Sea Shuan Luo
Full Text Available This paper presents a comparative study about the development of a network based laboratory environment in the “Unix introduction” course for the undergraduate students. The study results and the response from the students from 2005 to 2006 will be used to better understand what kind of method is more suitable for students. We also use the data collected to adjust our teaching strategy and try to build up a network based laboratory environment.
Full Text Available IntroductionPreoccupation and compulsive use of the internet can have negative psychological effects, such that it is increasingly being recognized as a mental disorder. The present study employed network-based statistics to explore how whole-brain functional connections at rest is related to the extent of individual’s level of internet addiction, indexed by a self-rated questionnaire. We identified two topologically significant networks, one with connections that are positively correlated with internet addiction tendency, and one with connections negatively correlated with internet addiction tendency. The two networks are interconnected mostly at frontal regions, which might reflect alterations in the frontal region for different aspects of cognitive control (i.e., for control of internet usage and gaming skills. Next, we categorized the brain into several large regional subgroupings, and found that the majority of proportions of connections in the two networks correspond to the cerebellar model of addiction which encompasses the four-circuit model. Lastly, we observed that the brain regions with the most inter-regional connections associated with internet addiction tendency replicate those often seen in addiction literature, and is corroborated by our meta-analysis of internet addiction studies. This research provides a better understanding of large-scale networks involved in internet addiction tendency and shows that pre-clinical levels of internet addiction are associated with similar regions and connections as clinical cases of addiction.
Now there are 17.7 million deaf people in China, but only four universities can provide them with higher education, which is far from enough. The implementation of network-based higher education for the deaf under the background of the Internet is an effective mean and objective needs for China's to carry out of the special higher education. This…
Simic, Konstantin; Vujin, Vladimir; Labus, Aleksandra; Stepanic, Ðorde; Stevanovic, Mladen
One of the new topics taught at technical universities is Internet of Things. In this paper, a workshop for organizing a lab in academic environment for the subject Internet of Things is described. The architecture of the platform, scenario and a description of components used for creating the environment for learning Internet of things are also…
Davies, B.R.; McDonald, M.J.
The Virtual Collaborative Environment (VCE) and Distributed Collaborative Workbench (DCW) are new technologies that make it possible for diverse users to synthesize and share mechatronic, sensor, and information resources. Using these technologies, university researchers, manufacturers, design firms, and others can directly access and reconfigure systems located throughout the world. The architecture for implementing VCE and DCW has been developed based on the proposed National Information Infrastructure or Information Highway and a tool kit of Sandia-developed software. Further enhancements to the VCE and DCW technologies will facilitate access to other mechatronic resources. This report describes characteristics of VCE and DCW and also includes background information about the evolution of these technologies.
National Aeronautics and Space Administration — Remote Sensing Solutions proposes to develop the Network-based Parallel Retrieval Onboard Computing Environment for Sensor Systems (nPROCESS) for deployment on...
Park, Dae-Heon; Park, Jang-Woo
Dew condensation on the leaf surface of greenhouse crops can promote diseases caused by fungus and bacteria, affecting the growth of the crops. In this paper, we present a WSN (Wireless Sensor Network)-based automatic monitoring system to prevent dew condensation in a greenhouse environment. The system is composed of sensor nodes for collecting data, base nodes for processing collected data, relay nodes for driving devices for adjusting the environment inside greenhouse and an environment server for data storage and processing. Using the Barenbrug formula for calculating the dew point on the leaves, this system is realized to prevent dew condensation phenomena on the crop's surface acting as an important element for prevention of diseases infections. We also constructed a physical model resembling the typical greenhouse in order to verify the performance of our system with regard to dew condensation control.
Baha, Hakim; Dibi, Zohir
Thanks to their high sensitivity and low-cost, metal oxide gas sensors (MOX) are widely used in gas detection, although they present well-known problems (lack of selectivity and environmental effects…). We present in this paper a novel neural network- based technique to remedy these problems. The idea is to create intelligent models; the first one, called corrector, can automatically linearize a sensor's response characteristics and eliminate its dependency on the environmental parameters. The corrector's responses are processed with the second intelligent model which has the role of discriminating exactly the detected gas (nature and concentration). The gas sensors used are industrial resistive kind (TGS8xx, by Figaro Engineering). The MATLAB environment is used during the design phase and optimization. The sensor models, the corrector, and the selective model were implemented and tested in the PSPICE simulator. The sensor model accurately expresses the nonlinear character of the response and the dependence on temperature and relative humidity in addition to their gas nature dependency. The corrector linearizes and compensates the sensor's responses. The method discriminates qualitatively and quantitatively between seven gases. The advantage of the method is that it uses a small representative database so we can easily implement the model in an electrical simulator. This method can be extended to other sensors.
Full Text Available Thanks to their high sensitivity and low-cost, metal oxide gas sensors (MOX are widely used in gas detection, although they present well-known problems (lack of selectivity and environmental effects…. We present in this paper a novel neural network- based technique to remedy these problems. The idea is to create intelligent models; the first one, called corrector, can automatically linearize a sensor’s response characteristics and eliminate its dependency on the environmental parameters. The corrector’s responses are processed with the second intelligent model which has the role of discriminating exactly the detected gas (nature and concentration. The gas sensors used are industrial resistive kind (TGS8xx, by Figaro Engineering. The MATLAB environment is used during the design phase and optimization. The sensor models, the corrector, and the selective model were implemented and tested in the PSPICE simulator. The sensor model accurately expresses the nonlinear character of the response and the dependence on temperature and relative humidity in addition to their gas nature dependency. The corrector linearizes and compensates the sensor’s responses. The method discriminates qualitatively and quantitatively between seven gases. The advantage of the method is that it uses a small representative database so we can easily implement the model in an electrical simulator. This method can be extended to other sensors.
This article reports an overview on the evolution of the optical network scenario taking into account the exponential growth of connected devices, big data, and cloud computing that is driving a concrete transformation impacting the information and communication technology world. This hyper-connected scenario is deeply affecting relationships between individuals, enterprises, citizens, and public administrations, fostering innovative use cases in practically any environment and market, and introducing new opportunities and new challenges. The successful realization of this hyper-connected scenario depends on different elements of the ecosystem. In particular, it builds on connectivity and functionalities allowed by converged next-generation networks and their capacity to support and integrate with the Internet of Things, machine-to-machine, and cloud computing. This article aims at providing some hints of this scenario to contribute to analyze impacts on optical system and network issues and requirements. In particular, the role of the software-defined network is investigated by taking into account all scenarios regarding data centers, cloud computing, and machine-to-machine and trying to illustrate all the advantages that could be introduced by advanced optical communications.
Ellis, William F.; McAleer, Brenda; Szakas, Joseph S.
The Internet's effect on society is growing exponentially. One only has to look at the growth of e-commerce, social media, wireless data access, and mobile devices to see how communication is changing. The need and desire for the Internet, especially in such disciplines as Computer Science or Computer Information Systems, pose a unique risk for…
Argues that the Internet demands a significant review of approaches to marketing communications, or promotion, as both the strategic and tactical levels. Highlights include electronic business and electronic commerce; comparing organizational and consumer markets; service development; objectives of marketing communications; and questions for…
1. DESIGN In this dissertation we introduce a new approach to Internet access networks in public spaces, such as Wi-Fi network commonly known as Hotspot, based on Fog Computing (or Edge Computing), Software Defined Networking (SDN) and the deployment of Virtual Machines (VM) and Linux containers, on the edge of the network. In this vision we deploy specialized network elements, called Fog Nodes, on the edge of the network, able to virtualize the physical infrastructure and expose APIs to e...
Van Heerden, RP
Full Text Available the authors to reset the simulation environment before each test and mitigated against the damage that an attack potentially inflicts on the test network. Without simulated network traffic, the virtualised network was too sterile. This resulted in any network...
Chaudhari Narendra S
Full Text Available We present an artificial neural-network- (NN- based smart interface framework for sensors operating in harsh environments. The NN-based sensor can automatically compensate for the nonlinear response characteristics and its nonlinear dependency on the environmental parameters, with high accuracy. To show the potential of the proposed NN-based framework, we provide results of a smart capacitive pressure sensor (CPS operating in a wide temperature range of 0 to . Through simulated experiments, we have shown that the NN-based CPS model is capable of providing pressure readout with a maximum full-scale (FS error of only over this temperature range. A novel scheme for estimating the ambient temperature from the sensor characteristics itself is proposed. For this purpose, a second NN is utilized to estimate the ambient temperature accurately from the knowledge of the offset capacitance of the CPS. A microcontroller-unit- (MCU- based implementation scheme is also provided.
On the basis of this background, access to geospatial data through internet technology has become attractive, for investigating the impacts of dynamic processes on the coastal environment. This paper presents the result of investigation carried out in Okrika coastal areas of Rivers State, Nigeria. In particular, it discusses ...
Legrand, I. C.; Schwendicke, U.; Leich, H.; Medinnis, M.; Koehler, A.; Wegner, P.; Sulanke, K.; Dippel, R.; Gellrich, A.
The software environment used to control a large switching architecture based on SGS-Thomson STC104 (an asynchronous 32-way dynamic packet routing chip) is presented. We are evaluating this switching technology for large scale, real-time parallel systems. A Graphical User Interface (GUI) written as a multi-thread application in Java allows to set the switch configuration and to continuously monitor the state of each link. This GUI connects to a multi-thread server via TCP/IP sockets. The server is running on a PC-Linux system and implements the virtual channel protocol in communicating with the STC104 switching units using the Data Strobe link or the VME bus. Linux I/O drivers to control the Data Strobe link parallel adaptor (STC101) were developed. For each client the server creates a new thread and allocates a new socket for communications. The Java code of the GUI may be transferred to any client using the http protocol providing a user friendly interface to the system with real-time monitoring which is also platform independent.
K. Nageswara Rao
Full Text Available The transition of traditional library collections to digital or virtual collections presented the librarian with new opportunities. The Internet, Web en-vironment and associated sophisticated tools have given the librarian a new dynamic role to play and serve the new information based society in bet-ter ways than hitherto. Because of the powerful features of Web i.e. distributed, heterogeneous, collaborative, multimedia, multi-protocol, hyperme-dia-oriented architecture, World Wide Web has revolutionized the way people access information, and has opened up new possibilities in areas such as digital libraries, virtual libraries, scientific information retrieval and dissemination. Not only the world is becoming interconnected, but also the use of Internet and Web has changed the fundamental roles, paradigms, and organizational culture of libraries and librarians as well. The article describes the limitless scope of Internet and Web, the existence of the librarian in the changing environment, parallelism between information sci-ence and information technology, librarians and intelligent agents, working of intelligent agents, strengths, weaknesses, threats and opportunities in-volved in the relationship between librarians and the Web. The role of librarian in Internet and Web environment especially as intermediary, facilita-tor, end-user trainer, Web site builder, researcher, interface designer, knowledge manager and sifter of information resources is also described.
K. Nageswara Rao; Kh Babu
The transition of traditional library collections to digital or virtual collections presented the librarian with new opportunities. The Internet, Web en-vironment and associated sophisticated tools have given the librarian a new dynamic role to play and serve the new information based society in bet-ter ways than hitherto. Because of the powerful features of Web i.e. distributed, heterogeneous, collaborative, multimedia, multi-protocol, hyperme-dia-oriented architecture, World Wide Web has re...
Harvey B. Newman
We are now well-advanced in our development, prototyping and deployment of a high performance next generation Integrated Environment for Collaborative Work. The system, aimed at using the capability of ESnet and Internet2 for rapid data exchange, is based on the Virtual Room Videoconferencing System (VRVS) developed by Caltech. The VRVS system has been chosen by the Internet2 Digital Video (I2-DV) Initiative as a preferred foundation for the development of advanced video, audio and multimedia collaborative applications by the Internet2 community. Today, the system supports high-end, broadcast-quality interactivity, while enabling a wide variety of clients (Mbone, H.323) to participate in the same conference by running different standard protocols in different contexts with different bandwidth connection limitations, has a fully Web-integrated user interface, developers and administrative APIs, a widely scalable video network topology based on both multicast domains and unicast tunnels, and demonstrated multiplatform support. This has led to its rapidly expanding production use for national and international scientific collaborations in more than 60 countries. We are also in the process of creating a 'testbed video network' and developing the necessary middleware to support a set of new and essential requirements for rapid data exchange, and a high level of interactivity in large-scale scientific collaborations. These include a set of tunable, scalable differentiated network services adapted to each of the data streams associated with a large number of collaborative sessions, policy-based and network state-based resource scheduling, authentication, and optional encryption to maintain confidentiality of inter-personal communications. High performance testbed video networks will be established in ESnet and Internet2 to test and tune the implementation, using a few target application-sets.
Full Text Available In the trials of utilization of technology for the society, efforts have shown benefits of the ICT use in facilitating education from different perspectives based on different waves of technological change. The recent development in technologies has also resulted in change of user behavior and usage patterns towards different areas of life, and consequently in the area of education. A new wave of change has started and is expecting to proliferate with stronger connectivity and interoperability of various devices, named as the Internet of Things (IoT. The internet of things is expected to give strong impacts on different areas of life including healthcare, transportation, smart homes, smart campus, and more. Consequently, there are inherent benefits to the education environment that are not yet well established in literature. The paper studies the potential benefit and impact of the IoT evolution concept in both the physical and the virtual learning environment and suggests a paradigm with use case scenarios. The results of an experimental evaluation on the aspects of applying IoT technology in education are presented and discussed in order to verify the set of related hypotheses.
Full Text Available Internet provides a convenient environment to share geographic information. Web GIS (Geographic Information System even provides users a direct access environment to geographic databases through Internet. However, the complexity of geographic data makes it difficult for users to understand the real content and the limitation of geographic information. In some cases, users may misuse the geographic data and make wrong decisions. Meanwhile, geographic data are distributed across various government agencies, academic institutes, and private organizations, which make it even more difficult for users to fully understand the content of these complex data. To overcome these difficulties, this research uses metadata as a guiding mechanism for users to fully understand the content and the limitation of geographic data. We introduce three metadata standards commonly used for geographic data and metadata authoring tools available in the US. We also review the current development of geographic metadata standard in Taiwan. Two metadata authoring tools are developed in this research, which will enable users to build their own geographic metadata easily.[Article content in Chinese
Zhang, Jing; Guan, Zhongliang
The technology of Internet is an important factor of industry’s development. Constructing a good technical environment is the foundation of the Internet and related industries’ development. This paper demonstrates the necessity of the construction and improvement of the Internet and the related industries technology environment through comparing the current situation of the related industries. It also points out that China needs to improve the environment of the Internet technology urgently. The paper establishes the technology demand pattern of different related industries, and explores strategies of the different Internet technology environment’s construction and perfection according to the different demand of the strong related Internet and the weak related Internet to the industries environment. This paper analyzes the factors that threaten the security of the Internet, and fully demonstrates the methods and tactics of establishing and improving the technology environment Internet hardware, the Internet and related industries in China under the basis of the framework of comprehensive management of Internet. This paper also studies the construction and improvement of the comprehensive management technology environment based on the Internet industry in China.
Hashemi Nekoo, Ali Reza; Ashourizadeh, Shayegheh; Zarei, Behrouz
Survival on dynamic environment is not achieved without a map. Scanning and monitoring of the market show business models as a fruitful tool. But scholars believe that old-fashioned business models are dead; as they are not included the effect of internet and network in themselves. This paper...... is going to propose e-business model ontology from the network point of view and its application in real world. The suggested ontology for network-based businesses is composed of individuals` characteristics and what kind of resources they own. also, their connections and pre-conceptions of connections...... such as shared-mental model and trust. However, it mostly covers previous business model elements. To confirm the applicability of this ontology, it has been implemented in business angel network and showed how it works....
Aline Vieira De Lima Nunes
Full Text Available The present study aimed at comparing social representations structures concerning data collection procedures: through internet forms, diffused in the WWW, and through conventional paper and pencil questionnaire methods. O verall 893 individuals participated in the research, 58% of whom were female. A total of 217 questionnaires about the social representation on football (soccer and 218 about the representation on aging were answered by Brazilian university students in classrooms. Electronic versions of the same instrument were diffused through an internet forum linked to the same university. There were 238 answers for the football questionnaire and 230 for the aging one. The instrument asked participants to indicate five wordsor expressions related to one of the social objects. Sample characteristics and structural analyses were carried out separately for the two data collection procedures. Data indicated that internet-based research allows for higher sample diversity, but it is essential to guarantee the adoption of measures that can select only desired participants. Results also pointed out the need to take into account the nature of the social object to be investigated through internet research on representations, seeking to avoid self-selection effects, which can bias results, as it seems to have happened with the football social object.
Monge-Najera, Julian Antonio; Rivas Rossi, Marta; Mendez-Estrada, Victor Hugo
Describes the development of low-cost multimedia courses and materials for use on the Internet, as well as virtual laboratories, at the Universidad Estatal a Distancia (Costa Rica). Explains how simultaneous production of traditional printed materials and online courses, outsourcing, and the use of HTML and Java can reduce costs for developing…
Teh, George P. L.
Reports on a study of Web-based learning environments in Singapore that focuses on the cross-validation of the Geography Classroom Environment Inventory (GCEI) which assesses undergraduate students' perceptions of psychosocial aspects of their Web-based instruction. Examines gender equity, instructional innovation, internal consistency…
Hong, Sung-Ryong; Na, Wonshik; Kang, Jang-Mook
This study suggests an approach to effective transmission of multimedia content in a rapidly changing Internet environment including smart-phones. Guaranteeing QoS in networks is currently an important research topic. When transmitting Assured Forwarding (AF) packets in a Multi-DiffServ network environment, network A may assign priority in an order AF1, AF2, AF3 and AF4; on the other hand, network B may reverse the order to a priority AF4, AF3, AF2 and AF1. In this case, the AF1 packets that received the best quality of service in network A will receive the lowest in network B, which may result in dropping of packets in network B and vice versa. This study suggests a way to guarantee QoS between hosts by minimizing the loss of AF packet class when one network transmits AF class packets to another network with differing principles. It is expected that QoS guarantees and their experimental value may be utilized as principles which can be applied to various mobile-web environments based on smart-phones. PMID:22163453
Full Text Available This study suggests an approach to effective transmission of multimedia content in a rapidly changing Internet environment including smart-phones. Guaranteeing QoS in networks is currently an important research topic. When transmitting Assured Forwarding (AF packets in a Multi-DiffServ network environment, network A may assign priority in an order AF1, AF2, AF3 and AF4; on the other hand, network B may reverse the order to a priority AF4, AF3, AF2 and AF1. In this case, the AF1 packets that received the best quality of service in network A will receive the lowest in network B, which may result in dropping of packets in network B and vice versa. This study suggests a way to guarantee QoS between hosts by minimizing the loss of AF packet class when one network transmits AF class packets to another network with differing principles. It is expected that QoS guarantees and their experimental value may be utilized as principles which can be applied to various mobile-web environments based on smart-phones.
Full Text Available A dual coverage system for Internet of Things (IoT environments is introduced. This system is used to connect IoT nodes regardless of their locations. The proposed system has three different architectures, which are based on satellites and High Altitude Platforms (HAPs. In case of Internet coverage problems, the Internet coverage will be replaced with the Satellite/HAP network coverage under specific restrictions such as loss and delay. According to IoT requirements, the proposed architectures should include multiple levels of satellites or HAPs, or a combination of both, to cover the global Internet things. It was shown that the Satellite/HAP/HAP/Things architecture provides the largest coverage area. A network simulation package, NS2, was used to test the performance of the proposed multilevel architectures. The results indicated that the HAP/HAP/Things architecture has the best end-to-end delay, packet loss, throughput, energy consumption, and handover.
