WorldWideScience

Sample records for network-based internet environment

  1. Towards a dynamic social-network-based approach for service composition in the Internet of Things

    Science.gov (United States)

    Xu, Wen; Hu, Zheng; Gong, Tao; Zhao, Zhengzheng

    2011-12-01

    The User-Generated Service (UGS) concept allows end-users to create their own services as well as to share and manage the lifecycles of these services. The current development of the Internet-of-Things (IoT) has brought new challenges to the UGS area. Creating smart services in the IoT environment requires a dynamic social network that considers the relationship between people and things. In this paper, we consider the know-how required to best organize exchanges between users and things to enhance service composition. By surveying relevant aspects including service composition technology, social networks and a recommendation system, we present the first concept of our framework to provide recommendations for a dynamic social network-based means to organize UGSs in the IoT.

  2. Network-based analysis reveals functional connectivity related to internet addiction tendency

    Directory of Open Access Journals (Sweden)

    Tanya eWen

    2016-02-01

    Full Text Available IntroductionPreoccupation and compulsive use of the internet can have negative psychological effects, such that it is increasingly being recognized as a mental disorder. The present study employed network-based statistics to explore how whole-brain functional connections at rest is related to the extent of individual’s level of internet addiction, indexed by a self-rated questionnaire. We identified two topologically significant networks, one with connections that are positively correlated with internet addiction tendency, and one with connections negatively correlated with internet addiction tendency. The two networks are interconnected mostly at frontal regions, which might reflect alterations in the frontal region for different aspects of cognitive control (i.e., for control of internet usage and gaming skills. Next, we categorized the brain into several large regional subgroupings, and found that the majority of proportions of connections in the two networks correspond to the cerebellar model of addiction which encompasses the four-circuit model. Lastly, we observed that the brain regions with the most inter-regional connections associated with internet addiction tendency replicate those often seen in addiction literature, and is corroborated by our meta-analysis of internet addiction studies. This research provides a better understanding of large-scale networks involved in internet addiction tendency and shows that pre-clinical levels of internet addiction are associated with similar regions and connections as clinical cases of addiction.

  3. The Internet: A Learning Environment.

    Science.gov (United States)

    McGreal, Rory

    1997-01-01

    The Internet environment is suitable for many types of learning activities and teaching and learning styles. Every World Wide Web-based course should provide: home page; introduction; course overview; course requirements, vital information; roles and responsibilities; assignments; schedule; resources; sample tests; teacher biography; course…

  4. Designing Environment for Teaching Internet of Things

    Science.gov (United States)

    Simic, Konstantin; Vujin, Vladimir; Labus, Aleksandra; Stepanic, Ðorde; Stevanovic, Mladen

    2014-01-01

    One of the new topics taught at technical universities is Internet of Things. In this paper, a workshop for organizing a lab in academic environment for the subject Internet of Things is described. The architecture of the platform, scenario and a description of components used for creating the environment for learning Internet of things are also…

  5. Network-based collaborative research environment LDRD final report

    Energy Technology Data Exchange (ETDEWEB)

    Davies, B.R.; McDonald, M.J.

    1997-09-01

    The Virtual Collaborative Environment (VCE) and Distributed Collaborative Workbench (DCW) are new technologies that make it possible for diverse users to synthesize and share mechatronic, sensor, and information resources. Using these technologies, university researchers, manufacturers, design firms, and others can directly access and reconfigure systems located throughout the world. The architecture for implementing VCE and DCW has been developed based on the proposed National Information Infrastructure or Information Highway and a tool kit of Sandia-developed software. Further enhancements to the VCE and DCW technologies will facilitate access to other mechatronic resources. This report describes characteristics of VCE and DCW and also includes background information about the evolution of these technologies.

  6. Wireless sensor network-based greenhouse environment monitoring and automatic control system for dew condensation prevention.

    Science.gov (United States)

    Park, Dae-Heon; Park, Jang-Woo

    2011-01-01

    Dew condensation on the leaf surface of greenhouse crops can promote diseases caused by fungus and bacteria, affecting the growth of the crops. In this paper, we present a WSN (Wireless Sensor Network)-based automatic monitoring system to prevent dew condensation in a greenhouse environment. The system is composed of sensor nodes for collecting data, base nodes for processing collected data, relay nodes for driving devices for adjusting the environment inside greenhouse and an environment server for data storage and processing. Using the Barenbrug formula for calculating the dew point on the leaves, this system is realized to prevent dew condensation phenomena on the crop's surface acting as an important element for prevention of diseases infections. We also constructed a physical model resembling the typical greenhouse in order to verify the performance of our system with regard to dew condensation control.

  7. Wireless Sensor Network-Based Greenhouse Environment Monitoring and Automatic Control System for Dew Condensation Prevention

    Science.gov (United States)

    Park, Dae-Heon; Park, Jang-Woo

    2011-01-01

    Dew condensation on the leaf surface of greenhouse crops can promote diseases caused by fungus and bacteria, affecting the growth of the crops. In this paper, we present a WSN (Wireless Sensor Network)-based automatic monitoring system to prevent dew condensation in a greenhouse environment. The system is composed of sensor nodes for collecting data, base nodes for processing collected data, relay nodes for driving devices for adjusting the environment inside greenhouse and an environment server for data storage and processing. Using the Barenbrug formula for calculating the dew point on the leaves, this system is realized to prevent dew condensation phenomena on the crop’s surface acting as an important element for prevention of diseases infections. We also constructed a physical model resembling the typical greenhouse in order to verify the performance of our system with regard to dew condensation control. PMID:22163813

  8. Internet Self-Efficacy Preferences of Internet Based Environments and Achievement of Prospective Teachers

    Science.gov (United States)

    Ozyalcin Oskay, Ozge

    2011-01-01

    The aims of this study are to determine prospective chemistry teachers' internet self-efficacy and preferences of constructivist internet-assisted environments and to examine the relationship between their internet self-efficacy and their preferences for constructivist internet-assisted environments, the relationship between their achievement in…

  9. Network Based Educational Environment How Libraries and Librarians Become Organizers of Knowledge Access and Resources

    CERN Document Server

    Pettenati, M C; Pettenati, Corrado

    2000-01-01

    In this paper we will highlight some important issues which will influence the redefinition of roles and duties of libraries and librarians in a networked based educational environment. Although librarians will also keep their traditional roles of faculty support services as well as reference service and research assistance, we identify the participation in the instructional design process, the support in the evaluation, development and use of a proper authoring system and the customization of information access, as being the domains where libraries and librarians should mainly involve themselves in the next future and make profit of their expertise in information and knowledge organization in order to properly and effectively support the institutions in the use of Information Technology in education.

  10. Dynamic Optical Networks for Future Internet Environments

    Science.gov (United States)

    Matera, Francesco

    2014-05-01

    This article reports an overview on the evolution of the optical network scenario taking into account the exponential growth of connected devices, big data, and cloud computing that is driving a concrete transformation impacting the information and communication technology world. This hyper-connected scenario is deeply affecting relationships between individuals, enterprises, citizens, and public administrations, fostering innovative use cases in practically any environment and market, and introducing new opportunities and new challenges. The successful realization of this hyper-connected scenario depends on different elements of the ecosystem. In particular, it builds on connectivity and functionalities allowed by converged next-generation networks and their capacity to support and integrate with the Internet of Things, machine-to-machine, and cloud computing. This article aims at providing some hints of this scenario to contribute to analyze impacts on optical system and network issues and requirements. In particular, the role of the software-defined network is investigated by taking into account all scenarios regarding data centers, cloud computing, and machine-to-machine and trying to illustrate all the advantages that could be introduced by advanced optical communications.

  11. Internet Addiction Risk in the Academic Environment

    Science.gov (United States)

    Ellis, William F.; McAleer, Brenda; Szakas, Joseph S.

    2015-01-01

    The Internet's effect on society is growing exponentially. One only has to look at the growth of e-commerce, social media, wireless data access, and mobile devices to see how communication is changing. The need and desire for the Internet, especially in such disciplines as Computer Science or Computer Information Systems, pose a unique risk for…

  12. Remodelling Marketing Communications in an Internet Environment.

    Science.gov (United States)

    Rowley, Jennifer

    2001-01-01

    Argues that the Internet demands a significant review of approaches to marketing communications, or promotion, as both the strategic and tactical levels. Highlights include electronic business and electronic commerce; comparing organizational and consumer markets; service development; objectives of marketing communications; and questions for…

  13. Development of library documents in BRICEM on network-based environment

    International Nuclear Information System (INIS)

    Gao Renxi

    2010-01-01

    With the development of the internet, the transformation from a traditional library to a modem one is essential to the development of BRICEM (Beijing Research Institute of Chemical Engineering and Metallurgy) Technology Library and the situations of other libraries, this thesis integrates the reality of BRICEM and its library in an effort to work out a tentative plan, as well as concrete measures and procedures of digitalising and online-sharing the resources of BRICEM Technology Library. (author)

  14. Internet-centric collaborative design in a distributed environment

    International Nuclear Information System (INIS)

    Kim, Hyun; Kim, Hyoung Sun; Do, Nam Chul; Lee, Jae Yeol; Lee, Joo Haeng; Myong, Jae Hyong

    2001-01-01

    Recently, advanced information technologies including internet-related technology and distributed object technology have opened new possibilities for collaborative designs. In this paper, we discuss computer supports for collaborative design in a distributed environment. The proposed system is the internet-centric system composed of an engineering framework, collaborative virtual workspace and engineering service. It allows the distributed designers to more efficiently and collaboratively work their engineering tasks throughout the design process

  15. Interactive browsing of 3D environment over the Internet

    Science.gov (United States)

    Zhang, Cha; Li, Jin

    2000-12-01

    In this paper, we describe a system for wandering in a realistic environment over the Internet. The environment is captured by the concentric mosaic, compressed via the reference block coder (RBC), and accessed and delivered over the Internet through the virtual media (Vmedia) access protocol. Capturing the environment through the concentric mosaic is easy. We mount a camera at the end of a level beam, and shoot images as the beam rotates. The huge dataset of the concentric mosaic is then compressed through the RBC, which is specifically designed for both high compression efficiency and just-in-time (JIT) rendering. Through the JIT rendering function, only a portion of the RBC bitstream is accessed, decoded and rendered for each virtual view. A multimedia communication protocol -- the Vmedia protocol, is then proposed to deliver the compressed concentric mosaic data over the Internet. Only the bitstream segments corresponding to the current view are streamed over the Internet. Moreover, the delivered bitstream segments are managed by a local Vmedia cache so that frequently used bitstream segments need not be streamed over the Internet repeatedly, and the Vmedia is able to handle a RBC bitstream larger than its memory capacity. A Vmedia concentric mosaic interactive browser is developed where the user can freely wander in a realistic environment, e.g., rotate around, walk forward/backward and sidestep, even under a tight bandwidth of 33.6 kbps.

  16. Developing a virtualised testbed environment in preparation for testing of network based attacks

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2013-11-01

    Full Text Available Computer network attacks are difficult to simulate due to the damage they may cause to live networks and the complexity required simulating a useful network. We constructed a virtualised network within a vSphere ESXi environment which is able...

  17. Role of Librarian in Internet and World Wide Web Environment

    Directory of Open Access Journals (Sweden)

    K. Nageswara Rao

    2001-01-01

    Full Text Available The transition of traditional library collections to digital or virtual collections presented the librarian with new opportunities. The Internet, Web en-vironment and associated sophisticated tools have given the librarian a new dynamic role to play and serve the new information based society in bet-ter ways than hitherto. Because of the powerful features of Web i.e. distributed, heterogeneous, collaborative, multimedia, multi-protocol, hyperme-dia-oriented architecture, World Wide Web has revolutionized the way people access information, and has opened up new possibilities in areas such as digital libraries, virtual libraries, scientific information retrieval and dissemination. Not only the world is becoming interconnected, but also the use of Internet and Web has changed the fundamental roles, paradigms, and organizational culture of libraries and librarians as well. The article describes the limitless scope of Internet and Web, the existence of the librarian in the changing environment, parallelism between information sci-ence and information technology, librarians and intelligent agents, working of intelligent agents, strengths, weaknesses, threats and opportunities in-volved in the relationship between librarians and the Web. The role of librarian in Internet and Web environment especially as intermediary, facilita-tor, end-user trainer, Web site builder, researcher, interface designer, knowledge manager and sifter of information resources is also described.

  18. Role of Librarian in Internet and World Wide Web Environment

    OpenAIRE

    K. Nageswara Rao; KH Babu

    2001-01-01

    The transition of traditional library collections to digital or virtual collections presented the librarian with new opportunities. The Internet, Web en-vironment and associated sophisticated tools have given the librarian a new dynamic role to play and serve the new information based society in bet-ter ways than hitherto. Because of the powerful features of Web i.e. distributed, heterogeneous, collaborative, multimedia, multi-protocol, hyperme-dia-oriented architecture, World Wide Web has re...

  19. Social amplification of risk in the Internet environment.

    Science.gov (United States)

    Chung, Ik Jae

    2011-12-01

    This article analyzes the dynamic process of risk amplification in the Internet environment with special emphasis on public concern for environmental risks from a high-speed railway tunnel construction project in South Korea. Environmental organizations and activists serving as social stations collected information about the project and its ecological impact, and communicated this with the general public, social groups, and institutions. The Internet provides social stations and the public with an efficient means for interactive communication and an open space for active information sharing and public participation. For example, while the website of an organization such as an environmental activist group can initially trigger local interest, the Internet allows this information to be disseminated to a much wider audience in a manner unavailable to the traditional media. Interaction among social stations demonstrates an amplifying process of public attention to the risk. Analyses of the volume of readers' comments to online newspaper articles and public opinions posted on message board of public and nonprofit organizations show the ripple effects of the amplification process as measured along temporal, geographical, and sectoral dimensions. Public attention is also influenced by the symbolic connotations of risk information. Interpretations of risk in religious, political, or legal terms intensify public concern for the environmental risk. © 2011 Society for Risk Analysis.

  20. Foreign electronic information sources about environment in the Internet

    International Nuclear Information System (INIS)

    Svrsek, L.

    2005-01-01

    This presentation deals with external electronic information sources (e-sources) i. e. about data bases which are formed no by users or their institutes. Data bases are compiled by producers of data which are publishing in different forms and offerer it for users by different form. In the first part of contribution e-sources are described at the first generally. In the second part, some most significant data bases about environment in on-line medium of Internet, are described in detail

  1. Next Generation Integrated Environment for Collaborative Work Across Internets

    Energy Technology Data Exchange (ETDEWEB)

    Harvey B. Newman

    2009-02-24

    We are now well-advanced in our development, prototyping and deployment of a high performance next generation Integrated Environment for Collaborative Work. The system, aimed at using the capability of ESnet and Internet2 for rapid data exchange, is based on the Virtual Room Videoconferencing System (VRVS) developed by Caltech. The VRVS system has been chosen by the Internet2 Digital Video (I2-DV) Initiative as a preferred foundation for the development of advanced video, audio and multimedia collaborative applications by the Internet2 community. Today, the system supports high-end, broadcast-quality interactivity, while enabling a wide variety of clients (Mbone, H.323) to participate in the same conference by running different standard protocols in different contexts with different bandwidth connection limitations, has a fully Web-integrated user interface, developers and administrative APIs, a widely scalable video network topology based on both multicast domains and unicast tunnels, and demonstrated multiplatform support. This has led to its rapidly expanding production use for national and international scientific collaborations in more than 60 countries. We are also in the process of creating a 'testbed video network' and developing the necessary middleware to support a set of new and essential requirements for rapid data exchange, and a high level of interactivity in large-scale scientific collaborations. These include a set of tunable, scalable differentiated network services adapted to each of the data streams associated with a large number of collaborative sessions, policy-based and network state-based resource scheduling, authentication, and optional encryption to maintain confidentiality of inter-personal communications. High performance testbed video networks will be established in ESnet and Internet2 to test and tune the implementation, using a few target application-sets.

  2. Experimental Evaluation of Internet of Things in the Educational Environment

    Directory of Open Access Journals (Sweden)

    Amr Elsaadany

    2017-09-01

    Full Text Available In the trials of utilization of technology for the society, efforts have shown benefits of the ICT use in facilitating education from different perspectives based on different waves of technological change. The recent development in technologies has also resulted in change of user behavior and usage patterns towards different areas of life, and consequently in the area of education. A new wave of change has started and is expecting to proliferate with stronger connectivity and interoperability of various devices, named as the Internet of Things (IoT. The internet of things is expected to give strong impacts on different areas of life including healthcare, transportation, smart homes, smart campus, and more. Consequently, there are inherent benefits to the education environment that are not yet well established in literature. The paper studies the potential benefit and impact of the IoT evolution concept in both the physical and the virtual learning environment and suggests a paradigm with use case scenarios. The results of an experimental evaluation on the aspects of applying IoT technology in education are presented and discussed in order to verify the set of related hypotheses.

  3. Using Metadata to Build Geographic Information Sharing Environment on Internet

    Directory of Open Access Journals (Sweden)

    Chih-hong Sun

    1999-12-01

    Full Text Available Internet provides a convenient environment to share geographic information. Web GIS (Geographic Information System even provides users a direct access environment to geographic databases through Internet. However, the complexity of geographic data makes it difficult for users to understand the real content and the limitation of geographic information. In some cases, users may misuse the geographic data and make wrong decisions. Meanwhile, geographic data are distributed across various government agencies, academic institutes, and private organizations, which make it even more difficult for users to fully understand the content of these complex data. To overcome these difficulties, this research uses metadata as a guiding mechanism for users to fully understand the content and the limitation of geographic data. We introduce three metadata standards commonly used for geographic data and metadata authoring tools available in the US. We also review the current development of geographic metadata standard in Taiwan. Two metadata authoring tools are developed in this research, which will enable users to build their own geographic metadata easily.[Article content in Chinese

  4. Research on technology environment improvement of related industries based on internet governance

    Science.gov (United States)

    Zhang, Jing; Guan, Zhongliang

    2017-08-01

    The technology of Internet is an important factor of industry’s development. Constructing a good technical environment is the foundation of the Internet and related industries’ development. This paper demonstrates the necessity of the construction and improvement of the Internet and the related industries technology environment through comparing the current situation of the related industries. It also points out that China needs to improve the environment of the Internet technology urgently. The paper establishes the technology demand pattern of different related industries, and explores strategies of the different Internet technology environment’s construction and perfection according to the different demand of the strong related Internet and the weak related Internet to the industries environment. This paper analyzes the factors that threaten the security of the Internet, and fully demonstrates the methods and tactics of establishing and improving the technology environment Internet hardware, the Internet and related industries in China under the basis of the framework of comprehensive management of Internet. This paper also studies the construction and improvement of the comprehensive management technology environment based on the Internet industry in China.

  5. An adaptive network-based fuzzy inference system for short-term natural gas demand estimation: Uncertain and complex environments

    International Nuclear Information System (INIS)

    Azadeh, A.; Asadzadeh, S.M.; Ghanbari, A.

    2010-01-01

    Accurate short-term natural gas (NG) demand estimation and forecasting is vital for policy and decision-making process in energy sector. Moreover, conventional methods may not provide accurate results. This paper presents an adaptive network-based fuzzy inference system (ANFIS) for estimation of NG demand. Standard input variables are used which are day of the week, demand of the same day in previous year, demand of a day before and demand of 2 days before. The proposed ANFIS approach is equipped with pre-processing and post-processing concepts. Moreover, input data are pre-processed (scaled) and finally output data are post-processed (returned to its original scale). The superiority and applicability of the ANFIS approach is shown for Iranian NG consumption from 22/12/2007 to 30/6/2008. Results show that ANFIS provides more accurate results than artificial neural network (ANN) and conventional time series approach. The results of this study provide policy makers with an appropriate tool to make more accurate predictions on future short-term NG demand. This is because the proposed approach is capable of handling non-linearity, complexity as well as uncertainty that may exist in actual data sets due to erratic responses and measurement errors.

  6. Internet

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Internet. The latest communication revolution surrounds Internet. Some stats*:. 210 billion emails sent daily; 15 billion phone calls everyday; ~40 billion WWW links served everyday. * Source : The Radicati group.

  7. The Internet: A productive research environment for social scientists

    Directory of Open Access Journals (Sweden)

    Tulbure, B.T.

    2011-01-01

    Full Text Available Since the first web-studies in 1995, scientists have investigated the major issues regarding the new Internet based research methods, study designs and on-line data collection techniques. New software programs and manuals make it easy for newcomers to implement simple experimental procedures in cyberspace. Despite their limits, most researchers consider the advantages of Internet research as greater comparing with their disadvantages. The Internet has changed the major aspects of social sciences – from how researchers communicate to how they publish their studies.

  8. 670 investigating changes in coastal environment using internet

    African Journals Online (AJOL)

    Osondu

    the basis of this background, access to geospatial data through internet technology has become ... refer to different things in the strictest sense. .... maps, previous literature, and ground survey .... across a broad range of industries and.

  9. Designing Network-based Business Model Ontology

    DEFF Research Database (Denmark)

    Hashemi Nekoo, Ali Reza; Ashourizadeh, Shayegheh; Zarei, Behrouz

    2015-01-01

    Survival on dynamic environment is not achieved without a map. Scanning and monitoring of the market show business models as a fruitful tool. But scholars believe that old-fashioned business models are dead; as they are not included the effect of internet and network in themselves. This paper...... is going to propose e-business model ontology from the network point of view and its application in real world. The suggested ontology for network-based businesses is composed of individuals` characteristics and what kind of resources they own. also, their connections and pre-conceptions of connections...... such as shared-mental model and trust. However, it mostly covers previous business model elements. To confirm the applicability of this ontology, it has been implemented in business angel network and showed how it works....

  10. Targeting Children Online : Young internet users and producers in the commercial media environment

    OpenAIRE

    Martinez, Carolina

    2017-01-01

    Children’s daily internet usage takes place to a large extent in a commercial environment, where advertising and the sale of virtual goods are ever-present parts of the online experience. The overall goal of this thesis is to contribute to a critical understanding of children’s commercial online environment as spaces for children’s everyday life activities and participation, and as spaces for commercial interests that seek to target children and monetize their internet usage. Two papers analy...

  11. Data collection in Internet environment in social representations studies

    Directory of Open Access Journals (Sweden)

    Aline Vieira De Lima Nunes

    2011-01-01

    Full Text Available The present study aimed at comparing social representations structures concerning data collection procedures: through internet forms, diffused in the WWW, and through conventional paper and pencil questionnaire methods. O verall 893 individuals participated in the research, 58% of whom were female. A total of 217 questionnaires about the social representation on football (soccer and 218 about the representation on aging were answered by Brazilian university students in classrooms. Electronic versions of the same instrument were diffused through an internet forum linked to the same university. There were 238 answers for the football questionnaire and 230 for the aging one. The instrument asked participants to indicate five wordsor expressions related to one of the social objects. Sample characteristics and structural analyses were carried out separately for the two data collection procedures. Data indicated that internet-based research allows for higher sample diversity, but it is essential to guarantee the adoption of measures that can select only desired participants. Results also pointed out the need to take into account the nature of the social object to be investigated through internet research on representations, seeking to avoid self-selection effects, which can bias results, as it seems to have happened with the football social object.

  12. Internet, Multimedia and Virtual Laboratories in a 'Third World' Environment.

    Science.gov (United States)

    Monge-Najera, Julian Antonio; Rivas Rossi, Marta; Mendez-Estrada, Victor Hugo

    2001-01-01

    Describes the development of low-cost multimedia courses and materials for use on the Internet, as well as virtual laboratories, at the Universidad Estatal a Distancia (Costa Rica). Explains how simultaneous production of traditional printed materials and online courses, outsourcing, and the use of HTML and Java can reduce costs for developing…

  13. Network-Based Effectiveness

    National Research Council Canada - National Science Library

    Friman, Henrik

    2006-01-01

    ...) to increase competitive advantage, innovation, and mission effectiveness. Network-based effectiveness occurs due to the influence of various factors such as people, procedures, technology, and organizations...

  14. Internet

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    微软想要统治Internet,Windows XP就是这个计划中的一个组成部分。微软已经努力争取提供连接Internet的最方便、最完整的方法。新的操作系统含有Internet Explorer 6(IE6)、新的保密功能以及防火墙保护。Windows XP甚至包含有一个Macromedia Flash播放器插件。但是对Sun微系统公司的打击就是

  15. Learning by Doing Approach in the Internet Environment to Improve the Teaching Efficiency of Information Technology

    Science.gov (United States)

    Zhang, X.-S.; Xie, Hua

    This paper presents a learning-by-doing method in the Internet environment to enhance the results of information technology education by experimental work in the classroom of colleges. In this research, an practical approach to apply the "learning by doing" paradigm in Internet-based learning, both for higher educational environments and life-long training systems, taking into account available computer and network resources, such as blogging, podcasting, social networks, wiki etc. We first introduce the different phases in the learning process, which aimed at showing to the readers that the importance of the learning by doing paradigm, which is not implemented in many Internet-based educational environments. Secondly, we give the concept of learning by doing in the different perfective. Then, we identify the most important trends in this field, and give a real practical case for the application of this approach. The results show that the attempt methods are much better than traditional teaching methods.

  16. A QoS Scheme for a Congestion Core Network Based on Dissimilar QoS Structures in Smart-Phone Environments

    Science.gov (United States)

    Hong, Sung-Ryong; Na, Wonshik; Kang, Jang-Mook

    2010-01-01

    This study suggests an approach to effective transmission of multimedia content in a rapidly changing Internet environment including smart-phones. Guaranteeing QoS in networks is currently an important research topic. When transmitting Assured Forwarding (AF) packets in a Multi-DiffServ network environment, network A may assign priority in an order AF1, AF2, AF3 and AF4; on the other hand, network B may reverse the order to a priority AF4, AF3, AF2 and AF1. In this case, the AF1 packets that received the best quality of service in network A will receive the lowest in network B, which may result in dropping of packets in network B and vice versa. This study suggests a way to guarantee QoS between hosts by minimizing the loss of AF packet class when one network transmits AF class packets to another network with differing principles. It is expected that QoS guarantees and their experimental value may be utilized as principles which can be applied to various mobile-web environments based on smart-phones. PMID:22163453

  17. Performance Evaluation of a Dual Coverage System for Internet of Things Environments

    Directory of Open Access Journals (Sweden)

    Omar Said

    2016-01-01

    Full Text Available A dual coverage system for Internet of Things (IoT environments is introduced. This system is used to connect IoT nodes regardless of their locations. The proposed system has three different architectures, which are based on satellites and High Altitude Platforms (HAPs. In case of Internet coverage problems, the Internet coverage will be replaced with the Satellite/HAP network coverage under specific restrictions such as loss and delay. According to IoT requirements, the proposed architectures should include multiple levels of satellites or HAPs, or a combination of both, to cover the global Internet things. It was shown that the Satellite/HAP/HAP/Things architecture provides the largest coverage area. A network simulation package, NS2, was used to test the performance of the proposed multilevel architectures. The results indicated that the HAP/HAP/Things architecture has the best end-to-end delay, packet loss, throughput, energy consumption, and handover.

  18. Network-Based Effectiveness

    National Research Council Canada - National Science Library

    Friman, Henrik

    2006-01-01

    ... (extended from Leavitt, 1965). This text identifies aspects of network-based effectiveness that can benefit from a better understanding of leadership and management development of people, procedures, technology, and organizations...

  19. PREFERENCES ON INTERNET BASED LEARNING ENVIRONMENTS IN STUDENT-CENTERED EDUCATION

    Directory of Open Access Journals (Sweden)

    Zuhal CUBUKCU

    2008-10-01

    Full Text Available Nowadays, educational systems are being questionned to find effective solutions to problems that are being encountered, and discussions are centered around the ways of restructuring systems so as to overcome difficulties. As the consequences of the traditional teaching approach, we can indicate that the taught material is not long-lasting but easily forgotten, that students do not sufficiently acquire the knowledge and skills that are aimed at developing, and that students lack transferring their knowledge to real life. In our current situation, individuals prefer to use educational resources where and when they want, based on their individual skills and abilities. Throughout the world, because the internet infrastructure has developed quite rapidly, it has been offered as an alternative way for a rich learning and teaching environment. This study aims at determining teacher candidates’ preferences regarding internet-based learning environments in student-centered education by involving the teacher candidates enrolled at Osmangazi University, Faculty of Education, Primary School Teaching, Mathematics Teaching and Computer and Educational Technologies Education programmes. This study is a descriptive study. The data collection scale consists of the “Constructivist Internet-based Education of Science Scale (CILES-S”. The sample group of teacher candidates in the study showed differences with respect to their preferences regarding internet-based learning in student-centered education. The candidates scored higher in the internet-based learning environments of Cognitive Development and Critical Judgement. The lowest average scores of the sample group were observed in the internet-based learning environment of Episthemologic awareness.

  20. Learning in a Sheltered Internet Environment: The Use of WebQuests

    Science.gov (United States)

    Segers, Eliane; Verhoeven, Ludo

    2009-01-01

    The present study investigated the effects on learning in a sheltered Internet environment using so-called WebQuests in elementary school classrooms in the Netherlands. A WebQuest is an assignment presented together with a series of web pages to help guide children's learning. The learning gains and quality of the work of 229 sixth graders…

  1. Learning in a sheltered Internet environment: The use of WebQuests

    NARCIS (Netherlands)

    Segers, P.C.J.; Verhoeven, L.T.W.

    2009-01-01

    The present study investigated the effects on learning in a sheltered Internet environment using so-called WebQuests in elementary school classrooms in the Netherlands. A WebQuest is an assignment presented together with a series of web pages to help guide children's learning. The learning gains and

  2. New Challenges Facing Universities in the Internet-Driven Global Environment

    Science.gov (United States)

    Rajasingham, Lalita

    2011-01-01

    This paper explores some new challenges facing universities in a global multimediated Internet-based environment, as they seek alternative paradigms and options to remain true to their core business. At a time of rapid technological change, and contested, complex concepts associated with globalisation, knowledge is becoming a primary factor of…

  3. Old maps in the GIS and Internet environment

    Science.gov (United States)

    Křováková, K.; Brůna, V.; Pacina, J.

    2009-04-01

    Old maps are moreover used as data layers in GIS environment, both in raster or vector form. By comparing data from several time periods we can identify the main trends in landscape development and its spatial structure. The Laboratory of geoinformatics at Jan Evangelista Purkyně University, Czech republic is working on several projects concerned about analysis and visualization of old maps. On the poster are presented results of some of the projects solved at the laboratory. One of the most successful project is the web-application http://oldmaps.geolab.cz - where are online presented old maps from the region of Bohemia, Moravia and Silesia. On this server are accessible maps of the 1st, 2nd and partially 3rd military mapping, Müller's map of Bohemia and a part of survey operator of Stabile cadastre. On the poster are as well presented results from the Historical atlas of Czech towns and results from project solved for the National Park of Šumava in the area of Chlum.

  4. Challenges and Characteristics of Intelligent Autonomy for Internet of Battle Things in Highly Adversarial Environments

    OpenAIRE

    Kott, Alexander

    2018-01-01

    Numerous, artificially intelligent, networked things will populate the battlefield of the future, operating in close collaboration with human warfighters, and fighting as teams in highly adversarial environments. This paper explores the characteristics, capabilities and intelligence required of such a network of intelligent things and humans - Internet of Battle Things (IOBT). It will experience unique challenges that are not yet well addressed by the current generation of AI and machine lear...

  5. Big data and Internet of Things a roadmap for smart environments

    CERN Document Server

    Dobre, Ciprian

    2014-01-01

    This book presents current progress on challenges related to Big Data management by focusing on the particular challenges associated with context-aware data-intensive applications and services. The book is a state-of-the-art reference discussing progress made, as well as prompting future directions on the theories, practices, standards and strategies that are related to the emerging computational technologies and their association with supporting the Internet of Things advanced functioning for organizational settings including both business and e-science. Apart from inter-operable and inter-cooperative aspects, the book deals with a notable opportunity namely, the current trend in which a collectively shared and generated content is emerged from Internet end-users. Specifically, the book presents advances on managing and exploiting the vast size of data generated from within the smart environment (i.e. smart cities) towards an integrated, collective intelligence approach. The book also presents methods and pr...

  6. An Internet of Things platform architecture for supporting ambient assisted living environments.

    Science.gov (United States)

    Tsirmpas, Charalampos; Kouris, Ioannis; Anastasiou, Athanasios; Giokas, Kostas; Iliopoulou, Dimitra; Koutsouris, Dimitris

    2017-01-01

    Internet of Things (IoT) is the logical further development of today's Internet, enabling a huge amount of devices to communicate, compute, sense and act. IoT sensors placed in Ambient Assisted Living (AAL) environments, enable the context awareness and allow the support of the elderly in their daily routines, ultimately allowing an independent and safe lifestyle. The vast amount of data that are generated and exchanged between the IoT nodes require innovative context modeling approaches that go beyond currently used models. Current paper presents and evaluates an open interoperable platform architecture in order to utilize the technical characteristics of IoT and handle the large amount of generated data, as a solution to the technical requirements of AAL applications.

  7. Fake Plate Vehicle Auditing Based on Composite Constraints in Internet of Things Environment

    Science.gov (United States)

    Li, Shasha; Xiangji Huang, Jimmy; Tohti, Turdi

    2018-03-01

    Accordance to the real application demands, this paper proposes a fake plate vehicle auditing method based on composite constrains strategy, a corresponding simulated IOT (internet of things) environment was created and uses liner matrix, Base64 encryption and grid monitoring technology and puts forward a real-time detecting algorithm for fake plate vehicles. The developed real system not only shows the superiority on its speed, detection accuracy and visualization, it also be good at realizing the vehicle’s real-time position and predicting the possible traveling trajectory.

  8. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire (IRSN), 92 - Fontenay-aux-Roses (France)

    2009-07-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection, and environment shared by sites in France, Europe, big agencies and non-ionizing radiations. (N.C.)

  9. Implementing Internet of Things in a military command and control environment

    Science.gov (United States)

    Raglin, Adrienne; Metu, Somiya; Russell, Stephen; Budulas, Peter

    2017-05-01

    While the term Internet of Things (IoT) has been coined relatively recently, it has deep roots in multiple other areas of research including cyber-physical systems, pervasive and ubiquitous computing, embedded systems, mobile ad-hoc networks, wireless sensor networks, cellular networks, wearable computing, cloud computing, big data analytics, and intelligent agents. As the Internet of Things, these technologies have created a landscape of diverse heterogeneous capabilities and protocols that will require adaptive controls to effect linkages and changes that are useful to end users. In the context of military applications, it will be necessary to integrate disparate IoT devices into a common platform that necessarily must interoperate with proprietary military protocols, data structures, and systems. In this environment, IoT devices and data will not be homogeneous and provenance-controlled (i.e. single vendor/source/supplier owned). This paper presents a discussion of the challenges of integrating varied IoT devices and related software in a military environment. A review of contemporary commercial IoT protocols is given and as a practical example, a middleware implementation is proffered that provides transparent interoperability through a proactive message dissemination system. The implementation is described as a framework through which military applications can integrate and utilize commercial IoT in conjunction with existing military sensor networks and command and control (C2) systems.

  10. Collaborative Virtual 3D Environment for Internet-Accessible Physics Experiments

    Directory of Open Access Journals (Sweden)

    Bettina Scheucher

    2009-08-01

    Full Text Available Abstract—Immersive 3D worlds have increasingly raised the interest of researchers and practitioners for various learning and training settings over the last decade. These virtual worlds can provide multiple communication channels between users and improve presence and awareness in the learning process. Consequently virtual 3D environments facilitate collaborative learning and training scenarios. In this paper we focus on the integration of internet-accessible physics experiments (iLabs combined with the TEALsim 3D simulation toolkit in Project Wonderland, Sun's toolkit for creating collaborative 3D virtual worlds. Within such a collaborative environment these tools provide the opportunity for teachers and students to work together as avatars as they control actual equipment, visualize physical phenomenon generated by the experiment, and discuss the results. In particular we will outline the steps of integration, future goals, as well as the value of a collaboration space in Wonderland's virtual world.

  11. PSYCHOLOGICAL ASPECTS OF INVOLVEMENT OF YOUNG PEOPLE IN EXTREMIST GROUPS IN THE INTERNET ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    Olga V. Kruzhkova

    2016-01-01

    Full Text Available Abstract. The aim of the article is to consider the psychological characteristics of involvement of youth in extremist community through the Internet.Methods. The theoretical analysis and modeling were used as the main methods.Results. The Internet is described as a means and space of psychological influence on young people, which can be both positive and negative. Absorption of teenagers, boys and young men, in a virtual space essentially converts their activity and, as a result, transform the leading activity, which in turn leads to different mental tumors. Three main effects from the exposure of the Internet are found out: «the effect of the goals of drift», mythology and «the effect of excitement»; their impact on the individual in each age periods is noted. Consideration of the main motivational reasons, taking into account the specifics of building human interaction with the environment made it possible to identify and describe the main types of behavioural patterns exhibited by young people on the Internet. The degree of activity of young people in the network is described from the perspective of integrated strategies of behaviour: information blocking, changes in the distance, control, transformations. Risk groups of users, the most susceptible to extremist manipulations are designated. «Vulnerability areas» of representatives of each group are summarized and described; a step-by-step algorithm of victims’ involvement in extremist communities by recruiters is described.Scientific novelty of the present study consists in discussion of one of the most acute problems of the present – the changed conditions of a growing and socialization of younger generation; constant stay in network virtual space is an integral part of today’s existence, wherein unformed and immature person is very vulnerable to the influence of extremist content. To prevent the increased potential threat of involvement of young people in destructive, asocial

  12. The use of deep and surface learning strategies among students learning English as a foreign language in an Internet environment.

    Science.gov (United States)

    Aharony, Noa

    2006-12-01

    The learning context is learning English in an Internet environment. The examination of this learning process was based on the Biggs and Moore's teaching-learning model (Biggs & Moore, 1993). The research aims to explore the use of the deep and surface strategies in an Internet environment among EFL students who come from different socio-economic backgrounds. The results of the research may add an additional level to the understanding of students' functioning in the Internet environment. One hundred fourty-eight Israeli junior and high school students participated in this research. The methodology was based on special computer software: Screen Cam, which recorded the students' learning process. In addition, expert judges completed a questionnaire which examined and categorized the students' learning strategies. The research findings show a clear preference of participants from all socio-economic backgrounds towards the surface learning strategy. The findings also showed that students from the medium to high socio-economic background used both learning strategies more frequently than low socio-economic students. The results reflect the habits that students acquire during their adjustment process throughout their education careers. A brief encounter with the Internet learning environment apparently cannot change norms or habits, which were acquired in the non-Internet learning environment.

  13. Internet marketing

    OpenAIRE

    Zelený, Martin

    2009-01-01

    In the bachelor thesis are introduced theoretical concepts of the Internet and marketing, accented the need of marketing mix along with its specifics of the internet environment. Next is interpreted which tools can be used for marketing of firms and which marketing instruments are to be deployed. Final chapter illustrates socio-demographics of Czech internet users along with media market allocation from the perspective of all media as well as in the segment of the Internet.

  14. Internet-of-Things – A Layered Model for Business Environment

    Directory of Open Access Journals (Sweden)

    Logica BANICA

    2017-12-01

    Full Text Available The new concept of Internet of Things (IoT will increase the pace of globalization in business, overcoming spatial and temporal barriers, language and economic development. But, as any new concept emerged, it still has no widespread functional models and standards and, moreover, companies are not ready to accept all the changes proposed by IoT in the business environment. In this paper, as a case study, we propose an IoT model, based on collaboration between Fog/Edge and Cloud Computing, for developing a business in distribution and retail domain, with a multi-stores and multi-warehouses structures. The entire system is monitored by a hierarchical synchronization model, having the master clock server placed in the Cloud layer, and then, in subordinate relation, to the next level, the Fog/Edge layer, from which start signals simultaneously to the servers in the warehouses and to stores.

  15. Distributed interactive virtual environments for collaborative experiential learning and training independent of distance over Internet2.

    Science.gov (United States)

    Alverson, Dale C; Saiki, Stanley M; Jacobs, Joshua; Saland, Linda; Keep, Marcus F; Norenberg, Jeffrey; Baker, Rex; Nakatsu, Curtis; Kalishman, Summers; Lindberg, Marlene; Wax, Diane; Mowafi, Moad; Summers, Kenneth L; Holten, James R; Greenfield, John A; Aalseth, Edward; Nickles, David; Sherstyuk, Andrei; Haines, Karen; Caudell, Thomas P

    2004-01-01

    Medical knowledge and skills essential for tomorrow's healthcare professionals continue to change faster than ever before creating new demands in medical education. Project TOUCH (Telehealth Outreach for Unified Community Health) has been developing methods to enhance learning by coupling innovations in medical education with advanced technology in high performance computing and next generation Internet2 embedded in virtual reality environments (VRE), artificial intelligence and experiential active learning. Simulations have been used in education and training to allow learners to make mistakes safely in lieu of real-life situations, learn from those mistakes and ultimately improve performance by subsequent avoidance of those mistakes. Distributed virtual interactive environments are used over distance to enable learning and participation in dynamic, problem-based, clinical, artificial intelligence rules-based, virtual simulations. The virtual reality patient is programmed to dynamically change over time and respond to the manipulations by the learner. Participants are fully immersed within the VRE platform using a head-mounted display and tracker system. Navigation, locomotion and handling of objects are accomplished using a joy-wand. Distribution is managed via the Internet2 Access Grid using point-to-point or multi-casting connectivity through which the participants can interact. Medical students in Hawaii and New Mexico (NM) participated collaboratively in problem solving and managing of a simulated patient with a closed head injury in VRE; dividing tasks, handing off objects, and functioning as a team. Students stated that opportunities to make mistakes and repeat actions in the VRE were extremely helpful in learning specific principles. VRE created higher performance expectations and some anxiety among VRE users. VRE orientation was adequate but students needed time to adapt and practice in order to improve efficiency. This was also demonstrated successfully

  16. Service-Oriented Security Framework for Remote Medical Services in the Internet of Things Environment.

    Science.gov (United States)

    Lee, Jae Dong; Yoon, Tae Sik; Chung, Seung Hyun; Cha, Hyo Soung

    2015-10-01

    Remote medical services have been expanding globally, and this is expansion is steadily increasing. It has had many positive effects, including medical access convenience, timeliness of service, and cost reduction. The speed of research and development in remote medical technology has been gradually accelerating. Therefore, it is expected to expand to enable various high-tech information and communications technology (ICT)-based remote medical services. However, the current state lacks an appropriate security framework that can resolve security issues centered on the Internet of things (IoT) environment that will be utilized significantly in telemedicine. This study developed a medical service-oriented frame work for secure remote medical services, possessing flexibility regarding new service and security elements through its service-oriented structure. First, the common architecture of remote medical services is defined. Next medical-oriented secu rity threats and requirements within the IoT environment are identified. Finally, we propose a "service-oriented security frame work for remote medical services" based on previous work and requirements for secure remote medical services in the IoT. The proposed framework is a secure framework based on service-oriented cases in the medical environment. A com parative analysis focusing on the security elements (confidentiality, integrity, availability, privacy) was conducted, and the analysis results demonstrate the security of the proposed framework for remote medical services with IoT. The proposed framework is service-oriented structure. It can support dynamic security elements in accordance with demands related to new remote medical services which will be diversely generated in the IoT environment. We anticipate that it will enable secure services to be provided that can guarantee confidentiality, integrity, and availability for all, including patients, non-patients, and medical staff.