... (extended from Leavitt, 1965). This text identifies aspects of network-based effectiveness that can benefit from a better understanding of leadership and management development of people, procedures, technology, and organizations...
give more attention to means of sustaining the human environment, especially the coastal areas. On the basis ... socio-economic development planners, public administrators, and environmentalists, who apply their findings to define the purposes for which humans beings modify the ... meaningfully towards investigating and.
Tsai, Pei-Shan; Tsai, Chin-Chung; Hwang, Gwo-Jen
This study aimed to explore the correlates among teachers' epistemological beliefs concerning Internet environments, their web search strategies and search outcomes. The sample of this study included 105 teachers from 63 grades 1 to 9 schools in Taiwan. The results show that the teachers with more advanced epistemological beliefs concerning…
This paper explores some new challenges facing universities in a global multimediated Internet-based environment, as they seek alternative paradigms and options to remain true to their core business. At a time of rapid technological change, and contested, complex concepts associated with globalisation, knowledge is becoming a primary factor of…
Background: The learning context is learning English in an Internet environment. The examination of this learning process was based on the Biggs and Moore's teaching-learning model (Biggs & Moore, 1993). Aim: The research aims to explore the use of the deep and surface strategies in an Internet environment among EFL students who come from…
Chng, Grace S; Li, Dongdong; Liau, Albert K; Khoo, Angeline
Pathological Internet use (PIU) occurs when excessive Internet use results in addictive symptoms that exert detrimental consequences on one's overall functioning and well-being. Poor family functioning has been found to be associated with youths' addictive Internet use, and parental use of active and restrictive mediation has been found to reduce online risk. The current study aims to test if parental active and restrictive mediation strategies are negatively associated with youths' PIU. Additionally, it also tests the effectiveness of these strategies as a function of the broader family environment with measures of parent-child attachment, family communication, and the youth's comfort with living at home. The data of 3,079 students in Singapore were analyzed through a series of logistic regressions. The results revealed that the family environment for students with PIU was significantly less positive. Only restrictive mediation was found to be negatively associated with PIU. This relation was stronger for higher levels of attachment, communication, and comfort at home, implying that the effectiveness of restrictive mediation varies with the degree of warmth and support in the general family environment. The implications are discussed.
Chu, Regina Juchun; Chu, Anita Zichun; Weng, Cathy; Tsai, Chin-Chung; Lin, Chia-chun
This research explores the relationships between self-directed learning readiness and transformative learning theory (TLT) reflected by the Constructivist Internet-based Learning Environment Scale (CILES). A questionnaire survey about adult learner's perceptions of Internet-based learning was administered to adults enrolled in classes in community…
Fujino, Yuichi; Fujimura, Kaori; Nomura, Shin-ichiro; Kawashima, Harumi; Tsuchikawa, Megumu; Matsumoto, Toru; Nagao, Kei-ichi; Uruma, Takahiro; Yamamoto, Shinji; Takizawa, Hotaka; Kuroda, Chikazumi; Nakayama, Tomio
This research aims to support chest computed tomography (CT) medical checkups to decrease the death rate by lung cancer. We have developed a remote cooperative reading system for lung cancer screening over the Internet, a secure transmission function, and a cooperative reading environment. It is called the Network-based Reading System. A telemedicine system involves many issues, such as network costs and data security if we use it over the Internet, which is an open network. In Japan, broadband access is widespread and its cost is the lowest in the world. We developed our system considering human machine interface and security. It consists of data entry terminals, a database server, a computer aided diagnosis (CAD) system, and some reading terminals. It uses a secure Digital Imaging and Communication in Medicine (DICOM) encrypting method and Public Key Infrastructure (PKI) based secure DICOM image data distribution. We carried out an experimental trial over the Japan Gigabit Network (JGN), which is the testbed for the Japanese next-generation network, and conducted verification experiments of secure screening image distribution, some kinds of data addition, and remote cooperative reading. We found that network bandwidth of about 1.5 Mbps enabled distribution of screening images and cooperative reading and that the encryption and image distribution methods we proposed were applicable to the encryption and distribution of general DICOM images via the Internet.
This book presents current progress on challenges related to Big Data management by focusing on the particular challenges associated with context-aware data-intensive applications and services. The book is a state-of-the-art reference discussing progress made, as well as prompting future directions on the theories, practices, standards and strategies that are related to the emerging computational technologies and their association with supporting the Internet of Things advanced functioning for organizational settings including both business and e-science. Apart from inter-operable and inter-cooperative aspects, the book deals with a notable opportunity namely, the current trend in which a collectively shared and generated content is emerged from Internet end-users. Specifically, the book presents advances on managing and exploiting the vast size of data generated from within the smart environment (i.e. smart cities) towards an integrated, collective intelligence approach. The book also presents methods and pr...
Tsirmpas, Charalampos; Kouris, Ioannis; Anastasiou, Athanasios; Giokas, Kostas; Iliopoulou, Dimitra; Koutsouris, Dimitris
Internet of Things (IoT) is the logical further development of today's Internet, enabling a huge amount of devices to communicate, compute, sense and act. IoT sensors placed in Ambient Assisted Living (AAL) environments, enable the context awareness and allow the support of the elderly in their daily routines, ultimately allowing an independent and safe lifestyle. The vast amount of data that are generated and exchanged between the IoT nodes require innovative context modeling approaches that go beyond currently used models. Current paper presents and evaluates an open interoperable platform architecture in order to utilize the technical characteristics of IoT and handle the large amount of generated data, as a solution to the technical requirements of AAL applications.
Full Text Available Education and training are expected to change dramatically due to the combined impact of the Internet and multimedia technologies. A challenge for internet-based education systems is to allow educators and trainers to work from known models, while simultaneously letting them experiment with innovations without requiring frequent retooling. Work in distance learning, while of interest in its own right, is important to our general research program as a test bed for our ideas. The basic research program is to provide a general foundation, or set of "primitive" classes, for building remote collaboration environments, and then to build toolkits using these classes, and other more specific classes, that will address the particular requirements of various collaboration environments. Our basic premise is that the virtual room concept together with other fundamental concepts provides such a foundation. In this paper we discuss our virtual room platform and a distance-learning environment called PERSYST. PERSYST has been used in several distance-learning trials; we close this paper with a discussion of the trials and what we have learned from them.
Raglin, Adrienne; Metu, Somiya; Russell, Stephen; Budulas, Peter
While the term Internet of Things (IoT) has been coined relatively recently, it has deep roots in multiple other areas of research including cyber-physical systems, pervasive and ubiquitous computing, embedded systems, mobile ad-hoc networks, wireless sensor networks, cellular networks, wearable computing, cloud computing, big data analytics, and intelligent agents. As the Internet of Things, these technologies have created a landscape of diverse heterogeneous capabilities and protocols that will require adaptive controls to effect linkages and changes that are useful to end users. In the context of military applications, it will be necessary to integrate disparate IoT devices into a common platform that necessarily must interoperate with proprietary military protocols, data structures, and systems. In this environment, IoT devices and data will not be homogeneous and provenance-controlled (i.e. single vendor/source/supplier owned). This paper presents a discussion of the challenges of integrating varied IoT devices and related software in a military environment. A review of contemporary commercial IoT protocols is given and as a practical example, a middleware implementation is proffered that provides transparent interoperability through a proactive message dissemination system. The implementation is described as a framework through which military applications can integrate and utilize commercial IoT in conjunction with existing military sensor networks and command and control (C2) systems.
Full Text Available Abstract—Immersive 3D worlds have increasingly raised the interest of researchers and practitioners for various learning and training settings over the last decade. These virtual worlds can provide multiple communication channels between users and improve presence and awareness in the learning process. Consequently virtual 3D environments facilitate collaborative learning and training scenarios. In this paper we focus on the integration of internet-accessible physics experiments (iLabs combined with the TEALsim 3D simulation toolkit in Project Wonderland, Sun's toolkit for creating collaborative 3D virtual worlds. Within such a collaborative environment these tools provide the opportunity for teachers and students to work together as avatars as they control actual equipment, visualize physical phenomenon generated by the experiment, and discuss the results. In particular we will outline the steps of integration, future goals, as well as the value of a collaboration space in Wonderland's virtual world.
Olga V. Kruzhkova
Full Text Available Abstract. The aim of the article is to consider the psychological characteristics of involvement of youth in extremist community through the Internet.Methods. The theoretical analysis and modeling were used as the main methods.Results. The Internet is described as a means and space of psychological influence on young people, which can be both positive and negative. Absorption of teenagers, boys and young men, in a virtual space essentially converts their activity and, as a result, transform the leading activity, which in turn leads to different mental tumors. Three main effects from the exposure of the Internet are found out: «the effect of the goals of drift», mythology and «the effect of excitement»; their impact on the individual in each age periods is noted. Consideration of the main motivational reasons, taking into account the specifics of building human interaction with the environment made it possible to identify and describe the main types of behavioural patterns exhibited by young people on the Internet. The degree of activity of young people in the network is described from the perspective of integrated strategies of behaviour: information blocking, changes in the distance, control, transformations. Risk groups of users, the most susceptible to extremist manipulations are designated. «Vulnerability areas» of representatives of each group are summarized and described; a step-by-step algorithm of victims’ involvement in extremist communities by recruiters is described.Scientific novelty of the present study consists in discussion of one of the most acute problems of the present – the changed conditions of a growing and socialization of younger generation; constant stay in network virtual space is an integral part of today’s existence, wherein unformed and immature person is very vulnerable to the influence of extremist content. To prevent the increased potential threat of involvement of young people in destructive, asocial
De, Suvranu; Deo, Dhannanjay; Sankaranarayanan, Ganesh; Arikatla, Venkata S
BACKGROUND: While an update rate of 30 Hz is considered adequate for real time graphics, a much higher update rate of about 1 kHz is necessary for haptics. Physics-based modeling of deformable objects, especially when large nonlinear deformations and complex nonlinear material properties are involved, at these very high rates is one of the most challenging tasks in the development of real time simulation systems. While some specialized solutions exist, there is no general solution for arbitrary nonlinearities. METHODS: In this work we present PhyNNeSS - a Physics-driven Neural Networks-based Simulation System - to address this long-standing technical challenge. The first step is an off-line pre-computation step in which a database is generated by applying carefully prescribed displacements to each node of the finite element models of the deformable objects. In the next step, the data is condensed into a set of coefficients describing neurons of a Radial Basis Function network (RBFN). During real-time computation, these neural networks are used to reconstruct the deformation fields as well as the interaction forces. RESULTS: We present realistic simulation examples from interactive surgical simulation with real time force feedback. As an example, we have developed a deformable human stomach model and a Penrose-drain model used in the Fundamentals of Laparoscopic Surgery (FLS) training tool box. CONCLUSIONS: A unique computational modeling system has been developed that is capable of simulating the response of nonlinear deformable objects in real time. The method distinguishes itself from previous efforts in that a systematic physics-based pre-computational step allows training of neural networks which may be used in real time simulations. We show, through careful error analysis, that the scheme is scalable, with the accuracy being controlled by the number of neurons used in the simulation. PhyNNeSS has been integrated into SoFMIS (Software Framework for Multimodal
The learning context is learning English in an Internet environment. The examination of this learning process was based on the Biggs and Moore's teaching-learning model (Biggs & Moore, 1993). The research aims to explore the use of the deep and surface strategies in an Internet environment among EFL students who come from different socio-economic backgrounds. The results of the research may add an additional level to the understanding of students' functioning in the Internet environment. One hundred fourty-eight Israeli junior and high school students participated in this research. The methodology was based on special computer software: Screen Cam, which recorded the students' learning process. In addition, expert judges completed a questionnaire which examined and categorized the students' learning strategies. The research findings show a clear preference of participants from all socio-economic backgrounds towards the surface learning strategy. The findings also showed that students from the medium to high socio-economic background used both learning strategies more frequently than low socio-economic students. The results reflect the habits that students acquire during their adjustment process throughout their education careers. A brief encounter with the Internet learning environment apparently cannot change norms or habits, which were acquired in the non-Internet learning environment.
Full Text Available The new concept of Internet of Things (IoT will increase the pace of globalization in business, overcoming spatial and temporal barriers, language and economic development. But, as any new concept emerged, it still has no widespread functional models and standards and, moreover, companies are not ready to accept all the changes proposed by IoT in the business environment. In this paper, as a case study, we propose an IoT model, based on collaboration between Fog/Edge and Cloud Computing, for developing a business in distribution and retail domain, with a multi-stores and multi-warehouses structures. The entire system is monitored by a hierarchical synchronization model, having the master clock server placed in the Cloud layer, and then, in subordinate relation, to the next level, the Fog/Edge layer, from which start signals simultaneously to the servers in the warehouses and to stores.
In the bachelor thesis are introduced theoretical concepts of the Internet and marketing, accented the need of marketing mix along with its specifics of the internet environment. Next is interpreted which tools can be used for marketing of firms and which marketing instruments are to be deployed. Final chapter illustrates socio-demographics of Czech internet users along with media market allocation from the perspective of all media as well as in the segment of the Internet.
Alverson, Dale C; Saiki, Stanley M; Jacobs, Joshua; Saland, Linda; Keep, Marcus F; Norenberg, Jeffrey; Baker, Rex; Nakatsu, Curtis; Kalishman, Summers; Lindberg, Marlene; Wax, Diane; Mowafi, Moad; Summers, Kenneth L; Holten, James R; Greenfield, John A; Aalseth, Edward; Nickles, David; Sherstyuk, Andrei; Haines, Karen; Caudell, Thomas P
Medical knowledge and skills essential for tomorrow's healthcare professionals continue to change faster than ever before creating new demands in medical education. Project TOUCH (Telehealth Outreach for Unified Community Health) has been developing methods to enhance learning by coupling innovations in medical education with advanced technology in high performance computing and next generation Internet2 embedded in virtual reality environments (VRE), artificial intelligence and experiential active learning. Simulations have been used in education and training to allow learners to make mistakes safely in lieu of real-life situations, learn from those mistakes and ultimately improve performance by subsequent avoidance of those mistakes. Distributed virtual interactive environments are used over distance to enable learning and participation in dynamic, problem-based, clinical, artificial intelligence rules-based, virtual simulations. The virtual reality patient is programmed to dynamically change over time and respond to the manipulations by the learner. Participants are fully immersed within the VRE platform using a head-mounted display and tracker system. Navigation, locomotion and handling of objects are accomplished using a joy-wand. Distribution is managed via the Internet2 Access Grid using point-to-point or multi-casting connectivity through which the participants can interact. Medical students in Hawaii and New Mexico (NM) participated collaboratively in problem solving and managing of a simulated patient with a closed head injury in VRE; dividing tasks, handing off objects, and functioning as a team. Students stated that opportunities to make mistakes and repeat actions in the VRE were extremely helpful in learning specific principles. VRE created higher performance expectations and some anxiety among VRE users. VRE orientation was adequate but students needed time to adapt and practice in order to improve efficiency. This was also demonstrated successfully
Lee, Jae Dong; Yoon, Tae Sik; Chung, Seung Hyun
Objectives Remote medical services have been expanding globally, and this is expansion is steadily increasing. It has had many positive effects, including medical access convenience, timeliness of service, and cost reduction. The speed of research and development in remote medical technology has been gradually accelerating. Therefore, it is expected to expand to enable various high-tech information and communications technology (ICT)-based remote medical services. However, the current state lacks an appropriate security framework that can resolve security issues centered on the Internet of things (IoT) environment that will be utilized significantly in telemedicine. Methods This study developed a medical service-oriented frame work for secure remote medical services, possessing flexibility regarding new service and security elements through its service-oriented structure. First, the common architecture of remote medical services is defined. Next medical-oriented secu rity threats and requirements within the IoT environment are identified. Finally, we propose a "service-oriented security frame work for remote medical services" based on previous work and requirements for secure remote medical services in the IoT. Results The proposed framework is a secure framework based on service-oriented cases in the medical environment. A com parative analysis focusing on the security elements (confidentiality, integrity, availability, privacy) was conducted, and the analysis results demonstrate the security of the proposed framework for remote medical services with IoT. Conclusions The proposed framework is service-oriented structure. It can support dynamic security elements in accordance with demands related to new remote medical services which will be diversely generated in the IoT environment. We anticipate that it will enable secure services to be provided that can guarantee confidentiality, integrity, and availability for all, including patients, non-patients, and medical
Lee, Jae Dong; Yoon, Tae Sik; Chung, Seung Hyun; Cha, Hyo Soung
Remote medical services have been expanding globally, and this is expansion is steadily increasing. It has had many positive effects, including medical access convenience, timeliness of service, and cost reduction. The speed of research and development in remote medical technology has been gradually accelerating. Therefore, it is expected to expand to enable various high-tech information and communications technology (ICT)-based remote medical services. However, the current state lacks an appropriate security framework that can resolve security issues centered on the Internet of things (IoT) environment that will be utilized significantly in telemedicine. This study developed a medical service-oriented frame work for secure remote medical services, possessing flexibility regarding new service and security elements through its service-oriented structure. First, the common architecture of remote medical services is defined. Next medical-oriented secu rity threats and requirements within the IoT environment are identified. Finally, we propose a "service-oriented security frame work for remote medical services" based on previous work and requirements for secure remote medical services in the IoT. The proposed framework is a secure framework based on service-oriented cases in the medical environment. A com parative analysis focusing on the security elements (confidentiality, integrity, availability, privacy) was conducted, and the analysis results demonstrate the security of the proposed framework for remote medical services with IoT. The proposed framework is service-oriented structure. It can support dynamic security elements in accordance with demands related to new remote medical services which will be diversely generated in the IoT environment. We anticipate that it will enable secure services to be provided that can guarantee confidentiality, integrity, and availability for all, including patients, non-patients, and medical staff.
Wang, Minjuan; Laffey, James; Poole, Melissa J.
Investigates how participants (39 teenagers and 10 college-age online mentors) interacted and constructed shared knowledge of concepts, goals, tasks, procedures, and solutions when solving a real-world problem in an Internet-mediated project-based learning environment (iExpeditions). The main focus of the study was on how different patterns of…
This article designated as its subject crowd–hosting platforms on the Internet. Reflected the concept, the main features and directions of development of such phenomenon as crowdaming platform. At the same time, attention is paid to the obstacles that stand in the way of development of crowd–hosting technologies in the virtual environment of today’s Russian reality.
Schwebel, David C; McClure, Leslie A; Severson, Joan
Child pedestrian injury is a preventable global health challenge. Successful training efforts focused on child behavior, including individualized streetside training and training in large virtual pedestrian environments, are laborious and expensive. This study considers the usability and feasibility of a virtual pedestrian environment "game" application to teach children safe street-crossing behavior via the internet, a medium that could be broadly disseminated at low cost. Ten 7- and 8-year-old children participated. They engaged in an internet-based virtual pedestrian environment and completed a brief assessment survey. Researchers rated children's behavior while engaged in the game. Both self-report and researcher observations indicated the internet-based system was readily used by the children without adult support. The youth understood how to engage in the system and used it independently and attentively. The program also was feasible. It provided multiple measures of pedestrian safety that could be used for research or training purposes. Finally, the program was rated by children as engaging and educational. Researcher ratings suggested children used the program with minimal fidgeting or boredom. The pilot test suggests an internet-based virtual pedestrian environment offers a usable, feasible, engaging, and educational environment for child pedestrian safety training. If future research finds children learn the cognitive and perceptual skills needed to cross streets safely within it, internet-based training may provide a low-cost medium to broadly disseminate child pedestrian safety training. The concept may be generalized to other domains of health-related functioning such as teen driving safety, adolescent sexual risk-taking, and adolescent substance use.