  17. Service-Oriented Security Framework for Remote Medical Services in the Internet of Things Environment

    Science.gov (United States)

    Lee, Jae Dong; Yoon, Tae Sik; Chung, Seung Hyun

    2015-01-01

    Objectives Remote medical services have been expanding globally, and this is expansion is steadily increasing. It has had many positive effects, including medical access convenience, timeliness of service, and cost reduction. The speed of research and development in remote medical technology has been gradually accelerating. Therefore, it is expected to expand to enable various high-tech information and communications technology (ICT)-based remote medical services. However, the current state lacks an appropriate security framework that can resolve security issues centered on the Internet of things (IoT) environment that will be utilized significantly in telemedicine. Methods This study developed a medical service-oriented frame work for secure remote medical services, possessing flexibility regarding new service and security elements through its service-oriented structure. First, the common architecture of remote medical services is defined. Next medical-oriented secu rity threats and requirements within the IoT environment are identified. Finally, we propose a "service-oriented security frame work for remote medical services" based on previous work and requirements for secure remote medical services in the IoT. Results The proposed framework is a secure framework based on service-oriented cases in the medical environment. A com parative analysis focusing on the security elements (confidentiality, integrity, availability, privacy) was conducted, and the analysis results demonstrate the security of the proposed framework for remote medical services with IoT. Conclusions The proposed framework is service-oriented structure. It can support dynamic security elements in accordance with demands related to new remote medical services which will be diversely generated in the IoT environment. We anticipate that it will enable secure services to be provided that can guarantee confidentiality, integrity, and availability for all, including patients, non-patients, and medical

  18. Usability and Feasibility of an Internet-Based Virtual Pedestrian Environment to Teach Children to Cross Streets Safely

    Science.gov (United States)

    Schwebel, David C.; McClure, Leslie A.; Severson, Joan

    2013-01-01

    Child pedestrian injury is a preventable global health challenge. Successful training efforts focused on child behavior, including individualized streetside training and training in large virtual pedestrian environments, are laborious and expensive. This study considers the usability and feasibility of a virtual pedestrian environment “game” application to teach children safe street-crossing behavior via the internet, a medium that could be broadly disseminated at low cost. Ten 7- and 8-year-old children participated. They engaged in an internet-based virtual pedestrian environment and completed a brief assessment survey. Researchers rated children's behavior while engaged in the game. Both self-report and researcher observations indicated the internet-based system was readily used by the children without adult support. The youth understood how to engage in the system and used it independently and attentively. The program also was feasible. It provided multiple measures of pedestrian safety that could be used for research or training purposes. Finally, the program was rated by children as engaging and educational. Researcher ratings suggested children used the program with minimal fidgeting or boredom. The pilot test suggests an internet-based virtual pedestrian environment offers a usable, feasible, engaging, and educational environment for child pedestrian safety training. If future research finds children learn the cognitive and perceptual skills needed to cross streets safely within it, internet-based training may provide a low-cost medium to broadly disseminate child pedestrian safety training. The concept may be generalized to other domains of health-related functioning such as teen driving safety, adolescent sexual risk-taking, and adolescent substance use. PMID:24678263

  19. Development of an effective virtual environment in eliciting craving in adolescents and young adults with internet gaming disorder

    Science.gov (United States)

    Shin, Yu-Bin; Kim, Jae-Jin; Kim, Min-Kyeong; Kyeong, Sunghyon; Jung, Young Hoon; Eom, Hyojung

    2018-01-01

    Internet gaming disorder (IGD) is a new disorder that warrants further investigation, as recently noted in the research criteria of the Diagnostic and Statistical Manual of Mental Disorders, Fifth Edition. Offering controlled environments that increase cue-induced craving, virtual reality cue-exposure therapy has been shown to be effective for some addiction disorders. To assess the feasibility of virtual reality for patients with IGD, this study aimed to develop virtual environments that represent risk situations for inducing craving, and assess the effect of virtual reality in cue reactivity. A total of 64 male adolescents and young adults (34 with IGD and 30 without) were recruited for participation. We developed a virtual internet café environment and the participants were exposed to four different tasks. As the primary feasibility outcome, cravings were measured with a visual analogue scale measuring current urge to play a game after exposure to each task. The virtual internet café induced significantly greater cravings in patients with IGD compared to controls. Additionally, patients exhibited a significantly higher acceptance rate of an avatar’s invitation to play a game together than that of controls. In IGD, craving response to the tasks was positively associated with the symptom severity score as measured by Young's Internet Addiction Test. These findings reveal that virtual reality laden with complex game-related cues could evoke game craving in patients with IGD and could be used in the treatment of IGD as a cue-exposure therapy tool for eliciting craving. PMID:29672530

  20. Development of an effective virtual environment in eliciting craving in adolescents and young adults with internet gaming disorder.

    Science.gov (United States)

    Shin, Yu-Bin; Kim, Jae-Jin; Kim, Min-Kyeong; Kyeong, Sunghyon; Jung, Young Hoon; Eom, Hyojung; Kim, Eunjoo

    2018-01-01

    Internet gaming disorder (IGD) is a new disorder that warrants further investigation, as recently noted in the research criteria of the Diagnostic and Statistical Manual of Mental Disorders, Fifth Edition. Offering controlled environments that increase cue-induced craving, virtual reality cue-exposure therapy has been shown to be effective for some addiction disorders. To assess the feasibility of virtual reality for patients with IGD, this study aimed to develop virtual environments that represent risk situations for inducing craving, and assess the effect of virtual reality in cue reactivity. A total of 64 male adolescents and young adults (34 with IGD and 30 without) were recruited for participation. We developed a virtual internet café environment and the participants were exposed to four different tasks. As the primary feasibility outcome, cravings were measured with a visual analogue scale measuring current urge to play a game after exposure to each task. The virtual internet café induced significantly greater cravings in patients with IGD compared to controls. Additionally, patients exhibited a significantly higher acceptance rate of an avatar's invitation to play a game together than that of controls. In IGD, craving response to the tasks was positively associated with the symptom severity score as measured by Young's Internet Addiction Test. These findings reveal that virtual reality laden with complex game-related cues could evoke game craving in patients with IGD and could be used in the treatment of IGD as a cue-exposure therapy tool for eliciting craving.

  1. The benefits of integrating Internet technology with standard communications for telemedicine in extreme environments.

    Science.gov (United States)

    Harnett, B M; Satava, R; Angood, P; Merriam, N R; Doarn, C R; Merrell, R C

    2001-12-01

    The ability to continuously monitor the vital signs of a person can be beneficial especially if the environment is hazardous or a person simply has general health concerns. We wanted to ascertain if, by integrating the Internet, ubiquitous switching technologies and off-the-shelf tools, this "suite of services" could provide a topology to enable remote monitoring in extreme and remote locations. An evaluation of this approach was conducted at the base camp of Mount Everest in the spring of 1999. Three climbers were outfitted with wireless, wearable sensors and transmitters for 24 h as they ascended through the Khumbu Icefall toward Camp One. The physiologic data was forwarded to the receiving station at Base Camp where it was forwarded to the U.S. mainland. Two of the three devices delivered physiologic data 95%-100% of the time while the third unit operated at only 78%. According to the climbers, the devices were unobtrusive, however, any additional weight while climbing Everest must provide advantage.

  2. Voice Over Internet Protocol (VoIP) in a Control Center Environment

    Science.gov (United States)

    Pirani, Joseph; Calvelage, Steven

    2010-01-01

    The technology of transmitting voice over data networks has been available for over 10 years. Mass market VoIP services for consumers to make and receive standard telephone calls over broadband Internet networks have grown in the last 5 years. While operational costs are less with VoIP implementations as opposed to time division multiplexing (TDM) based voice switches, is it still advantageous to convert a mission control center s voice system to this newer technology? Marshall Space Flight Center (MSFC) Huntsville Operations Support Center (HOSC) has converted its mission voice services to a commercial product that utilizes VoIP technology. Results from this testing, design, and installation have shown unique considerations that must be addressed before user operations. There are many factors to consider for a control center voice design. Technology advantages and disadvantages were investigated as they refer to cost. There were integration concerns which could lead to complex failure scenarios but simpler integration for the mission infrastructure. MSFC HOSC will benefit from this voice conversion with less product replacement cost, less operations cost and a more integrated mission services environment.

  3. Cognitive Maps, AI Agents and Personalized Virtual Environments in Internet Learning Experiences.

    Science.gov (United States)

    Maule, R. William

    1998-01-01

    Develops frameworks to help Internet media designers address end-user information presentation preferences by advancing structures for assessing metadata design variables which are then linked to user cognitive styles. An underlying theme is that artificial intelligence (AI) methodologies may be used to help automate the Internet media design…

  4. Towards an internet of things tangible program environment supported by indigenous African artefacts

    CSIR Research Space (South Africa)

    Smith, Andrew C

    2016-11-01

    Full Text Available According to its advocates, the Internet of Things holds great promise. Great strides have been made to address its security and standardise communication protocols for data exchange in this potentially unlimited network of connected things. However...

  5. Toward a Holistic Federated Future Internet Experimentation Environment: The Experience of NOVI Research and Experimentation

    NARCIS (Netherlands)

    Maglaris, V.; Papagianni, C.; Androulidakis, G.; Grammatikou, M.; Grosso, P.; van der Ham, J.; de Laat, C.; Pietrzak, B.; Belter, B.; Steger, J.; Laki, S.; Campanella, M.; Sallent, S.

    This article presents the design and pilot implementation of a suite of intelligent methods, algorithms, and tools for federating heterogeneous experimental platforms (domains) toward a holistic Future Internet experimentation ecosystem. The proposed framework developed within the NOVI research and

  6. A Study on Information Search and Commitment Strategies on Web Environment and Internet Usage Self-Efficacy Beliefs of University Students'

    Science.gov (United States)

    Geçer, Aynur Kolburan

    2014-01-01

    This study addresses university students' information search and commitment strategies on web environment and internet usage self-efficacy beliefs in terms of such variables as gender, department, grade level and frequency of internet use; and whether there is a significant relation between these beliefs. Descriptive method was used in the study.…

  7. Subject-Environment Interactions with Television and the Internet in the Context of Traditional and Modern Gender Representations

    Directory of Open Access Journals (Sweden)

    Lidskaya E.V.,

    2017-11-01

    Full Text Available The article focuses on the identification of the relationship between gender representations and subject-environment interactions using the example of TV and the Internet. Among the considered interactions are object, subject and quasi-subject types. The survey involved 400 respondents, 40% male and 60% female, aged 18 to 65 years. The respondents filled out two online questionnaires. One questionnaire (GRBS was aimed at assessing the respondents’ propensity to traditional or modern gender-role representations. The other questionnaire was a technique developed on the basis of eco-psychological types of interaction with the information environment. The study revealed a correlation between gender representations and the types of interaction with TV and the Internet. Interactions with TV most often refer to the object type, and least often to the quasi-subject one. The indicators for all three types of interactions were higher in the respondents with traditional gender beliefs as compared to the respondents with modern gender beliefs. The correlation between gender stereotypes and the Internet was found only in women and only in the case of quasi-subject type of interactions.

  8. Internet through the Eyes of 11-year-Old Children: First-Hand Experiences from the Technological Environment Children Live In

    Directory of Open Access Journals (Sweden)

    Harri Oinas-Kukkonen

    2009-01-01

    Full Text Available The aim of this research is to obtain a deeper understanding of children’s own views and experiences of using the Internet, and their attitudes towards parental supervision and the technological environment in which they are growing up. This article reports on a survey of Internet use among the fifth-grade pupils in ordinary Finnish schools. The population studied was a selected sample, and the data were analyzed both statistically and by qualitative methods. Nine out of ten children are regular Internet users, and every second child uses the Internet daily. The contemporary Internet seems to be a means for social interaction for girls and for playing games for boys. In more general terms, the Internet serves as a different kind of information vehicle, depending on the user.

  9. The Mobile Application Social Mode of Manufacturing Enterprise under the Environment of Mobile Internet

    Directory of Open Access Journals (Sweden)

    Zuo Cen

    2017-01-01

    Full Text Available The rapid development of the mobile internet, mobile communication technology and mobile terminal stimulate demand of mobile application in manufacturing enterprises, which makes the enterprise implement the mobile ERP. The implementation of mobile ERP changes the internal application management of manufacturing enterprises to social applications. We analyse the driving factors of implementing the mobile application social mode considering the complexity of organization relations and business processes of manufacturing enterprise. And then the mobile application social mode of the manufacturing enterprise is built based on mobile internet. Finally, we present the management strategies of the mobile application social network to provide references for the manufacturing enterprise.

  10. Innovative Second Language Speaking Practice with Interactive Videos in a Rich Internet Application Environment

    Science.gov (United States)

    Pereira, Juan A.; Sanz-Santamaría, Silvia; Montero, Raúl; Gutiérrez, Julián

    2012-01-01

    Attaining a satisfactory level of oral communication in a second language is a laborious process. In this action research paper we describe a new method applied through the use of interactive videos and the Babelium Project Rich Internet Application (RIA), which allows students to practice speaking skills through a variety of exercises. We present…

  11. An Overview and Analysis of Mobile Internet Protocols in Cellular Environments.

    Science.gov (United States)

    Chao, Han-Chieh

    2001-01-01

    Notes that cellular is the inevitable future architecture for the personal communication service system. Discusses the current cellular support based on Mobile Internet Protocol version 6 (Ipv6) and points out the shortfalls of using Mobile IP. Highlights protocols especially for mobile management schemes which can optimize a high-speed mobile…

  12. THE MOBILE SPACE AND MOBILE TARGETING ENVIRONMENT FOR INTERNET USERS: FEATURES OF MODEL SUBMISSION AND USING IN EDUCATION

    Directory of Open Access Journals (Sweden)

    V. Bykov

    2013-08-01

    Full Text Available Article submitted the results of the analysis of the use of mobile devices in education. The substantiation of the definition of user mobility in the Internet space, taking into account the variability of mobile devices and communications. The use of mobile devices in the educational process is based on the paradigm of open and equal access to quality education. Considered the technology of using different types of devices and their functions . The conditions of user mobility in the internet environment, the factors influencing it, the creation and storage of mobile communications resources . Provided with basic mathematical model of user behavior in a virtual network. A model of migration as a user from device to device , and its geographic move , and then use the resulting model for the design of distance learning systems . Preliminary forecasts have been made on the development of education in the transition from the remote technology to open. It is assumed the appearance of new types of personal devices that will combine the power of a desktop PC and the autonomy of smartphones with constant access for broadband wireless connection to the Internet. The use of cloud technology to store and process information resources training helps centralize and synchronize data and access to them from different devices.

  13. The relationship between internet-gaming experience and executive functions measured by virtual environment compared with conventional laboratory multitasks.

    Directory of Open Access Journals (Sweden)

    Yong-Quan Chen

    Full Text Available The aim of this study was to investigate if individuals with frequent internet gaming (IG experience exhibited better or worse multitasking ability compared with those with infrequent IG experience. The individuals' multitasking abilities were measured using virtual environment multitasks, such as Edinburgh Virtual Errands Test (EVET, and conventional laboratory multitasks, such as the dual task and task switching. Seventy-two young healthy college students participated in this study. They were split into two groups based on the time spent on playing online games, as evaluated using the Internet Use Questionnaire. Each participant performed EVET, dual-task, and task-switching paradigms on a computer. The current results showed that the frequent IG group performed better on EVET compared with the infrequent IG group, but their performance on the dual-task and task-switching paradigms did not differ significantly. The results suggest that the frequent IG group exhibited better multitasking efficacy if measured using a more ecologically valid task, but not when measured using a conventional laboratory multitasking task. The differences in terms of the subcomponents of executive function measured by these task paradigms were discussed. The current results show the importance of the task effect while evaluating frequent internet gamers' multitasking ability.

  14. Greening Internet of Things for Smart Everythings with A Green-Environment Life: A Survey and Future Prospects

    OpenAIRE

    Alsamhi, S. H.; Ma, Ou; Ansari, M. Samar; Meng, Qingliang

    2018-01-01

    Tremendous technology development in the field of Internet of Things (IoT) has changed the way we work and live. Although the numerous advantages of IoT are enriching our society, it should be reminded that the IoT also consumes energy, embraces toxic pollution and E-waste. These place new stress on the environments and smart world. In order to increase the benefits and reduce the harm of IoT, there is an increasing desire to move toward green IoT. Green IoT is seen as the future of IoT that ...

  15. Internet: An Innovative Environment for Information Dissemination, Access, and Retrieval in Distance Education

    OpenAIRE

    Tonta, Yaşar

    1995-01-01

    Information sources available through the networks such as the Internet and Bitnet have proliferated and diversified in recent years. Nowadays, in addition to textual information, multimedia databases containing `documents' with graphics, images, sound and animation can often be found on the network. Government agencies, various institutions, commercial companies, and, more recently, individuals themselves, can disseminate information and open their own databases to the use of others who have...

  16. Internet Inquiry

    DEFF Research Database (Denmark)

    This collection of dialogues is the only textbook of its kind. Internet Inquiry: Conversations About Method takes students into the minds of top internet researchers as they discuss how they have worked through critical challenges as they research online social environments. Editors Annette N....... Markham and Nancy K. Baym illustrate that good research choices are not random but are deliberate, studied, and internally consistent. Rather than providing single "how to" answers, this book presents distinctive and divergent viewpoints on how to think about and conduct qualitative internet studies....

  17. Logistics environment awareness system prototype based on modular Internet of Things platform

    OpenAIRE

    Aksentijević, Saša; Krnjak, David; Tijan, Edvard

    2015-01-01

    Internet of Things (IoT) is a completely new paradigm of interconnected computing devices in the market segment that has started emerging from 2013, while trends have been recognized in 2014 and most predictions are related to the period until 2020. Anticipating widespread use of IoT technology in logistics chains reported by leading sector players, a dedicated logistics testbed IoT platform named MiOT is created and tested using Raspberry PI minicomputer, with research goal to evaluate possi...

  18. Nuclear analysis via internet based on robocom, a robotic computing environment

    International Nuclear Information System (INIS)

    Kim, J.H.; Liu, J.; Foung, R.

    1997-01-01

    Nuclear engineers can resume the pioneering role the authors once played in network computing. The authors can transform Internet World Wide Web from offering information to offering analysis capabilities in the form of software robots that are capable of processing information of their own. Pooling such transmittable robots by the nuclear analysis community would represent a collaborative effort to automate nuclear engineering analysis. Samples of HTML files for a web site, a robot and its corresponding schematics are included to demonstrate the ease of implementation

  19. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6)

    OpenAIRE

    Jara, Antonio J.; Moreno-Sanchez, Pedro; Skarmeta, Antonio F.; Varakliotis, Socrates; Kirstein, Peter

    2013-01-01

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing spa...

  20. Internet flash of lightning

    International Nuclear Information System (INIS)

    Anon.

    2005-01-01

    Seven Internet sites are given relative to European Research and IAEA; Three sites in relation with optimization of radiation protection and environment, Google scolar, medicine, radioecology, finally seventeen Internet sites are detailed in this article. (N.C.)

  1. Internet marketing directed at children on food and restaurant websites in two policy environments.

    Science.gov (United States)

    Kent, M Potvin; Dubois, L; Kent, E A; Wanless, A J

    2013-04-01

    Food and beverage marketing has been associated with childhood obesity yet little research has examined the influence of advertising policy on children's exposure to food/beverage marketing on the Internet. The purpose of this study was to assess the influence of Quebec's Consumer Protection Act and the self-regulatory Canadian Children's Food and Beverage Advertising Initiative (CAI) on food manufacturer and restaurant websites in Canada. A content analysis of 147 French and English language food and restaurant websites was undertaken. The presence of child-directed content was assessed and an analysis of marketing features, games and activities, child protection features, and the promotion of healthy lifestyle messages was then examined on those sites with child-directed content. There were statistically no fewer French language websites (n = 22) with child-directed content compared to English language websites (n = 27). There were no statistically significant differences in the number of the various marketing features, or in the average number of marketing features between the English and French websites. There were no fewer CAI websites (n = 14) with child-directed content compared to non-CAI websites (n = 13). The CAI sites had more healthy lifestyle messages and child protection features compared to the non-CAI sites. Systematic surveillance of the Consumer Protection Act in Quebec is recommended. In the rest of Canada, the CAI needs to be significantly expanded or replaced by regulatory measures to adequately protect children from the marketing of foods/beverages high in fat, sugar, and sodium on the Internet. Copyright © 2012 The Obesity Society.

  2. Time-Aware Service Ranking Prediction in the Internet of Things Environment.

    Science.gov (United States)

    Huang, Yuze; Huang, Jiwei; Cheng, Bo; He, Shuqing; Chen, Junliang

    2017-04-27

    With the rapid development of the Internet of things (IoT), building IoT systems with high quality of service (QoS) has become an urgent requirement in both academia and industry. During the procedures of building IoT systems, QoS-aware service selection is an important concern, which requires the ranking of a set of functionally similar services according to their QoS values. In reality, however, it is quite expensive and even impractical to evaluate all geographically-dispersed IoT services at a single client to obtain such a ranking. Nevertheless, distributed measurement and ranking aggregation have to deal with the high dynamics of QoS values and the inconsistency of partial rankings. To address these challenges, we propose a time-aware service ranking prediction approach named TSRPred for obtaining the global ranking from the collection of partial rankings. Specifically, a pairwise comparison model is constructed to describe the relationships between different services, where the partial rankings are obtained by time series forecasting on QoS values. The comparisons of IoT services are formulated by random walks, and thus, the global ranking can be obtained by sorting the steady-state probabilities of the underlying Markov chain. Finally, the efficacy of TSRPred is validated by simulation experiments based on large-scale real-world datasets.

  3. Time-Aware Service Ranking Prediction in the Internet of Things Environment

    Directory of Open Access Journals (Sweden)

    Yuze Huang

    2017-04-01

    Full Text Available With the rapid development of the Internet of things (IoT, building IoT systems with high quality of service (QoS has become an urgent requirement in both academia and industry. During the procedures of building IoT systems, QoS-aware service selection is an important concern, which requires the ranking of a set of functionally similar services according to their QoS values. In reality, however, it is quite expensive and even impractical to evaluate all geographically-dispersed IoT services at a single client to obtain such a ranking. Nevertheless, distributed measurement and ranking aggregation have to deal with the high dynamics of QoS values and the inconsistency of partial rankings. To address these challenges, we propose a time-aware service ranking prediction approach named TSRPred for obtaining the global ranking from the collection of partial rankings. Specifically, a pairwise comparison model is constructed to describe the relationships between different services, where the partial rankings are obtained by time series forecasting on QoS values. The comparisons of IoT services are formulated by random walks, and thus, the global ranking can be obtained by sorting the steady-state probabilities of the underlying Markov chain. Finally, the efficacy of TSRPred is validated by simulation experiments based on large-scale real-world datasets.

  4. Fault Diagnosis Method for a Mine Hoist in the Internet of Things Environment.

    Science.gov (United States)

    Li, Juanli; Xie, Jiacheng; Yang, Zhaojian; Li, Junjie

    2018-06-13

    To reduce the difficulty of acquiring and transmitting data in mining hoist fault diagnosis systems and to mitigate the low efficiency and unreasonable reasoning process problems, a fault diagnosis method for mine hoisting equipment based on the Internet of Things (IoT) is proposed in this study. The IoT requires three basic architectural layers: a perception layer, network layer, and application layer. In the perception layer, we designed a collaborative acquisition system based on the ZigBee short distance wireless communication technology for key components of the mine hoisting equipment. Real-time data acquisition was achieved, and a network layer was created by using long-distance wireless General Packet Radio Service (GPRS) transmission. The transmission and reception platforms for remote data transmission were able to transmit data in real time. A fault diagnosis reasoning method is proposed based on the improved Dezert-Smarandache Theory (DSmT) evidence theory, and fault diagnosis reasoning is performed. Based on interactive technology, a humanized and visualized fault diagnosis platform is created in the application layer. The method is then verified. A fault diagnosis test of the mine hoisting mechanism shows that the proposed diagnosis method obtains complete diagnostic data, and the diagnosis results have high accuracy and reliability.

  5. Wireless Sensor Network Based Smart Parking System

    Directory of Open Access Journals (Sweden)

    Jeffrey JOSEPH

    2014-01-01

    Full Text Available Ambient Intelligence is a vision in which various devices come together and process information from multiple sources in order to exert control on the physical environment. In addition to computation and control, communication plays a crucial role in the overall functionality of such a system. Wireless Sensor Networks are one such class of networks, which meet these criteria. These networks consist of spatially distributed sensor motes which work in a co-operative manner to sense and control the environment. In this work, an implementation of an energy-efficient and cost-effective, wireless sensor networks based vehicle parking system for a multi-floor indoor parking facility has been introduced. The system monitors the availability of free parking slots and guides the vehicle to the nearest free slot. The amount of time the vehicle has been parked is monitored for billing purposes. The status of the motes (dead/alive is also recorded. Information like slot allocated, directions to the slot and billing data is sent as a message to customer’s mobile phones. This paper extends our previous work 1 with the development of a low cost sensor mote, about one tenth the cost of a commercially available mote, keeping in mind the price sensitive markets of the developing countries.

  6. Network-based production quality control

    Science.gov (United States)

    Kwon, Yongjin; Tseng, Bill; Chiou, Richard

    2007-09-01

    This study investigates the feasibility of remote quality control using a host of advanced automation equipment with Internet accessibility. Recent emphasis on product quality and reduction of waste stems from the dynamic, globalized and customer-driven market, which brings opportunities and threats to companies, depending on the response speed and production strategies. The current trends in industry also include a wide spread of distributed manufacturing systems, where design, production, and management facilities are geographically dispersed. This situation mandates not only the accessibility to remotely located production equipment for monitoring and control, but efficient means of responding to changing environment to counter process variations and diverse customer demands. To compete under such an environment, companies are striving to achieve 100%, sensor-based, automated inspection for zero-defect manufacturing. In this study, the Internet-based quality control scheme is referred to as "E-Quality for Manufacturing" or "EQM" for short. By its definition, EQM refers to a holistic approach to design and to embed efficient quality control functions in the context of network integrated manufacturing systems. Such system let designers located far away from the production facility to monitor, control and adjust the quality inspection processes as production design evolves.

  7. Interactivity and Explicit Memory Formation of Consumer Undergraduate Male Students on Internet Environment

    Directory of Open Access Journals (Sweden)

    George Bedinelli Rossi

    2016-01-01

    Full Text Available ABSTRACT This research aims to integrate the theories of Explicit Memory and Interactivity, contributing to the theoretical development of both. We investigated whether the interactivity precedes the explicit consumer memory. Data collection was carried on by sending online questionnaire to 876 undergraduate male students, with a return of 453 valid questionnaires. Data were analyzed using Structural Equation Modeling of the constructs Explicit Memory and Interactivity. The analyzes indicate that interactivity increases explicit consumer memory, filling a theoretical gap of this concept about its effects. Moreover, it is a concept related to the future, not only to the past and to present, as shown by the classical definitions. As for explicit memory, its formation results from the individual's interactions with the environment, which was not explained by classical theories. The results indicated that interactivity and explicit memory are almost independent of each other, having low correlation or almost nil.

  8. Analysis of the Macroscopic Behavior of Server Systems in the Internet Environment

    Directory of Open Access Journals (Sweden)

    Yusuke Tanimura

    2017-11-01

    Full Text Available Elasticity is one of the key features of cloud-hosted services built on virtualization technology. To utilize the elasticity of cloud environments, administrators should accurately capture the operational status of server systems, which changes constantly according to service requests incoming irregularly. However, it is difficult to detect and avoid in advance that operating services are falling into an undesirable state. In this paper, we focus on the management of server systems that include cloud systems, and propose a new method for detecting the sign of undesirable scenarios before the system becomes overloaded as a result of various causes. In this method, a measure that utilizes the fluctuation of the macroscopic operational state observed in the server system is introduced. The proposed measure has the property of drastically increasing before the server system is in an undesirable state. Using the proposed measure, we realize a function to detect that the server system is falling into an overload scenario, and we demonstrate its effectiveness through experiments.

  9. A behavioral framework for capturing emotional information in an internet of things environment

    Science.gov (United States)

    Luis-Ferreira, Fernando; Jardim-Goncalves, Ricardo

    2013-10-01

    Life in modern societies implies a close relationship with many types of devices. The diversity of such devices has impact in diverse areas of our life as some provide support for management tasks, others just provide information, and most of them follow us anywhere and anytime. The more widespread example is mobile phones, but others also follow us, like our music devices or even our car with many electronic systems. In a recent past a phone was something to talk with others and a car was just a vehicle, with an engine, to allow displacement of people and goods. A phone would support voice conversation and a car had the equipment needed to take us to some destination. But these days all those devices and vehicles have computer equipment and some include complex functions and sensory abilities. We cannot question how useful those devices are for every day's activities but it is questionable how those devices respect our nature and address our needs of perceptive and emotive human beings. How far can those devices retrieve information about our nature, and our feelings, and what kind of information and reasoning those devices can provide to users? The proposed framework, by capturing and managing sensorial and physiological information, will feed information that enable the reasoning of emotional knowledge in an IoT environment.

  10. A User-Centric Knowledge Creation Model in a Web of Object-Enabled Internet of Things Environment

    Science.gov (United States)

    Kibria, Muhammad Golam; Fattah, Sheik Mohammad Mostakim; Jeong, Kwanghyeon; Chong, Ilyoung; Jeong, Youn-Kwae

    2015-01-01

    User-centric service features in a Web of Object-enabled Internet of Things environment can be provided by using a semantic ontology that classifies and integrates objects on the World Wide Web as well as shares and merges context-aware information and accumulated knowledge. The semantic ontology is applied on a Web of Object platform to virtualize the real world physical devices and information to form virtual objects that represent the features and capabilities of devices in the virtual world. Detailed information and functionalities of multiple virtual objects are combined with service rules to form composite virtual objects that offer context-aware knowledge-based services, where context awareness plays an important role in enabling automatic modification of the system to reconfigure the services based on the context. Converting the raw data into meaningful information and connecting the information to form the knowledge and storing and reusing the objects in the knowledge base can both be expressed by semantic ontology. In this paper, a knowledge creation model that synchronizes a service logistic model and a virtual world knowledge model on a Web of Object platform has been proposed. To realize the context-aware knowledge-based service creation and execution, a conceptual semantic ontology model has been developed and a prototype has been implemented for a use case scenario of emergency service. PMID:26393609

  11. A User-Centric Knowledge Creation Model in a Web of Object-Enabled Internet of Things Environment

    Directory of Open Access Journals (Sweden)

    Muhammad Golam Kibria

    2015-09-01

    Full Text Available User-centric service features in a Web of Object-enabled Internet of Things environment can be provided by using a semantic ontology that classifies and integrates objects on the World Wide Web as well as shares and merges context-aware information and accumulated knowledge. The semantic ontology is applied on a Web of Object platform to virtualize the real world physical devices and information to form virtual objects that represent the features and capabilities of devices in the virtual world. Detailed information and functionalities of multiple virtual objects are combined with service rules to form composite virtual objects that offer context-aware knowledge-based services, where context awareness plays an important role in enabling automatic modification of the system to reconfigure the services based on the context. Converting the raw data into meaningful information and connecting the information to form the knowledge and storing and reusing the objects in the knowledge base can both be expressed by semantic ontology. In this paper, a knowledge creation model that synchronizes a service logistic model and a virtual world knowledge model on a Web of Object platform has been proposed. To realize the context-aware knowledge-based service creation and execution, a conceptual semantic ontology model has been developed and a prototype has been implemented for a use case scenario of emergency service.

  12. A User-Centric Knowledge Creation Model in a Web of Object-Enabled Internet of Things Environment.

    Science.gov (United States)

    Kibria, Muhammad Golam; Fattah, Sheik Mohammad Mostakim; Jeong, Kwanghyeon; Chong, Ilyoung; Jeong, Youn-Kwae

    2015-09-18

    User-centric service features in a Web of Object-enabled Internet of Things environment can be provided by using a semantic ontology that classifies and integrates objects on the World Wide Web as well as shares and merges context-aware information and accumulated knowledge. The semantic ontology is applied on a Web of Object platform to virtualize the real world physical devices and information to form virtual objects that represent the features and capabilities of devices in the virtual world. Detailed information and functionalities of multiple virtual objects are combined with service rules to form composite virtual objects that offer context-aware knowledge-based services, where context awareness plays an important role in enabling automatic modification of the system to reconfigure the services based on the context. Converting the raw data into meaningful information and connecting the information to form the knowledge and storing and reusing the objects in the knowledge base can both be expressed by semantic ontology. In this paper, a knowledge creation model that synchronizes a service logistic model and a virtual world knowledge model on a Web of Object platform has been proposed. To realize the context-aware knowledge-based service creation and execution, a conceptual semantic ontology model has been developed and a prototype has been implemented for a use case scenario of emergency service.

  13. Internet user behaviour

    Directory of Open Access Journals (Sweden)

    Radbâță, A.

    2011-01-01

    Full Text Available Internet is a useful tool for everybody in a technologically advanced world. As Internet appears and develops, it creates a totally new network environment. The development of commerce on the Internet based on virtual communities has become one of the most successful business models in the world. After analyzing the concept of internet, the e-commerce market and its marketing mix and the benefits and limitations of the Internet, we have presented a few studies on Internet user behaviour. Furthermore, the paper looks at a representative sample of Romanian internet users. The results reveal that the Romanians are using the Internet especially for information gathering, e-mail, entertainment and social networking.

  14. THE MOBILE SPACE AND MOBILE TARGETING ENVIRONMENT FOR INTERNET USERS: FEATURES OF MODEL SUBMISSION AND USING IN EDUCATION

    OpenAIRE

    V. Bykov

    2013-01-01

    Article submitted the results of the analysis of the use of mobile devices in education. The substantiation of the definition of user mobility in the Internet space, taking into account the variability of mobile devices and communications. The use of mobile devices in the educational process is based on the paradigm of open and equal access to quality education. Considered the technology of using different types of devices and their functions . The conditions of user mobility in the internet ...

  15. INTERNET FORUM AS AN ENVIRONMENT OF PSYCHOLOGICAL SUPPORT OF MARRIED COUPLES FROM THE FAMILIES OF MIGRANT WORKERS IN A SITUATION OF FORCED SEPARATION

    Directory of Open Access Journals (Sweden)

    Gritsenko Valentina Vasilievna

    2013-04-01

    Full Text Available The purpose of this work is to describe the psychological characteristics of communication of forum members concerning the situation of forced separation of married couples in a situation of labor migration. Practical relevance and novelty of the work is to identify opportunities of the Internet environment for psychological support for migrant workers’ families. Through the method of content analysis of materials of the Internet forums, the motives for applying for psychological support of family members to the participants of virtual communication in the situations of labor migration are identified, the reactions of the forum members on the suggested topics are analyzed. It is noted that the actuality of applying to the Internet resources often occurs at the stage of taking a decision of labor migration, rarely - at the stage of separation, as a rule, by the remaining partner. Most forum members assess a situation of going of one of the partners to work critically, describing negative scenarios. The article deals with coping strategies described on the forum which are estimated as the point of support, the expansion of psychological experience in a situation of forced separation. The examples of adaptive, not adaptive or relatively adaptive coping mechanisms implemented by the Forum members are given. The final conclusion of the article is an overview of possibility of communication in the Internet forums to search for effective strategies for coping with the situation of forced separation due to migration.

  16. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire - IRSN, 92 - Clamart (France)

    2011-01-15

    This section gathers a selection of Internet links to online articles dealing with radiation protection issues. Below are the titles of the papers with their web site source: 1 - A mission of the European Commission verifies the proper enforcement by France of the EURATOM treaty dispositions relative to the control of radioactivity in the vicinity of uranium mines (http://www.asn.fr); 2 - tritium contamination at Saint-Maur-des-Fosses: new results from measurements performed by IRSN in the environment; 3 - status of radioactivity monitoring in French Polynesia in 2009 (http://www.irsn.fr); 4 - study of mortality and cancers impact near the Aube facility for low- and medium-activity waste storage (http://www.invs.sante.fr); 5 - Marcel Jurien de la Graviere appointed president of the guidance committee of the defense nuclear expertise of the Institute of radiation protection and nuclear safety (IRSN) (http://www.legifrance.gouv.fr); 6 - radiation protection 163: 'Childhood Leukaemia - Mechanisms and Causes'; 7- Radiation Protection 164: Radioactive effluents from nuclear power stations and nuclear fuel reprocessing sites in the European Union, 2004-08; 8 - Radiation Protection 165: Medical Effectiveness of Iodine Prophylaxis in a Nuclear Reactor Emergency Situation and Overview of European Practices Protection (http://ec.europa.eu); 9 - Report RIFE 15: Radioactivity in Food and the Environment - RIFE (SEPA - Scottish Environment Protection Agency, http://www.sepa.org.uk); 10 - HPA response statement: Advisory Group on Ionising Radiation's report on circulatory disease risk (HPA - Health Protection Agency, http://www.hpa.org.uk); 11 - launching of the national database for the voluntary registering of (quasi) incidents (AFCN - Federal agency of nuclear control, http://www.fanc.fgov.be); 12 - Radiation dose optimization in nuclear medicine (IAEA RPOP - Radiation Protection Of Patients, http://rpop.iaea.org); 13 - The government of Canada finances

  17. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Societe Francaise de Radioprotection, 75 - Paris (France)

    2008-04-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection,radioecology, nuclear laws. To note three sites treat the accident of radiotherapy arisen to Toulouse. (N.C.)

  18. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    2010-01-15

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  19. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [Institut de Radioprotection et de Surete Nucleaire, IRSN, 92 - Fontenay aux Roses (France)

    2009-10-15

    Numerous Internet sites are given in relation with radiotherapy, nuclear medicine and ionizing radiation, nuclear activity, radiation protection for populations, radioactive waste management in France and Europe. (N.C.)

  20. Elements of Network-Based Assessment

    Science.gov (United States)

    Gibson, David

    2007-01-01

    Elements of network-based assessment systems are envisioned based on recent advances in knowledge and practice in learning theory, assessment design and delivery, and semantic web interoperability. The architecture takes advantage of the meditating role of technology as well as recent models of assessment systems. This overview of the elements…

  1. Towards a comfortable, energy-efficient office using a publish-subscribe pattern in an internet of things environment

    CSIR Research Space (South Africa)

    Butgereit, LL

    2014-09-01

    Full Text Available an implementation of the pub-sub pattern specifically for an Internet of Things platform which operated at four levels –sensors (and actuator), Supervisors, Middleware, and application. This platform was specifically instantiated to control a typical office meeting...

  2. Internet marketing global features

    Directory of Open Access Journals (Sweden)

    Rakita Branko

    2005-01-01

    Full Text Available Business environment incessantly bringing a yard of a new challenges to market entities. One of the greatest challenges that companies faced during the last couple of decades was development of information systems as well as a large scale usage of world's greatest computer network - Internet - no matter how big they were or what their activities included. There are many papers about Internet, its development, social and economic significance. However, there is no paper or article written by a local author that systematically and thoroughly treats marketing importance of Internet. This paper presents potentials and business importance of internet marketing in new millennium. It considers internet as a communication, trade and distribution channel. In addition, the paper highlights research potentials of Internet.

  3. Network-based Approaches in Pharmacology.

    Science.gov (United States)

    Boezio, Baptiste; Audouze, Karine; Ducrot, Pierre; Taboureau, Olivier

    2017-10-01

    In drug discovery, network-based approaches are expected to spotlight our understanding of drug action across multiple layers of information. On one hand, network pharmacology considers the drug response in the context of a cellular or phenotypic network. On the other hand, a chemical-based network is a promising alternative for characterizing the chemical space. Both can provide complementary support for the development of rational drug design and better knowledge of the mechanisms underlying the multiple actions of drugs. Recent progress in both concepts is discussed here. In addition, a network-based approach using drug-target-therapy data is introduced as an example. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.

  4. Internet enlightens; Internet eclaire

    Energy Technology Data Exchange (ETDEWEB)

    Figueiredo, S. [IRSN, 92 - Fontenay-aux-Roses (France)

    2010-04-15

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection in nuclear medicine, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  5. A Quantum Cryptography Communication Network Based on Software Defined Network

    Directory of Open Access Journals (Sweden)

    Zhang Hongliang

    2018-01-01

    Full Text Available With the development of the Internet, information security has attracted great attention in today’s society, and quantum cryptography communication network based on quantum key distribution (QKD is a very important part of this field, since the quantum key distribution combined with one-time-pad encryption scheme can guarantee the unconditional security of the information. The secret key generated by quantum key distribution protocols is a very valuable resource, so making full use of key resources is particularly important. Software definition network (SDN is a new type of network architecture, and it separates the control plane and the data plane of network devices through OpenFlow technology, thus it realizes the flexible control of the network resources. In this paper, a quantum cryptography communication network model based on SDN is proposed to realize the flexible control of quantum key resources in the whole cryptography communication network. Moreover, we propose a routing algorithm which takes into account both the hops and the end-to-end availible keys, so that the secret key generated by QKD can be used effectively. We also simulate this quantum cryptography communication network, and the result shows that based on SDN and the proposed routing algorithm the performance of this network is improved since the effective use of the quantum key resources.

  6. Bibliographical resources available in the Internet about dangerous substances and residues and their influence in the environment in the period 1975-2005 Recursos bibliográficos disponibles en Internet sobre sustancias y residuos peligrosos y su influencia en el medio ambiente en el periodo 1975 a 2005

    Directory of Open Access Journals (Sweden)

    Elena Ronda-Pérez

    2008-06-01

    Full Text Available Introduction. The Internet has become the most used source of biomedical information. The documentation, produced by the public and private institutions, in relation with the dangerous substances that can recover in the Internet is fundamental for the prevention of this type of risks. Objective. To locate and to check the available documents in the Internet about dangerous substances, dangerous residues, including inert, and his influence in the environment in the period 1975 - 2005. Material and Method. Descriptive and cross sectional study of the results of the bibliographical searches made in the Internet, in the corresponding databases. Results. It has been recognized 162 records that expire with the requirements indicated in the pre-established methodology. Discussion. With respect to the environmental documentation present in the Internet it seems to be suitable to increase his diffusion and to improve his classification and accessibility.Introducción. Internet se ha convertido en una fuente de información biomédica cada vez más utilizada. La documentación producida por las instituciones públicas y privadas, en relación con las sustancias peligrosas que se pueden recuperar en Internet, es fundamental para la prevención de este tipo de riesgos. Objetivo. Localizar y revisar los documentos disponibles en Internet sobre sustancias peligrosas, residuos peligrosos, incluyendo inertes, y su influencia en el medio ambiente en el periodo 1975 a 2005. Material y método. Estudio descriptivo transversal de los resultados de las búsquedas bibliográficas efectuadas en Internet, en las correspondientes bases de datos. Resultados. Se han reconocido 162 registros que cumplen con los requisitos señalados en la metodología preestablecida. Discusión. Con respecto a la documentación medioambiental pre- sente en Internet, parece conveniente incrementar su difusión y mejorar su clasificación y accesibilidad.

  7. Autonomous power networks based power system

    International Nuclear Information System (INIS)

    Jokic, A.; Van den Bosch, P.P.J.

    2006-01-01

    This paper presented the concept of autonomous networks to cope with this increased complexity in power systems while enhancing market-based operation. The operation of future power systems will be more challenging and demanding than present systems because of increased uncertainties, less inertia in the system, replacement of centralized coordinating activities by decentralized parties and the reliance on dynamic markets for both power balancing and system reliability. An autonomous network includes the aggregation of networked producers and consumers in a relatively small area with respect to the overall system. The operation of an autonomous network is coordinated and controlled with one central unit acting as an interface between internal producers/consumers and the rest of the power system. In this study, the power balance problem and system reliability through provision of ancillary services was formulated as an optimization problem for the overall autonomous networks based power system. This paper described the simulation of an optimal autonomous network dispatching in day ahead markets, based on predicted spot prices for real power, and two ancillary services. It was concluded that large changes occur in a power systems structure and operation, most of them adding to the uncertainty and complexity of the system. The introduced concept of an autonomous power network-based power system was shown to be a realistic and consistent approach to formulate and operate a market-based dispatch of both power and ancillary services. 9 refs., 4 figs

  8. Internet Factories

    NARCIS (Netherlands)

    Strijkers, R.J.

    2014-01-01

    This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet

  9. Internet factories

    NARCIS (Netherlands)

    Strijkers, R.J.

    2014-01-01

    This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet

  10. Internet Economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1998-01-01

    Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing.......Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing....

  11. Internet economics

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm

    1997-01-01

    A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect.......A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect....

  12. An overview of structurally complex network-based modeling of public opinion in the “We the Media” era

    Science.gov (United States)

    Wang, Guanghui; Wang, Yufei; Liu, Yijun; Chi, Yuxue

    2018-05-01

    As the transmission of public opinion on the Internet in the “We the Media” era tends to be supraterritorial, concealed and complex, the traditional “point-to-surface” transmission of information has been transformed into “point-to-point” reciprocal transmission. A foundation for studies of the evolution of public opinion and its transmission on the Internet in the “We the Media” era can be laid by converting the massive amounts of fragmented information on public opinion that exists on “We the Media” platforms into structurally complex networks of information. This paper describes studies of structurally complex network-based modeling of public opinion on the Internet in the “We the Media” era from the perspective of the development and evolution of complex networks. The progress that has been made in research projects relevant to the structural modeling of public opinion on the Internet is comprehensively summarized. The review considers aspects such as regular grid-based modeling of the rules that describe the propagation of public opinion on the Internet in the “We the Media” era, social network modeling, dynamic network modeling, and supernetwork modeling. Moreover, an outlook for future studies that address complex network-based modeling of public opinion on the Internet is put forward as a summary from the perspective of modeling conducted using the techniques mentioned above.

  13. Internet accounting

    NARCIS (Netherlands)

    Pras, Aiko; van Beijnum, Bernhard J.F.; Sprenkels, Ron; Parhonyi, R.

    2001-01-01

    This article provides an introduction to Internet accounting and discusses the status of related work within the IETF and IRTF, as well as certain research projects. Internet accounting is different from accounting in POTS. To understand Internet accounting, it is important to answer questions like

  14. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  15. Internet plan and planning

    Directory of Open Access Journals (Sweden)

    Kahriman Emina

    2008-01-01

    Full Text Available Paper discuss specific features of internet plan as well as planning as management process in general in the contemporary environment. No need to stress out that marketing plan and marketing planning is core activity in approaching to market. At the same time, there are a lot specific c request in preparing marketing plan comparing to business planning due to marketing plan is an essential part. The importance of internet plan and planning rely on specific features of the internet network but as a part of general corporate as well as marketing strategy.

  16. Internet of things

    OpenAIRE

    Salazar Soler, Jorge; Silvestre Bergés, Santiago

    2015-01-01

    This is an introductory course to the IoT (Internet of things). In the early chapters the basics about the IoT are introduced. Then basics of IPv6 internet protocol that is the most used in IoT environment as well as main applications, the current state of the market and the technologies that enable the existence of the IoT are described. Finally the future challenges that are considered most important are discussed. Peer Reviewed

  17. Network Based High Speed Product Innovation

    DEFF Research Database (Denmark)

    Lindgren, Peter

    In the first decade of the 21st century, New Product Development has undergone major changes in the way NPD is managed and organised. This is due to changes in technology, market demands, and in the competencies of companies. As a result NPD organised in different forms of networks is predicted...... to be of ever-increasing importance to many different kinds of companies. This happens at the same times as the share of new products of total turnover and earnings is increasing at unprecedented speed in many firms and industries. The latter results in the need for very fast innovation and product development...... - a need that can almost only be resolved by organising NPD in some form of network configuration. The work of Peter Lindgren is on several aspects of network based high speed product innovation and contributes to a descriptive understanding of this phenomenon as well as with normative theory on how NPD...

  18. Quantum networks based on cavity QED

    Energy Technology Data Exchange (ETDEWEB)

    Ritter, Stephan; Bochmann, Joerg; Figueroa, Eden; Hahn, Carolin; Kalb, Norbert; Muecke, Martin; Neuzner, Andreas; Noelleke, Christian; Reiserer, Andreas; Uphoff, Manuel; Rempe, Gerhard [Max-Planck-Institut fuer Quantenoptik, Hans-Kopfermann-Strasse 1, 85748 Garching (Germany)

    2014-07-01

    Quantum repeaters require an efficient interface between stationary quantum memories and flying photons. Single atoms in optical cavities are ideally suited as universal quantum network nodes that are capable of sending, storing, retrieving, and even processing quantum information. We demonstrate this by presenting an elementary version of a quantum network based on two identical nodes in remote, independent laboratories. The reversible exchange of quantum information and the creation of remote entanglement are achieved by exchange of a single photon. Quantum teleportation is implemented using a time-resolved photonic Bell-state measurement. Quantum control over all degrees of freedom of the single atom also allows for the nondestructive detection of flying photons and the implementation of a quantum gate between the spin state of the atom and the polarization of a photon upon its reflection from the cavity. Our approach to quantum networking offers a clear perspective for scalability and provides the essential components for the realization of a quantum repeater.

  19. Network-based recommendation algorithms: A review

    Science.gov (United States)

    Yu, Fei; Zeng, An; Gillard, Sébastien; Medo, Matúš

    2016-06-01

    Recommender systems are a vital tool that helps us to overcome the information overload problem. They are being used by most e-commerce web sites and attract the interest of a broad scientific community. A recommender system uses data on users' past preferences to choose new items that might be appreciated by a given individual user. While many approaches to recommendation exist, the approach based on a network representation of the input data has gained considerable attention in the past. We review here a broad range of network-based recommendation algorithms and for the first time compare their performance on three distinct real datasets. We present recommendation topics that go beyond the mere question of which algorithm to use-such as the possible influence of recommendation on the evolution of systems that use it-and finally discuss open research directions and challenges.

  20. Navigating the Internet of Things

    DEFF Research Database (Denmark)

    Rassia, Stamatina; Steiner, Henriette

    2017-01-01

    Navigating the Internet of Things is an exploration of interconnected objects, functions, and situations in networks created to ease and manage our daily lives. The Internet of Things represents semi-automated interconnections of different objects in a network based on different information...... technologies. Some examples of this are presented here in order to better understand, explain, and discuss the elements that compose the Internet of Things. In this chapter, we provide a theoretical and practical perspective on both the micro- and macro-scales of ‘things’ (objects), small and large (e.......g. computers or interactive maps), that suggest new topographic relationships and challenge our understanding of users’ involvement with a given technology against the semi-automated workings of these systems. We navigate from a philosophical enquiry into the ‘thingness of things’ dating from the 1950s...

  1. The Effects of Using Technology and the Internet on Some Iranian EFL Students' Perceptions of Their Communication Classroom Environment

    Science.gov (United States)

    Ebrahimi, Nabi A.; Eskandari, Zahra; Rahimi, Ali

    2013-01-01

    This study aims to explore the effects of implementing a CALL framework on the students' perceptions of their communication classroom environments. The What Is Happening In This Class? (WIHIC) questionnaire was distributed twice among 34 (F=14 and M=20) Iranian EFL students, the first time after a ten-session-long regular no-tech communication…

  2. Named data networking-based smart home

    OpenAIRE

    Syed Hassan Ahmed; Dongkyun Kim

    2016-01-01

    Named data networking (NDN) treats content/data as a “first class citizen” of the network by giving it a “name”. This content “name” is used to retrieve any information, unlike in device-centric networks (i.e., the current Internet), which depend on physical IP addresses. Meanwhile, the smart home concept has been gaining attention in academia and industries; various low-cost embedded devices are considered that can sense, process, store, and communicate data autonomously. In this paper, we s...

  3. Internet piracy

    OpenAIRE

    Fiala, Jiří

    2012-01-01

    The main objective of this thesis is to describe the Internet piracy phenomenon and to define responsibility of individuals for copyright violations on the Internet from the view of valid Czech legislation. In order to prevent Internet piracy, countries are pushed to swiftly react on continuous development of new technologies used by pirates - these efforts of individual countries are described in several chapters of this thesis that are exploring the most significant court rulings. These rul...

  4. Network-based analysis of proteomic profiles

    KAUST Repository

    Wong, Limsoon

    2016-01-26

    Mass spectrometry (MS)-based proteomics is a widely used and powerful tool for profiling systems-wide protein expression changes. It can be applied for various purposes, e.g. biomarker discovery in diseases and study of drug responses. Although RNA-based high-throughput methods have been useful in providing glimpses into the underlying molecular processes, the evidences they provide are indirect. Furthermore, RNA and corresponding protein levels have been known to have poor correlation. On the other hand, MS-based proteomics tend to have consistency issues (poor reproducibility and inter-sample agreement) and coverage issues (inability to detect the entire proteome) that need to be urgently addressed. In this talk, I will discuss how these issues can be addressed by proteomic profile analysis techniques that use biological networks (especially protein complexes) as the biological context. In particular, I will describe several techniques that we have been developing for network-based analysis of proteomics profile. And I will present evidence that these techniques are useful in identifying proteomics-profile analysis results that are more consistent, more reproducible, and more biologically coherent, and that these techniques allow expansion of the detected proteome to uncover and/or discover novel proteins.

  5. Neural network based multiscale image restoration approach

    Science.gov (United States)

    de Castro, Ana Paula A.; da Silva, José D. S.

    2007-02-01

    This paper describes a neural network based multiscale image restoration approach. Multilayer perceptrons are trained with artificial images of degraded gray level circles, in an attempt to make the neural network learn inherent space relations of the degraded pixels. The present approach simulates the degradation by a low pass Gaussian filter blurring operation and the addition of noise to the pixels at pre-established rates. The training process considers the degraded image as input and the non-degraded image as output for the supervised learning process. The neural network thus performs an inverse operation by recovering a quasi non-degraded image in terms of least squared. The main difference of the approach to existing ones relies on the fact that the space relations are taken from different scales, thus providing relational space data to the neural network. The approach is an attempt to come up with a simple method that leads to an optimum solution to the problem. Considering different window sizes around a pixel simulates the multiscale operation. In the generalization phase the neural network is exposed to indoor, outdoor, and satellite degraded images following the same steps use for the artificial circle image.

  6. [Internet addiction].

    Science.gov (United States)

    Korkeila, Jyrki

    2012-01-01

    Internet addiction is defined as uncontrolled and harmful use of Internet, which manifests in three forms: gaming, various sexual activities and excessive use of emails, chats or SMS messaging. Several studies have found that abuse of alcohol and other substances, depression and other health problems are associated with Internet addiction. In boys and men depression may be more a consequence of the addiction than a cause for it. ADHD seems to be a significant background factor for developing the condition. Because it is almost impossible to lead a life without Internet and computers nowadays, it is unrealistic to aim towards full abstinence. Treatment has generally followed the guidelines adapted for pathological gambling.

  7. Internet Policy

    Science.gov (United States)

    Lehr, William H.; Pupillo, Lorenzo Maria

    The Internet is now widely regarded as essential infrastructure for our global economy and society. It is in our homes and businesses. We use it to communicate and socialize, for research, and as a platform for E-commerce. In the late 1990s, much was predicted about what the Internet has become at present; but now, we have actual experience living with the Internet as a critical component of our everyday lives. Although the Internet has already had profound effects, there is much we have yet to realize. The present volume represents a third installment in a collaborative effort to highlight the all-encompassing, multidisciplinary implications of the Internet for public policy. The first installment was conceived in 1998, when we initiated plans to organize an international conference among academic, industry, and government officials to discuss the growing policy agenda posed by the Internet. The conference was hosted by the European Commission in Brussels in 1999 and brought together a diverse mix of perspectives on what the pressing policy issues would be confronting the Internet. All of the concerns identified remain with us today, including how to address the Digital Divide, how to modify intellectual property laws to accommodate the new realities of the Internet, what to do about Internet governance and name-space management, and how to evolve broadcast and telecommunications regulatory frameworks for a converged world.

  8. Universal real-time control framework and Internet of Things for fast-paced research and development based production environments

    KAUST Repository

    Chaoui, Hicham

    2017-05-13

    This paper introduces a universal real-time control platform for complex research and development (R&D) based products design. The inherent complexity in R&D projects makes products development a difficult task to undertake. The use of state of the art development tools for modeling, simulation, and hardware-in-the-loop (HIL) validation contributes to a complexity reduction. However, R&D projects still require significant development time since many design iterations are usually necessary before final solution, which increases the cost. In most R&D processes, these tools are not used beyond rapid prototyping since development for mass production is usually performed in another environment, using different tools. This paper presents a fast and cost effective way of R&D-based products development, speeding-up time to market.

  9. Universal real-time control framework and Internet of Things for fast-paced research and development based production environments

    KAUST Repository

    Chaoui, Hicham; Aljarboua, Abdullah Abdulaziz; Miah, Suruz

    2017-01-01

    This paper introduces a universal real-time control platform for complex research and development (R&D) based products design. The inherent complexity in R&D projects makes products development a difficult task to undertake. The use of state of the art development tools for modeling, simulation, and hardware-in-the-loop (HIL) validation contributes to a complexity reduction. However, R&D projects still require significant development time since many design iterations are usually necessary before final solution, which increases the cost. In most R&D processes, these tools are not used beyond rapid prototyping since development for mass production is usually performed in another environment, using different tools. This paper presents a fast and cost effective way of R&D-based products development, speeding-up time to market.

  10. Internet effects

    NARCIS (Netherlands)

    Valkenburg, P.M.; Peter, J.; Levesque, R.J.R.

    2011-01-01

    Adolescents’ extensive use of Internet communication and the uncertainty about its consequences call for an integrative perspective that helps to understand both the appeal of Internet communication and its risks and opportunities. The aim of this essay is to theorize, and if possible, substantiate

  11. Network-Based Community Brings forth Sustainable Society

    Science.gov (United States)

    Kikuchi, Toshiko

    It has already been shown that an artificial society based on the three relations of social configuration (market, communal, and obligatory relations) functioning in balance with each other formed a sustainable society which the social reproduction is possible. In this artificial society model, communal relations exist in a network-based community with alternating members rather than a conventional community with cooperative mutual assistance practiced in some agricultural communities. In this paper, using the comparison between network-based communities with alternating members and conventional communities with fixed members, the significance of a network-based community is considered. In concrete terms, the difference in appearance rate for sustainable society, economic activity and asset inequality between network-based communities and conventional communities is analyzed. The appearance rate for a sustainable society of network-based community is higher than that of conventional community. Moreover, most of network-based communities had a larger total number of trade volume than conventional communities. But, the value of Gini coefficient in conventional community is smaller than that of network-based community. These results show that communal relations based on a network-based community is significant for the social reproduction and economic efficiency. However, in such an artificial society, the inequality is sacrificed.

  12. Named data networking-based smart home

    Directory of Open Access Journals (Sweden)

    Syed Hassan Ahmed

    2016-09-01

    Full Text Available Named data networking (NDN treats content/data as a “first class citizen” of the network by giving it a “name”. This content “name” is used to retrieve any information, unlike in device-centric networks (i.e., the current Internet, which depend on physical IP addresses. Meanwhile, the smart home concept has been gaining attention in academia and industries; various low-cost embedded devices are considered that can sense, process, store, and communicate data autonomously. In this paper, we study NDN in the context of smart-home communications, discuss the preliminary evaluations, and describe the future challenges of applying NDN in smart-home applications.

  13. Providing healthcare services on-the-fly using multi-player cooperation game theory in Internet of Vehicles (IoV environment

    Directory of Open Access Journals (Sweden)

    Neeraj Kumar

    2015-08-01

    Full Text Available Internet of Vehicles (IoV is a leading technology of the present era. It has gained huge attention with respect to its implementation in wide variety of domains ranging from traffic safety to infotainment applications. However, IoV can also be extended to healthcare domain, where the patients can be provided healthcare services on-the-fly. We extend this novel concept in this paper and refer it as “Healthcare services on-the-fly”. The concept of game theory has been used among the vehicles to access the healthcare services while traveling. The vehicles act as players in the game and tend to form and split coalitions to access these services. Learning automata (LA act as the players for interaction with the environment and take appropriate actions based on reward and penalty. Apart from this, Virtual Machine (VM scheduling algorithm for efficient utilization of resources at cloud level has also been formulated. A stochastic reward net (SRN-based model is used to represent the coalition formation and splitting with respect to availability of resources at cloud level. The performance of the proposed scheme is evaluated using various performance evaluation metrics. The results obtained prove the effectiveness of the proposed scheme in comparison to the best, first, and random fit schemes.

  14. Towards a conceptual framework of OSH risk management in smart working environments based on smart PPE, ambient intelligence and the Internet of Things technologies.

    Science.gov (United States)

    Podgórski, Daniel; Majchrzycka, Katarzyna; Dąbrowska, Anna; Gralewicz, Grzegorz; Okrasa, Małgorzata

    2017-03-01

    Recent developments in domains of ambient intelligence (AmI), Internet of Things, cyber-physical systems (CPS), ubiquitous/pervasive computing, etc., have led to numerous attempts to apply ICT solutions in the occupational safety and health (OSH) area. A literature review reveals a wide range of examples of smart materials, smart personal protective equipment and other AmI applications that have been developed to improve workers' safety and health. Because the use of these solutions modifies work methods, increases complexity of production processes and introduces high dynamism into thus created smart working environments (SWE), a new conceptual framework for dynamic OSH management in SWE is called for. A proposed framework is based on a new paradigm of OSH risk management consisting of real-time risk assessment and the capacity to monitor the risk level of each worker individually. A rationale for context-based reasoning in SWE and a respective model of the SWE-dedicated CPS are also proposed.

  15. Internet printing

    Science.gov (United States)

    Rahgozar, M. Armon; Hastings, Tom; McCue, Daniel L.

    1997-04-01

    The Internet is rapidly changing the traditional means of creation, distribution and retrieval of information. Today, information publishers leverage the capabilities provided by Internet technologies to rapidly communicate information to a much wider audience in unique customized ways. As a result, the volume of published content has been astronomically increasing. This, in addition to the ease of distribution afforded by the Internet has resulted in more and more documents being printed. This paper introduces several axes along which Internet printing may be examined and addresses some of the technological challenges that lay ahead. Some of these axes include: (1) submission--the use of the Internet protocols for selecting printers and submitting documents for print, (2) administration--the management and monitoring of printing engines and other print resources via Web pages, and (3) formats--printing document formats whose spectrum now includes HTML documents with simple text, layout-enhanced documents with Style Sheets, documents that contain audio, graphics and other active objects as well as the existing desktop and PDL formats. The format axis of the Internet Printing becomes even more exciting when one considers that the Web documents are inherently compound and the traversal into the various pieces may uncover various formats. The paper also examines some imaging specific issues that are paramount to Internet Printing. These include formats and structures for representing raster documents and images, compression, fonts rendering and color spaces.

  16. Saving the internet.

    Science.gov (United States)

    Zittrain, Jonathan

    2007-06-01

    The Internet goose has laid countless golden eggs, along with a growing number of rotten ones. But it's the rotten ones that now tempt commercial, governmental, and consumer interests to threaten the Internet's uniquely creative power. The expediently selected, almost accidentally generative properties of the Internet - its technical openness, ease of access and mastery, and adaptability - have combined, especially when coupled with those of the PC, to produce an unsurpassed environment for innovative experiment. Those same properties, however, also make the Internet hospitable to various forms of wickedness: hacking, porn, spam, fraud, theft, predation, and attacks on the network itself. As these undesirable phenomena proliferate, business, government, and many users find common cause for locking down Internet and PC architecture in the interests of security and order. PC and Internet security vulnerabilities are a legitimate menace. However, the most likely reactions - if they are not forestalled - will be at least as unfortunate as the security problems themselves. Consider the growing profusion of "tethered appliances" - devices whose functions cannot readily be altered by their owners (think TiVo). Such appliances take Internet innovations and wrap them up in a neat, easy-to-use package, which is good - but only if the Internet and PC can remain sufficiently in the center of the digital ecosystem to produce the next round of innovations and to generate competition. People buy these devices for their convenience or functionality and may appreciate the fact that they are safer to use (they limit the damage users can do through ignorance or carelessness). But the risk is that users, by migrating to such appliances, will unwittingly trade away the future benefits of generativity - a loss that will go unappreciated even as innovation tapers off.

  17. [Internet addiction].

    Science.gov (United States)

    Dannon, Pinhas Nadim; Iancu, Iulian

    2007-07-01

    The Internet provides inexpensive, interesting and comfortable recreation, but sometimes users get hooked. Thus, the computer-internet addiction concept has been proposed as an explanation for uncontrollable and damaging use. Symptoms of addiction could be compared to other addictive behaviors such as pathological gambling, kleptomania, trichotillomania, sex addiction and pyromania. Although criteria to diagnose this addiction have been proposed, methods of assessing excessive computer-internet use are limited. Early diagnosis could help the patient that suffers from this addiction before developing additional psychiatric diagnoses. A review of the proposed etiologies in the literature is summarized, together with recommendations for physicians and mental health officials.

  18. Internet culture

    CERN Document Server

    Porter, David

    2013-01-01

    The internet has recently grown from a fringe cultural phenomenon to a significant site of cultural production and transformation. Internet Culture maps this new domain of language, politics and identity, locating it within the histories of communication and the public sphere. Internet Culture offers a critical interrogation of the sustaining myths of the virtual world and of the implications of the current mass migration onto the electronic frontier. Among the topics discussed in Internet Culture are the virtual spaces and places created by the citizens of the Net and their claims to the hotly contested notion of "virtual community"; the virtual bodies that occupy such spaces; and the desires that animate these bodies. The contributors also examine the communication medium behind theworlds of the Net, analyzing the rhetorical conventions governing online discussion, literary antecedents,and potential pedagogical applications.

  19. Internet Connectivity

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Internet Connectivity. BSNL, SIFY, HCL in Guwahati; only BSNL elsewhere in NE (local player in Shillong). Service poor; All vendors lease BW from BSNL.

  20. Internet enlightens

    International Nuclear Information System (INIS)

    Figueiredo, S.

    2008-01-01

    Numerous Internet sites are given in relation with radiotherapy, nuclear activity, radiation protection,radioecology, nuclear laws. To note three sites treat the accident of radiotherapy arisen to Toulouse. (N.C.)

  1. Internet enlightens

    International Nuclear Information System (INIS)

    Anon.

    2010-01-01

    This part of the issue gives Internet addresses in relation with nuclear energy, safety, radiation protection, legislation, at the national level and European and international level. A special part is devoted to non ionizing radiation. (N.C.)

  2. Internet Censorship

    Science.gov (United States)

    Jyotsna; Kapil; Aayush

    2012-09-01

    Censorship on Internet has always wet its hands in the water of controversies, It is said to go in with synonym of "FILTERING THE NET" i.e. Either done to protect minors or for nationís privacy, some take it as snatching their freedom over internet and some take it as an appropriate step to protect minor, It has its supporters as well as opponents.Google has reported a whooping number of requests from Governments of U.K, China, Poland, Spain, and Canada to remove videos and search links that led to harassment, sensitive issues or suspicious people. This paper deals with the cons of censorship on internet and to make people aware of the fact that Internet is not a single body owned by an org. but an open sky of information shared equally by all. Research done has found out many unseen aspects of different people's view point.

  3. Small causes, big effects. For environment and sales: Check of thermostat valves in the internet; Kleine Ursache, grosse Wirkung. Zugunsten Umwelt und Umsatz: Thermostatventil-Check jetzt im Internet

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    2008-04-15

    Fifty percent of all installed thermostat valves are assumed to be lacking in energy efficiency, according to the ''Optimus'' research report. Industry has reacted to this by developing a ThermostatCheck, which can be accessed in the internet by builder-owners and fitters. (orig.)

  4. Neural Network Based Load Frequency Control for Restructuring ...

    African Journals Online (AJOL)

    Neural Network Based Load Frequency Control for Restructuring Power Industry. ... an artificial neural network (ANN) application of load frequency control (LFC) of a Multi-Area power system by using a neural network controller is presented.

  5. Environment

    DEFF Research Database (Denmark)

    Valentini, Chiara

    2017-01-01

    The term environment refers to the internal and external context in which organizations operate. For some scholars, environment is defined as an arrangement of political, economic, social and cultural factors existing in a given context that have an impact on organizational processes and structures....... For others, environment is a generic term describing a large variety of stakeholders and how these interact and act upon organizations. Organizations and their environment are mutually interdependent and organizational communications are highly affected by the environment. This entry examines the origin...... and development of organization-environment interdependence, the nature of the concept of environment and its relevance for communication scholarships and activities....

  6. 移动互联环境下跨界营销的影响因素%Influencing Factors of Crossover Marketing in Mobile Internet Environment

    Institute of Scientific and Technical Information of China (English)

    黄嘉涛

    2016-01-01

    本文运用扎根理论的方法,以深度访谈和文案资料为基础,通过开放编码、主轴编码、选择编码,探索移动互联网环境下跨界营销的行为及其影响因素并构建模型。随后,基于广东地区企业的调查数据,对模型进行实证研究。实证结果表明,品牌匹配、市场匹配和战略匹配显著正向影响跨界营销,其中品牌匹配的影响作用最大;市场动荡性和市场不确定性正向调节品牌匹配与跨界营销以及市场匹配与跨界营销之间的正向关系;市场动荡性和市场不确定性对战略匹配与跨界营销之间的关系调节效应不显著。传统企业必须与移动互联网进行融合,从产品合作、联合营销、内容传递、场景设计等方面开展跨界营销合作,提高跨界双方在品牌、市场、战略等方面的匹配程度,其中尤其要重视品牌的匹配程度。%Based on the data collected from literature and in-depth interviews,the Grounded Theory,and three types of coding,an exploratory research on crossover marketing in mobile internet environment and its influencing factors is conducted, and the corresponding model is developed. Then,an empirical test is conducted based on survey data from local companies in Guangdong. The results show that:1. brand matching,market matching and strategic matching have positive effect on crossover marketing,and brand matching has the strongest effect;2. market dynamic and market uncertainty positively moderate the relationship between brand matching and crossover marketing as well as the relationship between market matching and crossover marketing;3. market dynamic and market uncertainty does not positively moderate the relationship between strategic matching and crossover marketing. The traditional enterprises should integrate with mobile internet,and improve the matching level in terms of brand,market and strategy;and they should pay special attention to the

  7. Everyone's Internet

    Institute of Scientific and Technical Information of China (English)

    YAO BIN

    2010-01-01

    @@ After more than 20 years, the Internet in China has become a big success. The country has the world's largest Intemet population that topped 420 million at the end of June. In the first six months of this year, China's Internet market reached 74.3 billion yuan ($10.9 billion), the equivalent of 2009's total. Local businesses have risen to leaders on the Chinese market, as Chinese language search, instant messaging and online auction service providers have overwhelming advantages over foreign rivals.

  8. Internet Sexualities

    Science.gov (United States)

    Döring, Nicola

    The term “internet sexuality” (or OSA, online sexual activities) refers to sexual-related content and activities observable on the internet (cf. Adams, Oye, & Parker, 2003; Cooper, McLoughlin, & Campbell, 2000; Leiblum & Döring, 2002). It designates a variety of sexual phenomena (e.g., pornography, sex education, sexual contacts) related to a wide spectrum of online services and applications (e.g., websites, online chat rooms, peer-to-peer networks). If an even broader range of computer networks - such as the Usenet or bulletin board systems - is included in this extensional definition, one speaks of “online sexuality” or “cybersexuality.”

  9. Internet bullying.

    Science.gov (United States)

    Donnerstein, Ed

    2012-06-01

    There is substantial literature on the impact of the mass media on children's and adolescents' health and development. The question of what role new technology plays in the media's influence is now a subject of both review and discussion, particularly regarding health risks and intervention. This article takes a brief look at online usage and the theoretical mechanisms that might make Internet access more problematic in terms of risks, compared with more traditional media such as television and film. One of these risks, known today as cyberbullying or Internet harassment, is scrutinized in detail. Copyright © 2012 Elsevier Inc. All rights reserved.

  10. Anomaly Detection and Mitigation at Internet Scale: A Survey

    NARCIS (Netherlands)

    Steinberger, Jessica; Schehlmann, Lisa; Abt, Sebastian; Baier, Harald; Doyen, Guillaume; Waldburger, Martin; Celeda, Pavel; Sperotto, Anna; Stiller, Burkhard

    Network-based attacks pose a strong threat to the Internet landscape. There are different possibilities to encounter these threats. On the one hand attack detection operated at the end-users' side, on the other hand attack detection implemented at network operators' infrastructures. An obvious

  11. Bayesian-network-based safety risk analysis in construction projects

    International Nuclear Information System (INIS)

    Zhang, Limao; Wu, Xianguo; Skibniewski, Miroslaw J.; Zhong, Jingbing; Lu, Yujie

    2014-01-01

    This paper presents a systemic decision support approach for safety risk analysis under uncertainty in tunnel construction. Fuzzy Bayesian Networks (FBN) is used to investigate causal relationships between tunnel-induced damage and its influential variables based upon the risk/hazard mechanism analysis. Aiming to overcome limitations on the current probability estimation, an expert confidence indicator is proposed to ensure the reliability of the surveyed data for fuzzy probability assessment of basic risk factors. A detailed fuzzy-based inference procedure is developed, which has a capacity of implementing deductive reasoning, sensitivity analysis and abductive reasoning. The “3σ criterion” is adopted to calculate the characteristic values of a triangular fuzzy number in the probability fuzzification process, and the α-weighted valuation method is adopted for defuzzification. The construction safety analysis progress is extended to the entire life cycle of risk-prone events, including the pre-accident, during-construction continuous and post-accident control. A typical hazard concerning the tunnel leakage in the construction of Wuhan Yangtze Metro Tunnel in China is presented as a case study, in order to verify the applicability of the proposed approach. The results demonstrate the feasibility of the proposed approach and its application potential. A comparison of advantages and disadvantages between FBN and fuzzy fault tree analysis (FFTA) as risk analysis tools is also conducted. The proposed approach can be used to provide guidelines for safety analysis and management in construction projects, and thus increase the likelihood of a successful project in a complex environment. - Highlights: • A systemic Bayesian network based approach for safety risk analysis is developed. • An expert confidence indicator for probability fuzzification is proposed. • Safety risk analysis progress is extended to entire life cycle of risk-prone events. • A typical

  12. Internet Policy

    Science.gov (United States)

    1999-11-17

    equipment, including information technology , includes, but is not limited to, personal computers and related peripheral equipment and software, office...classified or Sensitive Unclassified Information through the Internet unless the Designated Approving Authority has approved the method of transmission in...writing. 2. Government office equipment, including Information Technology (IT), shall only be used for official purposes, except as specifically

  13. Internet Shopping

    Institute of Scientific and Technical Information of China (English)

    刘洪毓

    2004-01-01

    Nowadays you no longer need to walk round hundreds of shops looking for the items you need. You can shop for just about anything from your armchair. All you need is a computer and access(进入) to the Internet.

  14. [Internet addiction].

    Science.gov (United States)

    Nakayama, Hideki; Higuchi, Susumu

    2015-09-01

    Internet technologies have made a rapid progress, bringing convenience to daily life. On the other hand, internet use disorder and internet addiction (IA) have become reportedly serious health and social problems. In 2013, internet gaming disorder criteria have been proposed in the section of Conditions for Further Study of DSM-5. Existing epidemiological studies by questionnaire methods have reported that the prevalence of IA ranges between 2.8% and 9.9% among youths in Japan. Attention deficit hyperactivity disorder (ADHD), sleeping disorders, depression, obsessive compulsive disorder, and phobic anxiety disorder are extremely common comorbid mental disorders with IA. Some psychotherapies (e.g., cognitive behavioral therapy, motivational interviewing) and medical treatments (e.g., antidepressant drugs, methylphenidate) for comorbid mental disorders as well as rehabilitation (e.g., treatment camp) are effective for IA remission. However, some serious cases of IA may be difficult to treat, and prevention is very important. In future, the prevention, rehabilitations and treatments for IA will be more required in Japan.

  15. Internet Alternatifs

    OpenAIRE

    Dulong de Rosnay , Melanie; Musiani , Francesca

    2015-01-01

    International audience; L'Internet est constitué de différents éléments et couches, qui peuvent être développés, façonnés et organisés de plusieurs manières : le réseau, l'hébergement, les applications, la connexion locale, les contenus. Si le concept de décentralisation est en quelque sorte inscrit dans le principe même de l'Internet – et notamment dans l'organisation de la circulation des flux – son urbanisme actuel semble n'intégrer ce principe que de manière limitée, et certains des risqu...

  16. Resilient Disaster Network Based on Software Defined Cognitive Wireless Network Technology

    Directory of Open Access Journals (Sweden)

    Goshi Sato

    2015-01-01

    Full Text Available In order to temporally recover the information network infrastructure in disaster areas from the Great East Japan Earthquake in 2011, various wireless network technologies such as satellite IP network, 3G, and Wi-Fi were effectively used. However, since those wireless networks are individually introduced and installed but not totally integrated, some of networks were congested due to the sudden network traffic generation and unbalanced traffic distribution, and eventually the total network could not effectively function. In this paper, we propose a disaster resilient network which integrates various wireless networks into a cognitive wireless network that users can use as an access network to the Internet at the serious disaster occurrence. We designed and developed the disaster resilient network based on software defined network (SDN technology to automatically select the best network link and route among the possible access networks to the Internet by periodically monitoring their network states and evaluate those using extended AHP method. In order to verify the usefulness of our proposed system, a prototype system is constructed and its performance is evaluated.

  17. Wireless Sensor Network Based Subsurface Contaminant Plume Monitoring

    Science.gov (United States)

    2012-04-16

    Sensor Network (WSN) to monitor contaminant plume movement in naturally heterogeneous subsurface formations to advance the sensor networking based...time to assess the source and predict future plume behavior. This proof-of-concept research aimed at demonstrating the use of an intelligent Wireless

  18. Artificial Neural Network Based State Estimators Integrated into Kalmtool

    DEFF Research Database (Denmark)

    Bayramoglu, Enis; Ravn, Ole; Poulsen, Niels Kjølstad

    2012-01-01

    In this paper we present a toolbox enabling easy evaluation and comparison of dierent ltering algorithms. The toolbox is called Kalmtool and is a set of MATLAB tools for state estimation of nonlinear systems. The toolbox now contains functions for Articial Neural Network Based State Estimation as...

  19. Network-Based Material Requirements Planning (NBMRP) in ...

    African Journals Online (AJOL)

    Network-Based Material Requirements Planning (NBMRP) in Product Development Project. ... International Journal of Development and Management Review ... To address the problems, this study evaluated the existing material planning practice, and formulated a NBMRP model out of the variables of the existing MRP and ...

  20. IPTV inter-destination synchronization: A network-based approach

    NARCIS (Netherlands)

    Stokking, H.M.; Deventer, M.O. van; Niamut, O.A.; Walraven, F.A.; Mekuria, R.N.

    2010-01-01

    This paper introduces a novel network-based approach to inter-destination media synchronization. The approach meets the need for synchronization in advanced TV concepts like social TV and offers high scalability, unlike conventional end-point based approaches. The solution for interdestination media

  1. Neural network based system for script identification in Indian ...

    Indian Academy of Sciences (India)

    2016-08-26

    Aug 26, 2016 ... The paper describes a neural network-based script identification system which can be used in the machine reading of documents written in English, Hindi and Kannada language scripts. Script identification is a basic requirement in automation of document processing, in multi-script, multi-lingual ...

  2. The mediating role of internet connection, virtual friends, and mood in predicting loneliness among students with and without learning disabilities in different educational environments.

    Science.gov (United States)

    Sharabi, Adi; Margalit, Malka

    2011-01-01

    This study evaluated a multidimensional model of loneliness as related to risk and protective factors among adolescents with learning disabilities (LD). The authors aimed to identify factors that mediated loneliness among 716 adolescents in Grades 10 through 12 who were studying in high schools or in Youth Education Centers for at-risk populations. There were 334 students with LD, divided into subgroups according to disability severity (three levels of testing accommodations), and 382 students without LD. Five instruments measured participants' socioemotional characteristics: loneliness, Internet communication, mood, and social and academic achievement-oriented motivation. Using structural equation modeling, the results confirmed the loneliness model and revealed that the use of the Internet to support interpersonal communication with friends predicted less intense loneliness, whereas virtual friendships with individuals whom students knew only online predicted greater loneliness. Positive and negative mood and motivation also predicted students' loneliness. In addition, the severity of LD predicted stronger loneliness feelings.

  3. INTERNET ADVERTISING: A PRIMER

    OpenAIRE

    Matthew N. O. Sadiku*, Shumon Alam, Sarhan M. Musa

    2017-01-01

    Internet advertising (IA) is using the Internet to market products and services to a large audience. In the current era of Internet commerce, companies have chosen to use Internet advertising and the trend is irreversible. The goal of Internet advertising is to drive customers to your website. Understanding some key concepts of Internet advertising is crucial to creating a strategy that will suit one’s business. This paper provides a brief introduction to Internet or online advertising.

  4. Instability and internet design

    Directory of Open Access Journals (Sweden)

    Sandra Braman

    2016-09-01

    Full Text Available Instability - unpredictable but constant change in one’s environment and the means with which one deals with it - has replaced convergence as the focal problem for telecommunications policy in general and internet policy in particular. Those who designed what we now call the internet during the first decade of the effort (1969-1979, who in essence served simultaneously as its policy-makers, developed techniques for coping with instability of value for network designers today and for those involved with any kind of large-scale sociotechnical infrastructure. Analysis of the technical document series that was medium for and record of that design process reveals coping techniques that began with defining the problem and went on to include conceptual labour, social practices, and technical approaches.

  5. Internet Telephony

    OpenAIRE

    Perri, Richard.

    1999-01-01

    During the mid 90s, data and voice began to merge, propelled by advances in compression technology. The ubiquity of routed Internet Protocol (IP) networks, and the desire to trim telephony costs are the major driving forces of the deployment of Voice over IP (VoIP). One advantage of VoIP technologies is that they leverage existing network resources and dramatically reduce, or major eliminate telephone costs. If there is an existing Wide Area Network (WAN) then VoIP could be employed over the ...

  6. Customer loyalty in Internet banking

    OpenAIRE

    Eriksson, M.; Schuster, C.

    2008-01-01

    In the recent years the way to do banking has changed. Internet banking has grown and a lot of niche banks working mainly with the Internet as a medium has entered the Swedish bank market. How to keep the customer loyal online in a very competitive environment has become a main question for the banks. The aim of this dissertation is to test what factors impact bank customer loyalty in an online environment. A positivistic research philosophy, a deductive research approach, an explanatory pur...

  7. Internet dynamics

    Science.gov (United States)

    Lukose, Rajan Mathew

    The World Wide Web and the Internet are rapidly expanding spaces, of great economic and social significance, which offer an opportunity to study many phenomena, often previously inaccessible, on an unprecedented scale and resolution with relative ease. These phenomena are measurable on the scale of tens of millions of users and hundreds of millions of pages. By virtue of nearly complete electronic mediation, it is possible in principle to observe the time and ``spatial'' evolution of nearly all choices and interactions. This cyber-space therefore provides a view into a number of traditional research questions (from many academic disciplines) and creates its own new phenomena accessible for study. Despite its largely self-organized and dynamic nature, a number of robust quantitative regularities are found in the aggregate statistics of interesting and useful quantities. These regularities can be understood with the help of models that draw on ideas from statistical physics as well as other fields such as economics, psychology and decision theory. This thesis develops models that can account for regularities found in the statistics of Internet congestion and user surfing patterns and discusses some practical consequences. practical consequences.

  8. Internet-Based Communication

    Science.gov (United States)

    Gernsbacher, Morton Ann

    2014-01-01

    Google the question, "How is the Internet changing the way we communicate?," and you will find no shortage of opinions, or fears, about the Internet altering the way we communicate. Although the Internet is not necessarily making communication briefer (neither is the Internet making communication less formal), the Internet is manifesting…

  9. Network-based Modeling of Mesoscale Catchments - The Hydrology Perspective of Glowa-danube

    Science.gov (United States)

    Ludwig, R.; Escher-Vetter, H.; Hennicker, R.; Mauser, W.; Niemeyer, S.; Reichstein, M.; Tenhunen, J.

    Within the GLOWA initiative of the German Ministry for Research and Educa- tion (BMBF), the project GLOWA-Danube is funded to establish a transdisciplinary network-based decision support tool for water related issues in the Upper Danube wa- tershed. It aims to develop and validate integration techniques, integrated models and integrated monitoring procedures and to implement them in the network-based De- cision Support System DANUBIA. An accurate description of processes involved in energy, water and matter fluxes and turnovers requires an intense collaboration and exchange of water related expertise of different scientific disciplines. DANUBIA is conceived as a distributed expert network and is developed on the basis of re-useable, refineable, and documented sub-models. In order to synthesize a common understand- ing between the project partners, a standardized notation of parameters and functions and a platform-independent structure of computational methods and interfaces has been established using the Unified Modeling Language UML. DANUBIA is object- oriented, spatially distributed and raster-based at its core. It applies the concept of "proxels" (Process Pixel) as its basic object, which has different dimensions depend- ing on the viewing scale and connects to its environment through fluxes. The presented study excerpts the hydrological view point of GLOWA-Danube, its approach of model coupling and network based communication (using the Remote Method Invocation RMI), the object-oriented technology to simulate physical processes and interactions at the land surface and the methodology to treat the issue of spatial and temporal scal- ing in large, heterogeneous catchments. The mechanisms applied to communicate data and model parameters across the typical discipline borders will be demonstrated from the perspective of a land-surface object, which comprises the capabilities of interde- pendent expert models for snowmelt, soil water movement, runoff formation, plant

  10. Automation tools for accelerator control a network based sequencer

    International Nuclear Information System (INIS)

    Clout, P.; Geib, M.; Westervelt, R.

    1991-01-01

    In conjunction with a major client, Vista Control Systems has developed a sequencer for control systems which works in conjunction with its realtime, distributed Vsystem database. Vsystem is a network-based data acquisition, monitoring and control system which has been applied successfully to both accelerator projects and projects outside this realm of research. The network-based sequencer allows a user to simply define a thread of execution in any supported computer on the network. The script defining a sequence has a simple syntax designed for non-programmers, with facilities for selectively abbreviating the channel names for easy reference. The semantics of the script contains most of the familiar capabilities of conventional programming languages, including standard stream I/O and the ability to start other processes with parameters passed. The script is compiled to threaded code for execution efficiency. The implementation is described in some detail and examples are given of applications for which the sequencer has been used

  11. A network-based dynamical ranking system for competitive sports

    Science.gov (United States)

    Motegi, Shun; Masuda, Naoki

    2012-12-01

    From the viewpoint of networks, a ranking system for players or teams in sports is equivalent to a centrality measure for sports networks, whereby a directed link represents the result of a single game. Previously proposed network-based ranking systems are derived from static networks, i.e., aggregation of the results of games over time. However, the score of a player (or team) fluctuates over time. Defeating a renowned player in the peak performance is intuitively more rewarding than defeating the same player in other periods. To account for this factor, we propose a dynamic variant of such a network-based ranking system and apply it to professional men's tennis data. We derive a set of linear online update equations for the score of each player. The proposed ranking system predicts the outcome of the future games with a higher accuracy than the static counterparts.

  12. A Neural Network-Based Interval Pattern Matcher

    Directory of Open Access Journals (Sweden)

    Jing Lu

    2015-07-01

    Full Text Available One of the most important roles in the machine learning area is to classify, and neural networks are very important classifiers. However, traditional neural networks cannot identify intervals, let alone classify them. To improve their identification ability, we propose a neural network-based interval matcher in our paper. After summarizing the theoretical construction of the model, we take a simple and a practical weather forecasting experiment, which show that the recognizer accuracy reaches 100% and that is promising.

  13. Strengthening regional innovation through network-based innovation brokering

    OpenAIRE

    Svare, Helge; Gausdal, Anne Haugen

    2015-01-01

    The primary objective of this paper is to demonstrate how regional innovation system theory may be translated into manageable micro-level methods with the potential for strengthening the productive dynamics of a regional innovation system. The paper meets this objective by presenting network-based innovation brokering (NBIB), a practical method designed using insights from regional innovation system theory and trust theory. Five cases from two Norwegian regional innovation networks show that ...

  14. Poultry Internet

    Science.gov (United States)

    Cheok, Adrian David

    Poultry are one of the most badly treated animals in the modern world. It has been shown that they have high levels of both cognition and feelings, and as a result there has been a recent trend of promoting poultry welfare. There is also a tradition of keeping poultry as pets in some parts of the world. However, in modern cities and societies, it is often difficult to maintain contact with pets, particularly for office workers. We propose and describe a novel cybernetics system to use mobile and Internet technology to improve human-pet interaction. It can also be used for people who are allergic to touching animals and thus cannot stroke them directly. This interaction encompasses both visualization and tactile sensation of real objects.

  15. Internet Astrometry

    Science.gov (United States)

    Caballero, Rafael; Argyle, R. W.

    Amateur astronomers can carry out scientific research in many different ways. Some activities require expensive telescopes, cameras, and often access to dark skies. But those who live in highly polluted areas, or do not have access to very specialized equipment, still have many possibilities; amongst which is using the online resources available from the internet. In this chapter we explore Aladin, Simbad, and VizieR, three resources created and maintained by the Centre de Données astronomiques de Strasbourg (CDS). Although these applications are intended for professional astronomers, they are also freely available for amateurs. They allow us to find and measure old neglected difficult pairs, discover new double stars, and in general have a better understanding of those tiny pairs of points of light that we love to observe, photograph and measure.

  16. Internet conferences in glycobiology.

    Science.gov (United States)

    Hardy, B J; Doughty, S W; Parretti, M F; Tennison, J; Wilson, I

    1997-09-01

    In this article we describe recent activities in the use of electronic conferencing in glycobiology focusing on our experiences with the organization and development of the Second Electronic Glycoscience Conference (EGC-2), which was held on the Internet and World Wide Web in September 1996. EGC-2 involved the presentation and discussion of scientific research results in a virtual conferencing environment which incorporated virtual replicas of many activities usually observed at a physical conference in addition to features unique to the electronic medium. Highlights of the scientific program and technical developments in the design and use of these facilities are briefly described. EGC-3 will be held in October 1997.

  17. Social network based dynamic transit service through the OMITS system.

    Science.gov (United States)

    2014-02-01

    The Open Mode Integrated Transportation System (OMITS) forms a sustainable information infrastructure for communication within and between the mobile/Internet network, the roadway : network, and the users social network. It manipulates the speed g...