Pirani, Joseph; Calvelage, Steven
The technology of transmitting voice over data networks has been available for over 10 years. Mass market VoIP services for consumers to make and receive standard telephone calls over broadband Internet networks have grown in the last 5 years. While operational costs are less with VoIP implementations as opposed to time division multiplexing (TDM) based voice switches, is it still advantageous to convert a mission control center s voice system to this newer technology? Marshall Space Flight Center (MSFC) Huntsville Operations Support Center (HOSC) has converted its mission voice services to a commercial product that utilizes VoIP technology. Results from this testing, design, and installation have shown unique considerations that must be addressed before user operations. There are many factors to consider for a control center voice design. Technology advantages and disadvantages were investigated as they refer to cost. There were integration concerns which could lead to complex failure scenarios but simpler integration for the mission infrastructure. MSFC HOSC will benefit from this voice conversion with less product replacement cost, less operations cost and a more integrated mission services environment.
Jan, Mian Ahmad; Nanda, Priyadarsi; He, Xiangjian; Tan, Zhiyuan; Liu, Ren Ping
The Internet of Things is a vision that broadens the scope of the internet by incorporating physical objects to identify themselves to the participating entities. This innovative concept enables a physical device to represent itself in the digital world. There are a lot of speculations and future
Smith, Andrew C
Full Text Available According to its advocates, the Internet of Things holds great promise. Great strides have been made to address its security and standardise communication protocols for data exchange in this potentially unlimited network of connected things. However...
Geçer, Aynur Kolburan
This study addresses university students' information search and commitment strategies on web environment and internet usage self-efficacy beliefs in terms of such variables as gender, department, grade level and frequency of internet use; and whether there is a significant relation between these beliefs. Descriptive method was used in the study.…
Chuang, Shih-Chyueh; Hwang, Fu-Kwun; Tsai, Chin-Chung
The purpose of this study was to investigate the perceptions of Internet users of a physics virtual laboratory, Demolab, in Taiwan. Learners' perceptions of Internet-based learning environments were explored and the role of gender was examined by using preferred and actual forms of a revised Constructivist Internet-based Learning Environment Survey (CILES). The students expressed a clear gap between ideal and reality, and they showed higher preferences for many features of constructivist Internet-based learning environments than for features they had actually learned in Demolab. The results further suggested that male users prefer to be involved in the process of discussion and to show critical judgments. In addition, male users indicated they enjoyed the process of negotiation and discussion with others and were able to engage in reflective thoughts while learning in Demolab. In light of these findings, male users seemed to demonstrate better adaptability to the constructivist Internet-based learning approach than female users did. Although this study indicated certain differences between males and females in their responses to Internet-based learning environments, they also shared numerous similarities. A well-established constructivist Internet-based learning environment may encourage more female learners to participate in the science community.
Full Text Available The article focuses on the identification of the relationship between gender representations and subject-environment interactions using the example of TV and the Internet. Among the considered interactions are object, subject and quasi-subject types. The survey involved 400 respondents, 40% male and 60% female, aged 18 to 65 years. The respondents filled out two online questionnaires. One questionnaire (GRBS was aimed at assessing the respondents’ propensity to traditional or modern gender-role representations. The other questionnaire was a technique developed on the basis of eco-psychological types of interaction with the information environment. The study revealed a correlation between gender representations and the types of interaction with TV and the Internet. Interactions with TV most often refer to the object type, and least often to the quasi-subject one. The indicators for all three types of interactions were higher in the respondents with traditional gender beliefs as compared to the respondents with modern gender beliefs. The correlation between gender stereotypes and the Internet was found only in women and only in the case of quasi-subject type of interactions.
Full Text Available The aim of this research is to obtain a deeper understanding of children’s own views and experiences of using the Internet, and their attitudes towards parental supervision and the technological environment in which they are growing up. This article reports on a survey of Internet use among the fifth-grade pupils in ordinary Finnish schools. The population studied was a selected sample, and the data were analyzed both statistically and by qualitative methods. Nine out of ten children are regular Internet users, and every second child uses the Internet daily. The contemporary Internet seems to be a means for social interaction for girls and for playing games for boys. In more general terms, the Internet serves as a different kind of information vehicle, depending on the user.
Full Text Available The rapid development of the mobile internet, mobile communication technology and mobile terminal stimulate demand of mobile application in manufacturing enterprises, which makes the enterprise implement the mobile ERP. The implementation of mobile ERP changes the internal application management of manufacturing enterprises to social applications. We analyse the driving factors of implementing the mobile application social mode considering the complexity of organization relations and business processes of manufacturing enterprise. And then the mobile application social mode of the manufacturing enterprise is built based on mobile internet. Finally, we present the management strategies of the mobile application social network to provide references for the manufacturing enterprise.
Kartal, Erdogan; Arikan, Arda
The effects of information and communication technologies, which are rapidly improving and spreading in the current age, can be seen in the field of training and education as well as in all other fields. Unlike previous technologies, the Internet, which is the concrete compound of those technologies, provides users with the trio of audio, text and…
Sorenson, Brian K.
Approved for public release; distribution is unlimited The Naval Postgraduate School's (NPS) Strategic Plan for 1998 addresses the significance of distant education in NPS's future. Network Based Instruction (NBI) utilizes new technology and the Internet to provide education at a distance. This thesis provides a framework which identifies the costs and benefits associated with converting, administering and maintaining a traditionally taught course using Network Based Instruction. Conversio...
Zuo Cen; Zhang Xumei; Wang Xingshan
The rapid development of the mobile internet, mobile communication technology and mobile terminal stimulate demand of mobile application in manufacturing enterprises, which makes the enterprise implement the mobile ERP. The implementation of mobile ERP changes the internal application management of manufacturing enterprises to social applications. We analyse the driving factors of implementing the mobile application social mode considering the complexity of organization relations and business...
This collection of dialogues is the only textbook of its kind. Internet Inquiry: Conversations About Method takes students into the minds of top internet researchers as they discuss how they have worked through critical challenges as they research online social environments. Editors Annette N....... Markham and Nancy K. Baym illustrate that good research choices are not random but are deliberate, studied, and internally consistent. Rather than providing single "how to" answers, this book presents distinctive and divergent viewpoints on how to think about and conduct qualitative internet studies....
Jara, A. J.; Moreno-Sanchez, P.; Skarmeta, A. F.; Varakliotis, S.; Kirstein, P.
Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing spa...
Kent, M Potvin; Dubois, L; Kent, E A; Wanless, A J
Food and beverage marketing has been associated with childhood obesity yet little research has examined the influence of advertising policy on children's exposure to food/beverage marketing on the Internet. The purpose of this study was to assess the influence of Quebec's Consumer Protection Act and the self-regulatory Canadian Children's Food and Beverage Advertising Initiative (CAI) on food manufacturer and restaurant websites in Canada. A content analysis of 147 French and English language food and restaurant websites was undertaken. The presence of child-directed content was assessed and an analysis of marketing features, games and activities, child protection features, and the promotion of healthy lifestyle messages was then examined on those sites with child-directed content. There were statistically no fewer French language websites (n = 22) with child-directed content compared to English language websites (n = 27). There were no statistically significant differences in the number of the various marketing features, or in the average number of marketing features between the English and French websites. There were no fewer CAI websites (n = 14) with child-directed content compared to non-CAI websites (n = 13). The CAI sites had more healthy lifestyle messages and child protection features compared to the non-CAI sites. Systematic surveillance of the Consumer Protection Act in Quebec is recommended. In the rest of Canada, the CAI needs to be significantly expanded or replaced by regulatory measures to adequately protect children from the marketing of foods/beverages high in fat, sugar, and sodium on the Internet. Copyright © 2012 The Obesity Society.
Luciane Maria Gonçalves Franco
Full Text Available The objective is to identify the level of electronic transparency of financial statements in municipal districts, arranged in the internet environment. The research presents descriptive approach, ex-post facto, held in October of 2011. The study is based on legislation and literature of Accounting Science and Public Administration. Among respects, it was found that 81.25 % of municipalities with 50,000 or more inhabitants provide reports of the Fiscal Responsibility Law in their web pages and this figure drops to 29.43% in municipalities with fewer than 50,000 inhabitants. It is a significant number of municipalities that do not use electronics to publicize their acts , corresponding to 70.57 %, or 259 municipalities out of the total surveyed. It is emphasized that transparency of public accounts is of limitations in terms of availability of information, so he will need improvement and viability for the benefit of the results.
Full Text Available With the rapid development of the Internet of things (IoT, building IoT systems with high quality of service (QoS has become an urgent requirement in both academia and industry. During the procedures of building IoT systems, QoS-aware service selection is an important concern, which requires the ranking of a set of functionally similar services according to their QoS values. In reality, however, it is quite expensive and even impractical to evaluate all geographically-dispersed IoT services at a single client to obtain such a ranking. Nevertheless, distributed measurement and ranking aggregation have to deal with the high dynamics of QoS values and the inconsistency of partial rankings. To address these challenges, we propose a time-aware service ranking prediction approach named TSRPred for obtaining the global ranking from the collection of partial rankings. Specifically, a pairwise comparison model is constructed to describe the relationships between different services, where the partial rankings are obtained by time series forecasting on QoS values. The comparisons of IoT services are formulated by random walks, and thus, the global ranking can be obtained by sorting the steady-state probabilities of the underlying Markov chain. Finally, the efficacy of TSRPred is validated by simulation experiments based on large-scale real-world datasets.
Huang, Yuze; Huang, Jiwei; Cheng, Bo; He, Shuqing; Chen, Junliang
With the rapid development of the Internet of things (IoT), building IoT systems with high quality of service (QoS) has become an urgent requirement in both academia and industry. During the procedures of building IoT systems, QoS-aware service selection is an important concern, which requires the ranking of a set of functionally similar services according to their QoS values. In reality, however, it is quite expensive and even impractical to evaluate all geographically-dispersed IoT services at a single client to obtain such a ranking. Nevertheless, distributed measurement and ranking aggregation have to deal with the high dynamics of QoS values and the inconsistency of partial rankings. To address these challenges, we propose a time-aware service ranking prediction approach named TSRPred for obtaining the global ranking from the collection of partial rankings. Specifically, a pairwise comparison model is constructed to describe the relationships between different services, where the partial rankings are obtained by time series forecasting on QoS values. The comparisons of IoT services are formulated by random walks, and thus, the global ranking can be obtained by sorting the steady-state probabilities of the underlying Markov chain. Finally, the efficacy of TSRPred is validated by simulation experiments based on large-scale real-world datasets. PMID:28448451
Huang, Yuze; Huang, Jiwei; Cheng, Bo; He, Shuqing; Chen, Junliang
With the rapid development of the Internet of things (IoT), building IoT systems with high quality of service (QoS) has become an urgent requirement in both academia and industry. During the procedures of building IoT systems, QoS-aware service selection is an important concern, which requires the ranking of a set of functionally similar services according to their QoS values. In reality, however, it is quite expensive and even impractical to evaluate all geographically-dispersed IoT services at a single client to obtain such a ranking. Nevertheless, distributed measurement and ranking aggregation have to deal with the high dynamics of QoS values and the inconsistency of partial rankings. To address these challenges, we propose a time-aware service ranking prediction approach named TSRPred for obtaining the global ranking from the collection of partial rankings. Specifically, a pairwise comparison model is constructed to describe the relationships between different services, where the partial rankings are obtained by time series forecasting on QoS values. The comparisons of IoT services are formulated by random walks, and thus, the global ranking can be obtained by sorting the steady-state probabilities of the underlying Markov chain. Finally, the efficacy of TSRPred is validated by simulation experiments based on large-scale real-world datasets.
Describes a study conducted at the Naval Postgraduate School to determine student attitudes toward various aspects of network-based instruction. Discusses Internet technology; Web-based education; online learning; learning styles; and results from Kolb's Learning Style Inventory, the Hidden Figures Test, and a number of multivariate procedures.…
Full Text Available Ambient Intelligence is a vision in which various devices come together and process information from multiple sources in order to exert control on the physical environment. In addition to computation and control, communication plays a crucial role in the overall functionality of such a system. Wireless Sensor Networks are one such class of networks, which meet these criteria. These networks consist of spatially distributed sensor motes which work in a co-operative manner to sense and control the environment. In this work, an implementation of an energy-efficient and cost-effective, wireless sensor networks based vehicle parking system for a multi-floor indoor parking facility has been introduced. The system monitors the availability of free parking slots and guides the vehicle to the nearest free slot. The amount of time the vehicle has been parked is monitored for billing purposes. The status of the motes (dead/alive is also recorded. Information like slot allocated, directions to the slot and billing data is sent as a message to customer’s mobile phones. This paper extends our previous work 1 with the development of a low cost sensor mote, about one tenth the cost of a commercially available mote, keeping in mind the price sensitive markets of the developing countries.
Learning methodologies have been developed over a number of years and it has evolved as technologies advance and new learning theories emerge. We...can be used to justify learning systems. Many theories are developed . We introduce significant learning theories in this section. 2.1 Behaviorism...not fitting well with traditional classroom environment. 3 2.3 Cognitivism Piaget believed that humans desire a state of cognitive balance or
The aim of this research was to explore the presence of information technologies in children's homes in Serbia and children's activities in the online environment, according to their age, gender and economic status, based on the theory of uses and gratifications. The research adopted the survey technique, investigating 979 children aged from 7 to 13 in five cities in Serbia: Belgrade, Niš, Novi Sad, Šabac and Valjevo. The results of our study indicate that children's age and economic status i...
Full Text Available in the room can be affected by heating or cooling the temperature sensor and by preventing/allowing light on the lux sensor. The smart environment can further be controlled through access from instant messaging (XMPP). Through this communication channel... in ThingMemory Index 2: URL for Command to be executed Index 3: URL for Command to be executed 10913/SE_COOLER : http://things.meraka.csir.co.za/memory/thingView.seam?thingId=284 http://se-room1-controller.meraka.csir.co.za/?cooler=on http://se-room1...
Seda Çağlar; Sevim Savaşer
Nowadays, internet use and access is becoming increasingly common as a great entertainment, communication and educational resource for children as well as for adults. Internet is a perfect environment for children, for exploring the world, learning and having fun. However, access to illegal sites that contain violence and sexuality, and contact dangerous people are among the particular risks for children using the internet. It is a known fact that, internet and developing technology make the ...
Full Text Available Elasticity is one of the key features of cloud-hosted services built on virtualization technology. To utilize the elasticity of cloud environments, administrators should accurately capture the operational status of server systems, which changes constantly according to service requests incoming irregularly. However, it is difficult to detect and avoid in advance that operating services are falling into an undesirable state. In this paper, we focus on the management of server systems that include cloud systems, and propose a new method for detecting the sign of undesirable scenarios before the system becomes overloaded as a result of various causes. In this method, a measure that utilizes the fluctuation of the macroscopic operational state observed in the server system is introduced. The proposed measure has the property of drastically increasing before the server system is in an undesirable state. Using the proposed measure, we realize a function to detect that the server system is falling into an overload scenario, and we demonstrate its effectiveness through experiments.
Luis-Ferreira, Fernando; Jardim-Goncalves, Ricardo
Life in modern societies implies a close relationship with many types of devices. The diversity of such devices has impact in diverse areas of our life as some provide support for management tasks, others just provide information, and most of them follow us anywhere and anytime. The more widespread example is mobile phones, but others also follow us, like our music devices or even our car with many electronic systems. In a recent past a phone was something to talk with others and a car was just a vehicle, with an engine, to allow displacement of people and goods. A phone would support voice conversation and a car had the equipment needed to take us to some destination. But these days all those devices and vehicles have computer equipment and some include complex functions and sensory abilities. We cannot question how useful those devices are for every day's activities but it is questionable how those devices respect our nature and address our needs of perceptive and emotive human beings. How far can those devices retrieve information about our nature, and our feelings, and what kind of information and reasoning those devices can provide to users? The proposed framework, by capturing and managing sensorial and physiological information, will feed information that enable the reasoning of emotional knowledge in an IoT environment.
Kibria, Muhammad Golam; Fattah, Sheik Mohammad Mostakim; Jeong, Kwanghyeon; Chong, Ilyoung; Jeong, Youn-Kwae
User-centric service features in a Web of Object-enabled Internet of Things environment can be provided by using a semantic ontology that classifies and integrates objects on the World Wide Web as well as shares and merges context-aware information and accumulated knowledge. The semantic ontology is applied on a Web of Object platform to virtualize the real world physical devices and information to form virtual objects that represent the features and capabilities of devices in the virtual world. Detailed information and functionalities of multiple virtual objects are combined with service rules to form composite virtual objects that offer context-aware knowledge-based services, where context awareness plays an important role in enabling automatic modification of the system to reconfigure the services based on the context. Converting the raw data into meaningful information and connecting the information to form the knowledge and storing and reusing the objects in the knowledge base can both be expressed by semantic ontology. In this paper, a knowledge creation model that synchronizes a service logistic model and a virtual world knowledge model on a Web of Object platform has been proposed. To realize the context-aware knowledge-based service creation and execution, a conceptual semantic ontology model has been developed and a prototype has been implemented for a use case scenario of emergency service.
Kibria, Muhammad Golam; Fattah, Sheik Mohammad Mostakim; Jeong, Kwanghyeon; Chong, Ilyoung; Jeong, Youn-Kwae
User-centric service features in a Web of Object-enabled Internet of Things environment can be provided by using a semantic ontology that classifies and integrates objects on the World Wide Web as well as shares and merges context-aware information and accumulated knowledge. The semantic ontology is applied on a Web of Object platform to virtualize the real world physical devices and information to form virtual objects that represent the features and capabilities of devices in the virtual world. Detailed information and functionalities of multiple virtual objects are combined with service rules to form composite virtual objects that offer context-aware knowledge-based services, where context awareness plays an important role in enabling automatic modification of the system to reconfigure the services based on the context. Converting the raw data into meaningful information and connecting the information to form the knowledge and storing and reusing the objects in the knowledge base can both be expressed by semantic ontology. In this paper, a knowledge creation model that synchronizes a service logistic model and a virtual world knowledge model on a Web of Object platform has been proposed. To realize the context-aware knowledge-based service creation and execution, a conceptual semantic ontology model has been developed and a prototype has been implemented for a use case scenario of emergency service. PMID:26393609
Full Text Available Internet is a useful tool for everybody in a technologically advanced world. As Internet appears and develops, it creates a totally new network environment. The development of commerce on the Internet based on virtual communities has become one of the most successful business models in the world. After analyzing the concept of internet, the e-commerce market and its marketing mix and the benefits and limitations of the Internet, we have presented a few studies on Internet user behaviour. Furthermore, the paper looks at a representative sample of Romanian internet users. The results reveal that the Romanians are using the Internet especially for information gathering, e-mail, entertainment and social networking.
Neriya-Ben Shahar, R. & Lev-On A.
We analyze patterns of rejection and adoption of new technology in a closed and conservative community through the study of ultra-Orthodox Jewish women working in computerized environments, and their perceptions and uses of the Internet. These women stand in the intersection between orthodoxy and modernity. Their workplaces are populated by ultra-Orthodox women and adjusted for their needs, but the companies that employ them are (mostly) owned by seculars, they work with computers, and (occas...