  18. 互联网环境下的三七文化传播探究%Internet Environment SanChi Cultural of Transmission Search

    Institute of Scientific and Technical Information of China (English)

    2013-01-01

    SanChi culture is Wenshan of all nationalities collective,it can brings for human health.Using the Internet to spread SanChi culture,let more people know SanChi culture and consumer SanChi culture,sent it contribute to human health.%  三七文化是文山各族人民的集体智慧结晶,能为人类健康造福。充分利用互联网对三七文化进行广泛传播,让更多人认识并消费三七文化,让三七文化为人类健康做出更大贡献。

  19. Environment

    International Nuclear Information System (INIS)

    McIntyre, A.D.; Turnbull, R.G.H.

    1992-01-01

    The development of the hydrocarbon resources of the North Sea has resulted in both offshore and onshore environmental repercussions, involving the existing physical attributes of the sea and seabed, the coastline and adjoining land. The social and economic repercussions of the industry were equally widespread. The dramatic and speedy impact of the exploration and exploitation of the northern North Sea resources in the early 1970s, on the physical resources of Scotland was quickly realised together with the concern that any environmental and social damage to the physical and social fabric should be kept to a minimum. To this end, a wide range of research and other activities by central and local government, and other interested agencies was undertaken to extend existing knowledge on the marine and terrestrial environments that might be affected by the oil and gas industry. The outcome of these activities is summarized in this paper. The topics covered include a survey of the marine ecosystems of the North Sea, the fishing industry, the impact of oil pollution on seabirds and fish stocks, the ecology of the Scottish coastline and the impact of the petroleum industry on a selection of particular sites. (author)

  20. INTERNET & INTRANET

    Institute of Scientific and Technical Information of China (English)

    刘硬

    1999-01-01

    <正> 一、什么是INTERNET,INTRANET 说起INTERNET大家都知道它是我们平时接触最多的国际互联网。而INTRANET是最近两年才发展起来的新事物,被企业界称为企业内部网。 INTERNET是一组全球范围内信息资源的名字。这些资源非常巨大,不是一般人所能想象的。它于20世纪70年代创建。他们从一称为ARPANET的网络开始,是由美国国防部发起的用于军事情报的调查与军队之间的联络。原来的ARPANET早已被扩展与替代了,今天它已成为我们所说的INTERNET的全球主干网。

  1. Internet addiction or excessive internet use.

    Science.gov (United States)

    Weinstein, Aviv; Lejoyeux, Michel

    2010-09-01

    Problematic Internet addiction or excessive Internet use is characterized by excessive or poorly controlled preoccupations, urges, or behaviors regarding computer use and Internet access that lead to impairment or distress. Currently, there is no recognition of internet addiction within the spectrum of addictive disorders and, therefore, no corresponding diagnosis. It has, however, been proposed for inclusion in the next version of the Diagnostic and Statistical Manual of Mental Disorder (DSM). To review the literature on Internet addiction over the topics of diagnosis, phenomenology, epidemiology, and treatment. Review of published literature between 2000-2009 in Medline and PubMed using the term "internet addiction. Surveys in the United States and Europe have indicated prevalence rate between 1.5% and 8.2%, although the diagnostic criteria and assessment questionnaires used for diagnosis vary between countries. Cross-sectional studies on samples of patients report high comorbidity of Internet addiction with psychiatric disorders, especially affective disorders (including depression), anxiety disorders (generalized anxiety disorder, social anxiety disorder), and attention deficit hyperactivity disorder (ADHD). Several factors are predictive of problematic Internet use, including personality traits, parenting and familial factors, alcohol use, and social anxiety. Although Internet-addicted individuals have difficulty suppressing their excessive online behaviors in real life, little is known about the patho-physiological and cognitive mechanisms responsible for Internet addiction. Due to the lack of methodologically adequate research, it is currently impossible to recommend any evidence-based treatment of Internet addiction.

  2. Seismic network based detection, classification and location of volcanic tremors

    Science.gov (United States)

    Nikolai, S.; Soubestre, J.; Seydoux, L.; de Rosny, J.; Droznin, D.; Droznina, S.; Senyukov, S.; Gordeev, E.

    2017-12-01

    Volcanic tremors constitute an important attribute of volcanic unrest in many volcanoes, and their detection and characterization is a challenging issue of volcano monitoring. The main goal of the present work is to develop a network-based method to automatically classify volcanic tremors, to locate their sources and to estimate the associated wave speed. The method is applied to four and a half years of seismic data continuously recorded by 19 permanent seismic stations in the vicinity of the Klyuchevskoy volcanic group (KVG) in Kamchatka (Russia), where five volcanoes were erupting during the considered time period. The method is based on the analysis of eigenvalues and eigenvectors of the daily array covariance matrix. As a first step, following Seydoux et al. (2016), most coherent signals corresponding to dominating tremor sources are detected based on the width of the covariance matrix eigenvalues distribution. With this approach, the volcanic tremors of the two volcanoes known as most active during the considered period, Klyuchevskoy and Tolbachik, are efficiently detected. As a next step, we consider the array covariance matrix's first eigenvectors computed every day. The main hypothesis of our analysis is that these eigenvectors represent the principal component of the daily seismic wavefield and, for days with tremor activity, characterize the dominant tremor sources. Those first eigenvectors can therefore be used as network-based fingerprints of tremor sources. A clustering process is developed to analyze this collection of first eigenvectors, using correlation coefficient as a measure of their similarity. Then, we locate tremor sources based on cross-correlations amplitudes. We characterize seven tremor sources associated with different periods of activity of four volcanoes: Tolbachik, Klyuchevskoy, Shiveluch, and Kizimen. The developed method does not require a priori knowledge, is fully automatic and the database of network-based tremor fingerprints

  3. Responsible Internet Use.

    Science.gov (United States)

    Truett, Carol; And Others

    1997-01-01

    Provides advice for making school Internet-use guidelines. Outlines responsible proactive use of the Internet for educators and librarians, discusses strengths and weaknesses of Internet blocking software and rating systems, and describes acceptable-use policies (AUP). Lists resources for creating your own AUP, Internet filtering software, and…

  4. The Internet and tourism

    OpenAIRE

    Verner, Zbyněk

    2012-01-01

    This work concentrates on Internet and its influence on tourism. It describes history of Internet, tourism and interactions among them. Next this work deals with the newest trends of Internet and their influence on tourism. Last but not least, it analyzes the influence of Internet on demand in tourism in Czech Republic.

  5. Internet Addiction among Adolescence

    Science.gov (United States)

    Sargin, Nurten

    2012-01-01

    Each innovation brings along many risks. One of the risks related with the Internet use is Internet addiction. The aim of this study is to examine Internet addiction in adolescence in terms of gender, Internet access at home and grades. The research design used was survey method. The study population consisted of second stage students attending…

  6. Internet Economics IV

    Science.gov (United States)

    2004-08-01

    edts.): Internet Economics IV Technical Report No. 2004-04, August 2004 Information Systems Laboratory IIS, Departement of Computer Science University of...level agreements (SLA), Information technology (IT), Internet address, Internet service provider 16. PRICE CODE 17. SECURITY CLASSIFICATION 18... technology and its economic impacts in the Internet world today. The second talk addresses the area of AAA protocol, summarizing authentication

  7. University Students' Self-Efficacy and Their Attitudes Toward the Internet: The Role of Students' Perceptions of the Internet

    Science.gov (United States)

    Peng, Hsinyi; Tsai, Chin-Chung; Wu, Ying-Tien

    2006-01-01

    The attitudes and the self-efficacy that characterize learners relative to the Internet have been identified as important factors that affect learners' motivation, interests and performance in Internet-based learning environments. Meanwhile, learners' perceptions of the Internet may shape learners' attitudes and online behaviours. This study…

  8. Optical-Correlator Neural Network Based On Neocognitron

    Science.gov (United States)

    Chao, Tien-Hsin; Stoner, William W.

    1994-01-01

    Multichannel optical correlator implements shift-invariant, high-discrimination pattern-recognizing neural network based on paradigm of neocognitron. Selected as basic building block of this neural network because invariance under shifts is inherent advantage of Fourier optics included in optical correlators in general. Neocognitron is conceptual electronic neural-network model for recognition of visual patterns. Multilayer processing achieved by iteratively feeding back output of feature correlator to input spatial light modulator and updating Fourier filters. Neural network trained by use of characteristic features extracted from target images. Multichannel implementation enables parallel processing of large number of selected features.

  9. Internet-kulttuuri nykytaiteessa

    OpenAIRE

    Höyssä, Timo

    2016-01-01

    Internet-kulttuuri nykytaiteessa Tutkimuksessa tarkastellaan internet-taiteen historiaa ja nykyisiä esityskäytäntöjä sekä sitä miten globaali internet-kulttuuri on muokannut nykytaidetta sekä galleriassa että webissä. Tutkimuksessa kysytään miten internetin kehitys on vaikuttanut internet-taiteeseen sekä post-internet-taiteen syntyyn? Mikä on internetin paikka nykytaiteessa sekä populaarikulttuurissa? Internet culture in contemporary art A study on the history of Internet art and it’...

  10. Trends in Internet Marketing

    OpenAIRE

    Panchanathan, Nitin

    2005-01-01

    Internet marketing involves the usage of the Internet to market and sell goods or services. In this thesis we wished to seek answers for the following questions with the help of web, email surveys taking into consideration consumer perspective, company perspective and 3rd party internet marketing agency perspective. Our survey sample was based on a small set of companies, consumers and internet marketing agencies. The survey results helped us in predicting the trends in internet marketing. We...

  11. Future internet architecture and cloud ecosystem: A survey

    Science.gov (United States)

    Wan, Man; Yin, Shiqun

    2018-04-01

    The Internet has gradually become a social infrastructure, the existing TCP/IP architecture faces many challenges. So future Internet architecture become hot research. This paper introduces two ways of idea about the future research of Internet structure system, probes into the future Internet architecture and the environment of cloud ecosystem. Finally, we focuses the related research, and discuss basic principles and problems of OpenStack.

  12. Sensor Network-Based and User-Friendly User Location Discovery for Future Smart Homes.

    Science.gov (United States)

    Ahvar, Ehsan; Lee, Gyu Myoung; Han, Son N; Crespi, Noel; Khan, Imran

    2016-06-27

    User location is crucial context information for future smart homes where many location based services will be proposed. This location necessarily means that User Location Discovery (ULD) will play an important role in future smart homes. Concerns about privacy and the need to carry a mobile or a tag device within a smart home currently make conventional ULD systems uncomfortable for users. Future smart homes will need a ULD system to consider these challenges. This paper addresses the design of such a ULD system for context-aware services in future smart homes stressing the following challenges: (i) users' privacy; (ii) device-/tag-free; and (iii) fault tolerance and accuracy. On the other hand, emerging new technologies, such as the Internet of Things, embedded systems, intelligent devices and machine-to-machine communication, are penetrating into our daily life with more and more sensors available for use in our homes. Considering this opportunity, we propose a ULD system that is capitalizing on the prevalence of sensors for the home while satisfying the aforementioned challenges. The proposed sensor network-based and user-friendly ULD system relies on different types of inexpensive sensors, as well as a context broker with a fuzzy-based decision-maker. The context broker receives context information from different types of sensors and evaluates that data using the fuzzy set theory. We demonstrate the performance of the proposed system by illustrating a use case, utilizing both an analytical model and simulation.

  13. Sensor Network-Based and User-Friendly User Location Discovery for Future Smart Homes

    Directory of Open Access Journals (Sweden)

    Ehsan Ahvar

    2016-06-01

    Full Text Available User location is crucial context information for future smart homes where many location based services will be proposed. This location necessarily means that User Location Discovery (ULD will play an important role in future smart homes. Concerns about privacy and the need to carry a mobile or a tag device within a smart home currently make conventional ULD systems uncomfortable for users. Future smart homes will need a ULD system to consider these challenges. This paper addresses the design of such a ULD system for context-aware services in future smart homes stressing the following challenges: (i users’ privacy; (ii device-/tag-free; and (iii fault tolerance and accuracy. On the other hand, emerging new technologies, such as the Internet of Things, embedded systems, intelligent devices and machine-to-machine communication, are penetrating into our daily life with more and more sensors available for use in our homes. Considering this opportunity, we propose a ULD system that is capitalizing on the prevalence of sensors for the home while satisfying the aforementioned challenges. The proposed sensor network-based and user-friendly ULD system relies on different types of inexpensive sensors, as well as a context broker with a fuzzy-based decision-maker. The context broker receives context information from different types of sensors and evaluates that data using the fuzzy set theory. We demonstrate the performance of the proposed system by illustrating a use case, utilizing both an analytical model and simulation.

  14. Feasibility of a Friendship Network-Based Pediatric Obesity Intervention.

    Science.gov (United States)

    Giannini, Courtney M; Irby, Megan B; Skelton, Joseph A; Gesell, Sabina B

    2017-02-01

    There is growing evidence supporting social network-based interventions for adolescents with obesity. This study's aim was to determine the feasibility of a social network-based intervention by assessing adolescents' friendship networks, willingness to involve friends in treatment, and how these factors influence enjoyment. Adolescents (N = 42) were recruited from a tertiary care obesity clinic. Participants gave a list of closest friends, friendship characteristics, and which of their friends they would involve in treatment. A subset (N = 14) participated in group treatment, were encouraged to bring friends, and invited to a second interview. Participants nominated a mean of 4.0 (standard deviation [SD] = 1.6) friends and were more likely to nominate closer friends (p = 0.003). Friends who attended group sessions were more likely to have multiple friendships in common with the participant's own network (p = 0.04). Involving friends in treatment is feasible and desired by adolescents and may be a novel approach for augmenting obesity treatment outcomes.

  15. Deep Neural Network-Based Chinese Semantic Role Labeling

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiaoqing; CHEN Jun; SHANG Guoqiang

    2017-01-01

    A recent trend in machine learning is to use deep architec-tures to discover multiple levels of features from data, which has achieved impressive results on various natural language processing (NLP) tasks. We propose a deep neural network-based solution to Chinese semantic role labeling (SRL) with its application on message analysis. The solution adopts a six-step strategy: text normalization, named entity recognition (NER), Chinese word segmentation and part-of-speech (POS) tagging, theme classification, SRL, and slot filling. For each step, a novel deep neural network - based model is designed and optimized, particularly for smart phone applications. Ex-periment results on all the NLP sub - tasks of the solution show that the proposed neural networks achieve state-of-the-art performance with the minimal computational cost. The speed advantage of deep neural networks makes them more competitive for large-scale applications or applications requir-ing real-time response, highlighting the potential of the pro-posed solution for practical NLP systems.

  16. New Paradigms in Internet Computing

    CERN Document Server

    Tripathy, Piyu; Naik, Sagar

    2013-01-01

    The renaissance of internet has reached the mainstream that is named as Web 2.0. People are now using the web to build things they have never thought of earlier. Experts take a step forward to what we contribute, and extend it and give back to the society, i.e. really the boon of internet computing. It has revolutionized the current business environment, not as a mere computing tool, but offers versatile services and increase the productive flow of information. It is a new dimension in computing systems by which companies can curtail their operating expenses, by hosting and operating through the internet. Now the users can access the required information by means of any device connected with an internet. The challenge ahead for implementing this versatile system is that the software and technology has to be developed and deployed simultaneously vis-a-vis safeguarding the security and privacy of information.             This book encompasses various research and developments in Internet technology a...

  17. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6

    Directory of Open Access Journals (Sweden)

    Peter Kirstein

    2013-05-01

    Full Text Available Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT. IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB, Controller Area Network (CAN and radio frequency ID (RFID from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6.

  18. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6)

    Science.gov (United States)

    Jara, Antonio J.; Moreno-Sanchez, Pedro; Skarmeta, Antonio F.; Varakliotis, Socrates; Kirstein, Peter

    2013-01-01

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB), Controller Area Network (CAN) and radio frequency ID (RFID) from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6. PMID:23686145

  19. IPv6 addressing proxy: mapping native addressing from legacy technologies and devices to the Internet of Things (IPv6).

    Science.gov (United States)

    Jara, Antonio J; Moreno-Sanchez, Pedro; Skarmeta, Antonio F; Varakliotis, Socrates; Kirstein, Peter

    2013-05-17

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB), Controller Area Network (CAN) and radio frequency ID (RFID) from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6.

  20. Neural network based cluster creation in the ATLAS silicon Pixel Detector

    CERN Document Server

    Andreazza, A; The ATLAS collaboration

    2013-01-01

    The read-out from individual pixels on planar semi-conductor sensors are grouped into clusters to reconstruct the location where a charged particle passed through the sensor. The resolution given by individual pixel sizes is significantly improved by using the information from the charge sharing between pixels. Such analog cluster creation techniques have been used by the ATLAS experiment for many years to obtain an excellent performance. However, in dense environments, such as those inside high-energy jets, clusters have an increased probability of merging the charge deposited by multiple particles. Recently, a neural network based algorithm which estimates both the cluster position and whether a cluster should be split has been developed for the ATLAS Pixel Detector. The algorithm significantly reduces ambiguities in the assignment of pixel detector measurement to tracks within jets and improves the position accuracy with respect to standard interpolation techniques by taking into account the 2-dimensional ...

  1. Convolutional Neural Network-Based Shadow Detection in Images Using Visible Light Camera Sensor

    Directory of Open Access Journals (Sweden)

    Dong Seop Kim

    2018-03-01

    Full Text Available Recent developments in intelligence surveillance camera systems have enabled more research on the detection, tracking, and recognition of humans. Such systems typically use visible light cameras and images, in which shadows make it difficult to detect and recognize the exact human area. Near-infrared (NIR light cameras and thermal cameras are used to mitigate this problem. However, such instruments require a separate NIR illuminator, or are prohibitively expensive. Existing research on shadow detection in images captured by visible light cameras have utilized object and shadow color features for detection. Unfortunately, various environmental factors such as illumination change and brightness of background cause detection to be a difficult task. To overcome this problem, we propose a convolutional neural network-based shadow detection method. Experimental results with a database built from various outdoor surveillance camera environments, and from the context-aware vision using image-based active recognition (CAVIAR open database, show that our method outperforms previous works.

  2. Neural network based cluster creation in the ATLAS silicon pixel detector

    CERN Document Server

    Selbach, K E; The ATLAS collaboration

    2012-01-01

    The read-out from individual pixels on planar semi-conductor sensors are grouped into clusters to reconstruct the location where a charged particle passed through the sensor. The resolution given by individual pixel sizes is significantly improved by using the information from the charge sharing between pixels. Such analog cluster creation techniques have been used by the ATLAS experiment for many years to obtain an excellent performance. However, in dense environments, such as those inside high-energy jets, clusters have an increased probability of merging the charge deposited by multiple particles. Recently, a neural network based algorithm which estimates both the cluster position and whether a cluster should be split has been developed for the ATLAS pixel detector. The algorithm significantly reduces ambiguities in the assignment of pixel detector measurement to tracks within jets and improves the position accuracy with respect to standard interpolation techniques by taking into account the 2-dimensional ...

  3. A comprehensive probabilistic analysis model of oil pipelines network based on Bayesian network

    Science.gov (United States)

    Zhang, C.; Qin, T. X.; Jiang, B.; Huang, C.

    2018-02-01

    Oil pipelines network is one of the most important facilities of energy transportation. But oil pipelines network accident may result in serious disasters. Some analysis models for these accidents have been established mainly based on three methods, including event-tree, accident simulation and Bayesian network. Among these methods, Bayesian network is suitable for probabilistic analysis. But not all the important influencing factors are considered and the deployment rule of the factors has not been established. This paper proposed a probabilistic analysis model of oil pipelines network based on Bayesian network. Most of the important influencing factors, including the key environment condition and emergency response are considered in this model. Moreover, the paper also introduces a deployment rule for these factors. The model can be used in probabilistic analysis and sensitive analysis of oil pipelines network accident.

  4. Using mobile, internet connected deep sea crawlers for spatial and temporal analysis of cold seep ecosystems and the collection of real-time classroom data for extreme environment education.

    Science.gov (United States)

    Purser, Autun; Kwasnitschka, Tom; Duda, Alexander; Schwendner, Jakob; Bamberg, Marlene; Sohl, Frank; Doya, Carol; Aguzzi, Jacopo; Best, Mairi; Llovet, Neus Campanya I.; Scherwath, Martin; Thomsen, Laurenz

    2015-04-01

    Cabled internet and power connectivity with the deep sea allow instruments to operate in the deep sea at higher temporal resolutions than was possible historically, with the reliance on battery life and data storage capacities. In addition to the increase in sensor temporal frequency, cabled infrastructures now allow remote access to and control of mobile platforms on the seafloor. Jacobs University Bremen, in combination with collaborators from the Robotic Exploration of Extreme Environments (ROBEX) project, CSIC Barcelona and Ocean Networks Canada have been operating tracked deep sea crawler vehicles at ~890 m depth at the dynamic Barkley Canyon methane seep site, Pacific Canada during the last ~4 years. The vehicle has been able to explore an area of ~50 m radius, allowing repeated visits to numerous microhabitats. Mounting a range of sensors, including temperature, pressure, conductivity, fluorescence, turbidity, flow and methane concentration sensors, as well as various camera systems a large dataset has been compiled. Several methane pockmarks are present in the survey area, and geological, biological and oceanographic changes have been monitored over a range of timescales. Several publications have been produced, and in this presentation we introduce further data currently under analysis. Cabled internet connectivity further allows mobile platforms to be used directly in education. As part of the ROBEX project, researchers and students from both terrestrial and planetary sciences are using the crawler in an ongoing study project. Students are introduced to statistical methods from both fields during the course and in later stages they can plan their own research using the in-situ crawler, and follow the progress of their investigations live, then analyse the collected data using the techniques introduced during the course. Cabled infrastructures offer a unique facility for spatial investigation of extreme ecosystems over time, and for the 'hands on

  5. Countermeasures for Commercial Banks to Develop Mobile Financial services in the Environment of Mobile Internet%移动互联环境下商业银行发展移动金融服务对策

    Institute of Scientific and Technical Information of China (English)

    徐虹

    2016-01-01

    当前,移动互联网技术与金融业深度融合形成的移动金融,已成为金融行业创新最活跃、成长最迅速的新兴业态,分析当前移动互联背景下商业银行的移动金融服务发展策略显得尤为紧迫。文章从移动金融市场的发展态势入手,分析移动金融市场的泛在化、即时化、社交化等特征,提出五点建议:理顺移动金融发展战略,加快差异化发展模式,推进数据仓库技术支持,筑牢移动金融安全防线,弥补移动金融消费者教育与信息的不足等。%Mobile finance, as an integration of mobile internet technology and the financial industry, has become a new type of business with the most active innovation and the most rapid development, so that it has a great significance to study the countermeasures for commercial banks to develop mobile financial services in the environment of mobile internet. Based on the development tendency of mobile financial market, the paper presents its characteristics of being ubiquitous, immediate and social and puts forward five proposals: to work out the strategies for the development of mobile finance, to accelerate the differentiation of development mode, to promote the support of data warehouse technology, to build a powerful mobile financial security, and to make up for the insufficiency of education and information for mobile financial consumers.

  6. Reconstruction of biological networks based on life science data integration

    Directory of Open Access Journals (Sweden)

    Kormeier Benjamin

    2010-06-01

    Full Text Available For the implementation of the virtual cell, the fundamental question is how to model and simulate complex biological networks. Therefore, based on relevant molecular database and information systems, biological data integration is an essential step in constructing biological networks. In this paper, we will motivate the applications BioDWH - an integration toolkit for building life science data warehouses, CardioVINEdb - a information system for biological data in cardiovascular-disease and VANESA- a network editor for modeling and simulation of biological networks. Based on this integration process, the system supports the generation of biological network models. A case study of a cardiovascular-disease related gene-regulated biological network is also presented.

  7. Reconstruction of biological networks based on life science data integration.

    Science.gov (United States)

    Kormeier, Benjamin; Hippe, Klaus; Arrigo, Patrizio; Töpel, Thoralf; Janowski, Sebastian; Hofestädt, Ralf

    2010-10-27

    For the implementation of the virtual cell, the fundamental question is how to model and simulate complex biological networks. Therefore, based on relevant molecular database and information systems, biological data integration is an essential step in constructing biological networks. In this paper, we will motivate the applications BioDWH--an integration toolkit for building life science data warehouses, CardioVINEdb--a information system for biological data in cardiovascular-disease and VANESA--a network editor for modeling and simulation of biological networks. Based on this integration process, the system supports the generation of biological network models. A case study of a cardiovascular-disease related gene-regulated biological network is also presented.

  8. Study on marketing strategies of mobile phones under the mobile internet environment%移动互联网环境下的手机营销策略研究

    Institute of Scientific and Technical Information of China (English)

    张立平

    2015-01-01

    移动互联网环境下,手机作为一种新型营销平台,其应用价值日益凸显。企业应该发挥手机营销的优势,把握目标群体的心理,通过制作富有创意的APP、挖掘手机互动与分享功能、给予用户实惠便利、营造舒适的手机体验环境等多种策略,达到营销传播的目的。%Under the mobile internet environment, mobile phone, as a new marketing platform, is growing its application value. Enterprises should play the advantages of mobile phone marketing and grasp the target group. By using various strategies such as making creative APP, mining mobile interaction and sharing function, giving users the economical convenience and creating a comfortable environment, the marketing goals can be achieved.

  9. Internet Commerce Managing Financial on the Internet

    Directory of Open Access Journals (Sweden)

    Chandra Wibowo Widhianto

    2001-03-01

    Full Text Available Article explain how to business through internet which are web business clarification, strategy effect, how to make profit, and business electronic changes consist of criptografy, EDI, signature, digital notarisation, file, payment, and how to get succes in internet business.

  10. Commercialisation of Internet

    DEFF Research Database (Denmark)

    Henten, Anders; Skouby, Knud Erik

    An anthology dealing with the commercialisation of Internet and the development of new services.......An anthology dealing with the commercialisation of Internet and the development of new services....

  11. Internet Addiction and Antisocial Internet Behavior of Adolescents

    OpenAIRE

    Ma, Hing Keung

    2011-01-01

    Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial) use of Internet is discussed. It is argued ...

  12. Internet of Things (IoT Based Design of a Secure and Lightweight Body Area Network (BAN Healthcare System

    Directory of Open Access Journals (Sweden)

    Yong-Yuan Deng

    2017-12-01

    Full Text Available As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT. At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices which relay data to a personal wireless device, forming a body area network (BAN. These personal wireless devices collect and integrate patients’ personal physiological data, and then transmit the data to the backend of the network for related diagnostics. However, a great deal of the information transmitted by such systems is sensitive data, and must therefore be subject to stringent security protocols. Protecting this data from unauthorized access is thus an important issue in IoT-related research. In regard to a cloud healthcare environment, scholars have proposed a secure mechanism to protect sensitive patient information. Their schemes provide a general architecture; however, these previous schemes still have some vulnerability, and thus cannot guarantee complete security. This paper proposes a secure and lightweight body-sensor network based on the Internet of Things for cloud healthcare environments, in order to address the vulnerabilities discovered in previous schemes. The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack.

  13. Internet of Things (IoT) Based Design of a Secure and Lightweight Body Area Network (BAN) Healthcare System.

    Science.gov (United States)

    Deng, Yong-Yuan; Chen, Chin-Ling; Tsaur, Woei-Jiunn; Tang, Yung-Wen; Chen, Jung-Hsuan

    2017-12-15

    As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT). At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices which relay data to a personal wireless device, forming a body area network (BAN). These personal wireless devices collect and integrate patients' personal physiological data, and then transmit the data to the backend of the network for related diagnostics. However, a great deal of the information transmitted by such systems is sensitive data, and must therefore be subject to stringent security protocols. Protecting this data from unauthorized access is thus an important issue in IoT-related research. In regard to a cloud healthcare environment, scholars have proposed a secure mechanism to protect sensitive patient information. Their schemes provide a general architecture; however, these previous schemes still have some vulnerability, and thus cannot guarantee complete security. This paper proposes a secure and lightweight body-sensor network based on the Internet of Things for cloud healthcare environments, in order to address the vulnerabilities discovered in previous schemes. The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack.

  14. The internet for radiologists

    International Nuclear Information System (INIS)

    Caramella, D.; Pavone, P.

    1999-01-01

    This book provides information on all aspects of the Internet of interest to radiologists. It also provides non-experts with all the information necessary to profit from the Internet and to explore the different possibilities offered by the www. Its use should be recommended to all radiologists who use the Internet. (orig.)

  15. Advertising on the Internet.

    Science.gov (United States)

    Jugenheimer, Donald W.

    1996-01-01

    States that although many advertisers have intentions of utilizing the Internet for advertising, which can provide specific audience targeting and buyer/seller interactivity, few have been successful. Explains advantages and disadvantages of using the Internet for advertising purposes. Cites special problems with Internet advertising and successes…

  16. Impact of the Internet.

    Science.gov (United States)

    Balajthy, Ernest

    1997-01-01

    Discusses the impact and the potential of the Internet on education. Suggests that educators and parents need to deal with the lack of quality assurance of the Internet. Addresses readability and appropriateness for children. Notes that successful use of the Internet by children requires that teachers provide instruction in multiple sources and…

  17. Internet Bad Neighborhoods

    NARCIS (Netherlands)

    Moreira Moura, Giovane

    2013-01-01

    A significant part of current Internet attacks originates from hosts that are distributed all over the Internet. However, there is evidence that most of these hosts are, in fact, concentrated in certain parts of the Internet. This behavior resembles the crime distribution in the real world: it

  18. Internet Addiction in Adolescents

    Science.gov (United States)

    Rebisz, Slawomir; Sikora, Ilona

    2016-01-01

    The possibilities offered by the use of the Internet increasingly intensify the problem of Internet addiction, which has become more prevalent in the last decade, marked by the growing availability of mobile devices and new media and their exacerbation of the problem. Research on Internet addiction, initiated by Kimberly Young at the end of the…

  19. Konsep Pemasaran Melalui Internet

    OpenAIRE

    Nurbasari, Anny

    2002-01-01

    Tulisan ini mencoba membuka wawasan kita untuk mengenal dan mendalami paradigma baru dalam manajemen pemasaran, yang berkaitan dengan kemajuan teknologi pemasaran khususnya pemasaran internet (internet marketing).Pemasaran lewat internet sebagai media komunikasi baru makin lazim dilakukan dan makin berpengaruh karena efisiensinya (lengkap, detail, akurat, cepat, mudah, hemat, murah, dan berjangkauan luas). Secara otomatis ini meningkatkan customer intimacy dan customer satisfaction.

  20. The Sensing Internet

    DEFF Research Database (Denmark)

    Heller, Alfred

    2015-01-01

    . Sensor networks can be seen as an important part of the Internet of Things and may even constitute an Internet of Sensors, since the communication layers can differ from the Internet standards. The current paper describes the case for application, followed by a discussion of the observed adaptive...

  1. Internet from Above.

    Science.gov (United States)

    Sullivan, Laura

    1998-01-01

    Explains how fast and reliable Internet access can be obtained by using satellite communications based on experiences at a high school in Mississippi. Discusses Internet communications; how it was implemented in the media center; local area networks; the need for Ethernet-based connection to the Internet; and price. (LRW)

  2. Measuring the internet

    NARCIS (Netherlands)

    Zhou, X.

    2006-01-01

    The Internet is a collection of networks that use the TCP/IP suite of protocols. It has a huge impact on human activity. There are currently hundreds of millions of computers connected to the Internet, generating several petabytes traffic a day. Internet is still growing rapidly. However, the

  3. Internet Addiction and Psychopathology

    Science.gov (United States)

    Koc, Mustafa

    2011-01-01

    This study examined the relationships between university students' internet addiction and psychopathology in Turkey. The study was based on data drawn from a national survey of university students in Turkey. 174 university students completed the SCL-90-R scale and Addicted Internet Users Inventory. Results show that students who use internet six…

  4. Internet marketing environment analysis of the consumer behavior%网络营销环境下的消费者行为分析

    Institute of Scientific and Technical Information of China (English)

    黄淑贞

    2013-01-01

    In the network marketing environment, the correct analysis of the network changes in consumer behavior, is the enterprise network marketing priorities. Through analysis of the article is not only able to give consumers a better consumer experience, but also allow enterprise to win their own development space,access to greater benefit ,to gain more market share in consumer.%在网络营销环境下,正确分析网络消费者的行为变化,是企业进行网络营销的首要任务。通过文章的分析不仅能够给消费者带来更好的消费体验,而且也能让企业赢得自身发展的空间,获得更大的利益,获得更多的消费市场份额。

  5. Design of an IoT Enabled Local Network Based Home Monitoring System with a Priority Scheme

    Directory of Open Access Journals (Sweden)

    V. Tiwari

    2017-04-01

    Full Text Available Internet of things (IoT is a concept where all devices get connected to the internet to exchange information. IoT can be utilized in order to make a home environment interactive and smart. The required connectivity can be provided by either making all the devices Wi-Fi capable, which is costly, or by setting a local wireless sensor network (WSN which later connects to internet. In this work various devices and sensors are designed and connected in a wireless sensor network within a home environment which generates a sensor dependent data packet. These data packets are then sent to the cloud through a master node. The master sends the data using a proposed priority scheme so that the critical information can be sent early. Simulations were performed to show that under the proposed scheme the loss of critical sensors information is reduced by around 75%.

  6. Service Oriented Middleware for the Internet of Things: A Perspective

    OpenAIRE

    Teixeira , Thiago; Hachem , Sara; Issarny , Valérie; Georgantas , Nikolaos

    2011-01-01

    International audience; The Internet of Things plays a central role in the foreseen shift of the Internet to the Future Internet, as it incarnates the drastic expansion of the In- ternet network with non-classical ICT devices. It will further be a major source of evolution of usage, due to the penetration in the user's life. As such, we en- vision that the Internet of Things will cooperate with the Internet of Services to provide users with services that are aware of their surrounding environ...

  7. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  8. Neural network-based model reference adaptive control system.

    Science.gov (United States)

    Patino, H D; Liu, D

    2000-01-01

    In this paper, an approach to model reference adaptive control based on neural networks is proposed and analyzed for a class of first-order continuous-time nonlinear dynamical systems. The controller structure can employ either a radial basis function network or a feedforward neural network to compensate adaptively the nonlinearities in the plant. A stable controller-parameter adjustment mechanism, which is determined using the Lyapunov theory, is constructed using a sigma-modification-type updating law. The evaluation of control error in terms of the neural network learning error is performed. That is, the control error converges asymptotically to a neighborhood of zero, whose size is evaluated and depends on the approximation error of the neural network. In the design and analysis of neural network-based control systems, it is important to take into account the neural network learning error and its influence on the control error of the plant. Simulation results showing the feasibility and performance of the proposed approach are given.

  9. Network-based analysis of software change propagation.

    Science.gov (United States)

    Wang, Rongcun; Huang, Rubing; Qu, Binbin

    2014-01-01

    The object-oriented software systems frequently evolve to meet new change requirements. Understanding the characteristics of changes aids testers and system designers to improve the quality of softwares. Identifying important modules becomes a key issue in the process of evolution. In this context, a novel network-based approach is proposed to comprehensively investigate change distributions and the correlation between centrality measures and the scope of change propagation. First, software dependency networks are constructed at class level. And then, the number of times of cochanges among classes is minded from software repositories. According to the dependency relationships and the number of times of cochanges among classes, the scope of change propagation is calculated. Using Spearman rank correlation analyzes the correlation between centrality measures and the scope of change propagation. Three case studies on java open source software projects Findbugs, Hibernate, and Spring are conducted to research the characteristics of change propagation. Experimental results show that (i) change distribution is very uneven; (ii) PageRank, Degree, and CIRank are significantly correlated to the scope of change propagation. Particularly, CIRank shows higher correlation coefficient, which suggests it can be a more useful indicator for measuring the scope of change propagation of classes in object-oriented software system.

  10. Internet-based instruction in college teaching

    Science.gov (United States)

    Flickinger, Kathleen Anne

    Distance education and Internet instruction are increasingly being used in college science teaching. In an effort to reach more students, Iowa State University's Human Anatomy and Physiology course was offered via Internet as well as via traditional lecture format. To assess the educational ramifications of this offering, three studies were conducted. In the first study, a collective case study approach was utilized to describe the learning environment created by an Internet-based college science course. In this study, three students were followed as they worked their way through the course. Collective case study methodologies were used to provide a rich description of the learning environment experienced by these students. Motivation, computer savvy, and academic and personal self-confidence appeared to impact the satisfaction level of the students enrolled in the class. To evaluate the effectiveness of the learning environment offered through the Internet-based science course, a quantitative comparison study was undertaken. In this study a comparison of achievement scores and study habits between students enrolled in the Internet-based class and those enrolled in the traditional section was made. Results from this study indicated that content understanding and retention did not appear to be effected by the type of instruction. Desirable study habits were reportedly used more frequently in the Internet section of the class than in the traditional class. To complete the description of the Internet course experience, a qualitative examination of Internet instructors' time commitment and level of teaching satisfaction was conducted. Data for this study consisted of interviews and researcher observations. Instructor time-on-task was initially quite high, and remained above the average spent on average face-to-face instruction in subsequent semesters. Additionally the role of the faculty member changed dramatically, causing some lessening of job satisfaction. Taken as

  11. The ARAC client system: network-based access to ARAC

    International Nuclear Information System (INIS)

    Leach, M J; Sumikawa, D; Webster, C

    1999-01-01

    The ARAC Client System allows users (such as emergency managers and first responders) with commonly available desktop and laptop computers to utilize the central ARAC system over the Internet or any other communications link using Internet protocols. Providing cost-effective fast access to the central ARAC system greatly expands the availability of the ARAC capability. The ARAC Client system consists of (1) local client applications running on the remote user's computer, and (2) ''site servers'' that provide secure access to selected central ARAC system capabilities and run on a scalable number of dedicated workstations residing at the central facility. The remote client applications allow users to describe a real or potential them-bio event, electronically sends this information to the central ARAC system which performs model calculations, and quickly receive and visualize the resulting graphical products. The site servers will support simultaneous access to ARAC capabilities by multiple users. The ARAC Client system is based on object-oriented client/server and distributed computing technologies using CORBA and Java, and consists of a large number of interacting components

  12. Lightweight Sensor Authentication Scheme for Energy Efficiency in Ubiquitous Computing Environments.

    Science.gov (United States)

    Lee, Jaeseung; Sung, Yunsick; Park, Jong Hyuk

    2016-12-01

    The Internet of Things (IoT) is the intelligent technologies and services that mutually communicate information between humans and devices or between Internet-based devices. In IoT environments, various device information is collected from the user for intelligent technologies and services that control the devices. Recently, wireless sensor networks based on IoT environments are being used in sectors as diverse as medicine, the military, and commerce. Specifically, sensor techniques that collect relevant area data via mini-sensors after distributing smart dust in inaccessible areas like forests or military zones have been embraced as the future of information technology. IoT environments that utilize smart dust are composed of the sensor nodes that detect data using wireless sensors and transmit the detected data to middle nodes. Currently, since the sensors used in these environments are composed of mini-hardware, they have limited memory, processing power, and energy, and a variety of research that aims to make the best use of these limited resources is progressing. This paper proposes a method to utilize these resources while considering energy efficiency, and suggests lightweight mutual verification and key exchange methods based on a hash function that has no restrictions on operation quantity, velocity, and storage space. This study verifies the security and energy efficiency of this method through security analysis and function evaluation, comparing with existing approaches. The proposed method has great value in its applicability as a lightweight security technology for IoT environments.

  13. Preference-based Internet of Things dynamic service selection for smart campus

    CSIR Research Space (South Africa)

    Manqele, L

    2015-09-01

    Full Text Available The usage of the Internet of Things technology across different service provisioning environments has increased the challenges associated with service discovery and selection. Users cannot always remember the Internet Protocol (IP) address for every...

  14. Combining Host-based and network-based intrusion detection system

    African Journals Online (AJOL)

    These attacks were simulated using hping. The proposed system is implemented in Java. The results show that the proposed system is able to detect attacks both from within (host-based) and outside sources (network-based). Key Words: Intrusion Detection System (IDS), Host-based, Network-based, Signature, Security log.

  15. Telemetry Standards, IRIG Standard 106-17, Chapter 22, Network Based Protocol Suite

    Science.gov (United States)

    2017-07-01

    requirements. 22.2 Network Access Layer 22.2.1 Physical Layer Connectors and cable media should meet the electrical or optical properties required by the...Telemetry Standards, IRIG Standard 106-17 Chapter 22, July 2017 i CHAPTER 22 Network -Based Protocol Suite Acronyms...iii Chapter 22. Network -Based Protocol Suite

  16. Dynamic neural network-based methods for compensation of nonlinear effects in multimode communication lines

    Science.gov (United States)

    Sidelnikov, O. S.; Redyuk, A. A.; Sygletos, S.

    2017-12-01

    We consider neural network-based schemes of digital signal processing. It is shown that the use of a dynamic neural network-based scheme of signal processing ensures an increase in the optical signal transmission quality in comparison with that provided by other methods for nonlinear distortion compensation.

  17. Security in the internet; Sicherheitsaspekte im Internet

    Energy Technology Data Exchange (ETDEWEB)

    Seibel, R.M.M.; Kocher, K.; Landsberg, P. [Witten-Herdecke Univ., Witten (Germany). Inst. fuer Diagnostische und Interventionelle Radiologie

    2000-04-01

    Aim of the study: Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Conclusions: Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet. (orig.) [German] Ziele der Studie und Analyse: Es sollten die Fragen beantwortet werden, ob es moeglich ist, das Internet als sicheres Uebermittlungsmedium fuer Telemedizin zu nutzen und welche Sicherheitsrisiken bestehen. Dazu wurden die gaengigen Sicherheitsmethoden analysiert. Telemedizin im Internet ist mit Sicherheitsrisiken behaftet, die durch die Oeffnung eines Intranets mit der Moeglichkeit zur unberechtigten Manipulation von aussen bedingt sind. Schlussfolgerung: Diese Sicherheitsrisiken koennen durch eine Firewall weitgehend unterbunden werden. Chipkarten wie die Health professional card ermoeglichen eine hohe Sicherheit bei digitaler Signatur und sicherer Authentifikation der Sender und Empfaenger von Daten im Internet. Auch Standards wie Pretty good privacy sind inzwischen fuer sichere e-mails einfach einzusetzen. Wichtige Voraussetzung fuer die Reduktion von Sicherheitsrisiken ist unter Beruecksichtigung der gesetzlichen Vorgaben die exakte Planung aller Aktivitaeten im Internet, bei denen medizinische Patientendaten versandt werden sollen, in einem Team aus Aerzten und Informatikern. (orig.)

  18. Internet Geo-Location

    Science.gov (United States)

    2017-12-01

    INTERNET GEO-LOCATION DUKE UNIVERSITY DECEMBER 2017 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED STINFO COPY AIR...REPORT TYPE FINAL TECHNICAL REPORT 3. DATES COVERED (From - To) MAY 2014 – MAY 2017 4. TITLE AND SUBTITLE INTERNET GEO-LOCATION 5a. CONTRACT...of SpeedTest servers that are used by end users to measure the speed of their Internet connection. The servers log the IP address and the location

  19. INTERNET AND SENIORS

    OpenAIRE

    Rain, Tomáš; Ivana Švarcová

    2010-01-01

    The article deals about the possibilities of using the internet for seniors. Authors suggest using www pages as alternative of retrospective therapy. Authors describe barriers of internet access for seniors. The authors of the article consider about utilization of internet for the reminiscent therapy of seniors. The target group of this article are the workers of the information centres, gerontopeds and the other persons working as the pedagogues. The objective of this article is to summarize...

  20. International Mathematical Internet Olympiad

    Directory of Open Access Journals (Sweden)

    Alexander Domoshnitsky

    2012-10-01

    Full Text Available Modern Internet technologies open new possibilities in wide spectrum of traditional methods used in mathematical education. One of the areas, where these technologies can be efficiently used, is an organization of mathematical competitions. Contestants can stay at their schools or universities and try to solve as many mathematical problems as possible and then submit their solutions through Internet. Simple Internet technologies supply audio and video connection between participants and organizers.

  1. Everyone’s Internet

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    After more than 20 years,the Internet in China has become a big success.The country has the world’s largest Internet population that topped 420 million at the end of June.In the first six months of this year,China’s Internet market reached 74.3 billion yuan($10.9 billion),the equivalent of 2009’s total.Local businesses have risen to

  2. Privacy and internet services

    OpenAIRE

    Samec, Marek

    2010-01-01

    This thesis is focused on internet services user privacy. Goal of this thesis is to determine level of user awareness of how is their privacy approached while using internet services. Then suggest procedure to improve this awareness, or that will lead to better control of individual privacy. In theoretical part I analyze general and legislative approach to privacy, followed by analysis of behaviour of internet service users and providers. Part of this analysis deals with usage of web cookies ...

  3. Internet and Privacy

    OpenAIRE

    Al-Fadhli, Meshal Shehab

    2007-01-01

    The concept of privacy is hard to understand and is not easy to define, because this concept is linked with several dimensions. Internet Privacy is associated with the use of the Internet and most likely appointed under communications privacy, involving the user of the Internet’s personal information and activities, and the disclosure of them online. This essay is going to present the meaning of privacy and the implications of it for Internet users. Also, this essay will demonstrate some of t...

  4. Privacy driven internet ecosystem

    OpenAIRE

    Trinh, Tuan Anh; Gyarmati, Laszlo

    2012-01-01

    The dominant business model of today's Internet is built upon advertisements; users can access Internet services while the providers show ads to them. Although significant efforts have been made to model and analyze the economic aspects of this ecosystem, the heart of the current status quo, namely privacy, has not received the attention of the research community yet. Accordingly, we propose an economic model of the privacy driven Internet ecosystem where privacy is handled as an asset that c...

  5. Internet Addiction in Adolescents

    OpenAIRE

    Rębisz Sławomir; Sikora Ilona

    2016-01-01

    The possibilities offered by the use of the Internet increasingly intensify the problem of Internet addiction, which has become more prevalent in the last decade, marked by the growing availability of mobile devices and new media and their exacerbation of the problem. Research on Internet addiction, initiated by Kimberly Young at the end of the twentieth century, usually appears in the literature in the context of young people who have been found to be most vulnerable. The phenomenon is known...

  6. Identifying internet marketing principles relevant to generic marketers / Ayesha Lian Bevan-Dye

    OpenAIRE

    Bevan-Dye, Ayesha Lian

    2005-01-01

    To deliver the type of marketing graduate that meets industry demand necessitates that marketing curricula content be continuously updated to keep pace with the dynamic marketing environment. One of the major trends influencing the twenty-first century marketing environment is the advent of the Internet and substantial growth in Internet usage and Internet-based commerce. Not only is the Internet driving major marketing environmental change, it is also emerging as a new marketing tool of sign...

  7. INTERNET AND SENIORS

    Directory of Open Access Journals (Sweden)

    Rain, Tomáš

    2010-12-01

    Full Text Available The article deals about the possibilities of using the internet for seniors. Authors suggest using www pages as alternative of retrospective therapy. Authors describe barriers of internet access for seniors. The authors of the article consider about utilization of internet for the reminiscent therapy of seniors. The target group of this article are the workers of the information centres, gerontopeds and the other persons working as the pedagogues. The objective of this article is to summarize ways of using internet for helping seniors to better life. The authors describe terms e-senior. The authors suggest methodological approach to exercising user’s skills.

  8. Internet dalam Konteks Perpustakaan

    Directory of Open Access Journals (Sweden)

    Roni Rodhin

    2017-02-01

    Full Text Available The presence of internet would bring a variaty of effects in all areas of human life. The impac of bias could be both a positive and negative. On the other side for libraries it would bring a disparate impact, engaged  in the service and information. In the contect of libraries, the internet is very helpfull to disseminate information that is available in it. It means internet becomes a partner in the dissemination of information. Therefore, the existence of internet is very important for the library.

  9. Modeling the Internet.

    Energy Technology Data Exchange (ETDEWEB)

    Kelic, Andjelka; Mitchell, Michael David; Shirah, Donald N.

    2017-12-01

    The National Infrastructure Simulations and Analysis Center (NISAC) has developed a nationwide model of the Internet to study the potential impact of the loss of physical facilities on the network and on other infrastructures that depend on the Internet for services. The model looks at the Internet from the perspective of Internet Service Providers (ISPs) and their connectivity and can be used to determine how the network connectivity could be modified to assist in mitigating an event. In addition the model could be used to explore how portions of the network could be made more resilient to disruptive events.

  10. College Student Internet Use: Convenience and Amusement

    Directory of Open Access Journals (Sweden)

    Genevieve M. Johnson

    2007-02-01

    Full Text Available Four hundred five college students completed a questionnaire that assessed patterns of Internet use. Results describe college students, with rare exception, as Internet users. The vast majority of college students frequently communicate online and access websites. While an Internet game experience is typical, relatively few college students are heavy online gamers. Overwhelmingly (i.e., 77.8%, college students conceptualized the Internet as a convenience, although 17.8% considered the Internet a source of amusement. Approximately 5% of college students reported negative perceptions of the Internet (frustrating or a waste of time. Principal component analysis revealed three patterns of online behaviour; integrated-Internet-use, games-only use, and dating-only use. Implications for online instructional practice are presented. Résumé : Quatre cent cinq étudiants du niveau collégial ont répondu à un questionnaire mesurant leurs tendances de l’utilisation d’Internet. Les résultats présentent ces étudiants comme des usagers d’Internet, à quelques exceptions près. La grande majorité de ces étudiants utilisent fréquemment les outils de communication en ligne et naviguent sur Internet. Alors qu’une expérience de jeu en ligne s’avère commune, peu d’étudiants du collège s’avèrent être des joueurs en ligne excessifs. Essentiellement (c.à-d. 77,8 %, ces étudiants perçoivent Internet comme une commodité, même si 17,8 % d’entre eux le considère comme une source d’amusement. Environ 5 % ont indiqué des perceptions négatives d’Internet (frustrations ou pertes de temps. L’analyse en composantes principales a révélé 3 tendances de comportements en ligne, l’utilisation intégrée d’Internet, l’utilisation seule de jeux et l’utilisation à des fins de rencontre seulement. On présente des conséquences pour la pratique de l’enseignement en ligne.

  11. Neural Network Based Reactive Navigation for Mobile Robot in Dynamic Environment

    Czech Academy of Sciences Publication Activity Database

    Krejsa, Jiří; Věchet, S.; Ripel, T.

    2013-01-01

    Roč. 198, č. 2013 (2013), s. 108-113 ISSN 1012-0394 Institutional research plan: CEZ:AV0Z20760514 Institutional support: RVO:61388998 Keywords : mobile robot * reactive navigation * artificial neural networks Subject RIV: JD - Computer Applications, Robotics

  12. A network-based distributed, media-rich computing and information environment

    Energy Technology Data Exchange (ETDEWEB)

    Phillips, R.L.

    1995-12-31

    Sunrise is a Los Alamos National Laboratory (LANL) project started in October 1993. It is intended to be a prototype National Information Infrastructure development project. A main focus of Sunrise is to tie together enabling technologies (networking, object-oriented distributed computing, graphical interfaces, security, multi-media technologies, and data-mining technologies) with several specific applications. A diverse set of application areas was chosen to ensure that the solutions developed in the project are as generic as possible. Some of the application areas are materials modeling, medical records and image analysis, transportation simulations, and K-12 education. This paper provides a description of Sunrise and a view of the architecture and objectives of this evolving project. The primary objectives of Sunrise are three-fold: (1) To develop common information-enabling tools for advanced scientific research and its applications to industry; (2) To enhance the capabilities of important research programs at the Laboratory; (3) To define a new way of collaboration between computer science and industrially-relevant research.

  13. Security, privacy, and confidentiality issues on the Internet

    OpenAIRE

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standa...

  14. Differential psychological impact of internet exposure on Internet addicts.

    Directory of Open Access Journals (Sweden)

    Michela Romano

    Full Text Available The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and autism traits. High internet-users also showed a pronounced decrease in mood following internet use compared to the low internet-users. The immediate negative impact of exposure to the internet on the mood of internet addicts may contribute to increased usage by those individuals attempting to reduce their low mood by re-engaging rapidly in internet use.

  15. Differential psychological impact of internet exposure on Internet addicts.

    Science.gov (United States)

    Romano, Michela; Osborne, Lisa A; Truzoli, Roberto; Reed, Phil

    2013-01-01

    The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and autism traits. High internet-users also showed a pronounced decrease in mood following internet use compared to the low internet-users. The immediate negative impact of exposure to the internet on the mood of internet addicts may contribute to increased usage by those individuals attempting to reduce their low mood by re-engaging rapidly in internet use.

  16. Die internet as dinamiese taalomgewing: taalveranderingsverskynsels in Internetafrikaans

    Directory of Open Access Journals (Sweden)

    M. Verhoef

    2001-06-01

    Full Text Available The internet as dynamic language environment: manifestations of language change in Internet Afrikaans It is generally accepted that the growing interest in the Internet has opened up new horizons for language research. Chenault (1997:1 asserts that the Internet is not about technology or information, but about communication. The aim with this article is to explore the Internet as a dynamic language environment in which emerging patterns of language change in modernday Afrikaans could be traced. Firstly, attention is paid to ways in which the internet speech community could be defined as a coherent speech community. A second aim with this article is to scrutinise the dichotomy between spoken and written language. This is done in order to indicate that linguistic innovations, which usually emerge from social interaction, find their way into written language in digital communication. The third aim is to take a close look at various forms or patterns of language change in Afrikaans as they are presently used in Afrikaans chat rooms on the Internet. The article concludes that Internet Afrikaans could be regarded as an aspect of virtual reality for Afrikaans because systematic patterns of language change which started long ago in Afrikaans are confirmed by the Internet language environment.

  17. Internet use by the socially fearful: addiction or therapy?

    Science.gov (United States)

    Campbell, Andrew J; Cumming, Steven R; Hughes, Ian

    2006-02-01

    The Internet has often been argued to have adverse psychological consequences, such as depression or anxiety symptoms, among "over-users." The present study offers an alternative understanding, suggesting the Internet may be used as a forum for expanding social networks and consequently enhancing the chance of meaningful relationships, self-confidence, social abilities, and social support. An online sample of 188 people was recruited over the Internet, while paper and pencil tests were administered to an offline sample group of 27 undergraduate university students, who were regular Internet users. Subjects completed the Zung Depression Scale (ZDS), Depression, Anxiety and Stress Scales (DASS), Eysenck Personality Questionnaire?Revised Short Scale (EPQ-R Short), Fear of Negative Evaluation (FNE) scale, Internet Use Questionnaire (IUQ), and an Internet Effects Questionnaire (IEQ). Results suggested that there was no relationship between time spent online and depression, anxiety, or social fearfulness. Those who primarily used the Internet for online chat believed that the Internet is psychologically beneficial to them, but also believed that frequent Internet users are lonely and that the Internet can be addictive. It is argued that "chat" users who are socially fearful may be using the Internet as a form of low-risk social approach and an opportunity to rehearse social behavior and communication skills, which, may help them improve interaction with offline, face-to-face, social environments.

  18. Differential Psychological Impact of Internet Exposure on Internet Addicts

    OpenAIRE

    Romano, Michela; Osborne, Lisa A.; Truzoli, Roberto; Reed, Phil

    2013-01-01

    The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and aut...

  19. Piecing together the Internet

    CERN Multimedia

    Rae-Dupree, J

    2002-01-01

    No one group or person can take credit for inventing the Internet. Key ideas came from both military and academic researchers, DOE money got it up and running. Article giving a chronological timeline of the development of the internet from the 1960s to the present day (2 PC screens).

  20. Interlinguistics and the Internet.

    Science.gov (United States)

    Fettes, Mark

    1997-01-01

    Argues that the Internet offers new opportunities for the development, use, and study of planned languages. Notes that while most Web pages on "constructed" languages are the work of individual hobbyists, a few projects have small communities of users. The paper concludes that the use of Esperanto on the Internet reflects increased socialization…

  1. Creating Pupils' Internet Magazine

    Science.gov (United States)

    Bognar, Branko; Šimic, Vesna

    2014-01-01

    This article presents an action research, which aimed to improve pupils' literary creativity and enable them to use computers connected to the internet. The study was conducted in a small district village school in Croatia. Creating a pupils' internet magazine appeared to be an excellent way for achieving the educational aims of almost all…

  2. The Internet Erlang Formula

    DEFF Research Database (Denmark)

    Iversen, Villy Bæk

    2012-01-01

    This paper presents a robust and efficient algorithm for evaluating multi-service multi-rate queueing systems, including finite buffer systems and loss systems. Vint Cerf listed in 2007 seven research problems concerning the Internet. This paper responds to the second problem: an Internet Erlang...

  3. Trust Drives Internet Use

    DEFF Research Database (Denmark)

    Ljunge, Jan Martin

    This paper estimates the effect of trust on internet use by studying the general population as well as second generation immigrants in 29 European countries with ancestry in 87 nations. There is a significant positive effect of trust on internet use. The positive trust effect is not universal...

  4. Teaching on the Internet.

    Science.gov (United States)

    Kubala, Tom

    1998-01-01

    Discusses Internet graduate teaching experiences at the University of Central Florida and explores the pros and cons of online instruction. Describes Internet courses as asynchronous, allowing students to participate at any time and place. States that faculty must be excellent teachers, able to translate their styles into effective,…

  5. The Internet Debate.

    Science.gov (United States)

    Wampler, Angela Mallicote

    1996-01-01

    Examines whether the Internet will be an equalizer or will increase social stratification, whether the Internet will be a boon to rural areas, and how it can be made more appealing or acceptable to rural areas. Discusses the "missionary movement" model of economic change and rural issues related to access to infrastructure, censorship,…

  6. Internet Bad Neighborhoods Aggregation

    NARCIS (Netherlands)

    Moreira Moura, Giovane; Sadre, R.; Sperotto, Anna; Pras, Aiko; Paschoal Gaspary, L.; De Turk, Filip

    Internet Bad Neighborhoods have proven to be an innovative approach for fighting spam. They have also helped to understand how spammers are distributed on the Internet. In our previous works, the size of each bad neighborhood was fixed to a /24 subnetwork. In this paper, however, we investigate if

  7. Ethics and Internet Measurements

    NARCIS (Netherlands)

    van der Ham, Jeroen; van Rijswijk, Roland M.

    2017-01-01

    Over the past decade the Internet has changed from a helpful tool to an important part of our daily lives for most of the world’s population. Where in the past the Internet mostly served to look up and exchange information, it is now used to stay in touch with friends, perform financial transactions

  8. Internet accounting dictionaries

    DEFF Research Database (Denmark)

    Nielsen, Sandro; Mourier, Lise

    2005-01-01

    An examination of existing accounting dictionaries on the Internet reveals a general need for a new type of dictionary. In contrast to the dictionaries now accessible, the future accounting dictionaries should be designed as proper Internet dictionaries based on a functional approach so they can...

  9. Wireless mobile Internet security

    CERN Document Server

    Rhee, Man Young

    2013-01-01

      The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr

  10. LIFE ON THE INTERNET

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    The fast development of the Internet has not only changed people’s lifestyles but also had a deep impact on social structure the rapidly growing Internet has not only changed ways of collecting and using information,but also exerted a farreaching influence on social

  11. Internet and information

    Institute of Scientific and Technical Information of China (English)

    王文龙

    2001-01-01

    As the society develops, information becomesmore important than ever before. Computers willgradually be familiar to more and more people andbe used in more and more ways. Internet makes theworld integrated(合并) as a whole. So, it is important to learn how to make use of the Internet.

  12. Measuring internet skills

    NARCIS (Netherlands)

    van Deursen, Alexander Johannes Aloysius Maria; van Dijk, Johannes A.G.M.

    2010-01-01

    Research that considers Internet skills often lacks theoretical justifications and does not go beyond basic button knowledge. There is a strong need for a measurement framework that can guide future research. In this article, operational definitions for measuring Internet skills are proposed,

  13. Banking on the Internet.

    Science.gov (United States)

    Internet Research, 1996

    1996-01-01

    Electronic ground was broken in 1995 with the development of the completely Internet-based bank Security First Network Bank. This article discusses the need for developing online services, outlines the reasons for the formation of an Internet-based bank and argues that to remain competitive financial services providers must provide easier customer…

  14. Analysis and application of intelligence network based on FTTH

    Science.gov (United States)

    Feng, Xiancheng; Yun, Xiang

    2008-12-01

    With the continued rapid growth of Internet, new network service emerges in endless stream, especially the increase of network game, meeting TV, video on demand, etc. The bandwidth requirement increase continuously. Network technique, optical device technical development is swift and violent. FTTH supports all present and future service with enormous bandwidth, including traditional telecommunication service, traditional data service and traditional TV service, and the future digital TV and VOD. With huge bandwidth of FTTH, it wins the final solution of broadband network, becomes the final goal of development of optical access network. Firstly, it introduces the main service which FTTH supports, main analysis key technology such as FTTH system composition way, topological structure, multiplexing, optical cable and device. It focus two kinds of realization methods - PON, P2P technology. Then it proposed that the solution of FTTH can support comprehensive access (service such as broadband data, voice, video and narrowband private line). Finally, it shows the engineering application for FTTH in the district and building. It brings enormous economic benefits and social benefit.

  15. Australian internet policy

    Directory of Open Access Journals (Sweden)

    Angela Daly

    2017-03-01

    Full Text Available This special issue focussing on internet policy in Australia provides a snapshot of developments on various topics (access, privacy, censorship as a means of understanding better the state of play in Australia, and also how this compares to internet policy in other parts of the world, especially Europe and North America. Given changing geopolitics, the influence of internet policy in the rest of the Asia Pacific through vehicles such as the Regional Comprehensive Economic Partnership (RCEP may become increasingly important in Australia in the coming years. This leaves Australia, and its internet policy, at a crossroads, which may reflect broader dynamics in internet policy internationally, and makes this an interesting time in which to explore what is happening in this particular country.

  16. The Internet drag race

    CERN Document Server

    Fitchard, Kevin

    2004-01-01

    The Internet2 consortium members from California Institute of Technology and CERN developed effective fiber optic network, sending data upto 11,000 kilometers between Caltech's LA laboratories and CERN's campus in Geneva at a rate of 6.25 Gb/s. The 68,431 terabit- meters per second data transfer was accomplished using the IPv4 protocols that power the public Internet. Network run by Internet2, called Abilene maintains the highest capacities in the world, connecting dozens of GigaPOP's with OC-192c 10 Gb/s Ip backbone. The member institutions of Internet2 keep Abilene 10% to 15% full, but the researchers also use the network as a base for the latest Internet technologies and experiments, which include development of IPv6. (Edited abstract).

  17. Internet versus mail

    DEFF Research Database (Denmark)

    Olsen, Søren Bøye

    In a choice experiment setup, this paper suggests that internet surveys can be a viable alternative to traditional mail surveys when gathering feedback from a sample of respondents. In a study concerning preferences for avoiding encroachment of nature areas in future motorway planning in Denmark......, two samples of respondents are surveyed – one by internet and one by mail. Results suggest that additional self-selection mechanisms in the internet survey mode lead to the internet sample being less representative of the survey population than is the case for the mail sample. Similar response rates...... are obtained in the two samples, but the internet sample is apparently less prone to protest bidding. A thorough parametric analysis cannot reject that stated preferences elicited by use of the two different modes of sampling are identical. This suggests that the fear of a potential survey mode effect...

  18. Internet Use for Health Information

    Science.gov (United States)

    ... Health Services Utilization > Internet use for Health Information Internet use for Health Information Narrative Due in part ... adults in the United States who use the Internet has increased substantially, from 47 percent in 2000 ...

  19. Causes of Internet Addiction Disorder

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    The Internet Addiction Disorder diagnostic manual approved by psychologists on November 8 divides Internet addiction into five categories,which are addiction to online games,pornography,social networking,Internet information and Internetshopping.

  20. A Study of Autonomy English Learning on the Internet

    Science.gov (United States)

    Zhong, Yunsheng

    2008-01-01

    With the variety of environment and method of English learning, Autonomy English learning on the Internet is playing a more and more important role in modern English learning. It challenges the traditional learning approach, and also is forwardness. This paper points out that autonomy English learning on the Internet facilitates the improvement of…

  1. The Internet in the Workplace: Issues of Implementation and Impact.

    Science.gov (United States)

    Anderson, Byron

    1996-01-01

    As the Internet (with pluses and minuses) creeps forward, many work environments, business practices, and consumer processes will change significantly. Manufacturing, electronic commerce, health care, education, environmental monitoring, libraries, and government services will be profoundly affected. Fully implementing the Internet will take…

  2. Blended Learning of Programming in the Internet Age

    Science.gov (United States)

    Djenic, S.; Krneta, R.; Mitic, J.

    2011-01-01

    This paper presents an advanced variant of learning programming by the use of the Internet and multimedia. It describes the development of a blended learning environment, which, in addition to classroom (face-to-face) lessons, introduces lessons delivered over the Internet: the use of multimedia teaching material with completely dynamic…

  3. Cooperative Learning Technique through Internet Based Education: A Model Proposal

    Science.gov (United States)

    Ozkan, Hasan Huseyin

    2010-01-01

    Internet is gradually becoming the most valuable learning environment for the people which form the information society. That the internet provides written, oral and visual communication between the participants who are at different places, that it enables the students' interaction with other students and teachers, and that it does these so fast…

  4. Internet Usage by Nigerian Secondary School Students: A Case ...

    African Journals Online (AJOL)

    This study investigated the use, extent of use, and the specific purposes for which secondary school students in Nigeria use the Internet. It also studied the factors responsible for the widespread or limited use of the Internet. The study location for this research is limited to Ibadan and its environs. While 20 cyber cafés in ...

  5. Learning in neural networks based on a generalized fluctuation theorem

    Science.gov (United States)

    Hayakawa, Takashi; Aoyagi, Toshio

    2015-11-01

    Information maximization has been investigated as a possible mechanism of learning governing the self-organization that occurs within the neural systems of animals. Within the general context of models of neural systems bidirectionally interacting with environments, however, the role of information maximization remains to be elucidated. For bidirectionally interacting physical systems, universal laws describing the fluctuation they exhibit and the information they possess have recently been discovered. These laws are termed fluctuation theorems. In the present study, we formulate a theory of learning in neural networks bidirectionally interacting with environments based on the principle of information maximization. Our formulation begins with the introduction of a generalized fluctuation theorem, employing an interpretation appropriate for the present application, which differs from the original thermodynamic interpretation. We analytically and numerically demonstrate that the learning mechanism presented in our theory allows neural networks to efficiently explore their environments and optimally encode information about them.

  6. A neural network-based exploratory learning and motor planning system for co-robots

    Directory of Open Access Journals (Sweden)

    Byron V Galbraith

    2015-07-01

    Full Text Available Collaborative robots, or co-robots, are semi-autonomous robotic agents designed to work alongside humans in shared workspaces. To be effective, co-robots require the ability to respond and adapt to dynamic scenarios encountered in natural environments. One way to achieve this is through exploratory learning, or learning by doing, an unsupervised method in which co-robots are able to build an internal model for motor planning and coordination based on real-time sensory inputs. In this paper, we present an adaptive neural network-based system for co-robot control that employs exploratory learning to achieve the coordinated motor planning needed to navigate toward, reach for, and grasp distant objects. To validate this system we used the 11-degrees-of-freedom RoPro Calliope mobile robot. Through motor babbling of its wheels and arm, the Calliope learned how to relate visual and proprioceptive information to achieve hand-eye-body coordination. By continually evaluating sensory inputs and externally provided goal directives, the Calliope was then able to autonomously select the appropriate wheel and joint velocities needed to perform its assigned task, such as following a moving target or retrieving an indicated object.

  7. Pedagogy framework design in social networked-based learning: Focus on children with learning difficulties

    Directory of Open Access Journals (Sweden)

    Samira Sadat Sajadi

    2014-09-01

    Full Text Available This paper presents an investigation on the theory of constructivism applicable for learners with learning difficulties, specifically learners with Attention Deficit Hyperactivity Disorder (ADHD. The primary objective of this paper is to determine whether a constructivist technology enhanced learning pedagogy could be used to help ADHD learners cope with their educational needs within a social-media learning environment. Preliminary work is stated here, in which we are seeking evidence to determine the viability of a constructivist approach for learners with ADHD. The novelty of this research lies in the proposals to support ADHD learners to overcome their weaknesses with appropriate pedagogically sound interventions. As a result, a framework has been designed to illuminate areas in which constructivist pedagogies require to address the limitations of ADHD learners. An analytical framework addressing the suitability of a constructivist learning for ADHD is developed from a combination of literature and expert advice from those involved in the education of learners with ADHD. This analytical framework is married to a new model of pedagogy, which the authors have derived from literature analysis. Future work will expand this model to develop a constructivist social network-based learning and eventually test it in specialist schools with ADHD learners.

  8. A neural network-based exploratory learning and motor planning system for co-robots.

    Science.gov (United States)

    Galbraith, Byron V; Guenther, Frank H; Versace, Massimiliano

    2015-01-01

    Collaborative robots, or co-robots, are semi-autonomous robotic agents designed to work alongside humans in shared workspaces. To be effective, co-robots require the ability to respond and adapt to dynamic scenarios encountered in natural environments. One way to achieve this is through exploratory learning, or "learning by doing," an unsupervised method in which co-robots are able to build an internal model for motor planning and coordination based on real-time sensory inputs. In this paper, we present an adaptive neural network-based system for co-robot control that employs exploratory learning to achieve the coordinated motor planning needed to navigate toward, reach for, and grasp distant objects. To validate this system we used the 11-degrees-of-freedom RoPro Calliope mobile robot. Through motor babbling of its wheels and arm, the Calliope learned how to relate visual and proprioceptive information to achieve hand-eye-body coordination. By continually evaluating sensory inputs and externally provided goal directives, the Calliope was then able to autonomously select the appropriate wheel and joint velocities needed to perform its assigned task, such as following a moving target or retrieving an indicated object.

  9. Neural-Network-Based Fuzzy Logic Navigation Control for Intelligent Vehicles

    Directory of Open Access Journals (Sweden)

    Ahcene Farah

    2002-06-01

    Full Text Available This paper proposes a Neural-Network-Based Fuzzy logic system for navigation control of intelligent vehicles. First, the use of Neural Networks and Fuzzy Logic to provide intelligent vehicles  with more autonomy and intelligence is discussed. Second, the system  for the obstacle avoidance behavior is developed. Fuzzy Logic improves Neural Networks (NN obstacle avoidance approach by handling imprecision and rule-based approximate reasoning. This system must make the vehicle able, after supervised learning, to achieve two tasks: 1- to make one’s way towards its target by a NN, and 2- to avoid static or dynamic obstacles by a Fuzzy NN capturing the behavior of a human expert. Afterwards, two association phases between each task and the appropriate actions are carried out by Trial and Error learning and their coordination allows to decide the appropriate action. Finally, the simulation results display the generalization and adaptation abilities of the system by testing it in new unexplored environments.

  10. The Effect of Students' Perceptions of Internet Information Quality on Their Use of Internet Information in Inquiry-Based Learning

    Science.gov (United States)

    Pow, Jacky; Li, Sandy C.

    2015-01-01

    In Web 2.0 environments, the quality of published information can vary significantly and much of the information on the Internet is unproven. This unverified information hinders rather than facilitates student learning, especially among undergraduate students who depend heavily on Internet resources for their studies. Currently, we do not have…

  11. Internet Addiction in Adolescents

    Directory of Open Access Journals (Sweden)

    Rębisz Sławomir

    2016-08-01

    Full Text Available The possibilities offered by the use of the Internet increasingly intensify the problem of Internet addiction, which has become more prevalent in the last decade, marked by the growing availability of mobile devices and new media and their exacerbation of the problem. Research on Internet addiction, initiated by Kimberly Young at the end of the twentieth century, usually appears in the literature in the context of young people who have been found to be most vulnerable. The phenomenon is known as Adolescent Internet Addiction. Compulsive use of the Internet is a complex phenomenon, its effects being visible in almost all aspects of a young person’s social life. It is manifested in a variety of pathological behaviors and emotional states grouped into several major psycho-physical and social effects that may appear simultaneously, e.g. anger, depression, loneliness or anxiety associated with the lack of access to the network, the weakening of social ties, withdrawal from real life, lack of educational achievement, chronic fatigue or deteriorating health. The authors of this study aim to assess the level of Internet addiction among adolescents in Poland and indicate its main behavioral manifestations, in the students surveyed, which influence their pathological use of the Internet. Our study involved a total of 505 students from three high schools located in Rzeszow (N = 505 and was carried out by questionnaires, including, among others, The Problematic Use of the Internet (PUI which is the Polish adaptation of Kimberly Young’s Internet Addiction Test (IAT (Cronbach’s α = 0.89. Statistical analysis of responses from the PUI test allowed us to determine (1 the level of Internet addiction among these adolescents, whereas the univariate (ANOVA analysis enabled us (2 to verify the hypothesis of the existence of differences in the level of Internet addiction among the investigated groups as far as gender, place of residence or grade are concerned

  12. Internet Addiction and Antisocial Internet Behavior of Adolescents

    Directory of Open Access Journals (Sweden)

    Hing Keung Ma

    2011-01-01

    Full Text Available Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial use of Internet is discussed. It is argued that the behavior of Internet use is similar to daily life social behavior. In other words, Internet behavior is a kind of social behavior. Kohlberg's theory of moral development is employed to delineate the moral reasoning of the antisocial Internet behavior. The following behaviors are regarded as antisocial Internet behavior: (1 the use of Internet to carry out illegal activities such as selling faked products or offensive pornographic materials, (2 the use of Internet to bully others (i.e., cyberbullying such as distributing libelous statements against a certain person, (3 the use of Internet to cheat others, and (4 the use of Internet to do illegal gambling. The characteristics of the moral stages that are associated with these antisocial Internet behaviors are investigated in detail.

  13. Internet Addiction and Antisocial Internet Behavior of Adolescents

    Science.gov (United States)

    Ma, Hing Keung

    2011-01-01

    Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial) use of Internet is discussed. It is argued that the behavior of Internet use is similar to daily life social behavior. In other words, Internet behavior is a kind of social behavior. Kohlberg's theory of moral development is employed to delineate the moral reasoning of the antisocial Internet behavior. The following behaviors are regarded as antisocial Internet behavior: (1) the use of Internet to carry out illegal activities such as selling faked products or offensive pornographic materials, (2) the use of Internet to bully others (i.e., cyberbullying) such as distributing libelous statements against a certain person, (3) the use of Internet to cheat others, and (4) the use of Internet to do illegal gambling. The characteristics of the moral stages that are associated with these antisocial Internet behaviors are investigated in detail. PMID:22125466

  14. Authentication protocols for internet of things: a comprehensive survey

    OpenAIRE

    Ferrag, Mohamed Amine; Maglaras, Leandros A.; Janicke, Helge; Jiang, Jianmin; Shu, Lei

    2017-01-01

    open access article In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT) is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail. These protocols are categorized based on the target environment: (1) Machine to Machine Communications (M2M), (2) Internet of Vehicles (IoV), (3) Internet of Energy (IoE), and (4) Internet of Sensors (IoS). Threat models, c...

  15. An educational distributed Cosmic Ray detector network based on ArduSiPM

    Science.gov (United States)

    Bocci, V.; Chiodi, G.; Fresch, P.; Iacoangeli, F.; Recchia, L.

    2017-10-01

    The advent of high performance microcontrollers equipped with analog and digital peripherals, makes the design of a complete particle detector and a relative acquisition system on a single microcontroller chip possible. The existence of a world wide data infrastructure such as the internet, allows for the conception of a distributed network of cheap detectors able to elaborate and send data as well as to respond to setting commands. The internet infrastructure enables the distribution of the absolute time, with precision of a few milliseconds, to all devices independently of their physical location, when the sky view is accessible it possible to use a GPS module to reach synchronization of tens of nanoseconds. These devices can be far apart from each other and their relative distance can range from a few meters to thousands of kilometers. This allows for the design of a crowdsourcing experiment of citizen science, based on the use of many small scintillation-based particle detectors to monitor the high energetic cosmic ray and the radiation environment.

  16. Autonomous Cooperation in The Internet of Things

    NARCIS (Netherlands)

    Durmus, Y.

    2015-01-01

    The Internet of Things (IoT) represents the concept of cognitive networked devices that measure their environment and act on it intelligently. For instance, health sensors monitor vital human signs and inform their owner; smart meters measure the energy consumption and relay the information in real

  17. Audience, Elegance, and Learning via the Internet.

    Science.gov (United States)

    Lafer, Stephen

    1997-01-01

    Discusses the need for educational environments that allow for authentic learning. Shows how the Internet enables practice in which students are able to manipulate concepts for the sake of getting things done and receiving feedback regarding how well the application of an understanding worked. Provides examples of three learning activities on the…

  18. Interaction and Humans in Internet of Things

    DEFF Research Database (Denmark)

    Turunen, Markku; Sonntag, Daniel; Engelbrecht, Klaus-Peter

    2015-01-01

    Internet of Things is mainly about connected devices embedded in our everyday environment. Typically, ‘interaction’ in the context of IoT means interfaces which allow people to either monitor or configure IoT devices. Some examples include mobile applications and embedded touchscreens for control...

  19. Towards Marxian Internet Studies

    Directory of Open Access Journals (Sweden)

    Christian Fuchs

    2012-05-01

    Full Text Available This article gives an overview of example approaches of Critical Internet Studies and points out key concepts of this field. Critical Cyberculture Studies and Critical Political Economy/Critical Theory of the Internet are identified as two approaches in Critical Internet Studies. The paper also discusses the role of 11 Marxian concepts for Critical Internet Studies. Marxian concepts that have been reflected in Critical Internet Studies include: dialectics, capitalism, commodification, surplus value/exploitation/alienation/class, globalization, ideology, class struggle, commons, public sphere, communism, and aesthetics. The paper points out the importance of explicitly acknowledging the importance of Karl Marx’s thinking in Critical Internet Studies. Marx’s concepts are today frequently used implicitly, without acknowledging and engaging with their roots. A critique of the approach of “Critical” Cyberculture Studies is advanced. This approach is compared to the approaches of Critical Theory and Critical Political Economy of the Internet. The difference between these two approaches reflects the debate about class exploitation and non-class domination between Cultural Studies and Critical Political Economy in Media and Communication Studies.

  20. SEGMENTASI LAYANAN INTERNET BANKING

    Directory of Open Access Journals (Sweden)

    Ellen Theresia Sihotang

    2017-04-01

    Full Text Available The purpose of this study is to analyze internet banking�s users based on their experiences. It can be used to set marketing program of internet banking that appropriate with customers needs, in order to anticipate tight competition. This research methods starts with focus group discussion and clustering analysis to classify 312 respondents of internet banking users based on demographic, benefit and behavioral segmentation. The sampling method uses purposive sampling and snowball sampling. K-Means Clustering method�s produces four optimal clusters. The benefit orientation of the first cluster in on time saving. Second cluster, concern on the ease of getting and operating internet banking so this cluster does not need auxiliary features such as video guide to use internet banking. The third cluster�s orientation is on the modern lifestyle and the ease of getting and operating internet banking service with detailed daily mutation transaction The fourth cluster, concerns on the detailed daily mutation transaction but they are not sure with the security of personal data via internet banking. �

  1. Remote Thermal Analysis Through the Internet

    Science.gov (United States)

    Malroy, Eric T.

    2002-07-01

    The Heater of the Hypersonic Tunnel Facility (HTF) was modeled using SINDA/FLUINT thermal software. A description of the model is given. The project presented the opportunity of interfacing the thermal model with the Internet and was a demonstration that complex analysis is possible through the Internet. Some of the issues that need to be addressed related to interfacing software with the Internet are the following: justification for using the Internet, selection of the web server, choice of the CGI language, security of the system, communication among the parties, maintenance of state between web pages, and simultaneous users on the Internet system. The opportunities available for using the Internet for analysis are many and can present a significant jump in technology. This paper presents a vision how interfacing with the Internet could develop in the future. Using a separate Optical Internet (OI) for analysis, coupled with virtual reality analysis rooms (VRAR), could provide a synergistic environment to couple together engineering analysis within industry, academia, and government. The process of analysis could be broken down into sub-components so that specialization could occur resulting in superior quality, minimized cost and reduced time for engineering analysis and manufacturing. Some possible subcomponents of the system are solver routines, databases, Graphical User Interfaces, engineering design software, VRARs, computer processing, CAD systems, manufacturing, and a plethora of other options only limited by ones imagination. On a larger scope, the specialization of companies on the optical network would allow companies to rapidly construct and reconstruct their infrastructure based on changing economic conditions. This could transform business.

  2. Failure Analysis of Network Based Accessible Pedestrian Signals in Closed-Loop Operation

    Science.gov (United States)

    2011-03-01

    The potential failure modes of a network based accessible pedestrian system were analyzed to determine the limitations and benefits of closed-loop operation. The vulnerabilities of the system are accessed using the industry standard process known as ...

  3. Safety in the Internet

    Directory of Open Access Journals (Sweden)

    Semenko T.V.

    2016-11-01

    Full Text Available the modern world is the world of computer technology, and the children living in this world feel comfortable in it, they master the computer, mobile devices, new-fangled gadgets easily and use them skillfully. However, their knowledge of the safety in the Internet lags behind their ability to develop new devices. The number of the Internet users is increased every year, so the problem of children safety in the Internet is very urgent. It is necessary for parents, educators and teachers to conduct explanatory conversations and activities for explanation and consolidation the rules of “The Safe Internet”.

  4. Are internet prices sticky?

    OpenAIRE

    Lünnemann, Patrick; Wintr, Ladislav

    2006-01-01

    This paper studies the behaviour of Internet prices. It compares price rigidities on the Internet and in traditional brick-and-mortar stores and provides a cross-country perspective. The data set covers a broad range of items typically sold over the Internet. It includes more than 5 million daily price quotes downloaded from price comparison web sites in France, Germany, Italy, the UK and the US. The following results emerge from our analysis. First, and contrary to the recent findings for co...

  5. Wired or Wireless Internet?

    DEFF Research Database (Denmark)

    Gimpel, Gregory

    2010-01-01

    This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...... the speed of technological obsolescence, market share dominance, and the black boxing of technology influence consumer intention to adopt WiMax and 3G wireless internet for their laptop computers. The results, implications for industry, and areas for further research are discussed....

  6. INTERNET AND PIRACY

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    Internet has penetrated into all the aspects of our life and work.We can study and work by it;we can find a job by it;we can communicate by it;we can entertain by it;we can buy and sell by it.We can do almost everything on the Internet,and almost anywhere anytime. However,at the same time Internet provides services for us,it is inevitably invading our privacy to some degree.The services on most websites require our registering. If we want to enjoy these services,we have to provide much private informa-

  7. Towards the Tactile Internet

    DEFF Research Database (Denmark)

    Szabó, Dávid; Gulyás, András; Fitzek, Frank

    2015-01-01

    5G communication networks enable the steering and control of Internet of Things and therefore require extreme low latency communication referred to as the tactile Internet. In this paper we show that the massive use of network coding throughout the network significantly improves latency and reduce...... the frequency of packet re-transmission, so an architecture built around network coding may be a feasible road towards realizing the tactile internet vision. Our contribution is threefold: (i) we show how network coding improves latency and reduces packet re-transmission with respect to other coding schemes...

  8. Rumors and Internet

    Directory of Open Access Journals (Sweden)

    RENARD, Jean-Bruno

    2011-12-01

    Full Text Available This paper will address the rumors and the Internet in two ways: rumors as the subject of the Internet and the Internet as a channel of dissemination of rumors. We define rumors in a broadly way as an unverified information circulating within a social group. In a strict sense, rumors can be understand as false information that people believe. A rumor is an urban myth, a legend, a hoax, or a contemporary narrative, a tale of everyday life, false or dubious, but in which we believed because it is likely, and it conveys a moral message.

  9. Privacidad en internet

    OpenAIRE

    Rodríguez Gómez, José Luis

    2010-01-01

    Análisis de la privacidad en internet, y, en particular, en las redes sociales y la blogosfera. Se parte del concepto jurídico de privacidad y se analizan los riesgos crecientes que la acosan. Anàlisi de la privacitat a Internet, i, en particular, en les xarxes socials i la blogosfera. Es parteix del concepte jurídic de privacitat i s'analitzen els riscos creixents que l'assetgen. Analysis of Internet privacy, and in particular, social networks and the blogosphere. It begins with legal ...

  10. A network-based biomarker approach for molecular investigation and diagnosis of lung cancer

    Directory of Open Access Journals (Sweden)

    Chen Bor-Sen

    2011-01-01

    Full Text Available Abstract Background Lung cancer is the leading cause of cancer deaths worldwide. Many studies have investigated the carcinogenic process and identified the biomarkers for signature classification. However, based on the research dedicated to this field, there is no highly sensitive network-based method for carcinogenesis characterization and diagnosis from the systems perspective. Methods In this study, a systems biology approach integrating microarray gene expression profiles and protein-protein interaction information was proposed to develop a network-based biomarker for molecular investigation into the network mechanism of lung carcinogenesis and diagnosis of lung cancer. The network-based biomarker consists of two protein association networks constructed for cancer samples and non-cancer samples. Results Based on the network-based biomarker, a total of 40 significant proteins in lung carcinogenesis were identified with carcinogenesis relevance values (CRVs. In addition, the network-based biomarker, acting as the screening test, proved to be effective in diagnosing smokers with signs of lung cancer. Conclusions A network-based biomarker using constructed protein association networks is a useful tool to highlight the pathways and mechanisms of the lung carcinogenic process and, more importantly, provides potential therapeutic targets to combat cancer.

  11. Selling Internet Service: An Ancient Art Form on a New Canvas.

    Science.gov (United States)

    Maloff, Joel H.

    1992-01-01

    The Internet, no longer solely the domain of scientists and network engineers, is expanding rapidly to serve a diverse community of business professionals. Those marketing Internet services to these decision makers must practice the ancient art of salesmanship in a complex technological environment. Crucial is knowledge of Internet opportunities,…

  12. Munchausen by internet: current research and future directions.

    Science.gov (United States)

    Pulman, Andy; Taylor, Jacqui

    2012-08-22

    The Internet has revolutionized the health world, enabling self-diagnosis and online support to take place irrespective of time or location. Alongside the positive aspects for an individual's health from making use of the Internet, debate has intensified on how the increasing use of Web technology might have a negative impact on patients, caregivers, and practitioners. One such negative health-related behavior is Munchausen by Internet. Munchausen by Internet occurs when medically well individuals fake recognized illnesses in virtual environments, such as online support groups. This paper focuses on the aspect of Munchausen by Internet in which individuals actively seek to disrupt groups for their own satisfaction, which has not yet been associated with the wider phenomena of Internet trolls (users who post with the intention of annoying someone or disrupting an online environment). A wide-ranging review was conducted to investigate the causes and impacts of online identity deception and Munchausen by Internet drawing on academic research and case studies reported online and in the media. The limited research relating to motivation, opportunity, detection, effects, and consequences of Munchausen by Internet is highlighted and it is formally linked to aspects of trolling. Case studies are used to illustrate the phenomenon. What is particularly worrying is the ease with which the deception can be carried out online, the difficulty in detection, and the damaging impact and potential danger to isolated victims. We suggest ways to deal with Munchausen by Internet and provide advice for health group facilitators. We also propose that Munchausen by Internet and Munchausen by Internet trolling should be formally acknowledged in a revised version of the Diagnostic and Statistical Manual DSM-5. This will assist in effectively identifying and minimizing the growth of this behavior as more people seek reassurance and support about their health in the online environment. We

  13. Grid to supersede internet

    CERN Multimedia

    Goodard, A

    2000-01-01

    British scientists are developing a successor to the internet that will not only give researchers access to information but also raw computing power via seamless connections to the rest of the world (1 page).

  14. Race to replace internet

    CERN Multimedia

    Ahuja, A

    2000-01-01

    British scientists are urging the Government to support a project to build a computing 'Grid' to succeed the Internet. They believe that fortunes await the countries and companies who commit themselves from the very beginning (1 page).

  15. Scientists planning new internet

    CERN Multimedia

    Cookson, C

    2000-01-01

    British scientists are preparing to build the next generation internet - 'The Grid'. The government is expected to announce about 100 million pounds of funding for the project, to be done in collaboration with CERN (1/2 p).

  16. Internet research in psychology.

    Science.gov (United States)

    Gosling, Samuel D; Mason, Winter

    2015-01-03

    Today the Internet plays a role in the lives of nearly 40% of the world's population, and it is becoming increasingly entwined in daily life. This growing presence is transforming psychological science in terms of the topics studied and the methods used. We provide an overview of the literature, considering three broad domains of research: translational (implementing traditional methods online; e.g., surveys), phenomenological (topics spawned or mediated by the Internet; e.g., cyberbullying), and novel (new ways to study existing topics; e.g., rumors). We discuss issues (e.g., sampling, ethics) that arise when doing research online and point to emerging opportunities (e.g., smartphone sensing). Psychological research on the Internet comes with new challenges, but the opportunities far outweigh the costs. By integrating the Internet, psychological research has the ability to reach large, diverse samples and collect data on actual behaviors, which will ultimately increase the impact of psychological research on society.