Yu-Chun Kuo1, 2, 2, 3, and 4
Full Text Available This paper reports research on the implementation of a web-based videoconferencing tool (Interwise for synchronous learning sessions on an industrial technology course offered through a university in northern Taiwan. The participants included undergraduate students from the same course offered in two different semesters. We investigated students’ perceptions of interactions with the instructor and fellow students, their confidence in utilizing the Internet (Internet self-efficacy, and the satisfaction level that students perceived throughout the learning process with Interwise. We also examined the effect of interactions and Internet self-efficacy on student satisfaction. Data collected through paper-based and online surveys were analyzed using correlation and multiple regression. The results revealed that overall, learners perceived Interwise as a tool that was moderately easy to use for synchronous learning. Learners seemed to prefer using the Interwise features, such as emotion icons, talk, or raise hand, to interact with their instructor. Learners had high confidence in gathering data or getting support through the Internet, but low confidence in resolving Internet related problems. Both learner-learner and learner-instructor interactions were significant predictors of student satisfaction, while Internet self-efficacy did not significantly contribute to satisfaction. Learner-instructor interaction was found to be the strongest predictor of student satisfaction.
Gritsenko Valentina Vasilievna
Full Text Available The purpose of this work is to describe the psychological characteristics of communication of forum members concerning the situation of forced separation of married couples in a situation of labor migration. Practical relevance and novelty of the work is to identify opportunities of the Internet environment for psychological support for migrant workers’ families. Through the method of content analysis of materials of the Internet forums, the motives for applying for psychological support of family members to the participants of virtual communication in the situations of labor migration are identified, the reactions of the forum members on the suggested topics are analyzed. It is noted that the actuality of applying to the Internet resources often occurs at the stage of taking a decision of labor migration, rarely - at the stage of separation, as a rule, by the remaining partner. Most forum members assess a situation of going of one of the partners to work critically, describing negative scenarios. The article deals with coping strategies described on the forum which are estimated as the point of support, the expansion of psychological experience in a situation of forced separation. The examples of adaptive, not adaptive or relatively adaptive coping mechanisms implemented by the Forum members are given. The final conclusion of the article is an overview of possibility of communication in the Internet forums to search for effective strategies for coping with the situation of forced separation due to migration.
Jara, Antonio J; Moreno-Sanchez, Pedro; Skarmeta, Antonio F; Varakliotis, Socrates; Kirstein, Peter
.... The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices...
Full Text Available Business environment incessantly bringing a yard of a new challenges to market entities. One of the greatest challenges that companies faced during the last couple of decades was development of information systems as well as a large scale usage of world's greatest computer network - Internet - no matter how big they were or what their activities included. There are many papers about Internet, its development, social and economic significance. However, there is no paper or article written by a local author that systematically and thoroughly treats marketing importance of Internet. This paper presents potentials and business importance of internet marketing in new millennium. It considers internet as a communication, trade and distribution channel. In addition, the paper highlights research potentials of Internet.
Full Text Available Internet Banking (known also as online banking allows performing transactions and payments over the internet through a bank's secure website. This can be very useful, especially for banking outside bank hours (which tend to be very short and banking from anywhere where internet access is available. In most cases a web browser such as Internet Explorer or Mozilla Firefox is utilized and any normal internet connection is suitable. No special software or hardware is usually needed.
Full Text Available With the development of the Internet, information security has attracted great attention in today’s society, and quantum cryptography communication network based on quantum key distribution (QKD is a very important part of this field, since the quantum key distribution combined with one-time-pad encryption scheme can guarantee the unconditional security of the information. The secret key generated by quantum key distribution protocols is a very valuable resource, so making full use of key resources is particularly important. Software definition network (SDN is a new type of network architecture, and it separates the control plane and the data plane of network devices through OpenFlow technology, thus it realizes the flexible control of the network resources. In this paper, a quantum cryptography communication network model based on SDN is proposed to realize the flexible control of quantum key resources in the whole cryptography communication network. Moreover, we propose a routing algorithm which takes into account both the hops and the end-to-end availible keys, so that the secret key generated by QKD can be used effectively. We also simulate this quantum cryptography communication network, and the result shows that based on SDN and the proposed routing algorithm the performance of this network is improved since the effective use of the quantum key resources.
Ranking players or teams in sports is of practical interests. From the viewpoint of networks, a ranking system is equivalent a centrality measure for sports networks, whereby a directed link represents the result of a single game. Previously proposed network-based ranking systems are derived from static networks, i.e., aggregation of the results of games over time. However, the score (i.e., strength) of a player, for example, depends on time. Defeating a renowned player in the peak performance is intuitively more rewarding than defeating the same player in other periods. To account for this factor, we propose a dynamic variant of such a network-based ranking system and apply it to professional men's tennis data. Our ranking system, also interpreted as a centrality measure for directed temporal networks, has two parameters. One parameter represents the exponential decay rate of the past score, and the other parameter controls the effect of indirect wins on the score. We derive a set of linear online update equ...
Bibliographical resources available in the Internet about dangerous substances and residues and their influence in the environment in the period 1975-2005 Recursos bibliográficos disponibles en Internet sobre sustancias y residuos peligrosos y su influencia en el medio ambiente en el periodo 1975 a 2005
Full Text Available Introduction. The Internet has become the most used source of biomedical information. The documentation, produced by the public and private institutions, in relation with the dangerous substances that can recover in the Internet is fundamental for the prevention of this type of risks. Objective. To locate and to check the available documents in the Internet about dangerous substances, dangerous residues, including inert, and his influence in the environment in the period 1975 - 2005. Material and Method. Descriptive and cross sectional study of the results of the bibliographical searches made in the Internet, in the corresponding databases. Results. It has been recognized 162 records that expire with the requirements indicated in the pre-established methodology. Discussion. With respect to the environmental documentation present in the Internet it seems to be suitable to increase his diffusion and to improve his classification and accessibility.Introducción. Internet se ha convertido en una fuente de información biomédica cada vez más utilizada. La documentación producida por las instituciones públicas y privadas, en relación con las sustancias peligrosas que se pueden recuperar en Internet, es fundamental para la prevención de este tipo de riesgos. Objetivo. Localizar y revisar los documentos disponibles en Internet sobre sustancias peligrosas, residuos peligrosos, incluyendo inertes, y su influencia en el medio ambiente en el periodo 1975 a 2005. Material y método. Estudio descriptivo transversal de los resultados de las búsquedas bibliográficas efectuadas en Internet, en las correspondientes bases de datos. Resultados. Se han reconocido 162 registros que cumplen con los requisitos señalados en la metodología preestablecida. Discusión. Con respecto a la documentación medioambiental pre- sente en Internet, parece conveniente incrementar su difusión y mejorar su clasificación y accesibilidad.
This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet
This thesis contributes a novel concept for introducing new network technologies in network infrastructures. The concept, called Internet factories, describes the methodical process to create and manage application-specific networks from application programs, referred to as Netapps. An Internet
Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm
A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect.......A paper on the economics of the Internet with respect to end user pricing and pricing og interconnect....
Henten, Anders; Skouby, Knud Erik; Øst, Alexander Gorm
Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing.......Article descibing and analysing the influence of the commercialisation of Internet on end-user and interconnect pricing....
el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.
This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and
Pras, Aiko; van Beijnum, Bernhard J.F.; Sprenkels, Ron; Parhonyi, R.
This article provides an introduction to Internet accounting and discusses the status of related work within the IETF and IRTF, as well as certain research projects. Internet accounting is different from accounting in POTS. To understand Internet accounting, it is important to answer questions like
Full Text Available Paper discuss specific features of internet plan as well as planning as management process in general in the contemporary environment. No need to stress out that marketing plan and marketing planning is core activity in approaching to market. At the same time, there are a lot specific c request in preparing marketing plan comparing to business planning due to marketing plan is an essential part. The importance of internet plan and planning rely on specific features of the internet network but as a part of general corporate as well as marketing strategy.
Yu, Fei; Zeng, An; Gillard, Sébastien; Medo, Matúš
Recommender systems are a vital tool that helps us to overcome the information overload problem. They are being used by most e-commerce web sites and attract the interest of a broad scientific community. A recommender system uses data on users' past preferences to choose new items that might be appreciated by a given individual user. While many approaches to recommendation exist, the approach based on a network representation of the input data has gained considerable attention in the past. We review here a broad range of network-based recommendation algorithms and for the first time compare their performance on three distinct real datasets. We present recommendation topics that go beyond the mere question of which algorithm to use-such as the possible influence of recommendation on the evolution of systems that use it-and finally discuss open research directions and challenges.
In the first decade of the 21st century, New Product Development has undergone major changes in the way NPD is managed and organised. This is due to changes in technology, market demands, and in the competencies of companies. As a result NPD organised in different forms of networks is predicted...... to be of ever-increasing importance to many different kinds of companies. This happens at the same times as the share of new products of total turnover and earnings is increasing at unprecedented speed in many firms and industries. The latter results in the need for very fast innovation and product development...... - a need that can almost only be resolved by organising NPD in some form of network configuration. The work of Peter Lindgren is on several aspects of network based high speed product innovation and contributes to a descriptive understanding of this phenomenon as well as with normative theory on how NPD...
Salazar Soler, Jorge; Silvestre Bergés, Santiago
This is an introductory course to the IoT (Internet of things). In the early chapters the basics about the IoT are introduced. Then basics of IPv6 internet protocol that is the most used in IoT environment as well as main applications, the current state of the market and the technologies that enable the existence of the IoT are described. Finally the future challenges that are considered most important are discussed. Peer Reviewed
Rassia, Stamatina; Steiner, Henriette
Navigating the Internet of Things is an exploration of interconnected objects, functions, and situations in networks created to ease and manage our daily lives. The Internet of Things represents semi-automated interconnections of different objects in a network based on different information...... technologies. Some examples of this are presented here in order to better understand, explain, and discuss the elements that compose the Internet of Things. In this chapter, we provide a theoretical and practical perspective on both the micro- and macro-scales of ‘things’ (objects), small and large (e.......g. computers or interactive maps), that suggest new topographic relationships and challenge our understanding of users’ involvement with a given technology against the semi-automated workings of these systems. We navigate from a philosophical enquiry into the ‘thingness of things’ dating from the 1950s...
Ebrahimi, Nabi A.; Eskandari, Zahra; Rahimi, Ali
This study aims to explore the effects of implementing a CALL framework on the students' perceptions of their communication classroom environments. The What Is Happening In This Class? (WIHIC) questionnaire was distributed twice among 34 (F=14 and M=20) Iranian EFL students, the first time after a ten-session-long regular no-tech communication…
Elson, L.; Allen, M.; Goldsmith, J.; Orton, M.; Weibel, W.
In today's heterogeneous computing environment of proliferating platforms and operating systems, the Internet, through the World Wide Web (WWW), is becoming the preferred interface to much of the world's archive of digital data.
Leinonen, Harry; Lumiala, Veli-Matti; Sarlin, Riku
Payment systems are undergoing rapid and fundamental changes stimulated largely by technological progress especially distributed network technology and real-time processing. Internet and e-commerce will have a major impact on payment systems in the future. User demands and competition will speed up developments. Payment systems will move from conventions that were originally paper-based to truly network-based solutions. This paper presents a solution – E-Settlement – for improving interbank s...
Syed Hassan Ahmed; Dongkyun Kim
Named data networking (NDN) treats content/data as a “first class citizen” of the network by giving it a “name”. This content “name” is used to retrieve any information, unlike in device-centric networks (i.e., the current Internet), which depend on physical IP addresses. Meanwhile, the smart home concept has been gaining attention in academia and industries; various low-cost embedded devices are considered that can sense, process, store, and communicate data autonomously. In this paper, we s...
Full Text Available We introduce and develop a new network-based and binless methodology to perform frequency analyses and produce histograms. In contrast with traditional frequency analysis techniques that use fixed intervals to bin values, we place a range ±ζ around each individual value in a data set and count the number of values within that range, which allows us to compare every single value of a data set with one another. In essence, the methodology is identical to the construction of a network, where two values are connected if they lie within a given a range (±ζ. The value with the highest degree (i.e., most connections is therefore assimilated to the mode of the distribution. To select an optimal range, we look at the stability of the proportion of nodes in the largest cluster. The methodology is validated by sampling 12 typical distributions, and it is applied to a number of real-world data sets with both spatial and temporal components. The methodology can be applied to any data set and provides a robust means to uncover meaningful patterns and trends. A free python script and a tutorial are also made available to facilitate the application of the method.
Mass spectrometry (MS)-based proteomics is a widely used and powerful tool for profiling systems-wide protein expression changes. It can be applied for various purposes, e.g. biomarker discovery in diseases and study of drug responses. Although RNA-based high-throughput methods have been useful in providing glimpses into the underlying molecular processes, the evidences they provide are indirect. Furthermore, RNA and corresponding protein levels have been known to have poor correlation. On the other hand, MS-based proteomics tend to have consistency issues (poor reproducibility and inter-sample agreement) and coverage issues (inability to detect the entire proteome) that need to be urgently addressed. In this talk, I will discuss how these issues can be addressed by proteomic profile analysis techniques that use biological networks (especially protein complexes) as the biological context. In particular, I will describe several techniques that we have been developing for network-based analysis of proteomics profile. And I will present evidence that these techniques are useful in identifying proteomics-profile analysis results that are more consistent, more reproducible, and more biologically coherent, and that these techniques allow expansion of the detected proteome to uncover and/or discover novel proteins.
Lehr, William H.; Pupillo, Lorenzo Maria
The Internet is now widely regarded as essential infrastructure for our global economy and society. It is in our homes and businesses. We use it to communicate and socialize, for research, and as a platform for E-commerce. In the late 1990s, much was predicted about what the Internet has become at present; but now, we have actual experience living with the Internet as a critical component of our everyday lives. Although the Internet has already had profound effects, there is much we have yet to realize. The present volume represents a third installment in a collaborative effort to highlight the all-encompassing, multidisciplinary implications of the Internet for public policy. The first installment was conceived in 1998, when we initiated plans to organize an international conference among academic, industry, and government officials to discuss the growing policy agenda posed by the Internet. The conference was hosted by the European Commission in Brussels in 1999 and brought together a diverse mix of perspectives on what the pressing policy issues would be confronting the Internet. All of the concerns identified remain with us today, including how to address the Digital Divide, how to modify intellectual property laws to accommodate the new realities of the Internet, what to do about Internet governance and name-space management, and how to evolve broadcast and telecommunications regulatory frameworks for a converged world.
Opinnäytetyön tavoitteena on selvittää matkustajien halukkuutta käyttää Internet-yhteyttä lentokoneissa, matkustajien käyttökynnystä ottaa Internet käyttöön sekä kartoittaa mitä tarkoitusta varten matkustajat käyttäisivät Internet-yhteyttä. Tutkimuksessa vastaajat jaettiin erilaisiin ryhmiin sukupuolen, iän sekä koulutuksen mukaan. Tällä saavutettiin tutkimuksessa tarkennuksia, joilla pyrittiin selvittämään myös erilaisten ryhmien tarve Internet-yhteydelle. Opinnäytetyö tehtiin yleisesti ...
Internet addiction is defined as uncontrolled and harmful use of Internet, which manifests in three forms: gaming, various sexual activities and excessive use of emails, chats or SMS messaging. Several studies have found that abuse of alcohol and other substances, depression and other health problems are associated with Internet addiction. In boys and men depression may be more a consequence of the addiction than a cause for it. ADHD seems to be a significant background factor for developing the condition. Because it is almost impossible to lead a life without Internet and computers nowadays, it is unrealistic to aim towards full abstinence. Treatment has generally followed the guidelines adapted for pathological gambling.
This paper introduces a universal real-time control platform for complex research and development (R&D) based products design. The inherent complexity in R&D projects makes products development a difficult task to undertake. The use of state of the art development tools for modeling, simulation, and hardware-in-the-loop (HIL) validation contributes to a complexity reduction. However, R&D projects still require significant development time since many design iterations are usually necessary before final solution, which increases the cost. In most R&D processes, these tools are not used beyond rapid prototyping since development for mass production is usually performed in another environment, using different tools. This paper presents a fast and cost effective way of R&D-based products development, speeding-up time to market.
Syed Hassan Ahmed
Full Text Available Named data networking (NDN treats content/data as a “first class citizen” of the network by giving it a “name”. This content “name” is used to retrieve any information, unlike in device-centric networks (i.e., the current Internet, which depend on physical IP addresses. Meanwhile, the smart home concept has been gaining attention in academia and industries; various low-cost embedded devices are considered that can sense, process, store, and communicate data autonomously. In this paper, we study NDN in the context of smart-home communications, discuss the preliminary evaluations, and describe the future challenges of applying NDN in smart-home applications.
Valkenburg, P.M.; Peter, J.; Levesque, R.J.R.
Adolescents’ extensive use of Internet communication and the uncertainty about its consequences call for an integrative perspective that helps to understand both the appeal of Internet communication and its risks and opportunities. The aim of this essay is to theorize, and if possible, substantiate
Full Text Available Internet of Vehicles (IoV is a leading technology of the present era. It has gained huge attention with respect to its implementation in wide variety of domains ranging from traffic safety to infotainment applications. However, IoV can also be extended to healthcare domain, where the patients can be provided healthcare services on-the-fly. We extend this novel concept in this paper and refer it as “Healthcare services on-the-fly”. The concept of game theory has been used among the vehicles to access the healthcare services while traveling. The vehicles act as players in the game and tend to form and split coalitions to access these services. Learning automata (LA act as the players for interaction with the environment and take appropriate actions based on reward and penalty. Apart from this, Virtual Machine (VM scheduling algorithm for efficient utilization of resources at cloud level has also been formulated. A stochastic reward net (SRN-based model is used to represent the coalition formation and splitting with respect to availability of resources at cloud level. The performance of the proposed scheme is evaluated using various performance evaluation metrics. The results obtained prove the effectiveness of the proposed scheme in comparison to the best, first, and random fit schemes.
Podgórski, Daniel; Majchrzycka, Katarzyna; Dąbrowska, Anna; Gralewicz, Grzegorz; Okrasa, Małgorzata
Recent developments in domains of ambient intelligence (AmI), Internet of Things, cyber-physical systems (CPS), ubiquitous/pervasive computing, etc., have led to numerous attempts to apply ICT solutions in the occupational safety and health (OSH) area. A literature review reveals a wide range of examples of smart materials, smart personal protective equipment and other AmI applications that have been developed to improve workers' safety and health. Because the use of these solutions modifies work methods, increases complexity of production processes and introduces high dynamism into thus created smart working environments (SWE), a new conceptual framework for dynamic OSH management in SWE is called for. A proposed framework is based on a new paradigm of OSH risk management consisting of real-time risk assessment and the capacity to monitor the risk level of each worker individually. A rationale for context-based reasoning in SWE and a respective model of the SWE-dedicated CPS are also proposed.
The Internet goose has laid countless golden eggs, along with a growing number of rotten ones. But it's the rotten ones that now tempt commercial, governmental, and consumer interests to threaten the Internet's uniquely creative power. The expediently selected, almost accidentally generative properties of the Internet - its technical openness, ease of access and mastery, and adaptability - have combined, especially when coupled with those of the PC, to produce an unsurpassed environment for innovative experiment. Those same properties, however, also make the Internet hospitable to various forms of wickedness: hacking, porn, spam, fraud, theft, predation, and attacks on the network itself. As these undesirable phenomena proliferate, business, government, and many users find common cause for locking down Internet and PC architecture in the interests of security and order. PC and Internet security vulnerabilities are a legitimate menace. However, the most likely reactions - if they are not forestalled - will be at least as unfortunate as the security problems themselves. Consider the growing profusion of "tethered appliances" - devices whose functions cannot readily be altered by their owners (think TiVo). Such appliances take Internet innovations and wrap them up in a neat, easy-to-use package, which is good - but only if the Internet and PC can remain sufficiently in the center of the digital ecosystem to produce the next round of innovations and to generate competition. People buy these devices for their convenience or functionality and may appreciate the fact that they are safer to use (they limit the damage users can do through ignorance or carelessness). But the risk is that users, by migrating to such appliances, will unwittingly trade away the future benefits of generativity - a loss that will go unappreciated even as innovation tapers off.