  17. Nasionalisme di Era Internet

    Directory of Open Access Journals (Sweden)

    Danu Widhyatmoko

    2015-04-01

    Full Text Available Nationalism and nationality of a country life are moving into the new phase. Internet has become a new medium that opens up so many opportunities to create a sense of nationalism for the country. This paper contains a review of nationalism in the age of the Internet. This paper begins with understanding nationalism, the character of the Internet, social media and nationalism in the era of the Internet. Research method used in this paper is literature study, continued with reflective data analysis. With reflective analysis method, the authors analyzed data from the data collection has been carried out for comparison between the existing literature by circumstances or phenomena that occur, so that the conclusions of rational and scientific data can be obtained. 

  18. Countering Internet Extremism

    National Research Council Canada - National Science Library

    Thomas, Timothy L

    2009-01-01

    ... that. Extremists' use of the Internet has developed rapidly since the Chechen-Russian conflict. Now they are more creative, and more importantly, more persuasive in their methods to recruit members, gain financial support, and provide proof of success...

  19. Mobile Internet Protocol Analysis

    National Research Council Canada - National Science Library

    Brachfeld, Lawrence

    1999-01-01

    ...) and User Datagram Protocol (UDP). Mobile IP allows mobile computers to send and receive packets addressed with their home network IP address, regardless of the IP address of their current point of attachment on the Internet...

  20. TeleHealth networks: Instant messaging and point-to-point communication over the internet

    Energy Technology Data Exchange (ETDEWEB)

    Sachpazidis, Ilias [Fraunhofer Institute for Computer Graphics, Fraunhoferstr. 5, D-64283, Darmstadt (Germany)]. E-mail: Ilias.Sachpazidis@igd.fraunhofer.de; Ohl, Roland [MedCom Gesellschaft fuer medizinische Bildverarbeitung mbH, Runderturmstr. 12, D-64283, Darmstadt (Germany); Kontaxakis, George [Universidad Politecnica de Madrid, ETSI Telecomunicacion, Madrid 28040 (Spain); Sakas, Georgios [Fraunhofer Institute for Computer Graphics, Fraunhoferstr. 5, D-64283, Darmstadt (Germany)

    2006-12-20

    This paper explores the advantages and disadvantages of a medical network based on point-to-point communication and a medical network based on Jabber instant messaging protocol. Instant messaging might be, for many people, a convenient way of chatting over the Internet. We will attempt to illustrate how an instant messaging protocol could serve in the best way medical services and provide great flexibility to the involved parts. Additionally, the directory services and presence status offered by the Jabber protocol make it very attractive to medical applications that need to have real time and store and forward communication. Furthermore, doctors connected to Internet via high-speed networks could benefit by saving time due to the data transmission acceleration over Jabber.

  1. TeleHealth networks: Instant messaging and point-to-point communication over the internet

    Science.gov (United States)

    Sachpazidis, Ilias; Ohl, Roland; Kontaxakis, George; Sakas, Georgios

    2006-12-01

    This paper explores the advantages and disadvantages of a medical network based on point-to-point communication and a medical network based on Jabber instant messaging protocol. Instant messaging might be, for many people, a convenient way of chatting over the Internet. We will attempt to illustrate how an instant messaging protocol could serve in the best way medical services and provide great flexibility to the involved parts. Additionally, the directory services and presence status offered by the Jabber protocol make it very attractive to medical applications that need to have real time and store and forward communication. Furthermore, doctors connected to Internet via high-speed networks could benefit by saving time due to the data transmission acceleration over Jabber.

  2. TeleHealth networks: Instant messaging and point-to-point communication over the internet

    International Nuclear Information System (INIS)

    Sachpazidis, Ilias; Ohl, Roland; Kontaxakis, George; Sakas, Georgios

    2006-01-01

    This paper explores the advantages and disadvantages of a medical network based on point-to-point communication and a medical network based on Jabber instant messaging protocol. Instant messaging might be, for many people, a convenient way of chatting over the Internet. We will attempt to illustrate how an instant messaging protocol could serve in the best way medical services and provide great flexibility to the involved parts. Additionally, the directory services and presence status offered by the Jabber protocol make it very attractive to medical applications that need to have real time and store and forward communication. Furthermore, doctors connected to Internet via high-speed networks could benefit by saving time due to the data transmission acceleration over Jabber

  3. Learning Internet of Things

    CERN Document Server

    Waher, Peter

    2015-01-01

    If you're a developer or electronics engineer who is curious about Internet of Things, then this is the book for you. With only a rudimentary understanding of electronics, Raspberry Pi, or similar credit-card sized computers, and some programming experience using managed code such as C# or Java, you will be taught to develop state-of-the-art solutions for Internet of Things in an instant.

  4. Internet and computer crimes

    OpenAIRE

    Janýšková, Zuzana

    2010-01-01

    INTERNET AND COMPUTER CRIME (SUMMARY) The purpose of this thesis is to provide an introduction to the basic problems of Internet and computer crime (furthermore also "cyber crime"), which is a type of crime that is still relatively new, but fast developing in a similar pace as the information technologies. The thesis contains seven substantial chapters. First chapter is an introduction of this thesis, which focuses on its structure and summary of the content. Second chapter presents the most ...

  5. Acne and the Internet.

    Science.gov (United States)

    Zeichner, Joshua A; Del Rosso, James Q

    2016-04-01

    The Internet provides both education and miseducation for acne patients. Although some sites provide disease background information and objective treatment guidance, support networks, and research findings, others may seem to be objective on the surface, but are in reality run by untrained, self-proclaimed experts or are promotional in nature. Providers must be aware of the potential benefits and pitfalls the Internet provides for those suffering with acne. Copyright © 2016 Elsevier Inc. All rights reserved.

  6. Disclosure on the Internet

    International Nuclear Information System (INIS)

    Kratz, M.P.J.

    1998-01-01

    The key issues surrounding regulatory enforcement of Internet disclosure in the petroleum industry were discussed under three headings, i.e. (1) content problems, such as intellectual property, trademarks, copyright, licence limitations, accuracy of promotional and other information; (2) disclosure problems, including web site information, employee disclosure, electronic mail, and third party disclosures; and (3) regulatory issues that range from the Internet as the vehicle for stock manipulation, to transnational aspects, lack of editorial oversight, and multi-jurisdictional enforcement issues

  7. Strategy and the Internet.

    Science.gov (United States)

    Porter, M E

    2001-03-01

    Many of the pioneers of Internet business, both dot-coms and established companies, have competed in ways that violate nearly every precept of good strategy. Rather than focus on profits, they have chased customers indiscriminately through discounting, channel incentives, and advertising. Rather than concentrate on delivering value that earns an attractive price from customers, they have pursued indirect revenues such as advertising and click-through fees. Rather than make trade-offs, they have rushed to offer every conceivable product or service. It did not have to be this way--and it does not have to be in the future. When it comes to reinforcing a distinctive strategy, Michael Porter argues, the Internet provides a better technological platform than previous generations of IT. Gaining competitive advantage does not require a radically new approach to business; it requires building on the proven principles of effective strategy. Porter argues that, contrary to recent thought, the Internet is not disruptive to most existing industries and established companies. It rarely nullifies important sources of competitive advantage in an industry; it often makes them even more valuable. And as all companies embrace Internet technology, the Internet itself will be neutralized as a source of advantage. Robust competitive advantages will arise instead from traditional strengths such as unique products, proprietary content, and distinctive physical activities. Internet technology may be able to fortify those advantages, but it is unlikely to supplant them. Porter debunks such Internet myths as first-mover advantage, the power of virtual companies, and the multiplying rewards of network effects. He disentangles the distorted signals from the marketplace, explains why the Internet complements rather than cannibalizes existing ways of doing business, and outlines strategic imperatives for dot-coms and traditional companies.

  8. Security in Internet

    Directory of Open Access Journals (Sweden)

    Felician ALECU

    2006-01-01

    Full Text Available A very good method that can be used to protect a private network is the implementation of a firewall between Internet and Intranet. This firewall will filter the packets that transit the network according with the security policy defined at the system level. The SSL protocol allows verifying the identity of a WEB server based on a digital certificate issued by a certification authority. Secure data transport over the Internet is done by using encryption methods.

  9. Internet Use among Retired Teachers

    Science.gov (United States)

    Demiray, Emine; Candemir, Özden

    2017-01-01

    Internet access tools and devices are developing with the prevalence of the Internet, which is considered revolutionary in information and communications technology. Beside the widespread use of the Internet among young people, statistics show that the number of older people that use the Internet is also on the rise. The purpose of the study is to…

  10. The History of the Internet Search Engine: Navigational Media and the Traffic Commodity

    Science.gov (United States)

    van Couvering, E.

    This chapter traces the economic development of the search engine industry over time, beginning with the earliest Web search engines and ending with the domination of the market by Google, Yahoo! and MSN. Specifically, it focuses on the ways in which search engines are similar to and different from traditional media institutions, and how the relations between traditional and Internet media have changed over time. In addition to its historical overview, a core contribution of this chapter is the analysis of the industry using a media value chain based on audiences rather than on content, and the development of traffic as the core unit of exchange. It shows that traditional media companies failed when they attempted to create vertically integrated portals in the late 1990s, based on the idea of controlling Internet content, while search engines succeeded in creating huge "virtually integrated" networks based on control of Internet traffic rather than Internet content.

  11. Applying Blooms Digital Taxonomy to Address Creativity and Second Order Digital Divide in Internet Skills

    DEFF Research Database (Denmark)

    Purushothaman, Aparna

    2016-01-01

    Internet technologies play a significant role to enhance creativity of the students in learning environments. Internet literacy is vital to effectively use the Internet tools to enhance creative learning environments. In the developing countries Internet literacy is still an unfulfilled dream...... for students coming from underprivileged backgrounds thus bringing a digital divide in skills. The chapter draws upon an empirical study done in India on how an intervention comprised of Internet training designed on Bloom’s Digital Taxonomy and action research workshops based on the learning domains...... of the digital taxonomy was an effective approach for empowering women students through learning to use the Internet. The chapter puts forward the argument that an intervention for learning to use the Internet can be effective where focus is on the reflective and conceptual skills in using the Internet than...

  12. Telerobotics: through-the-Internet teleoperation of the ABB IRB 2000 industrial robot

    Science.gov (United States)

    Alvares, Alberto J.; Caribe de Carvalho, Guilherme; Paulinyi, Luis F. d. A.; Alfaro, Sadek C. A.

    1999-11-01

    Robotic systems can be controlled remotely through the use of telerobotics. This work presents a through-the-internet teleoperation system for remotely operating the IRB2000 industrial robot. The IRB2000 controller allows external access through a RS232 serial communication link, which is based on a 42 function proprietary communication protocol. The proposed teleoperation system uses this communication capability by connecting it to a local area network based on TCP/IP (Transport Control Protocol/Internet Protocol). The system was implemented using a Client/Server architecture, having as server a UNIX (LINUX) platform.

  13. NEW FEATURES OF EDUCATION INFORMATIZATION - «INTERNET OF THINGS»

    Directory of Open Access Journals (Sweden)

    Ольга Юрьевна Заславская

    2017-12-01

    Full Text Available This article discusses the development of one of the most important areas of information education and information educational environment - the “Internet of things”. The study was conducted by analyzing the historicized tric development of information and telecommunication technologies, the emergence stage of network technologies and methods for their use in time-personal sphere of professional activity of the person. Special attention is given to the need to develop and adopt common standards for interaction between mobile information and communication devices among themselves. Historical aspects of formation of the concept-ment of Internet of things, its emergence and transformation in the conditions of development of information and telecommunication technologies. The problems of the relationship between the development of the information educational environment, sub-jects of the educational process and the Internet of things, the Internet of things in the place of the information educational environment of educational organization, finding necessary and sufficient conditions under which the Internet of Things becomes part of the IOS, impact of the Internet of things in the educational process. The purpose of this article is to examine the possibility of inclusion in the space of the Internet of things the education system, the study of the relationship between the development of the information educational environment, the subjects of the image of the masticatory processes and resources that can share specialized educational information.

  14. Economic viability and Future Impact of Internet of Things in India: An Inevitable wave

    OpenAIRE

    Agrawal, Sharul; Mazumdar, Himanshu S

    2015-01-01

    The Internet of things , sometimes referred as Internet of objects can be stated as an environment in which any physical things or objects are assiThis paper studies the evolution of internet usage and classifies the impact areas where internet will go beyond personal communication or knowledge interface but it will provide communication and knowledge base support to numerous gadgets and systems around us

  15. Emerging Network-Based Tools in Movement Ecology.

    Science.gov (United States)

    Jacoby, David M P; Freeman, Robin

    2016-04-01

    New technologies have vastly increased the available data on animal movement and behaviour. Consequently, new methods deciphering the spatial and temporal interactions between individuals and their environments are vital. Network analyses offer a powerful suite of tools to disentangle the complexity within these dynamic systems, and we review these tools, their application, and how they have generated new ecological and behavioural insights. We suggest that network theory can be used to model and predict the influence of ecological and environmental parameters on animal movement, focusing on spatial and social connectivity, with fundamental implications for conservation. Refining how we construct and randomise spatial networks at different temporal scales will help to establish network theory as a prominent, hypothesis-generating tool in movement ecology. Copyright © 2016 Elsevier Ltd. All rights reserved.

  16. Ethics in the bank internet encounter

    DEFF Research Database (Denmark)

    Rendtorff, Jacob Dahl; Mattsson, Jan

    2012-01-01

    /implications – The important implication for managerial research of this study would be for banks to focus on customer competency with an ethical concern instead of only being concerned with technical solutions for effective internet operations. Practical implications – Since more and more businesses are digitally based......Purpose – The purpose of this paper is to discuss some ethical issues in the internet encounter between customer and bank. Empirical data related to the difficulties that customers have when they deal with the bank through internet technology and electronic banking. The authors discuss...... the difficulties that customers expressed from an ethical standpoint. Design/methodology/approach – The key problem of the paper is “how does research handle the user's lack of competence in a web-based commercial environment?” The authors illustrate this ethical dilemma with data from a Danish Bank collected...

  17. Prevention of Internet addiction: A systematic review.

    Science.gov (United States)

    Vondráčková, Petra; Gabrhelík, Roman

    2016-12-01

    Background and aims Out of a large number of studies on Internet addiction, only a few have been published on the prevention of Internet addiction. The aim of this study is provide a systematic review of scientific articles regarding the prevention of Internet addiction and to identify the relevant topics published in this area of interest. Methods The Preferred Reporting Items for Systematic Reviews and Meta-Analyses guidelines were adopted. The EBSCO, ProQuest Central, and PubMed databases were searched for texts published in English and Spanish between January 1995 and April 2016. A total of 179 original texts were obtained. After de-duplication and topic-relevance review, 108 texts were systematically classified and subjected to descriptive analysis and subsequent content analysis. Results The results of the content analysis yielded the following thematic areas: (a) target groups, (b) the improvement of specific skills, (c) program characteristics, and (d) environmental interventions. Discussion and conclusion Literature on the prevention of Internet addiction is scarce. There is an urgent need to introduce and implement new interventions for different at-risk populations, conduct well-designed research, and publish data on the effectiveness of these interventions. Developing prevention interventions should primarily target children and adolescents at risk of Internet addiction but also parents, teachers, peers, and others who are part of the formative environment of children and adolescents at risk of Internet addiction. Newly designed interventions focused on Internet addiction should be rigorously evaluated and the results published.

  18. Concurrency Control in the Problem of Automatic Substitution of the Dataflow Network Agent on Smart-M3 Platform and in the Internet of Things

    Directory of Open Access Journals (Sweden)

    S. I. Balandin

    2012-01-01

    Full Text Available The paper describes implementation of dataflow networks based on Smart-M3 platform for use cases related to the Internet of Things. The mechanism for automatic substitution of computational agents created on top of Smart-M3 platform is described. The paper reviews concurrency issues of the developed solution regarding Smart-M3 platform, as well as in the broader context of the Internet of Things.

  19. Dynamic neural networks based on-line identification and control of high performance motor drives

    Science.gov (United States)

    Rubaai, Ahmed; Kotaru, Raj

    1995-01-01

    In the automated and high-tech industries of the future, there wil be a need for high performance motor drives both in the low-power range and in the high-power range. To meet very straight demands of tracking and regulation in the two quadrants of operation, advanced control technologies are of a considerable interest and need to be developed. In response a dynamics learning control architecture is developed with simultaneous on-line identification and control. the feature of the proposed approach, to efficiently combine the dual task of system identification (learning) and adaptive control of nonlinear motor drives into a single operation is presented. This approach, therefore, not only adapts to uncertainties of the dynamic parameters of the motor drives but also learns about their inherent nonlinearities. In fact, most of the neural networks based adaptive control approaches in use have an identification phase entirely separate from the control phase. Because these approaches separate the identification and control modes, it is not possible to cope with dynamic changes in a controlled process. Extensive simulation studies have been conducted and good performance was observed. The robustness characteristics of neuro-controllers to perform efficiently in a noisy environment is also demonstrated. With this initial success, the principal investigator believes that the proposed approach with the suggested neural structure can be used successfully for the control of high performance motor drives. Two identification and control topologies based on the model reference adaptive control technique are used in this present analysis. No prior knowledge of load dynamics is assumed in either topology while the second topology also assumes no knowledge of the motor parameters.

  20. ICS logging solution for network-based attacks using Gumistix technology

    Science.gov (United States)

    Otis, Jeremy R.; Berman, Dustin; Butts, Jonathan; Lopez, Juan

    2013-05-01

    Industrial Control Systems (ICS) monitor and control operations associated with the national critical infrastructure (e.g., electric power grid, oil and gas pipelines and water treatment facilities). These systems rely on technologies and architectures that were designed for system reliability and availability. Security associated with ICS was never an inherent concern, primarily due to the protections afforded by network isolation. However, a trend in ICS operations is to migrate to commercial networks via TCP/IP in order to leverage commodity benefits and cost savings. As a result, system vulnerabilities are now exposed to the online community. Indeed, recent research has demonstrated that many exposed ICS devices are being discovered using readily available applications (e.g., ShodanHQ search engine and Google-esque queries). Due to the lack of security and logging capabilities for ICS, most knowledge about attacks are derived from real world incidents after an attack has already been carried out and the damage has been done. This research provides a method for introducing sensors into the ICS environment that collect information about network-based attacks. The sensors are developed using an inexpensive Gumstix platform that can be deployed and incorporated with production systems. Data obtained from the sensors provide insight into attack tactics (e.g., port scans, Nessus scans, Metasploit modules, and zero-day exploits) and characteristics (e.g., attack origin, frequency, and level of persistence). Findings enable security professionals to draw an accurate, real-time awareness of the threats against ICS devices and help shift the security posture from reactionary to preventative.

  1. Geotube: a network based framework for Goescience dissemination

    Science.gov (United States)

    Grieco, Giovanni; Porta, Marina; Merlini, Anna Elisabetta; Caironi, Valeria; Reggiori, Donatella

    2016-04-01

    Geotube is a project promoted by Il Geco cultural association for the dissemination of Geoscience education in schools by open multimedia environments. The approach is based on the following keystones: • A deep and permanent epistemological reflection supported by confrontation within the International Scientific Community • A close link with the territory • A local to global inductive approach to basic concepts in Geosciences • The construction of an open framework to stimulate creativity The project has been developed as an educational activity for secondary schools (11 to 18 years old students). It provides for the creation of a network of institutions to be involved in order to ensure the required diversified expertise. They can comprise: Universities, Natural Parks, Mountain Communities, Municipalities, schools, private companies working in the sector, and so on. A single project lasts for one school year (October to June) and requires 8-12 work hours at school, one or two half day or full day excursions and a final event of presentation of outputs. The possible outputs comprise a pdf or ppt guidebook, a script and a video completely shooted and edited by the students. The framework is open in order to adapt to the single class or workgroup needs, the level and type of school, the time available and different subjects in Geosciences. In the last two years the two parts of the project have been successfully tested separately, while the full project will be presented at schools in in its full form in April 2016, in collaboration with University of Milan, Campo dei Fiori Natural Park, Piambello Mountain Community and Cunardo Municipality. The production of geotube outputs has been tested in a high school for three consecutive years. Students produced scripts and videos on the following subjects: geologic hazards, volcanoes and earthquakes, and climate change. The excursions have been tested with two different high schools. Firstly two areas have been

  2. Internet Technology on Spacecraft

    Science.gov (United States)

    Rash, James; Parise, Ron; Hogie, Keith; Criscuolo, Ed; Langston, Jim; Powers, Edward I. (Technical Monitor)

    2000-01-01

    The Operating Missions as Nodes on the Internet (OMNI) project has shown that Internet technology works in space missions through a demonstration using the UoSAT-12 spacecraft. An Internet Protocol (IP) stack was installed on the orbiting UoSAT-12 spacecraft and tests were run to demonstrate Internet connectivity and measure performance. This also forms the basis for demonstrating subsequent scenarios. This approach provides capabilities heretofore either too expensive or simply not feasible such as reconfiguration on orbit. The OMNI project recognized the need to reduce the risk perceived by mission managers and did this with a multi-phase strategy. In the initial phase, the concepts were implemented in a prototype system that includes space similar components communicating over the TDRS (space network) and the terrestrial Internet. The demonstration system includes a simulated spacecraft with sample instruments. Over 25 demonstrations have been given to mission and project managers, National Aeronautics and Space Administration (NASA), Department of Defense (DoD), contractor technologists and other decisions makers, This initial phase reached a high point with an OMNI demonstration given from a booth at the Johnson Space Center (JSC) Inspection Day 99 exhibition. The proof to mission managers is provided during this second phase with year 2000 accomplishments: testing the use of Internet technologies onboard an actual spacecraft. This was done with a series of tests performed using the UoSAT-12 spacecraft. This spacecraft was reconfigured on orbit at very low cost. The total period between concept and the first tests was only 6 months! On board software was modified to add an IP stack to support basic IP communications. Also added was support for ping, traceroute and network timing protocol (NTP) tests. These tests show that basic Internet functionality can be used onboard spacecraft. The performance of data was measured to show no degradation from current

  3. Three neural network based sensor systems for environmental monitoring

    International Nuclear Information System (INIS)

    Keller, P.E.; Kouzes, R.T.; Kangas, L.J.

    1994-05-01

    Compact, portable systems capable of quickly identifying contaminants in the field are of great importance when monitoring the environment. One of the missions of the Pacific Northwest Laboratory is to examine and develop new technologies for environmental restoration and waste management at the Hanford Site. In this paper, three prototype sensing systems are discussed. These prototypes are composed of sensing elements, data acquisition system, computer, and neural network implemented in software, and are capable of automatically identifying contaminants. The first system employs an array of tin-oxide gas sensors and is used to identify chemical vapors. The second system employs an array of optical sensors and is used to identify the composition of chemical dyes in liquids. The third system contains a portable gamma-ray spectrometer and is used to identify radioactive isotopes. In these systems, the neural network is used to identify the composition of the sensed contaminant. With a neural network, the intense computation takes place during the training process. Once the network is trained, operation consists of propagating the data through the network. Since the computation involved during operation consists of vector-matrix multiplication and application of look-up tables unknown samples can be rapidly identified in the field

  4. Artificial Neural Network Based Mission Planning Mechanism for Spacecraft

    Science.gov (United States)

    Li, Zhaoyu; Xu, Rui; Cui, Pingyuan; Zhu, Shengying

    2018-04-01

    The ability to plan and react fast in dynamic space environments is central to intelligent behavior of spacecraft. For space and robotic applications, many planners have been used. But it is difficult to encode the domain knowledge and directly use existing techniques such as heuristic to improve the performance of the application systems. Therefore, regarding planning as an advanced control problem, this paper first proposes an autonomous mission planning and action selection mechanism through a multiple layer perceptron neural network approach to select actions in planning process and improve efficiency. To prove the availability and effectiveness, we use autonomous mission planning problems of the spacecraft, which is a sophisticated system with complex subsystems and constraints as an example. Simulation results have shown that artificial neural networks (ANNs) are usable for planning problems. Compared with the existing planning method in EUROPA, the mechanism using ANNs is more efficient and can guarantee stable performance. Therefore, the mechanism proposed in this paper is more suitable for planning problems of spacecraft that require real time and stability.

  5. Neural Network Based Sensory Fusion for Landmark Detection

    Science.gov (United States)

    Kumbla, Kishan -K.; Akbarzadeh, Mohammad R.

    1997-01-01

    NASA is planning to send numerous unmanned planetary missions to explore the space. This requires autonomous robotic vehicles which can navigate in an unstructured, unknown, and uncertain environment. Landmark based navigation is a new area of research which differs from the traditional goal-oriented navigation, where a mobile robot starts from an initial point and reaches a destination in accordance with a pre-planned path. The landmark based navigation has the advantage of allowing the robot to find its way without communication with the mission control station and without exact knowledge of its coordinates. Current algorithms based on landmark navigation however pose several constraints. First, they require large memories to store the images. Second, the task of comparing the images using traditional methods is computationally intensive and consequently real-time implementation is difficult. The method proposed here consists of three stages, First stage utilizes a heuristic-based algorithm to identify significant objects. The second stage utilizes a neural network (NN) to efficiently classify images of the identified objects. The third stage combines distance information with the classification results of neural networks for efficient and intelligent navigation.

  6. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  7. Low-dimensional recurrent neural network-based Kalman filter for speech enhancement.

    Science.gov (United States)

    Xia, Youshen; Wang, Jun

    2015-07-01

    This paper proposes a new recurrent neural network-based Kalman filter for speech enhancement, based on a noise-constrained least squares estimate. The parameters of speech signal modeled as autoregressive process are first estimated by using the proposed recurrent neural network and the speech signal is then recovered from Kalman filtering. The proposed recurrent neural network is globally asymptomatically stable to the noise-constrained estimate. Because the noise-constrained estimate has a robust performance against non-Gaussian noise, the proposed recurrent neural network-based speech enhancement algorithm can minimize the estimation error of Kalman filter parameters in non-Gaussian noise. Furthermore, having a low-dimensional model feature, the proposed neural network-based speech enhancement algorithm has a much faster speed than two existing recurrent neural networks-based speech enhancement algorithms. Simulation results show that the proposed recurrent neural network-based speech enhancement algorithm can produce a good performance with fast computation and noise reduction. Copyright © 2015 Elsevier Ltd. All rights reserved.

  8. World tour through the internet

    International Nuclear Information System (INIS)

    Jang, Ji Hwan; Kang, Ho Seong; Kim, Jong Hun

    1994-03-01

    This book deals with basic knowledge and familiarity with internet use, which is composed of seven chapters ; the world of internet, the basic knowledge for internet use such as telnet, mail, talk, basic command on Unix and command for communication, to access to the internet, if you get on the internet for the first time, useful service of internet such as archie service, gopher service, who is service, Use net, IRC and Netiquette on IRC, interesting internet trip like Billboard charts, TV-Rating, Solar Report, Agricultural Info, CARL, Nat'l Education BBS, internet service in Sydney university FEDIX, CAIR, NOAA, SDDAS, Stock, MUD and international Go server. The last chapter is computer networks connected to the internet ; computer services, BITNET, and FidoNet.

  9. World tour through the internet

    Energy Technology Data Exchange (ETDEWEB)

    Jang, Ji Hwan; Kang, Ho Seong; Kim, Jong Hun

    1994-03-15

    This book deals with basic knowledge and familiarity with internet use, which is composed of seven chapters ; the world of internet, the basic knowledge for internet use such as telnet, mail, talk, basic command on Unix and command for communication, to access to the internet, if you get on the internet for the first time, useful service of internet such as archie service, gopher service, who is service, Use net, IRC and Netiquette on IRC, interesting internet trip like Billboard charts, TV-Rating, Solar Report, Agricultural Info, CARL, Nat'l Education BBS, internet service in Sydney university FEDIX, CAIR, NOAA, SDDAS, Stock, MUD and international Go server. The last chapter is computer networks connected to the internet ; computer services, BITNET, and FidoNet.

  10. On Internet and Internet of things%论 Internet与 Internet of Things

    Institute of Scientific and Technical Information of China (English)

    曾华燊

    2012-01-01

    从Internet发展历史及应用环境变化的角度讨论IoT( Internet of Things)提出背景、内涵、组成结构和体系结构等关键问题.在分析对IoT的典型定义的基础上,笔者认为“ITU把IoT作为Internet平台在应用领域实现人、机、和智能化物理对象(SPO)信息全方位互通和实践普适计算理念的下一代Internet及其应用系统的概括”是对IoT更为合理的广义定义.以该定义为基础,全面地分析了“由多个用户域网(CPN)通过骨干通信子网互联”的基本组成结构,讨论了两类SPO-CPN的基本组成结构及其支撑技术;指出SPO的引入主要影响CPN资源网络中的接入部分,属于应用系统的范畴,对Internet基本技术影响甚微.笔者不赞同以欧盟为代表的把IoT定义为联物专用网的狭义定义,指出其IoT模型和体系结构研究混淆了网络平台与应用系统,实质上是网络应用系统模型和体系结构.%Based on the analysis of development history and application environment changes of Internet, this paper provided a comprehensive discussion on the incentive, connotation, organization, and some key issues of the Internet of Things (IoT). On the basis of the analysis of the typical definition of IoT, the author believed that " the full range of information interoperability ITU to IoT as an Internet platform in the application areas of human, machine, and intelligent physical objects (SPO) and the next generation Internet applications generalization of Pervasive Computing (Ubiquitous Computing) concept " is a more reasonable broad definition of the IoT. Based on this definition, the author analyzed the basic organization of IoT, which consisted of interconnected multiple Customer Premises Network (CPN) via backbone Subnetworks, and examined two types of components of SPO-CPN and their supporting techniques. It was also pointed out that introduction of SPO has little impact on Internet technology, except on access part of

  11. Internet for the internationals: effects of internet use motivations on international students' college adjustment.

    Science.gov (United States)

    Lee, Eun-Ju; Lee, Lu; Jang, Jeongwoo

    2011-01-01

    Drawing upon the uses and gratifications approach, the current study examined how international students' Internet use motivations affect their academic, social, and emotional adjustments in the new environment. A total of 166 Chinese students studying in Korea participated in a web-based survey. First, a factor analysis identified four distinct motivations for Internet use: homeland orientation (to stay connected to the home country), local information seeking (to learn about the host society), local social interaction (to form interpersonal relationships locally), and entertainment. After controlling for the effects of sociodemographic variables (i.e., gender, year at school, length of residence, Korean language proficiency) and personality traits (i.e., extraversion, openness to experience, neuroticism), Internet use motivations were found to be significant predictors of international students' social and emotional adjustments. Specifically, those seeking to build a local social network through the Internet reported greater satisfaction with their social life, whereas homeland orientation was associated with poorer emotional adaptation. Various Internet activities, such as e-mail, blogging, and instant messaging, were not significantly related to college adjustments, suggesting the multi-functionality of Internet-based communication channels.

  12. Internet Congestion Control System

    Directory of Open Access Journals (Sweden)

    Pranoto Rusmin

    2010-10-01

    Full Text Available Internet congestion occurs when resource demands exceeds the network capacity. But, it is not the only reason. Congestion can happen on some users because some others user has higher sending rate. Then some users with lower sending rate will experience congestion. This partial congestion is caused by inexactly feedback. At this moment congestion are solved by the involvement of two controlling mechanisms. These mechanisms are flow/congestion control in the TCP source and Active Queue Management (AQM in the router. AQM will provide feedback to the source a kind of indication for the occurrence of the congestion in the router, whereas the source will adapt the sending rate appropriate with the feedback. These mechanisms are not enough to solve internet congestion problem completely. Therefore, this paper will explain internet congestion causes, weakness, and congestion control technique that researchers have been developed. To describe congestion system mechanisms and responses, the system will be simulated by Matlab.

  13. Trust in Internet Election

    DEFF Research Database (Denmark)

    Markussen, Randi; Ronquillo, Lorena; Schürmann, Carsten

    2014-01-01

    This paper discusses the Decryption and Counting Ceremony held in conjunction with the internet voting trial on election day in the Ministry of Local Government and Regional Development of Norway in 2013. We examine the organizers' ambition of making the decryption and counting of electronic votes...... public in order to sustain trust in internet voting. We introduce a pragmatic approach to trust that emphasises the inseparability of truth from witnessing it. Based on this and on a description of how the event was made observable and how the complexities in the counting process were disclosed, we...... discuss what we term economy of truth from the perspective of the IT community involved in the ceremony. We claim that broadening the economy of truth by including more explicitly social and political perspectives in the ceremony, and in internet elections in general, and how witnessing is brought about...

  14. Security in the internet

    International Nuclear Information System (INIS)

    Seibel, R.M.M.; Kocher, K.; Landsberg, P.

    2000-01-01

    Aim of the study: Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Conclusions: Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet. (orig.) [de

  15. Internet Performance to Africa

    Energy Technology Data Exchange (ETDEWEB)

    Cottrell, L

    2003-10-01

    We report the first results ever for real-time Internet performance to Africa using the PingER methodology. Multiple monitoring hosts were used to enable comparisons with performance from different parts of the world. From these preliminary measurements, we have found that Internet packet losses to some African sites in recent months range from very poor to bad (> 12%), some getting better, others are holding steady or getting worse. This, together with the average monthly Round Trip Times, imply end-to-end maximum TCP throughputs that are order of magnitudes different between countries in the region. Africa is shown to be far from the Internet performance in industrialized nations due to the poor infrastructure in place today. These monitoring efforts can provide valuable information to analyze the relative rates of future improvement and today they help us to quantify the digital divide and can provide quantitative information to policy makers.

  16. Strategies for surviving the Internet meltdown. The case of two Internet incumbents

    NARCIS (Netherlands)

    Constantinides, Efthymios

    2004-01-01

    This paper reviews a number of theoretical issues dealing with the strategic management process in fast-evolving, uncertain environments and examines the fit between theory and practice by means of two case studies, two successful dot.com incumbents from the first generation of Internet start-ups.

  17. Internet Addiction: A Current Review

    Directory of Open Access Journals (Sweden)

    Hasan Bozkurt

    2016-09-01

    Full Text Available Internet addiction, which has become a global social issue, can be broadly conceptualized as an inability to control ones use of the Internet which leads to negative consequences in daily life. Only Internet Gaming Disorder has been included in the appendix of the diagnostic and statistical manual of mental disorders fifth edition (DSM-5, but it has already been argued that Internet addiction could also comprise problematic use of other Internet applications developing an addictive behavior. This paper aims to give a current review of the gradually evolving body of literature on Internet addiction. [J Contemp Med 2016; 6(3.000: 235-247

  18. Internet resource pricing models

    CERN Document Server

    Xu, Ke; He, Huan

    2013-01-01

    This brief guides the reader through three basic Internet resource pricing models using an Internet cost analysis. Addressing the evolution of service types, it presents several corresponding mechanisms which can ensure pricing implementation and resource allocation. The authors discuss utility optimization of network pricing methods in economics and underline two classes of pricing methods including system optimization and entities' strategic optimization. The brief closes with two examples of the newly proposed pricing strategy helping to solve the profit distribution problem brought by P2P

  19. Interpretation of Internet technology

    DEFF Research Database (Denmark)

    Madsen, Charlotte Øland

    2001-01-01

    Research scope: The topic of the research project is to investigate how new internet technologies such as e-trade and customer relation marketing and management are implemented in Danish food processing companies. The aim is to use Weick's (1995) sensemaking concept to analyse the strategic...... processes leading to the use of internet marketing technologies and to investigate how these new technologies are interpreted into the organisation. Investigating the organisational socio-cognitive processes underlying the decision making processes will give further insight into the socio...

  20. Kids rules the internet

    DEFF Research Database (Denmark)

    Sørensen, Birgitte Holm

    2006-01-01

    ?Power users? are children who explore the cutting edge of new media and develop their competencies at a level where few adults can follow. Adults concerns over children?s and adolescents? activities on the Internet can often be ascribed to the fact that the children master the new media faster...... than their parents and their teachers. Adults who take the time to familiarise themselves with common practice on the Internet will usually abandon their concerns in favour of a more positive and supportive attitude....

  1. Internet skills, sources of support, and benefiting from internet use

    NARCIS (Netherlands)

    van Deursen, Alexander Johannes Aloysius Maria; Courtois, Cédric; van Dijk, Johannes A.G.M.

    2014-01-01

    This study added communication Internet skills to an existing skill framework of operational, formal, information, and strategic skills. The study investigated how people deal with inadequate skill levels by identifying support sources. Furthermore, we investigated which of the Internet skills

  2. The Internet and Ethiopia's IP Law, Internet Governance and Legal ...

    African Journals Online (AJOL)

    KM_Yilma & HH_Abraha

    3 Ian Lloyd (2014), Information Technology Law, 7th Edition, Oxford ..... private sector, in the global Internet governance forums has indeed been quite .... Ethiopian government is completely absent from the global internet governance.

  3. Battery Performance Modelling ad Simulation: a Neural Network Based Approach

    Science.gov (United States)

    Ottavianelli, Giuseppe; Donati, Alessandro

    2002-01-01

    -Marquardt one. The ANN used is a three-layer one (2-4-1) with four inputs and one output. Having established all the ANN parameters and calculated all the input/target training data the ANN has been trained and validated. Afterwards, various simulations have been performed with BAPER to validate the performance of the software and test new alternative battery cycling strategies. Taking into account the small number of available training data for the ANN, and that the simulations have been carried out over a fairly extensive time frame (i.e. one year) the results obtained from the prototype tool must be considered more than satisfactory. It is found that the deliverable discharge capacity can be maintained circa 20% higher than the one obtained with the nominal cycling strategy if the batteries are left discharged for a longer period of time and the storage temperature is decreased. This ANN model has its limitations when asked to predict the discharge capacity deterioration that would be obtained with extraordinary cycling conditions (e.g. extremely low storage temperatures and continuous cycling). Hence, these results must be considered only approximate, as it is impossible to exactly state whether the ANN turn out to give extremely accurate realistic values or not, failing to extrapolate a correct pattern. One way to overcome the problem would be to do some parallel experiments in the laboratory, using the same battery and similar environment conditions (temperature, charge and discharge cycles) to the ones to be encounter in the spacecraft.

  4. Optical Calibration Process Developed for Neural-Network-Based Optical Nondestructive Evaluation Method

    Science.gov (United States)

    Decker, Arthur J.

    2004-01-01

    A completely optical calibration process has been developed at Glenn for calibrating a neural-network-based nondestructive evaluation (NDE) method. The NDE method itself detects very small changes in the characteristic patterns or vibration mode shapes of vibrating structures as discussed in many references. The mode shapes or characteristic patterns are recorded using television or electronic holography and change when a structure experiences, for example, cracking, debonds, or variations in fastener properties. An artificial neural network can be trained to be very sensitive to changes in the mode shapes, but quantifying or calibrating that sensitivity in a consistent, meaningful, and deliverable manner has been challenging. The standard calibration approach has been difficult to implement, where the response to damage of the trained neural network is compared with the responses of vibration-measurement sensors. In particular, the vibration-measurement sensors are intrusive, insufficiently sensitive, and not numerous enough. In response to these difficulties, a completely optical alternative to the standard calibration approach was proposed and tested successfully. Specifically, the vibration mode to be monitored for structural damage was intentionally contaminated with known amounts of another mode, and the response of the trained neural network was measured as a function of the peak-to-peak amplitude of the contaminating mode. The neural network calibration technique essentially uses the vibration mode shapes of the undamaged structure as standards against which the changed mode shapes are compared. The published response of the network can be made nearly independent of the contaminating mode, if enough vibration modes are used to train the net. The sensitivity of the neural network can be adjusted for the environment in which the test is to be conducted. The response of a neural network trained with measured vibration patterns for use on a vibration isolation

  5. MULTIFUNCTION OF INTERNET IN TRANSLATION

    Directory of Open Access Journals (Sweden)

    Bayu Budiharjo

    2017-04-01

    Full Text Available Technology affects almost all areas, including translation. Many products of technology have made translational works easier, one of which is internet. Despite the wide use of internet, the potentials it has are sometimes unnoticed. While web-based dictionaries or thesaurus often serve as translators’ assistants and online Machine Translation issues become topics of many researches, other uses of internet related to translation may not be known by many. Internet can help disseminate newborn ideas, theories and findings worldwide to enhance translation theories. Besides, the contact between internet and translation generates new areas to examine. Internet also provides helping hand in the area of translation research. Researcher or anyone conducting research in the field of translation can find a range of research gaps as well as reference. Those who need group discussions to collect required data from informants, or researchers of the same interest coming from all over the world can meet and conduct Focus Group Discussion (FGD on virtual world. Furthermore, internet offers various forms of assistance for translation practitioners. The commonly used internet assistance consists of dictionaries, thesaurus and Machine Translations available on the internet. Other forms of aid provided by internet take form of parallel texts, images, and videos, which can be very helpful. Internet provides many things which can be utilized for the purpose of translation. Internet keeps on providing more as it develops from time to time in line with the development of technology. Internet awaits utilization of theorists, researchers, practitioners and those having concern on translation.

  6. Measuring and analyzing the causes of problematic Internet use.

    Science.gov (United States)

    Chiang, I-Ping; Su, Yung-Hsiang

    2012-11-01

    Since Internet surfing became a daily activity, people have changed their behavior. This research analyzes the causes of problematic Internet use through an online survey, where 1,094 samples were collected. Based on the results of structural equation modeling analysis, the following conclusions are reached: First, novelty, security, and efficiency increase users' online trust. Second, information and efficiency enhance users' sharing and anonymity online. Third, greater trust in Internet environments leads to an increase in a user's cognitive bias toward online behavioral responsibility and Internet addiction. Fourth, a user's attitude toward online sharing further increases the cognitive bias toward online copyright. Fifth, a user's attitude toward anonymity increases cognitive bias toward online copyright, online behavioral responsibility, and deepens Internet addiction.

  7. Radiology and the internet, basic principles and technical requirements

    International Nuclear Information System (INIS)

    Boegl, K.

    2000-01-01

    As a new communication media the Internet has revolutionized the global exchange of information which is one of the major sources of progress in medicine. This article reviews the history of the Internet's evolution and describes some fundamental technical concepts. The importance of Internet services for everyday professional work is examined with special consideration of radiology. Special emphasis is laid on the current technical limitations that have delayed a broad practical implementation of tele-medical applications. As a highly innovative medical speciality, radiology has always been at the forefront of research and development in the field of clinical Internet applications. By taking a look at recent innovations, the impact of the Internet on the radiologist's working environment of the future is highlighted. (orig.) [de

  8. Internet Of Things And Analytics

    Directory of Open Access Journals (Sweden)

    Harshini G

    2017-08-01

    Full Text Available The Internet of Things IoT helps to encompass many aspects of life from connecting homes and cities to connecting cars and roads roads to devices that helps in examining individuals behavior and then the data collected is used.IoT is to make lives better secure and enjoyable. IoT solutions will promote cleaner environment improve peoples health with preventative care mechanisms and the constant supervision of elderly family members. It provides a platform for communication between objects where objects can organize and manage themselves. In this paper an attempt is made to understand how analytics can be applied to IoT data. Various statistical and data mining techniques will help to derive knowledge out of huge data collected by the IoT devices.

  9. Internet Abuse and Internet Addiction in the Workplace

    Science.gov (United States)

    Griffiths, Mark

    2010-01-01

    Purpose: This paper seeks to overview the issues, concerns and challenges relating to internet abuse and internet addiction in the workplace. Design/methodology/approach: Using psychological literature, the paper outlines a number of important and inter-related areas including brief overviews of internet abuse, and the most extreme form of…

  10. [Internet gambling: what are the risks?].

    Science.gov (United States)

    Bonnaire, C

    2012-02-01

    Actually, there are many different and varied new ways to take part in gambling activities such as gambling via the Internet, mobile phone and interactive television. Among these media, the rise in Internet gambling activity has been very rapid. Nevertheless, few empirical studies have been carried out on the psychosocial effects of Internet gambling. While there is no conclusive evidence that Internet gambling is more likely than other gambling media to cause problem gambling, there are a number of factors that make online activities like Internet gambling potentially seductive and/or addictive. Such factors include anonymity, convenience, escape, dissociation/immersion, accessibility, event frequency, interactivity, disinhibition, simulation, and asociability. It would also appear that virtual environments have the potential to provide short-term comfort, excitement and/or distraction. The introduction of the Internet to gambling activities changes some of the fundamental situational and structural characteristics. The major change is that gambling activities are bought into the home and workplace environment. Thus, Internet gambling can become an in-house or work activity. One of the major concerns relating to those changes and the increase in gambling opportunities is the potential rise in the number of problem and pathological gamblers. Addictions always result from an interaction and interplay between many factors but in the case of gambling, it could be argued that technology and technological advance can themselves be an important contributory factor as we saw in examining the salient factors in Internet gambling. It is difficult to determine the prevalence of online (problem or not) gamblers, as it is obviously a figure that changes and has changed relatively quickly over the past decade. Nevertheless, the rate of Internet gambling is increasing and some recent studies using self-selected samples suggest, for example, that the prevalence of problem

  11. Internet-kriminalitet

    DEFF Research Database (Denmark)

    Langsted, Lars Bo; Tranberg, Charlotte Bagger

    2008-01-01

     Kapitlet om internet-kriminalitet rummer, udover en kort indføring i strafferettens almindelige del, bl.a. beskrivelser af de nye værnetingsregler for internetkriminalitet, reglerne om hacking, virusangreb, Denial-of-service, uretmæssig anvendelse af PIN-koder m.v. og identitetstyveri. Bogen er en...

  12. Internet-kriminalitet

    DEFF Research Database (Denmark)

    Langsted, Lars Bo; Tranberg, Charlotte Bagger

    2012-01-01

    Kapitlet om internet-kriminalitet rummer, udover en kort indføring i strafferettens almindelige del, bl.a. beskrivelser af de nye værnetingsregler for internetkriminalitet, reglerne om hacking, virusangreb, Denial-of-service, uretmæssig anvendelse af PIN-koder m.v. og identitetstyveri. Bogen er en...

  13. Modeling Internet Topology Dynamics

    NARCIS (Netherlands)

    Haddadi, H.; Uhlig, S.; Moore, A.; Mortier, R.; Rio, M.

    Despite the large number of papers on network topology modeling and inference, there still exists ambiguity about the real nature of the Internet AS and router level topology. While recent findings have illustrated the inaccuracies in maps inferred from BGP peering and traceroute measurements,

  14. Internet censorship in Turkey

    Directory of Open Access Journals (Sweden)

    Mustafa Akgül

    2015-06-01

    Full Text Available Turkey passed an internet censorship law in 2007 with the declared objective of protecting families and minors (Akdeniz, 2010. It established a unit within the regulator BTK (Information and Communication Technologies Authority responsible for imposing bans and blocks on websites based on nine catalogue crimes defined by other national laws (Akgül 2008, 2009a, 2009b. As of May 2015, 80,000 websites were banned based on civil code related complaints and intellectual property rights violations, reports the independent website Engelliweb. Blocking decisions rendered by penal courts are enforced even when they are based on grounds other that the nine catalogue crimes - such as terrorism, organised crime and crime against the state. Passed in parliament while ignoring the pleas of NGOs and of the internet sector, the Internet Law No. 5651 has since been used to temporarily ban popular platforms such as Blogger, Last.fm, Vimeo, Wordpress and YouTube. At the same time, some blocking decisions by the courts (e.g., Google and Facebook were not enforced by the authorities. Since its introduction, the European Court of Human Rights has ruled that Law No. 5651 (Council of Europe, 2011 is against the European Convention on Human Rights (ECHR, 2013. This article provides an overview of internet censorship and its social background in Turkey.

  15. China on the Internet

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    The big news on the Web in 2009 No more mobile porn The problem of cellphone pornography has been on the rise with more and more mobile phones that are equipped to surf the Internet coming into the market. Online sites accessible only through mobile phones are becoming a popular new method for distributing porn,

  16. Internet based benchmarking

    DEFF Research Database (Denmark)

    Bogetoft, Peter; Nielsen, Kurt

    2005-01-01

    We discuss the design of interactive, internet based benchmarking using parametric (statistical) as well as nonparametric (DEA) models. The user receives benchmarks and improvement potentials. The user is also given the possibility to search different efficiency frontiers and hereby to explore...

  17. The Global Internet Pandemic

    Science.gov (United States)

    Carter, Deborah Joy

    2009-01-01

    The global rise of Internet-based education is discussed in relation to models drawn from social studies and epidemiology. Experiential and data density models are highlighted, also the capacity for technological change, and phenomena observed in the spread of disease. The lesson of these illustrations is that even apparently permanent phenomena…

  18. Internet Search Engines

    OpenAIRE

    Fatmaa El Zahraa Mohamed Abdou

    2004-01-01

    A general study about the internet search engines, the study deals main 7 points; the differance between search engines and search directories, components of search engines, the percentage of sites covered by search engines, cataloging of sites, the needed time for sites appearance in search engines, search capabilities, and types of search engines.

  19. Internet flash of lightning

    International Nuclear Information System (INIS)

    Anon.

    2004-01-01

    Five internet sites are given relative to European Research and IAEA in relation with the I.D.E.A.S. project, intercomparison exercise about the internal dose from individual measurements of radioactive contamination surveillance; European Research in oncology; Electromagnetic fields and human health and a site about the use of lead 210 to determine the date of a death. (N.C.)

  20. Internet, Cybersex and Infidelity

    Directory of Open Access Journals (Sweden)

    Verda Tuzer

    2011-03-01

    Full Text Available Increasing use of internet has numerous reflections on relationships. Within the range of chatroom friendship and flirting to shared sexuality, cybersex addiction and criminal behaviours are among the most intriguing. Searching for sexual satisfaction on internet may have a number of functions such as decreasing anxiety and distress; expressing emotions such as loneliness, depression, anger and disappointment; or providing support to not being able to judge the level of intimacy in a realtionship. The incredible ease with which one obtains sexual content on the internet, at home, at the work place or even through mobile phones is one of the most important reason for its widespread prevalence. Another important allure of the cybersex is its anonimity, the relative ease to disguise normally disturbing characteristics and its being mostly ignored by others. It is also low-cost. On the other hand it causes increased social isolation, damages trust in relationships, and causes the individual to seek for help due to dramatic consequences following a period of virtual mirroring, when the feeling of finding a soulmate causes mutual adoration and idealization. This review examines the definition of infidelity in the context of internet use, its characteristics, types and various aspects; its negative consequences on relationships; its effects on couples and families; and treatment alternatives. The problems caused by increasing compulsivity of cybersex are also highlighted.

  1. STUDYING ON THE INTERNET

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    正Nowadays the Internet is more and more popular.I think it is a good way of learning. First,the Intemet enables people to study whenever and wherever it is convenient. They can also choose to study whatever they are interested in.However,a traditional school doesn't provide such great freedom.Students have to study given sub-

  2. Internet of Things

    Science.gov (United States)

    Ritz, John; Knaack, Zane

    2017-01-01

    In the 21st century, electronic connectivity is a major component of everyday life. One expects to have mobile phone coverage and to have access to log a computer or tablet onto the internet. This connectivity enables users to keep track of personal affairs and conduct work from remote locations. Designers and manufacturers are also connecting…

  3. Internet of Things

    DEFF Research Database (Denmark)

    Shim, J. P.; Avital, Michel; Dennis, Alan R.

    2017-01-01

    Recent research reports illustrate that Internet of things (IoT) is projected to be a multi-trillion dollar opportunity by 2020, with 50 billion devices connected by then. The IoT is a leading-edge topic in Information Systems (IS). In a hyperconnected economy, IoT can transform a business...

  4. The Future of the Internet

    National Research Council Canada - National Science Library

    Komaroff, Mitchell

    2008-01-01

    .... While the DoD no longer controls Internet decision making, its unique perspective deriving from its multiple roles as Internet user, operator, and research center is important to the development and protection of U.S. national interests...

  5. Internet Journal of Medical Update

    African Journals Online (AJOL)

    admin

    Internet Journal of Medical Update 2010 July;5(2):8-14. Internet Journal ... hospitalizations. This study of Nigerian patients with diabetes examined the adequacy of ..... Physicians need .... relationship between patient education and glycaemic ...

  6. Adopting Internet Banking in Ghana

    OpenAIRE

    G.O. Ofori-Dwumfuo; Betty A. Dankwah

    2013-01-01

    This study looks at the benefits, challenges and barriers in adopting Internet banking at a major bank in Ghana. The development of the Internet is changing the way financial services are provided in Ghana. The Internet banking facility has resulted in new ways of delivering banking services. The research is a case study based on the staffs that has worked with the bank for more than three years. In evaluating benefits, challenges and barriers to the bank in adopting Internet banking, intervi...

  7. Pemanfaatan Teknologi Internet Dalam Pendidikan

    OpenAIRE

    Aziz, Nurazzmi

    2013-01-01

    Internet technology keeps on developing and touching various aspects of human daily life. Starting from the very simple utilization of internet, such as the use of email for communication purposes, browsing varied information, up to the relatively advanced one, such as designing and developing homepage or the use of internet for shopping purposes (e-shopping). Some initiatives, either individually or in collaboration, to utilize internet for learning has been conducted by some Secondary Schoo...

  8. Gender, internet experience, Internet identification, and internet anxiety: a ten-year followup.

    Science.gov (United States)

    Joiner, Richard; Gavin, Jeff; Brosnan, Mark; Cromby, John; Gregory, Helen; Guiller, Jane; Maras, Pam; Moon, Amy

    2012-07-01

    In 2002, we found gender differences in the use of the Internet. Since then, however, the Internet has changed considerably. We therefore conducted a follow-up study in 2012. The study involved 501 students (389 females and 100 males, 12 participants unspecified gender) and we measured Internet use, Internet anxiety, and Internet identification. We found that males had a greater breadth of Internet use; they used the Internet more for games and entertainment than females. The differentiation between males and females in terms of Internet use is evident, and in some ways is even more distinct than 10 years ago. In our previous research we had found no gender differences in the use of the Internet for communication, whereas in the current study we have found that females use the Internet for communication than males and were using social network sites more than males. We also found, consistent with our previous study, that Internet identification and Internet anxiety were related to Internet use.

  9. Traditional versus internet bullying in junior high school students.

    Science.gov (United States)

    Gofin, Rosa; Avitzour, Malka

    2012-11-01

    To examine the prevalence of traditional and Internet bullying and the personal, family, and school environment characteristics of perpetrators and victims. Students (12-14 years old) in 35 junior high schools were randomly selected from the Jerusalem Hebrew (secular and religious) and Arab educational system (n = 2,610). Students answered an anonymous questionnaire, addressing personal, family, and school characteristics. Traditional bullying and Internet bullying for perpetrators and victims were categorized as either occurring at least sometimes during the school year or not occurring. Twenty-eight percent and 8.9 % of students were perpetrators of traditional and Internet bullying, respectively. The respective proportions of victims were 44.9 and 14.4 %. Traditional bullies presented higher Odds Ratios (ORs) for boys, for students with poor social skills (those who had difficulty in making friends, were influenced by peers in their behavior, or were bored), and for those who had poor communication with their parents. Boys and girls were equally likely to be Internet bullies and to use the Internet for communication and making friends. The OR for Internet bullying victims to be Internet bullying perpetrators was 3.70 (95 % confidence interval 2.47-5.55). Victims of traditional bullying felt helpless, and victims of traditional and Internet bullying find school to be a frightening place. There was a higher OR of Internet victimization with reports of loneliness. Traditional bully perpetrators present distinctive characteristics, while Internet perpetrators do not. Victims of traditional and Internet bullying feel fear in school. Tailored interventions are needed to address both types of bullying.

  10. Emerging opportunities: the internet, marketing and museums

    Directory of Open Access Journals (Sweden)

    Richani Evdoxia

    2016-01-01

    Full Text Available The tremendous impact of applying new technologies is obvious when it comes to museums. Internet forms an integral part of museums everyday life and decision making. Websites, online communities, social media, and mobile applications comprise elements of the modern museum’s digital self, which complements the real museum of permanent and temporary exhibitions, storage rooms, visitors’ facilities, laboratories and, most important, museum objects. This environment inevitably affects museum marketing strategies and creates relevant opportunities.

  11. Reports on internet traffic statistics

    NARCIS (Netherlands)

    Hoogesteger, Martijn; de Oliveira Schmidt, R.; Sperotto, Anna; Pras, Aiko

    2013-01-01

    Internet traffic statistics can provide valuable information to network analysts and researchers about the way nowadays networks are used. In the past, such information was provided by Internet2 in a public website called Internet2 NetFlow: Weekly Reports. The website reported traffic statistics

  12. Some Aspects Regarding Internet Advertising

    Directory of Open Access Journals (Sweden)

    Chiţu I.

    2009-12-01

    Full Text Available The aim of this paper is to examine internet advertising, to understand its strengths and weaknesses, to compare the content and potential of traditional media with Web sites and to describe the specific types of internet advertising. The paper also tries to present some facts and figures regarding internet advertising.

  13. Internet Advertising: Ethics and Etiquette.

    Science.gov (United States)

    Machovec, George S.

    1994-01-01

    Discusses the growth of the Internet and the attitudes of users toward advertising, provides examples of kinds of advertising used on electronic networks, and lists several companies that help advertisers use the Internet. Fifteen guidelines are suggested to help advertisers use the Internet in a reasonable and appropriate way. (Contains 11…

  14. Internet applications in radiation safety

    International Nuclear Information System (INIS)

    Hill, P.; Geisse, C.; Wuest, E.

    1998-01-01

    As a means of effective communication the Internet is presently becoming more and more important in German speaking countries, too. Its possibilities to exchange and to obtain information efficiently and rapidly are excellent. Internet and email access are available now in most institutions for professional use. Internet services of importance to radiation safety professionals are described. (orig.) [de

  15. ITSA: Internet Traffic Statistics Archive

    NARCIS (Netherlands)

    Hoogesteger, Martijn; de Oliveira Schmidt, R.; Pras, Aiko

    Motivated by the fact that comprehensive and long term Internet traffic measurements can be hard to obtain, we have proposed and developed the Internet Traffic Statistics Archive (ITSA). Since 2013, ITSA concentrates reports on high-level statistics of Internet traffic worldwide. Examples of

  16. Possible Effects of Internet Use on Cognitive Development in Adolescence

    Directory of Open Access Journals (Sweden)

    Kathryn L. Mills

    2016-06-01

    Full Text Available The rise of digital media use and the ability to be in almost constant connection to the Internet has raised a number of concerns about how Internet use could impact cognitive abilities. In particular, parents and policy makers are concerned with how being ‘constantly online’ might disrupt social and cognitive development. This review integrates the latest empirical evidence on Internet use with relevant experimental studies to discuss how online behaviors, and the structure of the online environment, might affect the cognitive development of adolescents. Popular concerns are discussed in light of the reviewed evidence, and remaining gaps in knowledge are highlighted.

  17. Energy management of internet data centers in smart grid

    CERN Document Server

    Jiang, Tao; Cao, Yang

    2015-01-01

    This book reports the latest findings on intelligent energy management of Internet data centers in smart-grid environments. The book gathers novel research ideas in Internet data center energy management, especially scenarios with cyber-related vulnerabilities, power outages and carbon emission constraints. The book will be of interest to university researchers, R&D engineers and graduate students in communication and networking areas who wish to learn the core principles, methods, algorithms, and applications of energy management of Internet data centers in smart grids.

  18. Implementing multifactorial psychotherapy research in online virtual environments (IMPROVE-2): study protocol for a phase III trial of the MOST randomized component selection method for internet cognitive-behavioural therapy for depression.

    Science.gov (United States)

    Watkins, Edward; Newbold, Alexandra; Tester-Jones, Michelle; Javaid, Mahmood; Cadman, Jennifer; Collins, Linda M; Graham, John; Mostazir, Mohammod

    2016-10-06

    Depression is a global health challenge. Although there are effective psychological and pharmaceutical interventions, our best treatments achieve remission rates less than 1/3 and limited sustained recovery. Underpinning this efficacy gap is limited understanding of how complex psychological interventions for depression work. Recent reviews have argued that the active ingredients of therapy need to be identified so that therapy can be made briefer, more potent, and to improve scalability. This in turn requires the use of rigorous study designs that test the presence or absence of individual therapeutic elements, rather than standard comparative randomised controlled trials. One such approach is the Multiphase Optimization Strategy, which uses efficient experimentation such as factorial designs to identify active factors in complex interventions. This approach has been successfully applied to behavioural health but not yet to mental health interventions. A Phase III randomised, single-blind balanced fractional factorial trial, based in England and conducted on the internet, randomized at the level of the patient, will investigate the active ingredients of internet cognitive-behavioural therapy (CBT) for depression. Adults with depression (operationalized as PHQ-9 score ≥ 10), recruited directly from the internet and from an UK National Health Service Improving Access to Psychological Therapies service, will be randomized across seven experimental factors, each reflecting the presence versus absence of specific treatment components (activity scheduling, functional analysis, thought challenging, relaxation, concreteness training, absorption, self-compassion training) using a 32-condition balanced fractional factorial design (2 IV 7-2 ). The primary outcome is symptoms of depression (PHQ-9) at 12 weeks. Secondary outcomes include symptoms of anxiety and process measures related to hypothesized mechanisms. Better understanding of the active ingredients of

  19. Implementing multifactorial psychotherapy research in online virtual environments (IMPROVE-2: study protocol for a phase III trial of the MOST randomized component selection method for internet cognitive-behavioural therapy for depression

    Directory of Open Access Journals (Sweden)

    Edward Watkins

    2016-10-01

    Full Text Available Abstract Background Depression is a global health challenge. Although there are effective psychological and pharmaceutical interventions, our best treatments achieve remission rates less than 1/3 and limited sustained recovery. Underpinning this efficacy gap is limited understanding of how complex psychological interventions for depression work. Recent reviews have argued that the active ingredients of therapy need to be identified so that therapy can be made briefer, more potent, and to improve scalability. This in turn requires the use of rigorous study designs that test the presence or absence of individual therapeutic elements, rather than standard comparative randomised controlled trials. One such approach is the Multiphase Optimization Strategy, which uses efficient experimentation such as factorial designs to identify active factors in complex interventions. This approach has been successfully applied to behavioural health but not yet to mental health interventions. Methods/Design A Phase III randomised, single-blind balanced fractional factorial trial, based in England and conducted on the internet, randomized at the level of the patient, will investigate the active ingredients of internet cognitive-behavioural therapy (CBT for depression. Adults with depression (operationalized as PHQ-9 score ≥ 10, recruited directly from the internet and from an UK National Health Service Improving Access to Psychological Therapies service, will be randomized across seven experimental factors, each reflecting the presence versus absence of specific treatment components (activity scheduling, functional analysis, thought challenging, relaxation, concreteness training, absorption, self-compassion training using a 32-condition balanced fractional factorial design (2IV 7-2. The primary outcome is symptoms of depression (PHQ-9 at 12 weeks. Secondary outcomes include symptoms of anxiety and process measures related to hypothesized mechanisms

  20. FERAL : Network-based classifier with application to breast cancer outcome prediction

    NARCIS (Netherlands)

    Allahyar, A.; De Ridder, J.

    2015-01-01

    Motivation: Breast cancer outcome prediction based on gene expression profiles is an important strategy for personalize patient care. To improve performance and consistency of discovered markers of the initial molecular classifiers, network-based outcome prediction methods (NOPs) have been proposed.

  1. Modelisation et simulation d'un PON (Passive Optical Network) base ...

    African Journals Online (AJOL)

    English Title: Modeling and simulation of a PON (Passive Optical Network) Based on hybrid technology WDM/TDM. English Abstract. This development is part of dynamism of design for a model combining WDM and TDM multiplexing in the optical network of PON (Passive Optical Network) type, in order to satisfy the high bit ...

  2. A robust neural network-based approach for microseismic event detection

    KAUST Repository

    Akram, Jubran; Ovcharenko, Oleg; Peter, Daniel

    2017-01-01

    We present an artificial neural network based approach for robust event detection from low S/N waveforms. We use a feed-forward network with a single hidden layer that is tuned on a training dataset and later applied on the entire example dataset

  3. Development of the Social Network-Based Intervention "Powerful Together with Diabetes" Using Intervention Mapping

    NARCIS (Netherlands)

    Vissenberg, Charlotte; Nierkens, Vera; Uitewaal, Paul J. M.; Middelkoop, Barend J. C.; Nijpels, Giel; Stronks, Karien

    2017-01-01

    This article describes the development of the social network-based intervention Powerful Together with Diabetes which aims to improve diabetes self-management (DSM) among patients with type 2 diabetes living in socioeconomically deprived neighborhoods by stimulating social support for DSM and

  4. Enhancing Lifelong Competence Development and Management Systems with Social Network-based Concepts and Tools

    NARCIS (Netherlands)

    Cheak, Alicia; Angehrn, Albert; Sloep, Peter

    2006-01-01

    This paper addresses the challenge of enhancing the social dimension of lifelong Competence Development and Management Systems with social network-based concepts and tools. Our premise is that through a combination of social network visualization tools, simulations, stimulus agents and management

  5. Advantages and disadvantages of advertising and promotion in the internet

    OpenAIRE

    Dudnikova, A. V.; Дудникова, А. В.

    2014-01-01

    Nowadays, advertising plays an important role in the promotion and advancement of any brand, product or service. Advertising influences on the image and style of life. Internet is a tool which is used for creation of advertising. It represents an ideal opportunity for the development of communication with consumers in an electronic environment. Online advertising is used by companies worldwide for promotion their products and services. Features, advantages and disadvantages of the Internet - ...

  6. Risk Management Of Email And Internet Use In The Workplace

    Directory of Open Access Journals (Sweden)

    John C Ruhnka

    2013-09-01

    Full Text Available The article surveys the changing risk environment for corporations from their employees electronic communications. It identifies the types of liabilities thatcorporations can incur from such communications. It presents the objectives of corporate internet use policies and the types of provisions such policies should contain. It suggests an alternative risk-based approach to corporate acceptable use policies instead of atraditional “laundry list” of internet use prohibitions.

  7. ROLE OF MIDDLEWARE FOR INTERNET OF THINGS: A STUDY

    OpenAIRE

    Soma Bandyopadhyay; Munmun Sengupta; Souvik Maiti; Subhajit Dutta

    2011-01-01

    Internet of Things (IoT) has been recognized as a part of future internet and ubiquitous computing. Itcreates a true ubiquitous or smart environment. It demands a complex distributed architecture withnumerous diverse components, including the end devices and application and association with theircontext. This article provides the significance of middleware system for (IoT). The middleware for IoTacts as a bond joining the heterogeneous domains of applications communicating over heterogeneousi...

  8. Internet Browser for Ice, Weather and Ocean Information

    DEFF Research Database (Denmark)

    Pedersen, Leif Toudal; Saldo, Roberto

    2005-01-01

    Abstract An Internet based distribution system for ice, weather and ocean information has been set up. The system provides near real time access to a large variety of data about the polar environment in a standard user environment. The system is freely available at: http://www.seaice.dk Specific...

  9. The amazing world of the internet-challenges of the internet age

    Directory of Open Access Journals (Sweden)

    Veronica Adriana Popescu

    2010-12-01

    Full Text Available This presentation is aimed at briefly underlining the most important developments in informatics, following the introduction of the new informational techniques and technologies.Our presentation began by enumerating the programming languages used over time, by presenting the computers industry and computers generations. We have focused on numerous technical aspects, such as hardware structure; however the basis was represented by the way how information and computer networks are organized. At said point, an analysis was made of the Intranet and Internet, with a particular focus on the evolution of the Internet and its advantages and disadvantages. The Internet has represented and continues to represent a great challenge for its users, whereas as beneficial its advantages might be, the more dangerous it can become its use by some users in less controlled environments

  10. Narcissism and Internet pornography use.

    Science.gov (United States)

    Kasper, Thomas Edward; Short, Mary Beth; Milam, Alex Clinton

    2015-01-01

    This study examined the relation between Internet pornography use and narcissism. Participants (N=257) completed an online survey that included questions on Internet pornography use and 3 narcissism measures (i.e., Narcissistic Personality Inventory, Pathological Narcissistic Inventory, and the Index of Sexual Narcissism). The hours spent viewing Internet pornography was positively correlated to participants' narcissism level. In addition, those who have ever used Internet pornography endorsed higher levels of all 3 measures of narcissism than did those who have never used Internet pornography.

  11. The Analysis of Research on Internet Marketing

    Directory of Open Access Journals (Sweden)

    Vida Davidavičienė

    2014-09-01

    Full Text Available The targeted development of internet marketing faces the dynamic environment and its alterations that occur both – in business terms and conditions and in the use of e­tools and applicable concepts. The growing importance of internet marketing is indicated by a growth in e­markets, an increasing number of new generation consumers, investments of organizations in e­based decisions, a strong interest of scientists representing different fields as well as by widening the base of knowledge related to the above introduced phenomenon. Despite a continuously increasing amount of scientific literature on Internet marketing, this area of research is still at the initial stage. The article is aimed at analysing the fields of ongoing researches into Internet marketing and at identifying the areas required for deeper examination. The article has applied for the methods such as a comparative analysis and summary of scientific literature, information comparison and techniques for grouping and the graphical visualization of information.

  12. Distance Learning For Mobile Internet Users

    Directory of Open Access Journals (Sweden)

    Beran NECAT

    2007-04-01

    Full Text Available This paper provides an overview on the current state of art in the field of Distance learning for mobile users. It mentions a large range of technologies, services and approaches that may be used to bring distance learning to mobile internet users. These technologies are supposed to considerably increase innovative e-learning solutions for the next generation. While this definitely appears to be true, I think what is not so clear are the implications for students, and lecturers etc. In this article I first evaluate distributed e-learning technologies. With some of the most vital topics, focusing on adaptive distributed e-learning for Mobile Internet Users (MIUs. I also provide a brief analysis of Broadband Network Services, Collaborative e-Learning Tools and Distributed Virtual Environments, Internet-Based Adaptive Learning Technologies and Personalised Distance Learning. I continue my discussion on to Internet Development Tools (IDTs for Distance Learning Solutions, Learning Technologies for MIUs, Semantic and Web-Based Services for Enriching Learning Interactivity, and Evaluations of Distributed Learning Technologies (DLTs.

  13. JIP: Java image processing on the Internet

    Science.gov (United States)

    Wang, Dongyan; Lin, Bo; Zhang, Jun

    1998-12-01

    In this paper, we present JIP - Java Image Processing on the Internet, a new Internet based application for remote education and software presentation. JIP offers an integrate learning environment on the Internet where remote users not only can share static HTML documents and lectures notes, but also can run and reuse dynamic distributed software components, without having the source code or any extra work of software compilation, installation and configuration. By implementing a platform-independent distributed computational model, local computational resources are consumed instead of the resources on a central server. As an extended Java applet, JIP allows users to selected local image files on their computers or specify any image on the Internet using an URL as input. Multimedia lectures such as streaming video/audio and digital images are integrated into JIP and intelligently associated with specific image processing functions. Watching demonstrations an practicing the functions with user-selected input data dramatically encourages leaning interest, while promoting the understanding of image processing theory. The JIP framework can be easily applied to other subjects in education or software presentation, such as digital signal processing, business, mathematics, physics, or other areas such as employee training and charged software consumption.

  14. Public Libraries and Internet Access across the United States: A Comparison by State 2004–2006

    Directory of Open Access Journals (Sweden)

    Paul T. Jaeger

    2007-06-01

    Full Text Available Drawing upon findings from a national survey of U.S. public libraries, this paper examines trends in Internet and public computing access in public libraries across states from 2004 to 2006. Based on library-supplied information about levels and types of Internet and public computing access, the authors offer insights into the network-based content and services that public libraries provide. Examining data from 2004 to 2006 reveals trends and accomplishments in certain states and geographic regions. This paper details and discusses the data, identifies and analyzes issues related to Internet access, and suggests areas for future research.

  15. ISA for the internet of tactical things

    Science.gov (United States)

    Moulton, Christine L.; Harrell, John M.; Hepp, Jared J.

    2017-05-01

    The Internet of Things (IoT) integrates a variety of different devices that provide more information than can currently be easily handled. While there is much good there are also many problems in the IoT world and not all of the potential solutions can be used in the unique environment of the military. The tactical edge of the military is an even harsher environment with both constrained communications and resources but still having requirements to process data in real time for improved command decisions.

  16. Internet de las cosas

    OpenAIRE

    Salazar Soler, Jorge; Silvestre Bergés, Santiago

    2016-01-01

    Este es un curso de introducción a la IoT (Internet de las cosas). En los capítulos primeros capítulos se introducen los conceptos básicos sobre la IoT. Seguidamente se presentan nociones básicas sobre el protocolo de internet IPv6 que es el más utilizado en el entorno de la IoT y se describen las principales aplicaciones, el estado actual del mercado y las tecnologías que permiten la existencia de la IoT. Finalmente se analizan los retos de futuro que se consideran más importa...

  17. Internet and Advertisement.

    Science.gov (United States)

    Moustafa, Khaled

    2016-02-01

    The Internet has revolutionized the way knowledge is currently produced, stored and disseminated. A few finger clicks on a keyboard can save time and many hours of search in libraries or shopping in stores. Online trademarks with an (e-) prefix such as e-library, e-business, e-health etc., are increasingly part of our daily professional vocabularies. However, the Internet has also produced multiple negative side effects, ranging from an unhealthy dependency to a dehumanization of human relationships. Fraudulent, unethical and scam practices are also flourishing through for example misleading online advertising methods. Some social and professional networks gather users' profiles for selling and advertising purposes, sometimes by making it technically difficult to unsubscribe. Here, I discuss some of these unethical aspects and propose some potential solutions to reduce them.

  18. Mujeres en Internet

    Directory of Open Access Journals (Sweden)

    Sally Burch

    2015-01-01

    Full Text Available El potencial democratizador de las redes electrónicas dependerá de cómo se desarrollen y usen en un contexto social específico. El aparecimiento y fortalecimiento de espacios en Internet contribuirá a concretar ese potencial, si ello sucede como resultado de necesarias convergencias se logrará un mayor impacto. Así, el reto que presenta el ciberespacio es grande para las organizaciones de mujeres que quieren impulsar nuevas formas de comunicación de género. A las mujeres en la actualidad se les presenta un reto, buscar formas de incidir en la configuración de espacios en Internet para introducir un enfoque de género tanto en los contenidos como en los códigos y las estructuras

  19. Internet en service pack

    Directory of Open Access Journals (Sweden)

    Máximo Lameiro

    2004-04-01

    Full Text Available En contra de los sueños románticos que, no hace tantos años, muchos albergamos, Internet se ha convertido en un inmenso mercado en el cual es cada vez más difícil encontrar alguna cosa genuina y del que es cada vez más improbable salir ileso. La Internet de hoy es tan distinta de lo que fue que poca gente recuerda cómo se gestó y cual era su 'espíritu' en los comienzos. La Red de redes fue el resultado de un proceso, no previsto, que empezó como red militar, siguió como red universitaria, luego alcanzó nivel intercontinental y finalmente se globalizó tanto como el mundo al que ella misma contribuyó a unificar.

  20. Internet use among Turkish adolescents.

    Science.gov (United States)

    Tahiroglu, Aysegul Yolga; Celik, Gonca G; Uzel, Mehtap; Ozcan, Neslihan; Avci, Ayse

    2008-10-01

    The aim of this study was to investigate Internet use habits and problematic Internet use (PIU) in Turkish adolescents. Participants were 3,975 undergraduate students, 7.6% of whom used the Internet for more than 12 hours weekly. The Online Cognition Scale (OCS) was used. The most common purpose for using the Internet was playing games, followed by general information search. Female users mostly preferred searching for general information; male users preferred playing games (p game was violent games. While preference for strategy and fantasy role-play (FRP) games increased with age, preference for other games decreased (p games, followed by FRP, strategy, and sports and motor racing games. Computers and the Internet are useful, important inventions, but like other inventions, if used improperly, they may be harmful. Risk of harm raises concerns about who should use the Internet and computers, and where, when, and why the Internet and computers should be used.

  1. Internet addiction: A case report

    Directory of Open Access Journals (Sweden)

    Pejović-Milovančević Milica

    2009-01-01

    Full Text Available Some addictions cannot be connected with substance abuse (pathological gambling, video games playing, binge eating, compulsive physical activity, emotional relationship addiction, TV addiction. Since 1995, Internet addiction has been accepted as a clinical entity with profound negative effect on social, familial, educational and economical personal functioning. The diagnosis of Internet addiction could be established if the person spends more than 38 hours per week on the Internet exempting online professional needs. Basic symptoms are the increased number of hours spent in front of the computer along with the Internet use, development of abstinent syndrome if the Internet access is prohibited, sleep inversion, neglect of basic social requirements and personal hygiene, many somatic symptoms developed due to prolonged sitting or monitor watching, dissocial behavior. In this paper, data about the Internet addiction are presented and a case report of an adolescent with developed Internet addiction.

  2. Internet Addiction and Its Treatment

    Directory of Open Access Journals (Sweden)

    Ozden Arisoy

    2009-07-01

    Full Text Available With the introduction of new technologies, computer and internet use have become an unavoidable necessity in our daily lives. Internet was originally designed to facilitate communication and research. However the dramatic increase in use of internet in recent years has led to its pathologic use. Turkey, as a developing country with an increasing rate of internet access and computer use is at high risk for this disorder. In our country, this disorder is especially seen in young people who are more skilled in internet and computer use. And because their excessive internet use has led to negative consequences in their academic, social and family lives, patients and their families began search of treatment for this disorder. So clinicians must be aware of this newly emerging disorder and they should be able to apply the appropriate therapeutic interventions. This paper aims to summarize the pharmacological and cognitive-behavioral treatment of internet addiction.

  3. Internet addiction in young people.

    Science.gov (United States)

    Ong, Say How; Tan, Yi Ren

    2014-07-01

    In our technology-savvy population, mental health professionals are seeing an increasing trend of excessive Internet use or Internet addiction. Researchers in China, Taiwan and Korea have done extensive research in the field of Internet addiction. Screening instruments are available to identify the presence of Internet addiction and its extent. Internet addiction is frequently associated with mental illnesses such as anxiety, depression, conduct disorder and attention deficit hyperactivity disorder (ADHD). Treatment modalities include individual and group therapies, cognitive behavioural therapy (CBT), family therapy and psychotropic medications. A significant proportion of Singapore adolescents engaging in excessive Internet use are also diagnosed to have concomitant Internet addiction. Despite the presence of a variety of treatment options, future research in this area is needed to address its growing trend and to minimise its negative psychological and social impact on the individuals and their families.

  4. An Internet of Cars

    OpenAIRE

    Speed, Chris; Shingleton, D; Cherrett, T

    2013-01-01

    Despite describing the transport infrastructure as a ‘network’, most road and transport users see little similarity between the ‘transport network’ and the internet. This paper suggests that overcoming this difference is key to a new paradigm of transport in which connections, flow and sharing are synonymous with both social networking and travel behaviour.In order to demonstrate the potentials, this paper presents an experimental platform that combines data gathered from Automatic Number Pla...

  5. Internet quality management

    International Nuclear Information System (INIS)

    Park, Yeong Taek; Song, Hae Geun

    2000-09-01

    This book guides the useful application of internet quality management. It mentions understanding of modern quality management, which includes basics of quality management, six sigma quality innovation, best system, search way of quality information, consideration for effective information search, establishment of quality information center using bookmark, sites related quality by fields, journal sites related quality, sites related quality award,and web sites of the highest business.

  6. From Internet to Posthuman

    Directory of Open Access Journals (Sweden)

    Alberto Giovanni Biuso

    2015-04-01

    Full Text Available The social-interactive nature of the human being has produced different political, ethical, and technological structures. The Internet is one of them. A thorough understanding of the World Wide Web’s role, potentiality and risks surely requires sound sociological, psychological and cognitive paradigms but it always and above all requires a radical theoretical look at human and posthuman exists and acts on the web and its devices.

  7. Unified Internet Messaging

    OpenAIRE

    Healy, Paul; Barber, Declan

    2015-01-01

    As telephony services, mobile services and internet services continue to converge, the prospect of providing Unified Messaging and even Unified Communications becomes increasingly achievable. This paper discusses the growing importance of IP-based networks to Unified Messaging developments and examines some of the key services and protocols that are likely to make Unified Messaging more widely available. In this initial paper, we limit ourselves initially to the unification of text-based mess...

  8. Internet: alternativa educativa

    Directory of Open Access Journals (Sweden)

    José Francisco Amador Montaño

    2015-02-01

    Full Text Available RESUMEN Este artículo presenta una propuesta sobre la utilización de las potencialidades de Internet en la educación. Es una reflexión sobre el qué hacer y la responsabilidad d elas instituciones educativas y de los docentes frente a los retos cotnemporáneos que ofrece la tecnología y la ciencia.

  9. In-Service Teachers' Internet Self-Efficacy: A Re-Examination of Gender Differences

    Science.gov (United States)

    Kahraman, Sakip; Yilmaz, Zeynel Abidin

    2018-01-01

    Teachers' Internet self-efficacy plays a critical role in their web-based professional development and on their students' learning outcomes in Internet-based learning environments. It is therefore important to periodically measure and evaluate teachers' self-efficacy regarding the Internet, which is a dynamic technology, using an instrument that…

  10. The Internet of Things

    CERN Document Server

    Greengard, Samuel

    2015-01-01

    We turn on the lights in our house from a desk in an office miles away. Our refrigerator alerts us to buy milk on the way home. A package of cookies on the supermarket shelf suggests that we buy it, based on past purchases. The cookies themselves are on the shelf because of a "smart" supply chain. When we get home, the thermostat has already adjusted the temperature so that it's toasty or bracing, whichever we prefer. This is the Internet of Things -- a networked world of connected devices, objects, and people. In this book, Samuel Greengard offers a guided tour through this emerging world and how it will change the way we live and work. Greengard explains that the Internet of Things (IoT) is still in its early stages. Smart phones, cloud computing, RFID (radio-frequency identification) technology, sensors, and miniaturization are converging to make possible a new generation of embedded and immersive technology. Greengard traces the origins of the IoT from the early days of personal computers and the Internet...

  11. Internet and Surveillance

    DEFF Research Database (Denmark)

    The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged in this co......The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged...... institutions have a growing interest in accessing this personal data. Here, contributors explore this changing landscape by addressing topics such as commercial data collection by advertising, consumer sites and interactive media; self-disclosure in the social web; surveillance of file-sharers; privacy...... in the age of the internet; civil watch-surveillance on social networking sites; and networked interactive surveillance in transnational space. This book is a result of a research action launched by the intergovernmental network COST (European Cooperation in Science and Technology)....

  12. The Geoscience Internet of Things

    Science.gov (United States)

    Lehnert, K.; Klump, J.

    2012-04-01

    Internet of Things is a term that refers to "uniquely identifiable objects (things) and their virtual representations in an Internet-like structure" (Wikipedia). We here use the term to describe new and innovative ways to integrate physical samples in the Earth Sciences into the emerging digital infrastructures that are developed to support research and education in the Geosciences. Many Earth Science data are acquired on solid earth samples through observations and experiments conducted in the field or in the lab. The application and long-term utility of sample-based data for science is critically dependent on (a) the availability of information (metadata) about the samples such as geographical location where the sample was collected, time of sampling, sampling method, etc. (b) links between the different data types available for individual samples that are dispersed in the literature and in digital data repositories, and (c) access to the samples themselves. Neither of these requirements could be achieved in the past due to incomplete documentation of samples in publications, use of ambiguous sample names, and the lack of a central catalog that allows researchers to find a sample's archiving location. New internet-based capabilities have been developed over the past few years for the registration and unique identification of samples that make it possible to overcome these problems. Services for the registration and unique identification of samples are provided by the System for Earth Sample Registration SESAR (www.geosamples.org). SESAR developed the International Geo Sample Number, or IGSN, as a unique identifier for samples and specimens collected from our natural environment. Since December 2011, the IGSN is governed by an international organization, the IGSN eV (www.igsn.org), which endorses and promotes an internationally unified approach for registration and discovery of physical specimens in the Geoscience community and is establishing a new modular and

  13. Internet Addiction: A Review of the First Twenty Years.

    Science.gov (United States)

    Mihajlov, Martin; Vejmelka, Lucija

    2017-09-01

    Easy access to communication and information technologies has increased our dependence on technology for various aspects of our lives. Nevertheless, this remarkable growth of Internet Usage has been inextricably paired with a rise of excessive and dysfunctional Internet use. Conceptualized around 1996, a few years after the inception of the World Wide Web, Internet addiction has developed into a global issue influencing varying segments of the population at different levels. Despite heated debates on its addictive nature, consensus is emerging regarding the existence of this problematic behavior. In this paper we provide a comprehensive overview of the literature on Internet addiction in last 20 years. Purpose of this paper is to present crucial findings on Internet addiction to health profession. Besides numerous benefits of Internet use, the virtual environment brings various risks in every age group. The Internet is very significant in the everyday activities of children and youth and professional interventions with this age group should be specific considering their developmental characteristics. Exposure to online risks can have long-lasting and intense negative effects. Effective programs in prevention and treatment should include a multi-sectoral and interdisciplinary approach. Detail review of the symptomatology, diagnosis model an possibilities of treatment can be multiple beneficial to the health professionals and other helping professions due to actual needs for interventions in the field of the internet addiction treatment. Internet addiction is slowly becoming a societal concern as it particularly affects adolescents and children, who are more exposed and consequently more vulnerable. Findings presented in the paper can benefit in practice of treatment internet addiction and also as framework for further researches in the field.

  14. The Internet and HIV study: design and methods

    Directory of Open Access Journals (Sweden)

    Elford Jonathan

    2004-09-01

    Full Text Available Abstract Background The Internet provides a new meeting ground, especially for gay men, that did not exist in the early 1990s. Several studies have found increased levels of high risk sexual behaviour and sexually transmissible infections (STI among gay men who seek sex on the Internet, although the underlying processes are not fully understood. Research funded by the UK Medical Research Council (2002–2004 provided the opportunity to consider whether the Internet represents a new sexual risk environment for gay and bisexual men living in London. Methods The objectives of the Internet and HIV study are to: (i measure the extent to which gay men living in London seek sexual partners on the Internet; (ii compare the characteristics of London gay men who do and do not seek sex on the Internet; (iii examine whether sex with Internet-partners is less safe than with other sexual partners; (iv compare use of the Internet with other venues where men meet sexual partners; (v establish whether gay men use the Internet to actively seek partners for unprotected anal intercourse; (vi determine the potential for using the Internet for HIV prevention. These objectives have been explored using quantitative and qualitative research methods in four samples of London gay men recruited and interviewed both online and offline. The four samples were: (i gay men recruited through Internet chat rooms and profiles; (ii HIV positive gay men attending an NHS hospital outpatients clinic; (iii gay men seeking an HIV test in an NHS HIV testing or sexual health clinic; (iv gay men recruited in the community. Results Quantitative data were collected by means of confidential, anonymous self-administered questionnaires (n>4000 completed on-line by the Internet sample. Qualitative data were collected by means of one-to-one interviews (n = 128 conducted either face-to-face or on-line. Conclusion The strength of the Internet and HIV study is its methodological plurality, drawing

  15. Multi-Device to Multi-Device (MD2MD Content-Centric Networking Based on Multi-RAT Device

    Directory of Open Access Journals (Sweden)

    Cheolhoon Kim

    2017-11-01

    Full Text Available This paper proposes a method whereby a device can transmit and receive information using a beacon, and also describes application scenarios for the proposed method. In a multi-device to multi-device (MD2MD content-centric networking (CCN environment, the main issue involves searching for and connecting to nearby devices. However, if a device can’t find another device that satisfies its requirements, the connection is delayed due to the repetition of processes. It is possible to rapidly connect to a device without repetition through the selection of the optimal device using the proposed method. Consequently, the proposed method and scenarios are advantageous in that they enable efficient content identification and delivery in a content-centric Internet of Things (IoT environment, in which multiple mobile devices coexist.

  16. Insights into Motivating Internet Users towards Internet Banking

    OpenAIRE

    J. Ramola Premalatha

    2016-01-01

    Internet banking has evolved from helping customers meet their basic banking needs to meeting their sophisticated needs. In recent years, the number of internet banking users has been increasing exponentially. As customers get more and more educated, getting insight about internet banking has become a primary area of concern for all leading banks in India. Hence, the study is made to analyse the perception of customers specifically who are computer literate, in a semi-urban area about interne...

  17. The Internet Engineering Task Force and The Future of Internet

    OpenAIRE

    Baccelli , Emmanuel; Clausen , Thomas Heide; Jacquet , Philippe

    2009-01-01

    International audience; If one wants to identify where ideas and initiatives regarding the Internet are being confronted, the Internet Engineering Task Force (IETF) is unavoidable. Created in 1986 by US government agencies (DoD, Department of Energy, NASA, NSF) to supervise the design and deployment of Internet protocols, it was initially open only for US government funded researchers. Early 1987 saw a dozen of industry representatives invited, and in a matter of months, the IETF was opened t...

  18. Internet Freedom in Asia: Case of Internet Censorship in China

    OpenAIRE

    MONGGILO, ZAINUDDIN MUDA

    2016-01-01

    Internet can develop the communication and information freedom on society but unfortunately in some nations, especially in Asia, it cannot be fully accessed because of government censorship. This report explains the relationship between the practice of Internet censorship imposed by the Chinese government and the freedom of its citizens (in the internet surfing experience) as the realization of human rights in the freedom of expression and opinion (seek, receive-use, and communicate informati...