The term environment refers to the internal and external context in which organizations operate. For some scholars, environment is defined as an arrangement of political, economic, social and cultural factors existing in a given context that have an impact on organizational processes and structures....... For others, environment is a generic term describing a large variety of stakeholders and how these interact and act upon organizations. Organizations and their environment are mutually interdependent and organizational communications are highly affected by the environment. This entry examines the origin...... and development of organization-environment interdependence, the nature of the concept of environment and its relevance for communication scholarships and activities....
Jyotsna; Kapil; Aayush
Censorship on Internet has always wet its hands in the water of controversies, It is said to go in with synonym of "FILTERING THE NET" i.e. Either done to protect minors or for nationís privacy, some take it as snatching their freedom over internet and some take it as an appropriate step to protect minor, It has its supporters as well as opponents.Google has reported a whooping number of requests from Governments of U.K, China, Poland, Spain, and Canada to remove videos and search links that led to harassment, sensitive issues or suspicious people. This paper deals with the cons of censorship on internet and to make people aware of the fact that Internet is not a single body owned by an org. but an open sky of information shared equally by all. Research done has found out many unseen aspects of different people's view point.
Guney, Emre; Menche, Jörg; Vidal, Marc; Barábasi, Albert-László
.... Here, we take advantage of our increasing understanding of the network-based origins of diseases to introduce a drug-disease proximity measure that quantifies the interplay between drugs targets and diseases...
Dragos Marcel VESPAN
The Academy of Economic Studies has more than 45000 students and about 5000 computers with Internet access which are connected to AES network. Students can access internet on these computers through a proxy server which stores information about the way the Internet is accessed. In this paper, we describe the process of discovering internet user behavior models by analyzing proxy server raw data and we emphasize the importance of such models for the e-learning environment.
Full Text Available The Academy of Economic Studies has more than 45000 students and about 5000 computers with Internet access which are connected to AES network. Students can access internet on these computers through a proxy server which stores information about the way the Internet is accessed. In this paper, we describe the process of discovering internet user behavior models by analyzing proxy server raw data and we emphasize the importance of such models for the e-learning environment.
Steinberger, Jessica; Schehlmann, Lisa; Abt, Sebastian; Baier, Harald; Doyen, Guillaume; Waldburger, Martin; Celeda, Pavel; Sperotto, Anna; Stiller, Burkhard
Network-based attacks pose a strong threat to the Internet landscape. There are different possibilities to encounter these threats. On the one hand attack detection operated at the end-users' side, on the other hand attack detection implemented at network operators' infrastructures. An obvious
The term “internet sexuality” (or OSA, online sexual activities) refers to sexual-related content and activities observable on the internet (cf. Adams, Oye, & Parker, 2003; Cooper, McLoughlin, & Campbell, 2000; Leiblum & Döring, 2002). It designates a variety of sexual phenomena (e.g., pornography, sex education, sexual contacts) related to a wide spectrum of online services and applications (e.g., websites, online chat rooms, peer-to-peer networks). If an even broader range of computer networks - such as the Usenet or bulletin board systems - is included in this extensional definition, one speaks of “online sexuality” or “cybersexuality.”
Nakayama, Hideki; Higuchi, Susumu
Internet technologies have made a rapid progress, bringing convenience to daily life. On the other hand, internet use disorder and internet addiction (IA) have become reportedly serious health and social problems. In 2013, internet gaming disorder criteria have been proposed in the section of Conditions for Further Study of DSM-5. Existing epidemiological studies by questionnaire methods have reported that the prevalence of IA ranges between 2.8% and 9.9% among youths in Japan. Attention deficit hyperactivity disorder (ADHD), sleeping disorders, depression, obsessive compulsive disorder, and phobic anxiety disorder are extremely common comorbid mental disorders with IA. Some psychotherapies (e.g., cognitive behavioral therapy, motivational interviewing) and medical treatments (e.g., antidepressant drugs, methylphenidate) for comorbid mental disorders as well as rehabilitation (e.g., treatment camp) are effective for IA remission. However, some serious cases of IA may be difficult to treat, and prevention is very important. In future, the prevention, rehabilitations and treatments for IA will be more required in Japan.
Cost effective generation of electricity is vital to the economic growth and stability of this nation. To accomplish this goal a balanced portfolio of fuel sources must be maintained and established which not only addresses the cost of conversion of these energy sources to electricity, but also does so in an efficient and environmentally sound manner. Conversion of coal as an energy source to produce steam for a variety of systems has been a cornerstone of modern industry. However, the use of coal in combustion systems has traditionally produced unacceptable levels of gaseous and particulate emissions, albeit that recent combustion, removal and mitigation techniques have drastically reduced these levels. With the combustion of coal there is always the formation and deposition of ash and slag within the boilers. This adversely affects the rate at which heat is transferred to the working fluid, which in the case of electric generators is water/steam. The fouling of the boiler leads to poor efficiencies due to the fact that heat which could normally be transferred to the working fluid remains in the flue gas stream and exits to the environment without beneficial use. This loss in efficiency translates to higher consumption of fuel for equivalent levels of electric generation; hence more gaseous emissions are also produced. Another less obvious problem exists with fouling of various sections of the boiler creating intense peak temperatures within and around the combustion zone. Total nitrogen oxides (NOx) generation is primarily a function of both ''fuel'' and ''thermal'' NOx production. Fuel NOx which generally comprises 20%-40% of the total NOx generated is predominantly influenced by the levels of oxygen present, while thermal NOx which comprises the balance is a function of temperature. As the fouling of the boiler increases and the rate of heat transfer decreases, peak temperatures increase as does the thermal NOx production
Cheung, Samson H.; VanDalsem, William (Technical Monitor)
Combining multiple engineering workstations into a network-based heterogeneous parallel computer allows application of aerodynamic optimization with advance computational fluid dynamics codes, which is computationally expensive in mainframe supercomputer. This paper introduces a nonlinear quasi-Newton optimizer designed for this network-based heterogeneous parallel computer on a software called Parallel Virtual Machine. This paper will introduce the methodology behind coupling a Parabolized Navier-Stokes flow solver to the nonlinear optimizer. This parallel optimization package has been applied to reduce the wave drag of a body of revolution and a wing/body configuration with results of 5% to 6% drag reduction.
Tokunaga, Robert Shota
This article extends theory on the deficient self-regulation (DSR) of Internet use and media habits by integrating predictors relevant to technology use. It introduces novelty perceptions of a technology and flow as conditions that increase the likelihood of experiencing DSR and media habits. An experiment, with between- and within-subjects…
Full Text Available In order to temporally recover the information network infrastructure in disaster areas from the Great East Japan Earthquake in 2011, various wireless network technologies such as satellite IP network, 3G, and Wi-Fi were effectively used. However, since those wireless networks are individually introduced and installed but not totally integrated, some of networks were congested due to the sudden network traffic generation and unbalanced traffic distribution, and eventually the total network could not effectively function. In this paper, we propose a disaster resilient network which integrates various wireless networks into a cognitive wireless network that users can use as an access network to the Internet at the serious disaster occurrence. We designed and developed the disaster resilient network based on software defined network (SDN technology to automatically select the best network link and route among the possible access networks to the Internet by periodically monitoring their network states and evaluate those using extended AHP method. In order to verify the usefulness of our proposed system, a prototype system is constructed and its performance is evaluated.
Full Text Available It has now become quite obvious that the Internet has brought significant changes to our society and a break on how we lived before its emergence. It is still too early to assess the impact on society of the new services at our disposal, such as the capacity to communicate faster and cheaper on a global scale, access information and, perhaps more importantly, to produce and disseminate information in a way that is accessible to all.It is clear that the advent of the Information Society implies changes in our society that constitute a point of no return. However, contrary to what happened when we entered the Industrial Age about three centuries ago, when the changing process was slow and led by older individuals, these days the entrance into the Information Society is taking place rapidly and the decisive players are younger people. The global nature of the Internet, the possibility of producing and distributing any type of content in digital form at almost zero cost, as well as the vast number of people who use the web, have highlighted the need for new forms of intervention in a sector where there are many types of players. It is in this context that the problem of Internet Governance becomes a very current issue, inasmuch as one feels the need to guarantee a diversity of rights and duties, which may appear difficult to reconcile.This paper presents a brief overview of the main players and initiatives which, in the field of Internet Governance, have tried to contribute to turning this network into a factor for social development and democraticity on a global scale.
Bayramoglu, Enis; Ravn, Ole; Poulsen, Niels Kjølstad
In this paper we present a toolbox enabling easy evaluation and comparison of dierent ltering algorithms. The toolbox is called Kalmtool and is a set of MATLAB tools for state estimation of nonlinear systems. The toolbox now contains functions for Articial Neural Network Based State Estimation...
Stokking, H.M.; Deventer, M.O. van; Niamut, O.A.; Walraven, F.A.; Mekuria, R.N.
This paper introduces a novel network-based approach to inter-destination media synchronization. The approach meets the need for synchronization in advanced TV concepts like social TV and offers high scalability, unlike conventional end-point based approaches. The solution for interdestination media
Full Text Available Speed is an important parameter of an inspection system. Inline computed tomography systems exist but are generally expensive. Moreover, their throughput is limited by the speed of the reconstruction algorithm. In this work, we propose a Neural Network-based Hilbert transform Filtered Backprojection (NN-hFBP method to reconstruct objects in an inline scanning environment in a fast and accurate way. Experiments based on apple X-ray scans show that the NN-hFBP method allows to reconstruct images with a substantially better tradeoff between image quality and reconstruction time.
Sharabi, Adi; Margalit, Malka
This study evaluated a multidimensional model of loneliness as related to risk and protective factors among adolescents with learning disabilities (LD). The authors aimed to identify factors that mediated loneliness among 716 adolescents in Grades 10 through 12 who were studying in high schools or in Youth Education Centers for at-risk populations. There were 334 students with LD, divided into subgroups according to disability severity (three levels of testing accommodations), and 382 students without LD. Five instruments measured participants' socioemotional characteristics: loneliness, Internet communication, mood, and social and academic achievement-oriented motivation. Using structural equation modeling, the results confirmed the loneliness model and revealed that the use of the Internet to support interpersonal communication with friends predicted less intense loneliness, whereas virtual friendships with individuals whom students knew only online predicted greater loneliness. Positive and negative mood and motivation also predicted students' loneliness. In addition, the severity of LD predicted stronger loneliness feelings.
Full Text Available Instability - unpredictable but constant change in one’s environment and the means with which one deals with it - has replaced convergence as the focal problem for telecommunications policy in general and internet policy in particular. Those who designed what we now call the internet during the first decade of the effort (1969-1979, who in essence served simultaneously as its policy-makers, developed techniques for coping with instability of value for network designers today and for those involved with any kind of large-scale sociotechnical infrastructure. Analysis of the technical document series that was medium for and record of that design process reveals coping techniques that began with defining the problem and went on to include conceptual labour, social practices, and technical approaches.
Tsitsika, Artemis; Critselis, Elena; Kormas, Georgios; Filippopoulou, Anastasia; Tounissidou, Despoina; Freskou, Aliki; Spiliopoulou, Theodora; Louizou, Amalia; Konstantoulaki, Eleftheria; Kafetzis, Dimitrios
The internet is an integral tool for information, communication, and entertainment among adolescents. As adolescents devote increasing amounts of time to utilizing the internet, the risk for adopting excessive and pathological internet use is inherent. The study objectives include assessing the characteristics and predictors of excessive internet use and evaluating the prevalence of pathological internet use among Greek adolescents. A cross-sectional study design was applied to this effect. The study population (n = 897) consisted of a random sample of adolescents residing in Athens, Greece. Self-completed questionnaires, pertaining to internet access characteristics and Young's Internet Addiction Scale (YIAS) score, were applied in order to investigate the study objectives. The multivariate regression analysis indicated that the most significant predictors of overall internet use included accessing the internet via one's own home portal and for the purpose of social interaction. Internet access via the school environment was a significant deterrent among low (1-3 h/week) internet users, while access via internet cafés was a significant predictor for high (11-20 h/week) internet users. Moreover, accessing the internet for the purposes of game playing was the most significant predictor for excessive (>20 h/week) internet use. The prevalence of borderline internet use among the study population was 12.8%, while 1.00% reported addictive internet use. Also, 10.4% of male excessive internet users reported addictive internet use (p internet use is predicted solely by the location of internet access (own home portal) and the scope of internet use (i.e., sites relating to socialization and game playing) and may lead to internet addiction, particularly among male adolescents.
Gernsbacher, Morton Ann
Google the question, "How is the Internet changing the way we communicate?," and you will find no shortage of opinions, or fears, about the Internet altering the way we communicate. Although the Internet is not necessarily making communication briefer (neither is the Internet making communication less formal), the Internet is manifesting…
Lukose, Rajan Mathew
The World Wide Web and the Internet are rapidly expanding spaces, of great economic and social significance, which offer an opportunity to study many phenomena, often previously inaccessible, on an unprecedented scale and resolution with relative ease. These phenomena are measurable on the scale of tens of millions of users and hundreds of millions of pages. By virtue of nearly complete electronic mediation, it is possible in principle to observe the time and ``spatial'' evolution of nearly all choices and interactions. This cyber-space therefore provides a view into a number of traditional research questions (from many academic disciplines) and creates its own new phenomena accessible for study. Despite its largely self-organized and dynamic nature, a number of robust quantitative regularities are found in the aggregate statistics of interesting and useful quantities. These regularities can be understood with the help of models that draw on ideas from statistical physics as well as other fields such as economics, psychology and decision theory. This thesis develops models that can account for regularities found in the statistics of Internet congestion and user surfing patterns and discusses some practical consequences. practical consequences.
Cai, Baoping; Liu, Yonghong; Huang, Lei; Hu, Song; Xue, Haitao; Wang, Jiaxing
The paper proposes a Bayesian-network-based real-time fault diagnosis methodology of M-shaped subsea jumper. Finite element models of a typical M-shaped subsea jumper system are built to get the data for diagnosis. Netica is Bayesian-network -based software and is used to construct diagnosis models of the jumper in two main loading conditions which are falling objects and seabed moving. The results show that the accuracy of falling objects diagnosis model with four faults is 100%, and the accuracy of seabed moving diagnosis model with two faults is also 100%. Combine the two models into one and the accuracy of combined model is 96.59%. The effectiveness of the proposed method is validated.
Motegi, Shun; Masuda, Naoki
From the viewpoint of networks, a ranking system for players or teams in sports is equivalent to a centrality measure for sports networks, whereby a directed link represents the result of a single game. Previously proposed network-based ranking systems are derived from static networks, i.e., aggregation of the results of games over time. However, the score of a player (or team) fluctuates over time. Defeating a renowned player in the peak performance is intuitively more rewarding than defeating the same player in other periods. To account for this factor, we propose a dynamic variant of such a network-based ranking system and apply it to professional men's tennis data. We derive a set of linear online update equations for the score of each player. The proposed ranking system predicts the outcome of the future games with a higher accuracy than the static counterparts.
Motegi, Shun; Masuda, Naoki
From the viewpoint of networks, a ranking system for players or teams in sports is equivalent to a centrality measure for sports networks, whereby a directed link represents the result of a single game. Previously proposed network-based ranking systems are derived from static networks, i.e., aggregation of the results of games over time. However, the score of a player (or team) fluctuates over time. Defeating a renowned player in the peak performance is intuitively more rewarding than defeating the same player in other periods. To account for this factor, we propose a dynamic variant of such a network-based ranking system and apply it to professional men's tennis data. We derive a set of linear online update equations for the score of each player. The proposed ranking system predicts the outcome of the future games with a higher accuracy than the static counterparts.
Hong, Joo-Hyun; Cha, Eun-Jong; Lee, Tae-Soo
In this study, cellular phone network based portable ECG device was developed and three experiments were performed to evaluate the accuracy, reliability and operability, applicability during daily life of the developed device. First, ECG signals were measured using the developed device and Biopac device (reference device) during sitting and marking time and compared to verify the accuracy of R-R intervals. Second, the reliable data transmission to remote server was verified on two types of simulated emergency event using patient simulator. Third, during daily life with five types of motion, accuracy of data transmission to remote server was verified on two types of event occurring. By acquiring and comparing subject's biomedical signal and motion signal, the accuracy, reliability and operability, applicability during daily life of the developed device were verified. Therefore, cellular phone network based portable ECG device can monitor patient with inobtrusive manner.
Full Text Available One of the most important roles in the machine learning area is to classify, and neural networks are very important classifiers. However, traditional neural networks cannot identify intervals, let alone classify them. To improve their identification ability, we propose a neural network-based interval matcher in our paper. After summarizing the theoretical construction of the model, we take a simple and a practical weather forecasting experiment, which show that the recognizer accuracy reaches 100% and that is promising.
conventional WSN . VSN enabled closed loop system consumes more energy than the VSN only system, because of the commands that are send to the nodes. Energy ...predict future plume behavior. This proof-of-concept research aimed at demonstrating the use of an intelligent Wireless Sensor Network ( WSN ) to...Network ( WSN ) to monitor contaminant plume movement in naturally heterogeneous subsurface formations to advance the sensor networking based monitoring
Bae, Tae-Suk; Grejner-Brzezinska, Dorota; Mader, Gerald; Dennis, Michael
New guidelines and procedures for real-time (RT) network-based solutions are required in order to support Global Navigation Satellite System (GNSS) derived heights. Two kinds of experiments were carried out to analyze the performance of the network-based real-time kinematic (RTK) solutions. New test marks were installed in different surrounding environments, and the existing GPS benchmarks were used for analyzing the effect of different factors, such as baseline lengths, antenna types, on the final accuracy and reliability of the height estimation. The RT solutions are categorized into three groups: single-base RTK, multiple-epoch network RTK (mRTN), and single-epoch network RTK (sRTN). The RTK solution can be biased up to 9 mm depending on the surrounding environment, but there was no notable bias for a longer reference base station (about 30 km) In addition, the occupation time for the network RTK was investigated in various cases. There is no explicit bias in the solution for different durations, but smoother results were obtained for longer durations. Further investigation is needed into the effect of changing the occupation time between solutions and into the possibility of using single-epoch solutions in precise determination of heights by GNSS.
The Open Mode Integrated Transportation System (OMITS) forms a sustainable information infrastructure for communication within and between the mobile/Internet network, the roadway : network, and the users social network. It manipulates the speed g...
The paper is also concerned with the most common applications of Internet-based activities, suchas communication, information retrieval, and information publishing. Internet access has broughtabout new virtual learning environments and consequently, new learning experiences for thestudents: they can attend lessons or sessions when they want, they can log on from differentlocations, and they are offered new opportunities for communication.
Simpson, R L
Despite all the media hype, critical security issues do surround the Internet. Nurses need to ask two key questions: How is the Internet used in my organization and What kind of Internet connection do we have?
Cheok, Adrian David
Poultry are one of the most badly treated animals in the modern world. It has been shown that they have high levels of both cognition and feelings, and as a result there has been a recent trend of promoting poultry welfare. There is also a tradition of keeping poultry as pets in some parts of the world. However, in modern cities and societies, it is often difficult to maintain contact with pets, particularly for office workers. We propose and describe a novel cybernetics system to use mobile and Internet technology to improve human-pet interaction. It can also be used for people who are allergic to touching animals and thus cannot stroke them directly. This interaction encompasses both visualization and tactile sensation of real objects.
Waldersen, Matt; Schnarr, Otto, III
The primary topics of this presentation describe the testing of network based telemetry and RF modulation techniques. The overall intend is to aid the aerospace industry in transitioning to a network based telemetry system.
Ghiassian, Susan Dina
With the availability of large-scale data, it is now possible to systematically study the underlying interaction maps of many complex systems in multiple disciplines. Statistical physics has a long and successful history in modeling and characterizing systems with a large number of interacting individuals. Indeed, numerous approaches that were first developed in the context of statistical physics, such as the notion of random walks and diffusion processes, have been applied successfully to study and characterize complex systems in the context of network science. Based on these tools, network science has made important contributions to our understanding of many real-world, self-organizing systems, for example in computer science, sociology and economics. Biological systems are no exception. Indeed, recent studies reflect the necessity of applying statistical and network-based approaches in order to understand complex biological systems, such as cells. In these approaches, a cell is viewed as a complex network consisting of interactions among cellular components, such as genes and proteins. Given the cellular network as a platform, machinery, functionality and failure of a cell can be studied with network-based approaches, a field known as systems biology. Here, we apply network-based approaches to explore human diseases and their associated genes within the cellular network. This dissertation is divided in three parts: (i) A systematic analysis of the connectivity patterns among disease proteins within the cellular network. The quantification of these patterns inspires the design of an algorithm which predicts a disease-specific subnetwork containing yet unknown disease associated proteins. (ii) We apply the introduced algorithm to explore the common underlying mechanism of many complex diseases. We detect a subnetwork from which inflammatory processes initiate and result in many autoimmune diseases. (iii) The last chapter of this dissertation describes the
Chao, Tien-Hsin; Stoner, William W.
Multichannel optical correlator implements shift-invariant, high-discrimination pattern-recognizing neural network based on paradigm of neocognitron. Selected as basic building block of this neural network because invariance under shifts is inherent advantage of Fourier optics included in optical correlators in general. Neocognitron is conceptual electronic neural-network model for recognition of visual patterns. Multilayer processing achieved by iteratively feeding back output of feature correlator to input spatial light modulator and updating Fourier filters. Neural network trained by use of characteristic features extracted from target images. Multichannel implementation enables parallel processing of large number of selected features.
Hu, Liang; Ren, Liang; Lin, Wenbin
Recommendation algorithms based on bipartite networks have become increasingly popular, thanks to their accuracy and flexibility. Currently, many of these methods ignore users' negative ratings. In this work, we propose a method to exploit negative ratings for the network-based inference algorithm. We find that negative ratings play a positive role regardless of sparsity of data sets. Furthermore, we improve the efficiency of our method and compare it with the state-of-the-art algorithms. Experimental results show that the present method outperforms the existing algorithms.
Each innovation brings along many risks. One of the risks related with the Internet use is Internet addiction. The aim of this study is to examine Internet addiction in adolescence in terms of gender, Internet access at home and grades. The research design used was survey method. The study population consisted of second stage students attending…
Het huidige Internet is niet echt geschikt voor interactieve toepassingen zoals telefonie en video-vergaderen. Omdat er toch veel behoefte is aan dit soort toepassingen, wordt er in het kader van Internet-2, de Internet Engineering Task Force (IETF) alsmede de Internet Research Task Force (IRTF)
Seiden, Peggy; And Others
Six articles describe various Internet applications, including a campuswide information system that uses Gopher; using an X Windows interface for Internet access; electronic text projects; the Nevada Academic Libraries information system; Multipurpose Internet Mail Extensions and electronic reference services; the Internet and OCLC. (Contains 61…
This work concentrates on Internet and its influence on tourism. It describes history of Internet, tourism and interactions among them. Next this work deals with the newest trends of Internet and their influence on tourism. Last but not least, it analyzes the influence of Internet on demand in tourism in Czech Republic.
Ahvar, Ehsan; Lee, Gyu Myoung; Han, Son N; Crespi, Noel; Khan, Imran
User location is crucial context information for future smart homes where many location based services will be proposed. This location necessarily means that User Location Discovery (ULD) will play an important role in future smart homes. Concerns about privacy and the need to carry a mobile or a tag device within a smart home currently make conventional ULD systems uncomfortable for users. Future smart homes will need a ULD system to consider these challenges. This paper addresses the design of such a ULD system for context-aware services in future smart homes stressing the following challenges: (i) users' privacy; (ii) device-/tag-free; and (iii) fault tolerance and accuracy. On the other hand, emerging new technologies, such as the Internet of Things, embedded systems, intelligent devices and machine-to-machine communication, are penetrating into our daily life with more and more sensors available for use in our homes. Considering this opportunity, we propose a ULD system that is capitalizing on the prevalence of sensors for the home while satisfying the aforementioned challenges. The proposed sensor network-based and user-friendly ULD system relies on different types of inexpensive sensors, as well as a context broker with a fuzzy-based decision-maker. The context broker receives context information from different types of sensors and evaluates that data using the fuzzy set theory. We demonstrate the performance of the proposed system by illustrating a use case, utilizing both an analytical model and simulation.
Full Text Available User location is crucial context information for future smart homes where many location based services will be proposed. This location necessarily means that User Location Discovery (ULD will play an important role in future smart homes. Concerns about privacy and the need to carry a mobile or a tag device within a smart home currently make conventional ULD systems uncomfortable for users. Future smart homes will need a ULD system to consider these challenges. This paper addresses the design of such a ULD system for context-aware services in future smart homes stressing the following challenges: (i users’ privacy; (ii device-/tag-free; and (iii fault tolerance and accuracy. On the other hand, emerging new technologies, such as the Internet of Things, embedded systems, intelligent devices and machine-to-machine communication, are penetrating into our daily life with more and more sensors available for use in our homes. Considering this opportunity, we propose a ULD system that is capitalizing on the prevalence of sensors for the home while satisfying the aforementioned challenges. The proposed sensor network-based and user-friendly ULD system relies on different types of inexpensive sensors, as well as a context broker with a fuzzy-based decision-maker. The context broker receives context information from different types of sensors and evaluates that data using the fuzzy set theory. We demonstrate the performance of the proposed system by illustrating a use case, utilizing both an analytical model and simulation.
Internet-kulttuuri nykytaiteessa Tutkimuksessa tarkastellaan internet-taiteen historiaa ja nykyisiä esityskäytäntöjä sekä sitä miten globaali internet-kulttuuri on muokannut nykytaidetta sekä galleriassa että webissä. Tutkimuksessa kysytään miten internetin kehitys on vaikuttanut internet-taiteeseen sekä post-internet-taiteen syntyyn? Mikä on internetin paikka nykytaiteessa sekä populaarikulttuurissa? Internet culture in contemporary art A study on the history of Internet art and it’...
Giannini, Courtney M; Irby, Megan B; Skelton, Joseph A; Gesell, Sabina B
There is growing evidence supporting social network-based interventions for adolescents with obesity. This study's aim was to determine the feasibility of a social network-based intervention by assessing adolescents' friendship networks, willingness to involve friends in treatment, and how these factors influence enjoyment. Adolescents (N = 42) were recruited from a tertiary care obesity clinic. Participants gave a list of closest friends, friendship characteristics, and which of their friends they would involve in treatment. A subset (N = 14) participated in group treatment, were encouraged to bring friends, and invited to a second interview. Participants nominated a mean of 4.0 (standard deviation [SD] = 1.6) friends and were more likely to nominate closer friends (p = 0.003). Friends who attended group sessions were more likely to have multiple friendships in common with the participant's own network (p = 0.04). Involving friends in treatment is feasible and desired by adolescents and may be a novel approach for augmenting obesity treatment outcomes.
Coyne, K P; Dye, R
Telecommunications carriers, transportation companies, and banks are among the many network-based businesses--companies that move people, goods, or information from various points to various other points. Managers have long assumed that customers valued all links in these networks equally. It was thought that banking customers, for example, sought access to all of the branches throughout the network or that shipping customers wanted to be able to send packages everywhere. Intuitively, managers thought that many of their customers' needs were, in reality, narrower, but they had no way of knowing which links were most important. New computing power and robust mapping software now make it possible to understand network customers better. In applying this technology, the authors, both consultants from McKinsey & Company, have uncovered three distinct usage patterns: one in which all links are, indeed, valued equally; another in which customers concentrate their use in particular zones; and a third in which customers value only individual links. Each of these patterns requires a different strategy to direct executives in making the decisions fundamental to managing any network-based business: whether to open or close outlets, whether to connect their network to others, and how to organize business units so that they reflect the network's structure. Those who don't spot the patterns or understand their strategic implications will find themselves on the losing end of the network battle.
Monsen, P T; Dzwonczyk, M; Manolakos, E S
The development of a reliable helicopter gearbox health monitoring system (HMS) has been the subject of considerable research over the past 15 years. The deployment of such a system could lead to a significant saving in lives and vehicles as well as dramatically reduce the cost of helicopter maintenance. Recent research results indicate that a neural network-based system could provide a viable solution to the problem. This paper presents two neural network-based realizations of an HMS system. A hybrid (digital/analog) neural system is proposed as an extremely accurate off-line monitoring tool used to reduce helicopter gearbox maintenance costs. In addition, an all analog neural network is proposed as a real-time helicopter gearbox fault monitor that can exploit the ability of an analog neural network to directly compute the discrete Fourier transform (DFT) as a sum of weighted samples. Hardware performance results are obtained using the Integrated Neural Computing Architecture (INCA/1) analog neural network platform that was designed and developed at The Charles Stark Draper Laboratory. The results indicate that it is possible to achieve a 100% fault detection rate with 0% false alarm rate by performing a DFT directly on the first layer of INCA/1 followed by a small-size two-layer feed-forward neural network and a simple post-processing majority voting stage.
Internet marketing involves the usage of the Internet to market and sell goods or services. In this thesis we wished to seek answers for the following questions with the help of web, email surveys taking into consideration consumer perspective, company perspective and 3rd party internet marketing agency perspective. Our survey sample was based on a small set of companies, consumers and internet marketing agencies. The survey results helped us in predicting the trends in internet marketing. We...
Feng, L.; Chang, E.; Dillon, T.
The eXtensible Markup Language (XML) is fast emerging as the dominant standard for describing and interchanging data among various systems and databases on the Internet. It offers the Document Type Definition (DTD) as a formalism for defining the syntax and structure of XML documents. The XML Schema
Jara, Antonio J; Moreno-Sanchez, Pedro; Skarmeta, Antonio F; Varakliotis, Socrates; Kirstein, Peter
Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB), Controller Area Network (CAN) and radio frequency ID (RFID) from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6.
Full Text Available Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT. IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB, Controller Area Network (CAN and radio frequency ID (RFID from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6.
Tripathy, Piyu; Naik, Sagar
The renaissance of internet has reached the mainstream that is named as Web 2.0. People are now using the web to build things they have never thought of earlier. Experts take a step forward to what we contribute, and extend it and give back to the society, i.e. really the boon of internet computing. It has revolutionized the current business environment, not as a mere computing tool, but offers versatile services and increase the productive flow of information. It is a new dimension in computing systems by which companies can curtail their operating expenses, by hosting and operating through the internet. Now the users can access the required information by means of any device connected with an internet. The challenge ahead for implementing this versatile system is that the software and technology has to be developed and deployed simultaneously vis-a-vis safeguarding the security and privacy of information. This book encompasses various research and developments in Internet technology a...
http://biotribune.com/ Biotribune.com ou la biologie medicale sur internet. Ce site est concu comme un portail sur la biologie clinique. Accueil d'internautes sur une page comportant, entre autres, les rubriques : actualite, evenements, revue des connaissances, rubrique juridique et petites annonces. Biotribune propose regulierement des dossiers rediges par des specialistes comportant une mise a jour des connaissances orientee sur l'interet diagnostique des tests de biologie clinique. Le site propose egalement une revue de presse scientifique avec des resumes courts d'articles parus dans les grands journaux internationaux tels que The Lancet, New England Journal of Medicine, Science, etc. Vous pouvez aussi y tester vos connaissances grace a des cas cliniques et des QCM. Ce site propose egalement des petites annonces pratiques pour les laboratoires de ville (remplacement, materiel d'occasion, etc.). Les problemes touchant l'assurance qualite, les RMO et la nomenclature font egalement l'objet d'information et de commentaires. Enfin, vous pourrez vous inscrire a l'un des forums proposes : discussion biomedicale ou opinion et reaction sur les sujets touchant au professionnel de la biologie medicale. En conclusion, un site complet et agreable que l'on souhaite voir s'enrichir et se renouveler regulierement. http://www.arcol.asso.fr Site du Comite francais de coordination de recherche sur l'atherosclerose et le cholesterol (Arcol). Ce site s'adresse a la fois aux cliniciens, aux biologistes et aux non-specialistes interesses par la pathologie cardio-vasculaire et ses traitements. On y trouve des rubriques tres didactiques sur la physiopathologie et les facteurs de risque de l'atherosclerose, la prise en charge nutritionnelle et medicamenteuse des patients. On peut tester ses connaissances a l'aide des nombreux cas cliniques richement commentes. Ce site regulierement mis a jour contient egalement les recommandations nationales et internationales sur la prise en charge du
Full Text Available For the energy limitation of nodes and imbalance energy consuming among nodes, this paper proposes an optimization algorithm --Low Energy Algorithm-- of wireless sensor networks based on fractal dimension algorithm for the purpose of reduction of the energy consumption. The nodes in WSN cannot be located evenly, and cannot move with the monitoring environment changed once be located. Considering the characteristics of WSN, the paper designs an optimized clustering method accompany with dimension by calculating the dimension of each cluster to determine the cluster which needs to be adjusted dynamically. If the cluster with high value of dimension, increasing more nodes in this cluster. If the cluster with low value of dimension, reducing more nodes in the cluster. The simulation results show that the LEA algorithm improves energy efficiency, prolongs the network lifetime, and balances energy consumption in the sensor network.
Webster, Mike M; Atton, Nicola; Hoppitt, William J E; Laland, Kevin N
Socially transmitted information can significantly affect the ways in which animals interact with their environments. We used network-based diffusion analysis, a novel and powerful tool for exploring information transmission, to model the rate at which sticklebacks (Gasterosteus aculeatus) discovered prey patches, comparing shoals foraging in open and structured environments. We found that for groups in the open environment, individuals tended to recruit to both the prey patch and empty comparison patches at similar times, suggesting that patch discovery was not greatly affected by direct social transmission. In contrast, in structured environments we found strong evidence that information about prey patch location was socially transmitted and moreover that the pathway of information transmission followed the shoals' association network structures. Our findings highlight the importance of considering habitat structure when investigating the diffusion of information through populations and imply that association networks take on greater ecological significance in structured than open environments.
Daud, T.; Moopenn, A.; Lamb, J. L.; Ramesham, R.; Thakoor, A. P.
A novel thin film approach to neural-network-based high-density associative memory is described. The information is stored locally in a memory matrix of passive, nonvolatile, binary connection elements with a potential to achieve a storage density of 10 to the 9th bits/sq cm. Microswitches based on memory switching in thin film hydrogenated amorphous silicon, and alternatively in manganese oxide, have been used as programmable read-only memory elements. Low-energy switching has been ascertained in both these materials. Fabrication and testing of memory matrix is described. High-speed associative recall approaching 10 to the 7th bits/sec and high storage capacity in such a connection matrix memory system is also described.
Full Text Available Most of the existing clustering algorithms for networks are unsupervised, which cannot help improve the clustering quality by utilizing a small number of prior knowledge. We propose a semisupervised clustering algorithm for networks based on fast affinity propagation (SCAN-FAP, which is essentially a kind of similarity metric learning method. Firstly, we define a new constraint similarity measure integrating the structural information and the pairwise constraints, which reflects the effective similarities between nodes in networks. Then, taking the constraint similarities as input, we propose a fast affinity propagation algorithm which keeps the advantages of the original affinity propagation algorithm while increasing the time efficiency by passing only the messages between certain nodes. Finally, by extensive experimental studies, we demonstrate that the proposed algorithm can take fully advantage of the prior knowledge and improve the clustering quality significantly. Furthermore, our algorithm has a superior performance to some of the state-of-art approaches.
Purser, Autun; Kwasnitschka, Tom; Duda, Alexander; Schwendner, Jakob; Bamberg, Marlene; Sohl, Frank; Doya, Carol; Aguzzi, Jacopo; Best, Mairi; Llovet, Neus Campanya I.; Scherwath, Martin; Thomsen, Laurenz
Cabled internet and power connectivity with the deep sea allow instruments to operate in the deep sea at higher temporal resolutions than was possible historically, with the reliance on battery life and data storage capacities. In addition to the increase in sensor temporal frequency, cabled infrastructures now allow remote access to and control of mobile platforms on the seafloor. Jacobs University Bremen, in combination with collaborators from the Robotic Exploration of Extreme Environments (ROBEX) project, CSIC Barcelona and Ocean Networks Canada have been operating tracked deep sea crawler vehicles at ~890 m depth at the dynamic Barkley Canyon methane seep site, Pacific Canada during the last ~4 years. The vehicle has been able to explore an area of ~50 m radius, allowing repeated visits to numerous microhabitats. Mounting a range of sensors, including temperature, pressure, conductivity, fluorescence, turbidity, flow and methane concentration sensors, as well as various camera systems a large dataset has been compiled. Several methane pockmarks are present in the survey area, and geological, biological and oceanographic changes have been monitored over a range of timescales. Several publications have been produced, and in this presentation we introduce further data currently under analysis. Cabled internet connectivity further allows mobile platforms to be used directly in education. As part of the ROBEX project, researchers and students from both terrestrial and planetary sciences are using the crawler in an ongoing study project. Students are introduced to statistical methods from both fields during the course and in later stages they can plan their own research using the in-situ crawler, and follow the progress of their investigations live, then analyse the collected data using the techniques introduced during the course. Cabled infrastructures offer a unique facility for spatial investigation of extreme ecosystems over time, and for the 'hands on
Yoshimitsu, T.; Hashimoto, T.; Ninomiya, K.
The International Academy of Astronautics (IAA) is now constructing a multilingual dictionary database system of space-friendly terms. The database consists of a lexicon and dictionaries of multiple languages. The lexicon is a table which relates corresponding terminology in different languages. Each language has a dictionary which contains terms and their definitions. The database assumes the use on the internet. Updating and searching the terms and definitions are conducted via the network. Maintaining the database is conducted by the international cooperation. A new word arises day by day, thus to easily input new words and their definitions to the database is required for the longstanding success of the system. The main key of the database is an English term which is approved at the table held once or twice with the working group members. Each language has at lease one working group member who is responsible of assigning the corresponding term and the definition of the term of his/her native language. Inputting and updating terms and their definitions can be conducted via the internet from the office of each member which may be located at his/her native country. The system is constructed by freely distributed database server program working on the Linux operating system, which will be installed at the head office of IAA. Once it is installed, it will be open to all IAA members who can search the terms via the internet. Currently the authors are constructing the prototype system which is described in this paper.