  19. Internet gambling is a predictive factor of Internet addictive behavior.

    Science.gov (United States)

    Critselis, Elena; Janikian, Mari; Paleomilitou, Noni; Oikonomou, Despoina; Kassinopoulos, Marios; Kormas, George; Tsitsika, Artemis

    2013-12-01

    Adolescent Internet gambling is associated with concomitant addictive behaviors. This study aimed to assess the prevalence of Internet gambling practices, its impact upon psychosocial development and to evaluate the association between gambling practices and Internet addictive behavior among Cypriot adolescents. A cross-sectional study was conducted in a convenience sample (n = 805) of adolescents attending selected public schools (9th and 10th grades) in Cyprus. Anonymous self-completed questionnaires were used including the Internet Addiction Test and the Strengths and Difficulties Questionnaire. Among the study population (n = 805), approximately one third (n = 28; 34.9%) reported Internet gambling. Internet gamblers were twice as likely to utilize Internet café portals (adjusted odds ratio for gender and age, AOR: 2.13; 95% confidence interval, 95% CI: 1.56-2.91) for interactive game-playing (AOR: 6.84; 95% CI: 4.23-11.07), chat-rooms (AOR: 2.57; 95% CI: 1.31-4.85), and retrieval of sexual information (AOR: 1.99; 95% CI: 1.42-2.81). Among Internet gamblers 26.0% (n = 73) reported borderline addictive Internet use and 4.3% (n = 12) addictive behavior. Internet gamblers more often had comprehensive psychosocial and emotional maladjustment (AOR: 4.00; 95% CI: 1.97-8.13), including Abnormal Conduct Problems (AOR: 3.26; 95% CI: 2.00-5.32), Emotional Symptoms (AOR: 1.78; 95% CI: 1.02-3.11), and Peer Problems (AOR: 2.44; 95% CI: 1.08-5.48) scores. The multivariate regression analyses indicated that the single independent predictor associated with Internet addictive behavior was Internet gambling (AOR: 5.66; 95% CI: 1.45-22.15). Internet gambling is associated with addictive Internet use, as well as emotional maladjustment and behavioral problems, among Cypriot adolescents. Longitudinal studies are needed to elucidate whether Internet gambling constitutes a risk factor for the development of Internet addictive behavior among adolescents.

  20. [Interrelations Between Adolescent Problematic Internet Use and Parental Internet Mediation].

    Science.gov (United States)

    Kammerl, Rudolf; Wartberg, Lutz

    2018-02-01

    Interrelations Between Adolescent Problematic Internet Use and Parental Internet Mediation Everyday life of adolescents and their parents is increasingly characterized by digital media usage (also referred to as "process of mediatization"). In the current study, associations between problematic Internet use of the adolescents (as a possible consequence of the process of mediatization) and parental media education were explored. For this purpose, throughout Germany 1,095 family dyads (an adolescent and a related parent) were investigated with a standardized questionnaire measuring different aspects of parental media education and adolescent problematic Internet use. We conducted two multiple linear regression analyses (dimensional approach) with adolescent problematic Internet use based on self-ratings (model 1, corrected R 2 = 0.18) and parental assessment (model 2, corrected R 2 = 0.24) as response variables. Consistently for self- and parental ratings, adolescent problematic Internet use was statistically significant related to male gender (of the adolescent), a more frequent inconsistent media education (adolescents' and parents' perspective) and a stronger monitoring (parents' perspective). Additionally, we observed associations between the parental rating of adolescent problematic Internet use and a less frequent active and restrictive Internet Mediation (parents' perspective). The findings of the present study show the importance of parental media education for problematic Internet use in adolescence and especially, the role of inconsistent media education should be investigated again in further studies.

  1. Frequency of Internet, Social Network and Mobile Devices use in Prospective Teachers from Faculty of Education

    Directory of Open Access Journals (Sweden)

    Murat Tezer

    2017-11-01

    Full Text Available The basic aim of this study was to determine the relationship between university students’ frequency of internet use, duration of internet connection, environments that they connect to the internet, duration use of mobile devices, frequency of social networking leisure activities and internet addiction levels. The participants included a total of 363 university students of whom 255 were female and 108 were male. Quantitative research methods were used in this study. A survey was developed by the researchers and administered to the students. Based on statistical analysis; it was revealed that the frequency of internet use was every day throughout the week, students frequently stayed connected to the internet at home with their computers and the frequency of mobile devices and social network use was found as “Always”. In addition, university students stated that they connected to the internet in their leisure time.

  2. Neural Network-Based Resistance Spot Welding Control and Quality Prediction

    Energy Technology Data Exchange (ETDEWEB)

    Allen, J.D., Jr.; Ivezic, N.D.; Zacharia, T.

    1999-07-10

    This paper describes the development and evaluation of neural network-based systems for industrial resistance spot welding process control and weld quality assessment. The developed systems utilize recurrent neural networks for process control and both recurrent networks and static networks for quality prediction. The first section describes a system capable of both welding process control and real-time weld quality assessment, The second describes the development and evaluation of a static neural network-based weld quality assessment system that relied on experimental design to limit the influence of environmental variability. Relevant data analysis methods are also discussed. The weld classifier resulting from the analysis successfldly balances predictive power and simplicity of interpretation. The results presented for both systems demonstrate clearly that neural networks can be employed to address two significant problems common to the resistance spot welding industry, control of the process itself, and non-destructive determination of resulting weld quality.

  3. MEDUSA - An overset grid flow solver for network-based parallel computer systems

    Science.gov (United States)

    Smith, Merritt H.; Pallis, Jani M.

    1993-01-01

    Continuing improvement in processing speed has made it feasible to solve the Reynolds-Averaged Navier-Stokes equations for simple three-dimensional flows on advanced workstations. Combining multiple workstations into a network-based heterogeneous parallel computer allows the application of programming principles learned on MIMD (Multiple Instruction Multiple Data) distributed memory parallel computers to the solution of larger problems. An overset-grid flow solution code has been developed which uses a cluster of workstations as a network-based parallel computer. Inter-process communication is provided by the Parallel Virtual Machine (PVM) software. Solution speed equivalent to one-third of a Cray-YMP processor has been achieved from a cluster of nine commonly used engineering workstation processors. Load imbalance and communication overhead are the principal impediments to parallel efficiency in this application.

  4. Realization of Intelligent Household Appliance Wireless Monitoring Network Based on LEACH Protocol

    Directory of Open Access Journals (Sweden)

    Weilong ZHOU

    2014-06-01

    Full Text Available The intelligent household appliance wireless monitoring network can real-time monitor the apparent power and power factor of various household appliances in different indoor regions, and can realize the real-time monitoring on the household appliance working status and performance. The household appliance wireless monitoring network based on LEACH protocol is designed in the paper. Firstly, the basic idea of LEACH routing algorithm is proposed. Aiming at the node-distribution feature of intelligent home, the selection of cluster head in the routing algorithm and the data transmission method at the stable communication phase is modified. Moreover, the hardware circuit of power acquisition and power factor measurement is designed. The realization of wireless monitoring network based on CC2530 is described, each module and the whole system were conducted the on-line debugging. Finally, the system is proved to meet the practical requirement through the networking test.

  5. Design of Artificial Neural Network-Based pH Estimator

    Directory of Open Access Journals (Sweden)

    Shebel A. Alsabbah

    2010-10-01

    Full Text Available Taking into consideration the cost, size and drawbacks might be found with real hardware instrument for measuring pH values such that the complications of the wiring, installing, calibrating and troubleshooting the system, would make a person look for a cheaper, accurate, and alternative choice to perform the measuring operation, Where’s hereby, a feedforward artificial neural network-based pH estimator has to be proposed. The proposed estimator has been designed with multi- layer perceptrons. One input which is a measured base stream and two outputs represent pH values at strong base and strong/weak acids for a titration process. The created data base has been obtained with consideration of temperature variation. The final numerical results ensure the effectiveness and robustness of the design neural network-based pH estimator.

  6. A Bootstrap Neural Network Based Heterogeneous Panel Unit Root Test: Application to Exchange Rates

    OpenAIRE

    Christian de Peretti; Carole Siani; Mario Cerrato

    2010-01-01

    This paper proposes a bootstrap artificial neural network based panel unit root test in a dynamic heterogeneous panel context. An application to a panel of bilateral real exchange rate series with the US Dollar from the 20 major OECD countries is provided to investigate the Purchase Power Parity (PPP). The combination of neural network and bootstrapping significantly changes the findings of the economic study in favour of PPP.

  7. Machine learning of radial basis function neural network based on Kalman filter: Introduction

    Directory of Open Access Journals (Sweden)

    Vuković Najdan L.

    2014-01-01

    Full Text Available This paper analyzes machine learning of radial basis function neural network based on Kalman filtering. Three algorithms are derived: linearized Kalman filter, linearized information filter and unscented Kalman filter. We emphasize basic properties of these estimation algorithms, demonstrate how their advantages can be used for optimization of network parameters, derive mathematical models and show how they can be applied to model problems in engineering practice.

  8. Centralized light-source optical access network based on polarization multiplexing.

    Science.gov (United States)

    Grassi, Fulvio; Mora, José; Ortega, Beatriz; Capmany, José

    2010-03-01

    This paper presents and demonstrates a centralized light source optical access network based on optical polarization multiplexing technique. By using two optical sources emitting light orthogonally polarized in the Central Node for downstream and upstream operations, the Remote Node is kept source-free. EVM values below telecommunication standard requirements have been measured experimentally when bidirectional digital signals have been transmitted over 10 km of SMF employing subcarrier multiplexing technique in the electrical domain.

  9. Research on trust calculation of wireless sensor networks based on time segmentation

    Science.gov (United States)

    Su, Yaoxin; Gao, Xiufeng; Qiao, Wenxin

    2017-05-01

    Because the wireless sensor network is different from the traditional network characteristics, it is easy to accept the intrusion from the compromise node. The trust mechanism is the most effective way to defend against internal attacks. Aiming at the shortcomings of the existing trust mechanism, a method of calculating the trust of wireless sensor networks based on time segmentation is proposed. It improves the security of the network and extends the life of the network

  10. Neural Network based Minimization of BER in Multi-User Detection in SDMA

    OpenAIRE

    VENKATA REDDY METTU; KRISHAN KUMAR,; SRIKANTH PULLABHATLA

    2011-01-01

    In this paper we investigate the use of neural network based minimization of BER in MUD. Neural networks can be used for linear design, Adaptive prediction, Amplitude detection, Character Recognition and many other applications. Adaptive prediction is used in detecting the errors caused in AWGN channel. These errors are rectified by using Widrow-Hoff algorithm by updating their weights andAdaptive prediction methods. Both Widrow-Hoff and Adaptive prediction have been used for rectifying the e...

  11. Development of a simulated Internet for education

    Directory of Open Access Journals (Sweden)

    Andrew Smith

    2011-02-01

    Full Text Available This paper describes the early stages of research and development of an educational environment designed to enable learners to participate in remote, group based large-scale activities based on local area network and wide area network technologies working on a range of systems and within different learning situations, such as in class group work, remote group work or independent learning. The environment covers specifically routing, switching and wireless principles in the domain of computer networking. This is accomplished using the ‘multiuser functionality' feature found within the Cisco Academy programme, Packet Tracer application. The initial research explores how a ‘virtual Internet' can be implemented to enable learners to engage with the scale and complexity of the Internet without interacting with active routing infrastructures thereby interfering with others. Different communities of interest from Cisco Systems as well as their Academy Programme academic affiliates have contributed to the development of the resource as well as to research into how individuals participate in learning as a result of using this software. This paper tells the story of the iterative action research process with two initial learning situations of ‘remote many' participation and ‘in class many' participation in a large scale networking exercise. As research is still in the development process, this paper explores the experiences and observations gathered from engaging with the two learning scenarios, describing how each interaction exercise was perceived by participants and their educators. Initial findings from both activities indicate that the concept of an ‘Internet on the Internet' to deliver simulated practical learning has considerable potential and brings an alternative dimension to the practical learning experience. Research is ongoing, with the work in this paper informing the continual iterative process.

  12. Markkinointisuunnitelma - Internet startup

    OpenAIRE

    Koivu, Sami; Kantonen, Erno

    2011-01-01

    Tämän toiminnallisen opinnäytetyön aiheena oli luoda markkinointisuunnitelma kehitteillä olevalle Internet-palvelulle, joka on digitaalisesti toimiva yhteisöllinen musiikkipalvelu. Palvelun mahdolliset liiketoimintamahdollisuudet perustuvat lähes täysin suureen käyttäjämäärään. Siksi työn tarkoituksena oli selvittää, miten palvelulle saavutetaan mahdollisimman paljon käyttäjiä, ja miten nämä käyttäjät aktivoidaan tuottamaan lisäarvoa palvelulle. Työn lopullisena tavoitteena oli markkinointisu...

  13. Towards a quantum internet

    Science.gov (United States)

    Dür, Wolfgang; Lamprecht, Raphael; Heusler, Stefan

    2017-07-01

    A long-range quantum communication network is among the most promising applications of emerging quantum technologies. We discuss the potential of such a quantum internet for the secure transmission of classical and quantum information, as well as theoretical and experimental approaches and recent advances to realize them. We illustrate the involved concepts such as error correction, teleportation or quantum repeaters and consider an approach to this topic based on catchy visualizations as a context-based, modern treatment of quantum theory at high school.

  14. Internet congestion control

    CERN Document Server

    Varma, Subir

    2015-01-01

    Internet Congestion Control provides a description of some of the most important topics in the area of congestion control in computer networks, with special emphasis on the analytical modeling of congestion control algorithms. The field of congestion control has seen many notable advances in recent years and the purpose of this book, which is targeted towards the advanced and intermediate reader, is to inform about the most important developments in this area. The book should enable the reader to gain a good understanding of the application of congestion control theory to a number of applic

  15. The Internet Pollution

    Institute of Scientific and Technical Information of China (English)

    唐宁宁

    2005-01-01

    Life today has brought new problems. As we know, there are fourterrible pollutions in the world: water pollution, noise pollution, air pol-lution and rubbish pollution. Water pollution kills our fish and pollutesour drinking water. Noise pollution makes us talk louder and become angry more easily. Air pollution makes us hold our breath longer and be badto all living things in the world. Rubbish pollution often makes our livingenvironment much dirtier. But I think that the Internet pollution is anothernew pollution in the world.

  16. ATM and Internet protocol

    CERN Document Server

    Bentall, M; Turton, B

    1998-01-01

    Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o

  17. PENGGUNAAN TEKNOLOGI INTERNET DALAM BISNIS

    OpenAIRE

    Oviliani Yuliana

    2000-01-01

    The uses of internet in business are for information exchange, product catalog, promotion media, electronic mail, bulletin boards, electronic questioner, and mailing list. Internet can also be used for dialog, discussion, and consultation with customer online, therefore consumer can be proactively and interactively involved in designing, developing, marketing, and selling products. There are 2 methods for marketing products via internet, which are push and pull marketing. The advantages of in...

  18. Penggunaan Teknologi Internet Dalam Bisnis

    OpenAIRE

    Yuliana, Oviliani

    2000-01-01

    The uses of internet in business are for information exchange, product catalog, promotion media, electronic mail, bulletin boards, electronic questioner, and mailing list. Internet can also be used for dialog, discussion, and consultation with customer online, therefore consumer can be proactively and interactively involved in designing, developing, marketing, and selling products. There are 2 methods for marketing products via internet, which are push and pull marketing. The advantages of in...

  19. Reports on internet traffic statistics

    OpenAIRE

    Hoogesteger, Martijn; de Oliveira Schmidt, R.; Sperotto, Anna; Pras, Aiko

    2013-01-01

    Internet traffic statistics can provide valuable information to network analysts and researchers about the way nowadays networks are used. In the past, such information was provided by Internet2 in a public website called Internet2 NetFlow: Weekly Reports. The website reported traffic statistics from the Abilene network on a weekly basis. At that time, the network connected 230 research institutes with a 10Gb/s link. Although these reports were limited to the behavior of the Albeline's users,...

  20. Internet technologies and information services

    CERN Document Server

    Miller, Joseph

    2014-01-01

    Internet Technologies and Information Services: Second Edition is a vital asset to students preparing for careers in library and information science and provides expanded coverage to important new developments while still covering Internet foundations. In addition to networking, the Internet, HTML, web design, web programming, XML, and web searching, this new edition covers additional topics such as cloud computing, content management systems, eBook technologies, mobile technologies and applications, relational database management systems (RDMS), open source software, and virtual priva

  1. Internet ware cloud computing :Challenges

    OpenAIRE

    Qamar, S; Lal, Niranjan; Singh, Mrityunjay

    2010-01-01

    After decades of engineering development and infrastructural investment, Internet connections have become commodity product in many countries, and Internet scale “cloud computing” has started to compete with traditional software business through its technological advantages and economy of scale. Cloud computing is a promising enabling technology of Internet ware Cloud Computing is termed as the next big thing in the modern corporate world. Apart from the present day software and technologies,...

  2. Young children as Internet users

    OpenAIRE

    Daramola, O. (Oladipo)

    2015-01-01

    Abstract In the current available research concerning the real usage of the internet among the young children, most researchers particularly emphases on the risk and opportunities regarding the active use of the internet. Limited experimental research emphases on the role-based and impact of the parent guidelines in the context. In the current studies, internet parenting methods are well-defined and operationalized to study...

  3. Security in Internet of Things

    DEFF Research Database (Denmark)

    Kidmose, Egon; Pedersen, Jens Myrup

    2017-01-01

    2016 was a year when the discussions about Internet of Things and security gained significant grounds. Not only was it yet another year where the challenges of cybercrime became visible to the general public, maybe the presumable Russian hacking of Hillary Clinton's emails as the most prominent...... example, but at the end of the year the Mirai Botnet used Internet of Things devices to perform successful attacks on several Internet infrastructure points....

  4. Internet advertising effectiveness measurement model

    OpenAIRE

    Marcinkevičiūtė, Milda

    2007-01-01

    The research object of the master thesis is internet advertising effectiveness measurement. The goal of the work is after making theoretical studies of internet advertising effectiveness measurement (theoretical articles, practical researches and cetera), formulate the conceptual IAEM model and examine it empirically. The main tasks of the work are: to analyze internet advertising, it’s features, purposes, spread formats, functions, advantages and disadvantages; present the effectiveness of i...

  5. Untangling the Relationship between Internet Anxiety and Internet Identification in Students: The Role of Internet Self-Efficacy

    Science.gov (United States)

    Hsiao, Bo; Zhu, Yu-Qian; Chen, Li-Yueh

    2017-01-01

    Introduction: Previous research has identified Internet anxiety and Internet identification as two important factors that predict usage and experience on the Internet. However, little is known about the relationship between them. This research aimed to untangle the relationship between Internet anxiety and Internet identification, and to…

  6. Authentication Protocols for Internet of Things: A Comprehensive Survey

    Directory of Open Access Journals (Sweden)

    Mohamed Amine Ferrag

    2017-01-01

    Full Text Available In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail. These protocols are categorized based on the target environment: (1 Machine to Machine Communications (M2M, (2 Internet of Vehicles (IoV, (3 Internet of Energy (IoE, and (4 Internet of Sensors (IoS. Threat models, countermeasures, and formal security verification techniques used in authentication protocols for the IoT are presented. In addition a taxonomy and comparison of authentication protocols that are developed for the IoT in terms of network model, specific security goals, main processes, computation complexity, and communication overhead are provided. Based on the current survey, open issues are identified and future research directions are proposed.

  7. A new Information publishing system Based on Internet of things

    Science.gov (United States)

    Zhu, Li; Ma, Guoguang

    2018-03-01

    A new information publishing system based on Internet of things is proposed, which is composed of four level hierarchical structure, including the screen identification layer, the network transport layer, the service management layer and the publishing application layer. In the architecture, the screen identification layer has realized the internet of screens in which geographically dispersed independent screens are connected to the internet by the customized set-top boxes. The service management layer uses MQTT protocol to implement a lightweight broker-based publish/subscribe messaging mechanism in constrained environments such as internet of things to solve the bandwidth bottleneck. Meanwhile the cloud-based storage technique is used to storage and manage the promptly increasing multimedia publishing information. The paper has designed and realized a prototype SzIoScreen, and give some related test results.

  8. Towards the internet of services

    CERN Document Server

    Wahlster, Wolfgang; Wess, Stefan; Friedrich, Hermann; Widenka, Thomas

    2014-01-01

    The Internet of Services and the Internet of Things are major building blocks of the Future Internet. The digital enterprise of the future is based not only on mobile, social, and cloud technologies, but also on se­mantic technologies and the future Internet of Everything. Semantic technologies now enable mass cus­tomization for the delivery of goods and services that meet individual customer needs and tastes with near mass production efficiency and reliability. This is creating a competitive advantage in the industrial econ­omy, the service economy, and the emerging data economy, leading to

  9. Internet Civil Defense: Feasibility Study

    National Research Council Canada - National Science Library

    LaPorte, Ron

    2002-01-01

    ... (and ultimately, international) system of information sharing, education and analysis via the Internet to connect the general public, community networked cells, emergency responders, local and national investigative authorities...

  10. Library resources on the Internet

    Science.gov (United States)

    Buchanan, Nancy L.

    1995-07-01

    Library resources are prevalent on the Internet. Library catalogs, electronic books, electronic periodicals, periodical indexes, reference sources, and U.S. Government documents are available by telnet, Gopher, World Wide Web, and FTP. Comparatively few copyrighted library resources are available freely on the Internet. Internet implementations of library resources can add useful features, such as full-text searching. There are discussion lists, Gophers, and World Wide Web pages to help users keep up with new resources and changes to existing ones. The future will bring more library resources, more types of library resources, and more integrated implementations of such resources to the Internet.

  11. A NEURAL NETWORK BASED TRAFFIC-AWARE FORWARDING STRATEGY IN NAMED DATA NETWORKING

    OpenAIRE

    Parisa Bazmi; Manijeh Keshtgary

    2016-01-01

    Named Data Networking (NDN) is a new Internet architecture which has been proposed to eliminate TCP/IP Internet architecture restrictions. This architecture is abstracting away the notion of host and working based on naming datagrams. However, one of the major challenges of NDN is supporting QoS-aware forwarding strategy so as to forward Interest packets intelligently over multiple paths based on the current network condition. In this paper, Neural Network (NN) Based Traffic-aware Forwarding ...

  12. The Internet and the medical radiation science practitioner

    Energy Technology Data Exchange (ETDEWEB)

    Shanahan, Madeleine [School of Medical Science, RMIT University, Bundoora, Victoria 3083 (Australia)], E-mail: mshanahan@rmit.edu.au; Herrington, Anthony; Herrington, Jan [Faculty of Education, University of Wollongong, New South Wales (Australia)

    2009-08-15

    Purpose: The Internet is an important information source for health practitioners providing immediate access to the most current health and medical information. Factors limiting practitioner access to the Internet have been identified and the literature shows that access to the Internet varies across and within health professions. There is therefore a need for each health profession to investigate practitioner access to the Internet. There has been, however, no identified empirical research investigating medical radiation science (MRS) practitioner access to or use of the Internet. This research sought to establish the professional use of Internet-based tools by Australian MRS practitioners and issues affecting access to the Internet within MRS workplaces. Methods: Qualitative and quantitative approaches were used in this research. These included interviews with 28 MRS practitioners from the four areas of specialisation, namely nuclear medicine, radiation therapy, radiography and sonography and a survey of MRS practitioners. In 2007 a 4-page postal survey was sent to a random sample of 1142 MRS practitioners with a response rate of 32.8%. Results: The Internet is an important information source widely used by MRS practitioners. MRS practitioners search the Internet (87%), access specific web pages (86%), use email (82%) and listservs (39.4%) to update their professional knowledge. It was evident that access to the Internet within the workplace varied within the MRS profession. Whilst the majority (96.4%) of MRS practitioners had some level of access to the Internet in their workplace, factors shown to affect practitioner access were workplace setting (p = 0.000), work environment (p = 0.000), and geographic location (p = 0.025). The majority of clinical workplaces (81%) did not provide practitioners with remote access to electronic resources available in the workplace such as e-journals and databases. Conclusions: This research provides baseline data to the MRS

  13. The Internet and the medical radiation science practitioner

    International Nuclear Information System (INIS)

    Shanahan, Madeleine; Herrington, Anthony; Herrington, Jan

    2009-01-01

    Purpose: The Internet is an important information source for health practitioners providing immediate access to the most current health and medical information. Factors limiting practitioner access to the Internet have been identified and the literature shows that access to the Internet varies across and within health professions. There is therefore a need for each health profession to investigate practitioner access to the Internet. There has been, however, no identified empirical research investigating medical radiation science (MRS) practitioner access to or use of the Internet. This research sought to establish the professional use of Internet-based tools by Australian MRS practitioners and issues affecting access to the Internet within MRS workplaces. Methods: Qualitative and quantitative approaches were used in this research. These included interviews with 28 MRS practitioners from the four areas of specialisation, namely nuclear medicine, radiation therapy, radiography and sonography and a survey of MRS practitioners. In 2007 a 4-page postal survey was sent to a random sample of 1142 MRS practitioners with a response rate of 32.8%. Results: The Internet is an important information source widely used by MRS practitioners. MRS practitioners search the Internet (87%), access specific web pages (86%), use email (82%) and listservs (39.4%) to update their professional knowledge. It was evident that access to the Internet within the workplace varied within the MRS profession. Whilst the majority (96.4%) of MRS practitioners had some level of access to the Internet in their workplace, factors shown to affect practitioner access were workplace setting (p = 0.000), work environment (p = 0.000), and geographic location (p = 0.025). The majority of clinical workplaces (81%) did not provide practitioners with remote access to electronic resources available in the workplace such as e-journals and databases. Conclusions: This research provides baseline data to the MRS

  14. Strategies for building a customer base on the internet: Symbiotic marketing

    OpenAIRE

    Lockett, A; Blackman, ID

    2001-01-01

    The advent of the Internet is leading a re-evaluation of existing business practice as the methods employed in a non-virtual world may not necessarily be as effective in a virtual environment. The present paper examines the different strategic options facing organizations as they attempt to build a customer base on the Internet. The traditional site-centric approach of directing traffic to a central Internet site suffers from the problems of the increasing costs and decreasing effectiveness o...

  15. The Journal, the Internet, and Teaching

    Science.gov (United States)

    Lagowski, J. J.

    1995-11-01

    critiques of the original piece of information, but, in general, we have no way of establishing the credentials of the critics. It may take an enormous amount of time for an Internet publication to accrue a critique that is equivalent to that received by a equivalent quantum of information in a peer reviewed, paper-oriented journal. It is difficult to decide (unless you already know because of your expertise) when an Internet publication has "passed the test," in contrast to the paper published in a refereed journal. When the printed paper appears, most of the critics associated with that journal have agreed (through the editorial process) that it is probably worthwhile publishing. The appearance of an Internet paper does not carry the same implication since anyone can put anything on the Internet. Anyone who has a computer and a network connection is empowered to publish on the Internet, and often does. Putting a neophyte--a beginning student--in this kind of environment with little or no guidance would seem to abrogate certain responsibilities that teachers have to guide a student's intellectual growth and ability to make critical judgments. This is not an argument against the use of the Internet for teaching; rather it is a plea to use this new tool with care lest our students be harmed intellectually. "As the twig is bent. . ." The Internet can be likened to an open library where anyone can come in and put a book or a note on a scrap of paper anywhere on the shelves. Further, anyone can go in anytime they wish and make a copy of anything to take away. Without the value added by a librarian, who brings a known (if not necessarily perfect) order to the holdings, the open library is virtually worthless to people who have specific tasks to perform, e.g., finding the NMR spectrum of (or anything characteristic of) a specific compound. Unless we learn how to assure the usefulness and reliability of information on the Internet, one of the era's most valuable resources may

  16. Internet Uses and Gratifications: Understanding Motivations for Using the Internet.

    Science.gov (United States)

    Ko, Hanjun

    In this study, the uses and gratifications theory was applied to investigate the Internet users' motivations and their relationship with attitudes toward the Internet as well as types of Web site visited by users. Subjects were 185 college students who completed a self-report questionnaire. Four motivations and five types of Web sites were…

  17. Gender differences in Internet identification and Internet anxiety ...

    African Journals Online (AJOL)

    This exploratory study investigated gender differences in Internet identification and Internet anxiety. A sample of 231 students (138 females and 93 males) from four different schools participated in the study. A structured interview schedule was used to collect data. Factor analysis was carried out to test for construct validity.

  18. INTERNET5: Shaping an Internet for women's empowerment | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2017-12-08

    Dec 8, 2017 ... Poor women, girls, and other marginalized communities in the developing ... INTERNET5 — an Internet that helps achieve SDG 5 on gender equality — aims to support ... To ensure that the benefits of broadband are more evenly ... The project seeks to provide an effective and low-cost educational model ...

  19. Older Adolescent's Perceptions of Personal Internet Use

    Science.gov (United States)

    Koff, Rosalind N.; Moreno, Megan A.

    2013-01-01

    Internet use is widespread among the older adolescent population. Given the pervasiveness and frequency of internet use, concerns have been raised regarding the impact of excess internet use on adolescent health. In order to understand the impact of internet use on health, we must have accurate and reliable measures of internet use. This study…

  20. Internet Addiction Among Elementary and Middle School Students in China: A Nationally Representative Sample Study

    Science.gov (United States)

    Li, Yajun; Zhang, Xinghui; Lu, Furong; Zhang, Qin

    2014-01-01

    Abstract The purpose of this study was to examine the prevalence of Internet addiction in a nationally representative sample of Chinese elementary and middle school students and to investigate Internet addiction among Internet users with different usages. The data were from the National Children's Study of China (NCSC) in which 24,013 fourth- to ninth-grade students were recruited from 100 counties in 31 provinces in China. Only 54.2% of the students had accessed the Internet. According to the criteria of Young's Diagnostic Questionnaire (YDQ), an eight-item instrument, the prevalence of Internet addiction in the total sample was 6.3%, and among Internet users was 11.7%. Among the Internet users, males (14.8%) and rural students (12.1%) reported Internet addiction more than females (7.0%) and urban students (10.6%). The percentage of Internet addicts in elementary school students (11.5%) was not significantly lower than the percentage of middle school students (11.9%). There was no statistically significant difference between the four geographical regions (9.6%, 11.5%, 12.3%, 11.1%) characterized by different levels of economy, health, education, and social environment. As the frequency of Internet use and time spent online per week increased, the percentage of Internet addicts increased. When considering the location and purpose of Internet use, the percentage of Internet addicts was highest in adolescents typically surfing in Internet cafes (18.1%) and playing Internet games (22.5%). PMID:23971432

  1. A study on efficient detection of network-based IP spoofing DDoS and malware-infected Systems.

    Science.gov (United States)

    Seo, Jung Woo; Lee, Sang Jin

    2016-01-01

    Large-scale network environments require effective detection and response methods against DDoS attacks. Depending on the advancement of IT infrastructure such as the server or network equipment, DDoS attack traffic arising from a few malware-infected systems capable of crippling the organization's internal network has become a significant threat. This study calculates the frequency of network-based packet attributes and analyzes the anomalies of the attributes in order to detect IP-spoofed DDoS attacks. Also, a method is proposed for the effective detection of malware infection systems triggering IP-spoofed DDoS attacks on an edge network. Detection accuracy and performance of the collected real-time traffic on a core network is analyzed thru the use of the proposed algorithm, and a prototype was developed to evaluate the performance of the algorithm. As a result, DDoS attacks on the internal network were detected in real-time and whether or not IP addresses were spoofed was confirmed. Detecting hosts infected by malware in real-time allowed the execution of intrusion responses before stoppage of the internal network caused by large-scale attack traffic.

  2. Optimization of Indoor Thermal Comfort Parameters with the Adaptive Network-Based Fuzzy Inference System and Particle Swarm Optimization Algorithm

    Directory of Open Access Journals (Sweden)

    Jing Li

    2017-01-01

    Full Text Available The goal of this study is to improve thermal comfort and indoor air quality with the adaptive network-based fuzzy inference system (ANFIS model and improved particle swarm optimization (PSO algorithm. A method to optimize air conditioning parameters and installation distance is proposed. The methodology is demonstrated through a prototype case, which corresponds to a typical laboratory in colleges and universities. A laboratory model is established, and simulated flow field information is obtained with the CFD software. Subsequently, the ANFIS model is employed instead of the CFD model to predict indoor flow parameters, and the CFD database is utilized to train ANN input-output “metamodels” for the subsequent optimization. With the improved PSO algorithm and the stratified sequence method, the objective functions are optimized. The functions comprise PMV, PPD, and mean age of air. The optimal installation distance is determined with the hemisphere model. Results show that most of the staff obtain a satisfactory degree of thermal comfort and that the proposed method can significantly reduce the cost of building an experimental device. The proposed methodology can be used to determine appropriate air supply parameters and air conditioner installation position for a pleasant and healthy indoor environment.

  3. A Space-Time Network-Based Modeling Framework for Dynamic Unmanned Aerial Vehicle Routing in Traffic Incident Monitoring Applications

    Directory of Open Access Journals (Sweden)

    Jisheng Zhang

    2015-06-01

    Full Text Available It is essential for transportation management centers to equip and manage a network of fixed and mobile sensors in order to quickly detect traffic incidents and further monitor the related impact areas, especially for high-impact accidents with dramatic traffic congestion propagation. As emerging small Unmanned Aerial Vehicles (UAVs start to have a more flexible regulation environment, it is critically important to fully explore the potential for of using UAVs for monitoring recurring and non-recurring traffic conditions and special events on transportation networks. This paper presents a space-time network- based modeling framework for integrated fixed and mobile sensor networks, in order to provide a rapid and systematic road traffic monitoring mechanism. By constructing a discretized space-time network to characterize not only the speed for UAVs but also the time-sensitive impact areas of traffic congestion, we formulate the problem as a linear integer programming model to minimize the detection delay cost and operational cost, subject to feasible flying route constraints. A Lagrangian relaxation solution framework is developed to decompose the original complex problem into a series of computationally efficient time-dependent and least cost path finding sub-problems. Several examples are used to demonstrate the results of proposed models in UAVs’ route planning for small and medium-scale networks.

  4. Does the Internet Reduce Corruption?

    DEFF Research Database (Denmark)

    Andersen, Thomas Barnebeck; Bentzen, Jeanet Sinding; Dalgaard, Carl-Johan Lars

    2011-01-01

    of Internet diffusion. A natural phenomenon causing power disruptions is lightning activity, which makes lightning a viable instrument for Internet diffusion. Using ground-based lightning detection censors as well as global satellite data, we construct lightning density data for the contiguous U.S. states...

  5. Rocket Science for the Internet

    Science.gov (United States)

    2000-01-01

    Rainfinity, a company resulting from the commercialization of Reliable Array of Independent Nodes (RAIN), produces the product, Rainwall. Rainwall runs a cluster of computer workstations, creating a distributed Internet gateway. When Rainwall detects a failure in software or hardware, traffic is shifted to a healthy gateway without interruptions to Internet service. It more evenly distributes workload across servers, providing less down time.

  6. Internet Governance and National Security

    Science.gov (United States)

    2012-01-01

    by the International Orga­ nization of Standards for the Open Systems Interconnection ( OSI ) model as the basis of Internet networking. A brief...or “ride on top” of the Internet. A corporate LAN , such as “.company–name” for internal company use, is an example of the first. When a group wishes

  7. The Internet of Hackable Things

    OpenAIRE

    Giaretta, Alberto; Mazzara, Manuel; Dragoni, Nicola

    2017-01-01

    The Internet of Things makes possible to connect each everyday object to the Internet, making computing pervasive like never before. From a security and privacy perspective, this tsunami of connectivity represents a disaster, which makes each object remotely hackable. We claim that, in order to tackle this issue, we need to address a new challenge in security: education.

  8. Bad Neighborhoods on the Internet

    NARCIS (Netherlands)

    Moreira Moura, G.C.; Sadre, R.; Pras, A.

    2014-01-01

    Analogous to the real world, sources of malicious activities on the Internet tend to be concentrated in certain networks instead of being evenly distributed. In this article, we formally define and frame such areas as Internet Bad Neighborhoods. By extending the reputation of malicious IP addresses

  9. The Internet of Hackable Things

    DEFF Research Database (Denmark)

    Dragoni, Nicola; Giaretta, Alberto; Mazzara, Manuel

    2017-01-01

    The Internet of Things makes possible to connect each everyday object to the Internet, making computing pervasive like never before. From a security and privacy perspective, this tsunami of connectivity represents a disaster, which makes each object remotely hackable. We claim that, in order...

  10. Russian Initiatives in Internet Governance

    Directory of Open Access Journals (Sweden)

    Sergey Sergeevich Shirin

    2014-01-01

    Full Text Available The article is devoted to the research of Russian initiatives concerning its participation in international system of Internet governance. In the research, conceptual and theoretic basis for participation of state governments in Internet governance is given, academic discourse of this issue is assessed, the review of main Russian initiatives made from 2005 (since the second stage of the World Summit on Information Society till the present day is carried out. The conclusion is made that the most successful Internet governance initiative of Russia is the implementation of cyrillic top level domains. Much less successful are Russian attempts to reconstruct existing organizational structure of Internet governance. Russian policy is assessed as a policy of preferring loud statements and PR rather than real influence on development of Internet technologies. Russia consideres Internet as political resource and tries to increase its influence on decision making process on a political, not operational level of Internet governance. The author states that federal government of the United States of America has fully lost the control on the domain name systems. These functions are going to be given to the private sector, while ICANN, which was established according to the Memorandum of Understanding/Joint Project Agreement with U.S. Department of Commerce, is becoming a truly independent international organization. Considering this, the author comes to the conclusion that political transformations for the sake of Russia are already made. He also forecast that next initiatives of Russia will be directed to the segmentation of the Internet.

  11. The Marketing Mix in the Online Environment

    OpenAIRE

    Talpau A.

    2014-01-01

    : The introduction of the Internet into our lives has brought many opportunities that affected also marketing. With the development of the Internet, online sales (e-sales) have become more common in every day society and in a certain extend even replaced components of the traditional environment. The Internet is a new channel of communication which brings new opportunities in marketing. Nowadays, online marketing has taken over more and more of the budgets allocated for marketing, incre...

  12. Internet and Cross Media Productions

    DEFF Research Database (Denmark)

    Petersen, Anja Bechmann

    2006-01-01

    , the Internet continues to play a minor role when compared to older media. The content of the cross media concepts and organizations' history are crucial elements in deciding the priority and use of platforms. Methodologically, the article approaches cross media and the roles of the Internet on a micro......Convergence is one of the hot topics in Internet studies. Recently, however, media organizations have turned their focus to cross media communication. Media organizations are interested in optimizing communication across platforms such as TV, radio, websites, mobile telephones and newspapers....... The aim of this article is to examine the roles of the Internet when emphasis is put on cross media rather than convergence. This article proposes not one unidirectional convergent tendency but manifold roles of the Internet in cross media communication. Inside the media organizations, however...

  13. Student Empowerment Through Internet Usage

    DEFF Research Database (Denmark)

    Purushothaman, Aparna

    2011-01-01

    in a University in Southern India to empower the female students through Internet usage. The study was done to find out the problems the woman students faced in gaining access and using Internet and how they can be empowered through Internet usage. Future workshop was conducted to find out the problems...... and reflecting. The paper will explore the various cultural issues and explicate how the social context plays a major role in the use of Internet even if there is sufficient access. These issues will be addressed from an empowerment perspective. The paper ends by recommending the methods to be adopted for more......Information and Communication Technology (ICT) has been widely recognized as a tool for human development (UNDP 2001). The rate at which ICT are growing is changing the way knowledge is developed, acquired and delivered. (Tongia, et al. 2005) Internet is one of the Information & Communication...

  14. 76 FR 60754 - Preserving the Open Internet

    Science.gov (United States)

    2011-09-30

    ...-201] Preserving the Open Internet AGENCY: Federal Communications Commission. ACTION: Final rule..., 2011, a document establishing rules to preserve the open Internet. Inadvertently the wrong paragraph... alleging violations of the open Internet rules. Federal Communications Commission. Matt Warner, Attorney...

  15. Internet marketing 101.

    Science.gov (United States)

    Miller, Ryan J

    2010-11-01

    In an era when social media sites like YouTube, Facebook, and Twitter dominate the popular press, many surgeons overlook the foundational tactics and strategies necessary for long-term practice development and lead generation on the Internet. This article analyzes common errors made by surgeons during the development and implementation of Web site projects, focusing on the areas of strategy development; domain name identification; site plan creation; design considerations; content development; vendor selection; and launch, promotion, and staff training. The article emphasizes that, because the Web site remains the foundation of a surgeon's branding message, minimizing errors during development and construction is critical, particularly in highly competitive or saturated markets, for today's facial plastic surgery practice. Copyright © 2010 Elsevier Inc. All rights reserved.

  16. DFX via the Internet

    Science.gov (United States)

    Wagner, Rick; Castanotto, Giuseppe; Goldberg, Kenneth A.

    1995-11-01

    The Internet offers tremendous potential for rapid development of mechanical products to meet global competition. In the past several years, a number of geometric algorithms have been developed to evaluate manufacturing properties such as feedability, fixturability, assemblability, etc. This class of algorithms is sometimes termed `DFX: Design for X'. One problem is that most of these algorithms are tailored to a particular CAD system and format and so have not been widely tested by industry. the World Wide Web may offer a solution: its simple interface language may become a de facto standard for the exchange of geometric data. In this preliminary paper we describe one model for remote analysis of CAD models that we believe holds promise for use in industry (e.g. during the design cycle) and in research (e.g. to encourage verification of results).

  17. A cultura da internet

    OpenAIRE

    Cádima, Francisco Rui

    2017-01-01

    O novo ambiente digital é cada vez mais perturbante na sua dimensão ‘visível’ e está, em boa parte, incontrolável nessa área ainda algo desconhecida da Internet negra, conhecida por deep web ou dark net, convoca-nos para uma reflexão profunda de largo espectro, que não se pode vincular apenas às questões de mercado, tecnológicas e de redes, mas que nos vem alertar sobretudo para a ordem do político e da cidadania, do ‘desconhecido’ e do conhecimento e, enfim, do acesso à rede, quer no que is...

  18. Transparency through the Internet

    Energy Technology Data Exchange (ETDEWEB)

    Haginoya, Tohru [Inst. of Nuclear Materials Management, Japan Chapter, Tokyo (Japan)

    1998-07-01

    Many countries, especially developed countries have their 'Home Pages' and disclose their activities openly including nuclear activities. These information give, to some extent, the transparency of countries. The annual report of the IAEA can be found in its home page, reports describe its safeguards activities including facilities under its safeguards together with the status of 'subsidiary arrangements'. The Atomic Energy White Papers of the STA home pages show its nuclear activities and nuclear material. Details of safeguards related information are obtained by analyzing these home pages and find some information inconsistent each other. In connection with Strengthened Safeguards system' , non-nuclear items such as zirconium, heavy water or their manufacturing organizations which are subject to the safeguards system would be retrieved by using 'search engines' through the internet. (author)

  19. Transparency through the Internet

    International Nuclear Information System (INIS)

    Haginoya, Tohru

    1998-01-01

    Many countries, especially developed countries have their 'Home Pages' and disclose their activities openly including nuclear activities. These information give, to some extent, the transparency of countries. The annual report of the IAEA can be found in its home page, reports describe its safeguards activities including facilities under its safeguards together with the status of 'subsidiary arrangements'. The Atomic Energy White Papers of the STA home pages show its nuclear activities and nuclear material. Details of safeguards related information are obtained by analyzing these home pages and find some information inconsistent each other. In connection with Strengthened Safeguards system' , non-nuclear items such as zirconium, heavy water or their manufacturing organizations which are subject to the safeguards system would be retrieved by using 'search engines' through the internet. (author)

  20. Internet's impact on publishing

    Science.gov (United States)

    Beretta, Giordano B.

    1997-04-01

    In 1990, the first monochrome print-on-demand (POD) systems wee successfully brought to market. Subsequent color versions have been less successful, in my view mostly because they require a different workflow than traditional systems and the highly skilled specialists have not been trained. This hypothesis is based on the observation that direct-to-plate systems for short run printing, which do not require a new workflow, are quite successful in the market place. The internet and the World Wide Web are the enabling technologies that are fostering a new print model that is very likely to replace color POD before the latter can establish itself. In this model the consumers locate the material they desire from a contents provider, pay through a digital cash clearinghouse, and print the material at their own cost on their local printer. All the basic technologies for this model are in place; the main challenge is to make the workflow sufficiently robust for individual use.