Full Text Available Background: South Africa has a well-developed and established banking system which compares favourably with those in many developed countries (e.g. USA, but also sets South Africa apart from many other emerging market countries like Egypt and Brazil. Four dominant banks, namely the Amalgamated Banks of South Africa (ABSA, Standard Bank, Nedcor and First National Bank (FNB influence the South African banking environment. Internet banking has slowly been taking off in South Africa since 1996 as consumers are attracted to the convenience, safety and lower costs of doing banking online. Trust is a significant component of Internet banking and online services and products.Objectives: This article has reported on the results of a survey (a close-ended questionnaire that was conducted by alumni of the University of Johannesburg (UJ. The research problem for this study has been formulated as ‘what are Internet banking customers’ perception on information protection when using Internet banking services and products?’Method: The methodology for this study falls on quantitative research. The research study consisted of a detailed literature review, followed by an empirical component which consisted of a quantitative questionnaire. The questionnaire used in this study consisted of eight sections covering biographical information, financial institution and Internet banking, Internet banking service quality and delivery, Internet banking functionality, Internet banking costs, Internet banking convenience and relationships, Internet banking trust and Internet banking security and information technology (IT.Results: It was established that the findings of this research could assist financial institutions with fostering and building greater value adding relationships with their customers. These value-adding endeavours will ensure that customers experience and perceive their Internet banking experience to be enriching. Education and awareness campaigns are
Full Text Available As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT. At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices which relay data to a personal wireless device, forming a body area network (BAN. These personal wireless devices collect and integrate patients’ personal physiological data, and then transmit the data to the backend of the network for related diagnostics. However, a great deal of the information transmitted by such systems is sensitive data, and must therefore be subject to stringent security protocols. Protecting this data from unauthorized access is thus an important issue in IoT-related research. In regard to a cloud healthcare environment, scholars have proposed a secure mechanism to protect sensitive patient information. Their schemes provide a general architecture; however, these previous schemes still have some vulnerability, and thus cannot guarantee complete security. This paper proposes a secure and lightweight body-sensor network based on the Internet of Things for cloud healthcare environments, in order to address the vulnerabilities discovered in previous schemes. The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack.
Deng, Yong-Yuan; Chen, Chin-Ling; Tsaur, Woei-Jiunn; Tang, Yung-Wen; Chen, Jung-Hsuan
As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT). At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices which relay data to a personal wireless device, forming a body area network (BAN). These personal wireless devices collect and integrate patients' personal physiological data, and then transmit the data to the backend of the network for related diagnostics. However, a great deal of the information transmitted by such systems is sensitive data, and must therefore be subject to stringent security protocols. Protecting this data from unauthorized access is thus an important issue in IoT-related research. In regard to a cloud healthcare environment, scholars have proposed a secure mechanism to protect sensitive patient information. Their schemes provide a general architecture; however, these previous schemes still have some vulnerability, and thus cannot guarantee complete security. This paper proposes a secure and lightweight body-sensor network based on the Internet of Things for cloud healthcare environments, in order to address the vulnerabilities discovered in previous schemes. The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack.
Full Text Available Internet+ plays an important role in the transition and upgrading of enterprises in this era. To promote enterprise Internet+ implementation, this paper studies the influencing factors in enterprise Internet+ impetus. First, based on system dynamics, the influencing factors of enterprise Internet+ impetus are analyzed as well as their relationships. Then, a system dynamics model is established and Vensim PLE is utilized to simulate the model. Finally, some suggestions about the Internet+ implementation are given. The simulation results show that technological environment, government policy and information asymmetry all have different influence on the enterprise Internet+ impetus and different strategies can be taken to change their influence. This study is helpful for enterprises to understand the Internet+ impetus mechanism thus promote Internet+ implementation.
Chandra Wibowo Widhianto
Full Text Available Article explain how to business through internet which are web business clarification, strategy effect, how to make profit, and business electronic changes consist of criptografy, EDI, signature, digital notarisation, file, payment, and how to get succes in internet business.
Online & CD-ROM Review, 1996
Discusses ethical issues related to the Internet based on two speeches given at the Online 95 conference. Topics include pornography; copyright; libel and slander; and censorship imposed on the Internet by the secret service in Israel. (LRW)
Henten, Anders; Skouby, Knud Erik
An anthology dealing with the commercialisation of Internet and the development of new services.......An anthology dealing with the commercialisation of Internet and the development of new services....
Arthur J. Cordell; Prabir K. Neogi
Internet Governance: An Introduction offers a complete guide to the “ins and outs” of Internet governance. Drawing on a range of international authors Internet Governance is best suited for those seeking an overview of the range of issues involved as the Internet becomes increasingly important to bu siness and to society in general, affecting the daily lives of millions of people around the world.
Internet memes are phenomena that rapidly gain popularity or notoriety on the Internet. Often, modifications or spoofs add to the profile of the original idea thus turning it into a phenomenon that transgresses social and cultural boundaries. It is commonly assumed that Internet memes spread virally but scientific evidence as to this assumption is scarce. In this paper, we address this issue and investigate the epidemic dynamics of 150 famous Internet memes. Our analysis is based on time seri...
This study examined the relationships between university students' internet addiction and psychopathology in Turkey. The study was based on data drawn from a national survey of university students in Turkey. 174 university students completed the SCL-90-R scale and Addicted Internet Users Inventory. Results show that students who use internet six…
Rebisz, Slawomir; Sikora, Ilona
The possibilities offered by the use of the Internet increasingly intensify the problem of Internet addiction, which has become more prevalent in the last decade, marked by the growing availability of mobile devices and new media and their exacerbation of the problem. Research on Internet addiction, initiated by Kimberly Young at the end of the…
Moreira Moura, Giovane
A significant part of current Internet attacks originates from hosts that are distributed all over the Internet. However, there is evidence that most of these hosts are, in fact, concentrated in certain parts of the Internet. This behavior resembles the crime distribution in the real world: it
The Internet is a collection of networks that use the TCP/IP suite of protocols. It has a huge impact on human activity. There are currently hundreds of millions of computers connected to the Internet, generating several petabytes traffic a day. Internet is still growing rapidly. However, the
Boeg, M.; Harmgart, H.; Huck, S.; Jeffers, A. M.
We take a first step towards analysing fundraising on the internet. Internet fundraising allows for the possibility of instantaneous feedback on campaign progress. Analysing data from a large number of small scale internet fundraising campaigns we show that the rich feed-back information provided to donors alters subsequent donor behaviour. In particular, early donors set a precedent for later donors.
Jugenheimer, Donald W.
States that although many advertisers have intentions of utilizing the Internet for advertising, which can provide specific audience targeting and buyer/seller interactivity, few have been successful. Explains advantages and disadvantages of using the Internet for advertising purposes. Cites special problems with Internet advertising and successes…
. Sensor networks can be seen as an important part of the Internet of Things and may even constitute an Internet of Sensors, since the communication layers can differ from the Internet standards. The current paper describes the case for application, followed by a discussion of the observed adaptive...
The benefit of using the internet in health care is growing: Information retrieval, communication, and telemedical cooperation support the physician and serve the patient. On the other hand connecting a hospital to the internet leads to considerable security problems, exposes sensible data to danger, and corrupts the professional discretion, unless the connection is installed and managed with extreme care. The state of the art for an internet connection is a firewall system. Moreover the security in a networked environment depends on a cryptographic infrastructure. This will soon be provided in Germany by Health Professional Cards.
Hoorik, P. van; Mweetwa, F.
Access to information and, more importantly, the internet is not evenly distributed in this world. But if they had it, would people in rural Africa want to use the internet? How would they use it and benefit from it? Will internet influence culture and how can communities prepare themselves when the internet comes in their village? To support the rollout of internet in more rural areas in Zambia and to improve the effectiveness of ICT in rural environments, a clear view on the adoption and us...
Lee, Jaeseung; Sung, Yunsick; Park, Jong Hyuk
The Internet of Things (IoT) is the intelligent technologies and services that mutually communicate information between humans and devices or between Internet-based devices. In IoT environments, various device information is collected from the user for intelligent technologies and services that control the devices. Recently, wireless sensor networks based on IoT environments are being used in sectors as diverse as medicine, the military, and commerce. Specifically, sensor techniques that collect relevant area data via mini-sensors after distributing smart dust in inaccessible areas like forests or military zones have been embraced as the future of information technology. IoT environments that utilize smart dust are composed of the sensor nodes that detect data using wireless sensors and transmit the detected data to middle nodes. Currently, since the sensors used in these environments are composed of mini-hardware, they have limited memory, processing power, and energy, and a variety of research that aims to make the best use of these limited resources is progressing. This paper proposes a method to utilize these resources while considering energy efficiency, and suggests lightweight mutual verification and key exchange methods based on a hash function that has no restrictions on operation quantity, velocity, and storage space. This study verifies the security and energy efficiency of this method through security analysis and function evaluation, comparing with existing approaches. The proposed method has great value in its applicability as a lightweight security technology for IoT environments.
Todd Vollmer; Ondrej Linda; Milos Manic
Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.
Torbati, Nima; Ayatollahi, Ahmad; Kermani, Ali
The aim of this research is to propose a new neural network based method for medical image segmentation. Firstly, a modified self-organizing map (SOM) network, named moving average SOM (MA-SOM), is utilized to segment medical images. After the initial segmentation stage, a merging process is designed to connect the objects of a joint cluster together. A two-dimensional (2D) discrete wavelet transform (DWT) is used to build the input feature space of the network. The experimental results show that MA-SOM is robust to noise and it determines the input image pattern properly. The segmentation results of breast ultrasound images (BUS) demonstrate that there is a significant correlation between the tumor region selected by a physician and the tumor region segmented by our proposed method. In addition, the proposed method segments X-ray computerized tomography (CT) and magnetic resonance (MR) head images much better than the incremental supervised neural network (ISNN) and SOM-based methods. © 2013 Published by Elsevier Ltd.
Full Text Available Extreme learning machine (ELM as an emerging technology has recently attracted many researchers’ interest due to its fast learning speed and state-of-the-art generalization ability in the implementation. Meanwhile, the incremental extreme learning machine (I-ELM based on incremental learning algorithm was proposed which outperforms many popular learning algorithms. However, the incremental algorithms with ELM do not recalculate the output weights of all the existing nodes when a new node is added and cannot obtain the least-squares solution of output weight vectors. In this paper, we propose orthogonal convex incremental learning machine (OCI-ELM with Gram-Schmidt orthogonalization method and Barron’s convex optimization learning method to solve the nonconvex optimization problem and least-squares solution problem, and then we give the rigorous proofs in theory. Moreover, in this paper, we propose a deep architecture based on stacked OCI-ELM autoencoders according to stacked generalization philosophy for solving large and complex data problems. The experimental results verified with both UCI datasets and large datasets demonstrate that the deep network based on stacked OCI-ELM autoencoders (DOC-IELM-AEs outperforms the other methods mentioned in the paper with better performance on regression and classification problems.
Wang, Rongcun; Huang, Rubing; Qu, Binbin
The object-oriented software systems frequently evolve to meet new change requirements. Understanding the characteristics of changes aids testers and system designers to improve the quality of softwares. Identifying important modules becomes a key issue in the process of evolution. In this context, a novel network-based approach is proposed to comprehensively investigate change distributions and the correlation between centrality measures and the scope of change propagation. First, software dependency networks are constructed at class level. And then, the number of times of cochanges among classes is minded from software repositories. According to the dependency relationships and the number of times of cochanges among classes, the scope of change propagation is calculated. Using Spearman rank correlation analyzes the correlation between centrality measures and the scope of change propagation. Three case studies on java open source software projects Findbugs, Hibernate, and Spring are conducted to research the characteristics of change propagation. Experimental results show that (i) change distribution is very uneven; (ii) PageRank, Degree, and CIRank are significantly correlated to the scope of change propagation. Particularly, CIRank shows higher correlation coefficient, which suggests it can be a more useful indicator for measuring the scope of change propagation of classes in object-oriented software system.
Full Text Available It is a classic topic of social network analysis to evaluate the importance of nodes and identify the node that takes on the role of core or bridge in a network. Because a single indicator is not sufficient to analyze multiple characteristics of a node, it is a natural solution to apply multiple indicators that should be selected carefully. An intuitive idea is to select some indicators with weak correlations to efficiently assess different characteristics of a node. However, this paper shows that it is much better to select the indicators with strong correlations. Because indicator correlation is based on the statistical analysis of a large number of nodes, the particularity of an important node will be outlined if its indicator relationship doesn't comply with the statistical correlation. Therefore, the paper selects the multiple indicators including degree, ego-betweenness centrality and eigenvector centrality to evaluate the importance and the role of a node. The importance of a node is equal to the normalized sum of its three indicators. A candidate for core or bridge is selected from the great degree nodes or the nodes with great ego-betweenness centrality respectively. Then, the role of a candidate is determined according to the difference between its indicators' relationship with the statistical correlation of the overall network. Based on 18 real networks and 3 kinds of model networks, the experimental results show that the proposed methods perform quite well in evaluating the importance of nodes and in identifying the node role.
Full Text Available A visualization method is proposed for understanding the structure of complex networks based on an extended Curvelet transform named Dyadic Curvelet Transform (DClet. The proposed visualization method comes to answer specific questions about structures of complex networks by mapping data into orthogonal localized events with a directional component via the Cartesian sampling sets of detail coefficients. It behaves in the same matter as human visual system, seeing in terms of segments and distinguishing them by scale and orientation. Compressing the network is another fact. The performance of the proposed method is evaluated by two different networks with structural properties of small world networks with N = 16 vertices, and a globally coupled network with size N = 1024 and 523 776 edges. As the most large scale real networks are not fully connected, it is tested on the telecommunication network of Iran as a real extremely complex network with 92 intercity switching vertices, 706 350 E1 traffic channels and 315 525 transmission channels. It is shown that the proposed method performs as a simulation tool for successfully design of network and establishing the necessary group sizes. It can clue the network designer in on all structural properties that network has.
Conference of Vinton "Vint" Gray Cerf in the Intercontinental Hostel. Vinton Gray Cerf (born June 23, 1943) is an American computer scientist who is commonly referred to as one of the "founding fathers of the Internet" for his key technical and managerial role, together with Bob Kahn, in the creation of the Internet and the TCP/IP protocols which it uses. He was also a co-founder (in 1992) of the Internet Society (ISOC) which is intended to both promote the views of ordinary users of the Internet, and also serve as an umbrella body for the technical groups developing the Internet (such as the Internet Engineering Task Force). He served as the first president of the Internet Society from 1992-1995.
Flickinger, Kathleen Anne
Distance education and Internet instruction are increasingly being used in college science teaching. In an effort to reach more students, Iowa State University's Human Anatomy and Physiology course was offered via Internet as well as via traditional lecture format. To assess the educational ramifications of this offering, three studies were conducted. In the first study, a collective case study approach was utilized to describe the learning environment created by an Internet-based college science course. In this study, three students were followed as they worked their way through the course. Collective case study methodologies were used to provide a rich description of the learning environment experienced by these students. Motivation, computer savvy, and academic and personal self-confidence appeared to impact the satisfaction level of the students enrolled in the class. To evaluate the effectiveness of the learning environment offered through the Internet-based science course, a quantitative comparison study was undertaken. In this study a comparison of achievement scores and study habits between students enrolled in the Internet-based class and those enrolled in the traditional section was made. Results from this study indicated that content understanding and retention did not appear to be effected by the type of instruction. Desirable study habits were reportedly used more frequently in the Internet section of the class than in the traditional class. To complete the description of the Internet course experience, a qualitative examination of Internet instructors' time commitment and level of teaching satisfaction was conducted. Data for this study consisted of interviews and researcher observations. Instructor time-on-task was initially quite high, and remained above the average spent on average face-to-face instruction in subsequent semesters. Additionally the role of the faculty member changed dramatically, causing some lessening of job satisfaction. Taken as
Sidelnikov, O. S.; Redyuk, A. A.; Sygletos, S.
We consider neural network-based schemes of digital signal processing. It is shown that the use of a dynamic neural network-based scheme of signal processing ensures an increase in the optical signal transmission quality in comparison with that provided by other methods for nonlinear distortion compensation.
These attacks were simulated using hping. The proposed system is implemented in Java. The results show that the proposed system is able to detect attacks both from within (host-based) and outside sources (network-based). Key Words: Intrusion Detection System (IDS), Host-based, Network-based, Signature, Security log.
Full Text Available In this review we focus on how the hierarchical and single-path assumptions of epistasis analysis can bias the topologies of gene interactions infered. This has been acknowledged in several previous papers and reviews, but here we emphasize the critical importance of dynamic analyses, and specifically illustrate the use of Boolean network models. Epistasis in a broad sense refers to gene interactions, however, as originally proposed by Bateson (herein, classical epistasis, defined as the blocking of a particular allelic effect due to the effect of another allele at a different locus. Classical epistasis analysis has proven powerful and useful, allowing researchers to infer and assign directionality to gene interactions. As larger data sets are becoming available, the analysis of classical epistasis is being complemented with computer science tools and system biology approaches. We show that when the hierarchical and single-path assumptions are not met in classical epistasis analysis, the access to relevant information and the correct gene interaction topologies are hindered, and it becomes necessary to consider the temporal dynamics of gene interactions. The use of dynamical networks can overcome these limitations. We particularly focus on the use of Boolean networks that, like classical epistasis analysis, relies on logical formalisms, and hence can complement classical epistasis analysis and relax its assumptions. We develop a couple of theoretical examples and analyze them from a dynamic Boolean network model perspective. Boolean networks could help to guide additional experiments and discern among alternative regulatory schemes that would be impossible or difficult to infer without the elimination of these assumption from the classical epistasis analysis. We also use examples from the literature to show how a Boolean network-based approach has resolved ambiguities and guided epistasis analysis. Our review complements previous accounts, not
Serra, Laura; Mancini, Matteo; Cercignani, Mara; Di Domenico, Carlotta; Spanò, Barbara; Giulietti, Giovanni; Koch, Giacomo; Marra, Camillo; Bozzali, Marco
Cognitive reserve (CR) is known to modulate the clinical features of Alzheimer's disease (AD). This concept may be critical for the development of non-pharmacological interventions able to slow down patients' cognitive decline in the absence of disease-modifying treatments. We aimed at identifying the neurobiological substrates of CR (i.e., neural reserve) over the transition between normal aging and AD, by assessing the underlying brain networks and their topological properties. A cohort of 154 participants (n = 68 with AD, n = 61 with amnestic mild cognitive impairment (aMCI), and 25 healthy subjects) underwent resting-state functional MRI and neuropsychological testing. Within each group, participants were classified as having high or low CR, and functional connectivity measures were compared, within group, between high and low CR individuals. Network-based statistics and topological network properties derived from graph theory were explored. Connectivity differences between high and low CR were evident only for aMCI patients, with participants with high CR showing a significant increase of connectivity in a network involving mainly fronto-parietal nodes. Conversely, they showed significantly decreased connectivity in a network involving fronto-temporo-cerebellar nodes. Consistently, changes to topological measures were observed in either direction, and were associated with measures of global cognitive function. These findings support the hypothesis that CR impacts on neurodegenerative process in the early phase of AD only. In addition, they fit with the existence of a "neural reserve", characterized by specific neural networks and their efficiency. It remains to be demonstrated whether interventions later in life can modulate this "neural reserve".
Nie, Hao; Cai, Xiaoxia; Chen, Hong; Chen, Jian; Weng, Pengfei
In today's world, science and technology make a spurt of progress, so society has entered the era of information technology, network. Only the comprehensive use of electronic warfare and network warfare means can we maximize their access to information and maintain the information superiority. Combined with the specific combat mission and operational requirements, the research design and construction in accordance with the actual military which are Suitable for the future of information technology needs of the tactical Adhoc network, tactical internet, will greatly improve the operational efficiency of the command of the army. Through the study of the network of the U.S. military SINCGARS network, it can explore the routing protocol and mobile model, to provide a reference for the research of our army network.
R. Narasimhan (Krishtel eMaging) 1461 1996 Oct 15 13:05:22
environments. The system developed includes a feature extractor and a modular neural network. The feature extractor consists of two stages. In the first stage ... environments is script/language identification (Muthusamy et al 1994; Hochberg et al 1997). ... In order to take advantage of the learning and generalization abilities ...
Bevan-Dye, Ayesha Lian
To deliver the type of marketing graduate that meets industry demand necessitates that marketing curricula content be continuously updated to keep pace with the dynamic marketing environment. One of the major trends influencing the twenty-first century marketing environment is the advent of the Internet and substantial growth in Internet usage and Internet-based commerce. Not only is the Internet driving major marketing environmental change, it is also emerging as a new marketing tool of sign...
Krejsa, Jiří; Věchet, S.; Ripel, T.
Roč. 198, č. 2013 (2013), s. 108-113 ISSN 1012-0394 Institutional research plan: CEZ:AV0Z20760514 Institutional support: RVO:61388998 Keywords : mobile robot * reactive navigation * artificial neural networks Subject RIV: JD - Computer Applications, Robot ics
Seibel, R.M.M.; Kocher, K.; Landsberg, P. [Witten-Herdecke Univ., Witten (Germany). Inst. fuer Diagnostische und Interventionelle Radiologie
Aim of the study: Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Conclusions: Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet. (orig.) [German] Ziele der Studie und Analyse: Es sollten die Fragen beantwortet werden, ob es moeglich ist, das Internet als sicheres Uebermittlungsmedium fuer Telemedizin zu nutzen und welche Sicherheitsrisiken bestehen. Dazu wurden die gaengigen Sicherheitsmethoden analysiert. Telemedizin im Internet ist mit Sicherheitsrisiken behaftet, die durch die Oeffnung eines Intranets mit der Moeglichkeit zur unberechtigten Manipulation von aussen bedingt sind. Schlussfolgerung: Diese Sicherheitsrisiken koennen durch eine Firewall weitgehend unterbunden werden. Chipkarten wie die Health professional card ermoeglichen eine hohe Sicherheit bei digitaler Signatur und sicherer Authentifikation der Sender und Empfaenger von Daten im Internet. Auch Standards wie Pretty good privacy sind inzwischen fuer sichere e-mails einfach einzusetzen. Wichtige Voraussetzung fuer die Reduktion von Sicherheitsrisiken ist unter Beruecksichtigung der gesetzlichen Vorgaben die exakte Planung aller Aktivitaeten im Internet, bei denen medizinische Patientendaten versandt werden sollen, in einem Team aus Aerzten und Informatikern. (orig.)
Full Text Available Modern Internet technologies open new possibilities in wide spectrum of traditional methods used in mathematical education. One of the areas, where these technologies can be efficiently used, is an organization of mathematical competitions. Contestants can stay at their schools or universities and try to solve as many mathematical problems as possible and then submit their solutions through Internet. Simple Internet technologies supply audio and video connection between participants and organizers.
Al-Fadhli, Meshal Shehab
The concept of privacy is hard to understand and is not easy to define, because this concept is linked with several dimensions. Internet Privacy is associated with the use of the Internet and most likely appointed under communications privacy, involving the user of the Internet’s personal information and activities, and the disclosure of them online. This essay is going to present the meaning of privacy and the implications of it for Internet users. Also, this essay will demonstrate some of t...
This thesis is focused on internet services user privacy. Goal of this thesis is to determine level of user awareness of how is their privacy approached while using internet services. Then suggest procedure to improve this awareness, or that will lead to better control of individual privacy. In theoretical part I analyze general and legislative approach to privacy, followed by analysis of behaviour of internet service users and providers. Part of this analysis deals with usage of web cookies ...
Trinh, Tuan Anh; Gyarmati, Laszlo
The dominant business model of today's Internet is built upon advertisements; users can access Internet services while the providers show ads to them. Although significant efforts have been made to model and analyze the economic aspects of this ecosystem, the heart of the current status quo, namely privacy, has not received the attention of the research community yet. Accordingly, we propose an economic model of the privacy driven Internet ecosystem where privacy is handled as an asset that c...
The purpose of this project was to study hacking and hackers. It focused on learning the best ways to make the internet secure. The thesis investigates hacking and hackers as threats to internet security. The scope of analysis encompasses various fields of technology. Consequently, the conclusive observations provide a good understanding and information on protecting valuable internet resources from criminal and malicious users that harm personal and business information securi...
all areas of human life. The impact of bias could be both a positive and negative. On the other side for libraries it would bring a disparate impact, engaged in the service and information. In the context of libraries, the internet is very helpful to disseminate informationthat is available in it. It means internet becomes a partner in the dissemination of information. Therefore, the existence of the Internet is very important for the library.
Genevieve M. Johnson
Full Text Available Four hundred five college students completed a questionnaire that assessed patterns of Internet use. Results describe college students, with rare exception, as Internet users. The vast majority of college students frequently communicate online and access websites. While an Internet game experience is typical, relatively few college students are heavy online gamers. Overwhelmingly (i.e., 77.8%, college students conceptualized the Internet as a convenience, although 17.8% considered the Internet a source of amusement. Approximately 5% of college students reported negative perceptions of the Internet (frustrating or a waste of time. Principal component analysis revealed three patterns of online behaviour; integrated-Internet-use, games-only use, and dating-only use. Implications for online instructional practice are presented. Résumé : Quatre cent cinq étudiants du niveau collégial ont répondu à un questionnaire mesurant leurs tendances de l’utilisation d’Internet. Les résultats présentent ces étudiants comme des usagers d’Internet, à quelques exceptions près. La grande majorité de ces étudiants utilisent fréquemment les outils de communication en ligne et naviguent sur Internet. Alors qu’une expérience de jeu en ligne s’avère commune, peu d’étudiants du collège s’avèrent être des joueurs en ligne excessifs. Essentiellement (c.à-d. 77,8 %, ces étudiants perçoivent Internet comme une commodité, même si 17,8 % d’entre eux le considère comme une source d’amusement. Environ 5 % ont indiqué des perceptions négatives d’Internet (frustrations ou pertes de temps. L’analyse en composantes principales a révélé 3 tendances de comportements en ligne, l’utilisation intégrée d’Internet, l’utilisation seule de jeux et l’utilisation à des fins de rencontre seulement. On présente des conséquences pour la pratique de l’enseignement en ligne.
Full Text Available The presence of internet would bring a variaty of effects in all areas of human life. The impac of bias could be both a positive and negative. On the other side for libraries it would bring a disparate impact, engaged in the service and information. In the contect of libraries, the internet is very helpfull to disseminate information that is available in it. It means internet becomes a partner in the dissemination of information. Therefore, the existence of internet is very important for the library.
Kutay, Ali Turker
Application of recently developed neural network based adaptive output feedback controllers to a diverse range of problems both in simulations and experiments is investigated in this thesis. The purpose is to evaluate the theory behind the development of these controllers numerically and experimentally, identify the needs for further development in practical applications, and to conduct further research in directions that are identified to ultimately enhance applicability of adaptive controllers to real world problems. We mainly focus our attention on adaptive controllers that augment existing fixed gain controllers. A recently developed approach holds great potential for successful implementations on real world applications due to its applicability to systems with minimal information concerning the plant model and the existing controller. In this thesis the formulation is extended to the multi-input multi-output case for distributed control of interconnected systems and successfully tested on a formation flight wind tunnel experiment. The command hedging method is formulated for the approach to further broaden the class of systems it can address by including systems with input nonlinearities. Also a formulation is adopted that allows the approach to be applied to non-minimum phase systems for which non-minimum phase characteristics are modeled with sufficient accuracy and treated properly in the design of the existing controller. It is shown that the approach can also be applied to augment nonlinear controllers under certain conditions and an example is presented where the nonlinear guidance law of a spinning projectile is augmented. Simulation results on a high fidelity 6 degrees-of-freedom nonlinear simulation code are presented. The thesis also presents a preliminary adaptive controller design for closed loop flight control with active flow actuators. Behavior of such actuators in dynamic flight conditions is not known. To test the adaptive controller design in
destination. Such a mechanism is necessary at the gateway in order to protect one network from being overloaded by the other. Dissimilar flow control... mechanisms to record the ISDN or public network billing, and provide the LAN users procedures for verifying the public network billing. 4.2.10 Monitoring...controller resolution. judo proceswo lor ISDN terminal AmW?9C02 Strtpoid-down versiof@ Am?9c3V withotd audlo data controller functions Aml9l:31 Basic-nil
Full Text Available The internet as dynamic language environment: manifestations of language change in Internet Afrikaans It is generally accepted that the growing interest in the Internet has opened up new horizons for language research. Chenault (1997:1 asserts that the Internet is not about technology or information, but about communication. The aim with this article is to explore the Internet as a dynamic language environment in which emerging patterns of language change in modernday Afrikaans could be traced. Firstly, attention is paid to ways in which the internet speech community could be defined as a coherent speech community. A second aim with this article is to scrutinise the dichotomy between spoken and written language. This is done in order to indicate that linguistic innovations, which usually emerge from social interaction, find their way into written language in digital communication. The third aim is to take a close look at various forms or patterns of language change in Afrikaans as they are presently used in Afrikaans chat rooms on the Internet. The article concludes that Internet Afrikaans could be regarded as an aspect of virtual reality for Afrikaans because systematic patterns of language change which started long ago in Afrikaans are confirmed by the Internet language environment.
Campbell, Andrew J; Cumming, Steven R; Hughes, Ian
The Internet has often been argued to have adverse psychological consequences, such as depression or anxiety symptoms, among "over-users." The present study offers an alternative understanding, suggesting the Internet may be used as a forum for expanding social networks and consequently enhancing the chance of meaningful relationships, self-confidence, social abilities, and social support. An online sample of 188 people was recruited over the Internet, while paper and pencil tests were administered to an offline sample group of 27 undergraduate university students, who were regular Internet users. Subjects completed the Zung Depression Scale (ZDS), Depression, Anxiety and Stress Scales (DASS), Eysenck Personality Questionnaire?Revised Short Scale (EPQ-R Short), Fear of Negative Evaluation (FNE) scale, Internet Use Questionnaire (IUQ), and an Internet Effects Questionnaire (IEQ). Results suggested that there was no relationship between time spent online and depression, anxiety, or social fearfulness. Those who primarily used the Internet for online chat believed that the Internet is psychologically beneficial to them, but also believed that frequent Internet users are lonely and that the Internet can be addictive. It is argued that "chat" users who are socially fearful may be using the Internet as a form of low-risk social approach and an opportunity to rehearse social behavior and communication skills, which, may help them improve interaction with offline, face-to-face, social environments.
Full Text Available The study explored the immediate impact of internet exposure on the mood and psychological states of internet addicts and low internet-users. Participants were given a battery of psychological tests to explore levels of internet addiction, mood, anxiety, depression, schizotypy, and autism traits. They were then given exposure to the internet for 15 min, and re-tested for mood and current anxiety. Internet addiction was associated with long-standing depression, impulsive nonconformity, and autism traits. High internet-users also showed a pronounced decrease in mood following internet use compared to the low internet-users. The immediate negative impact of exposure to the internet on the mood of internet addicts may contribute to increased usage by those individuals attempting to reduce their low mood by re-engaging rapidly in internet use.
Feng, Xiancheng; Yun, Xiang
With the continued rapid growth of Internet, new network service emerges in endless stream, especially the increase of network game, meeting TV, video on demand, etc. The bandwidth requirement increase continuously. Network technique, optical device technical development is swift and violent. FTTH supports all present and future service with enormous bandwidth, including traditional telecommunication service, traditional data service and traditional TV service, and the future digital TV and VOD. With huge bandwidth of FTTH, it wins the final solution of broadband network, becomes the final goal of development of optical access network. Firstly, it introduces the main service which FTTH supports, main analysis key technology such as FTTH system composition way, topological structure, multiplexing, optical cable and device. It focus two kinds of realization methods - PON, P2P technology. Then it proposed that the solution of FTTH can support comprehensive access (service such as broadband data, voice, video and narrowband private line). Finally, it shows the engineering application for FTTH in the district and building. It brings enormous economic benefits and social benefit.
Byron V Galbraith
Full Text Available Collaborative robots, or co-robots, are semi-autonomous robotic agents designed to work alongside humans in shared workspaces. To be effective, co-robots require the ability to respond and adapt to dynamic scenarios encountered in natural environments. One way to achieve this is through exploratory learning, or learning by doing, an unsupervised method in which co-robots are able to build an internal model for motor planning and coordination based on real-time sensory inputs. In this paper, we present an adaptive neural network-based system for co-robot control that employs exploratory learning to achieve the coordinated motor planning needed to navigate toward, reach for, and grasp distant objects. To validate this system we used the 11-degrees-of-freedom RoPro Calliope mobile robot. Through motor babbling of its wheels and arm, the Calliope learned how to relate visual and proprioceptive information to achieve hand-eye-body coordination. By continually evaluating sensory inputs and externally provided goal directives, the Calliope was then able to autonomously select the appropriate wheel and joint velocities needed to perform its assigned task, such as following a moving target or retrieving an indicated object.
Galbraith, Byron V; Guenther, Frank H; Versace, Massimiliano
Collaborative robots, or co-robots, are semi-autonomous robotic agents designed to work alongside humans in shared workspaces. To be effective, co-robots require the ability to respond and adapt to dynamic scenarios encountered in natural environments. One way to achieve this is through exploratory learning, or "learning by doing," an unsupervised method in which co-robots are able to build an internal model for motor planning and coordination based on real-time sensory inputs. In this paper, we present an adaptive neural network-based system for co-robot control that employs exploratory learning to achieve the coordinated motor planning needed to navigate toward, reach for, and grasp distant objects. To validate this system we used the 11-degrees-of-freedom RoPro Calliope mobile robot. Through motor babbling of its wheels and arm, the Calliope learned how to relate visual and proprioceptive information to achieve hand-eye-body coordination. By continually evaluating sensory inputs and externally provided goal directives, the Calliope was then able to autonomously select the appropriate wheel and joint velocities needed to perform its assigned task, such as following a moving target or retrieving an indicated object.
Full Text Available This paper proposes a Neural-Network-Based Fuzzy logic system for navigation control of intelligent vehicles. First, the use of Neural Networks and Fuzzy Logic to provide intelligent vehicles with more autonomy and intelligence is discussed. Second, the system for the obstacle avoidance behavior is developed. Fuzzy Logic improves Neural Networks (NN obstacle avoidance approach by handling imprecision and rule-based approximate reasoning. This system must make the vehicle able, after supervised learning, to achieve two tasks: 1- to make one’s way towards its target by a NN, and 2- to avoid static or dynamic obstacles by a Fuzzy NN capturing the behavior of a human expert. Afterwards, two association phases between each task and the appropriate actions are carried out by Trial and Error learning and their coordination allows to decide the appropriate action. Finally, the simulation results display the generalization and adaptation abilities of the system by testing it in new unexplored environments.
Djenic, S.; Krneta, R.; Mitic, J.
This paper presents an advanced variant of learning programming by the use of the Internet and multimedia. It describes the development of a blended learning environment, which, in addition to classroom (face-to-face) lessons, introduces lessons delivered over the Internet: the use of multimedia teaching material with completely dynamic…
Istifci, Ilknur; Kaya, Zeki
We can call the education offered by using the Internet environment as "teaching through the Internet". Such a teaching contributes to interaction, which is not sufficient in traditional classrooms most of the time. It gives the geographically separated students the opportunity of exchanging ideas and information, collaborative learning,…
This study investigated the use, extent of use, and the specific purposes for which secondary school students in Nigeria use the Internet. It also studied the factors responsible for the widespread or limited use of the Internet. The study location for this research is limited to Ibadan and its environs. While 20 cyber cafés in ...
Rhee, Man Young
The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr
Nielsen, Sandro; Mourier, Lise
An examination of existing accounting dictionaries on the Internet reveals a general need for a new type of dictionary. In contrast to the dictionaries now accessible, the future accounting dictionaries should be designed as proper Internet dictionaries based on a functional approach so they can...
Antheunis, Marjolijn; Berger, Charles; Roloff, Michael
The Internet has effects on how people meet, communicate, and maintain friendships. Internet applications such as social network sites change the way, the frequency with which, and the people with whom individuals keep contact. The current entry describes the sort of friendships that can be
The Internet's breakthrough to primetime usage beginning in the mid-1990s evolved in an era of openness. Unfettered access seemed key to Internet development. An important foundation for the 1996 Telecommunications Act was the theory that the telecom industry would work best if it were free of government regulation, a guiding principle that has…
Ljunge, Jan Martin
This paper estimates the effect of trust on internet use by studying the general population as well as second generation immigrants in 29 European countries with ancestry in 87 nations. There is a significant positive effect of trust on internet use. The positive trust effect is not universal...
Iversen, Villy Bæk
This paper presents a robust and efficient algorithm for evaluating multi-service multi-rate queueing systems, including finite buffer systems and loss systems. Vint Cerf listed in 2007 seven research problems concerning the Internet. This paper responds to the second problem: an Internet Erlang...
Schermer, B.W.; Lodder, A.R.
Het internet bestaat al meer dan veertig jaar, maar kon aanvankelijk alleen worden gebruikt door overheden en wetenschappers. In 1993 werd het internet opengesteld voor het algemene publiek en is vervolgens uitgegroeid tot een integraal onderdeel van onze maatschappij en ons dagelijks leven.
No one group or person can take credit for inventing the Internet. Key ideas came from both military and academic researchers, DOE money got it up and running. Article giving a chronological timeline of the development of the internet from the 1960s to the present day (2 PC screens).
Information Impact: Journal of Information and Knowledge Management
The study investigated the impact of utilisation of Internet services and resources on academic activities of university ... Ajala, Adegun and Oyewunmi (2010) the Internet was found to be useful for research activities, however it was ..... Szajna, B. (1994). Software evolution and choice: predictive evolution of the Technology.
Wampler, Angela Mallicote
Examines whether the Internet will be an equalizer or will increase social stratification, whether the Internet will be a boon to rural areas, and how it can be made more appealing or acceptable to rural areas. Discusses the "missionary movement" model of economic change and rural issues related to access to infrastructure, censorship,…
Bognar, Branko; Šimic, Vesna
This article presents an action research, which aimed to improve pupils' literary creativity and enable them to use computers connected to the internet. The study was conducted in a small district village school in Croatia. Creating a pupils' internet magazine appeared to be an excellent way for achieving the educational aims of almost all…
van Deursen, Alexander Johannes Aloysius Maria; van Dijk, Johannes A.G.M.
Research that considers Internet skills often lacks theoretical justifications and does not go beyond basic button knowledge. There is a strong need for a measurement framework that can guide future research. In this article, operational definitions for measuring Internet skills are proposed,
... Health Services Utilization > Internet use for Health Information Internet use for Health Information Narrative Due in part ... adults in the United States who use the Internet has increased substantially, from 47 percent in 2000 ...
With the deregulation of the electric power market in New England, an independent system operator (ISO) has been separated from the New England Power Pool (NEPOOL). The ISO provides a regional spot market, with bids on various electricity-related products and services submitted by utilities and independent power producers. A utility can bid on the spot market and buy or sell electricity via bilateral transactions. Good estimation of market clearing prices (MCP) will help utilities and independent power producers determine bidding and transaction strategies with low risks, and this is crucial for utilities to compete in the deregulated environment. MCP prediction, however, is difficult since bidding strategies used by participants are complicated and MCP is a non-stationary process. The main objective of this research is to provide efficient short-term load and MCP forecasting and corresponding confidence interval estimation methodologies. In this research, the complexity of load and MCP with other factors is investigated, and neural networks are used to model the complex relationship between input and output. With improved learning algorithm and on-line update features for load forecasting, a neural network based load forecaster was developed, and has been in daily industry use since summer 1998 with good performance. MCP is volatile because of the complexity of market behaviors. In practice, neural network based MCP predictors usually have a cascaded structure, as several key input factors need to be estimated first. In this research, the uncertainties involved in a cascaded neural network structure for MCP prediction are analyzed, and prediction distribution under the Bayesian framework is developed. A fast algorithm to evaluate the confidence intervals by using the memoryless Quasi-Newton method is also developed. The traditional back-propagation algorithm for neural network learning needs to be improved since MCP is a non-stationary process. The extended Kalman
Full Text Available This special issue focussing on internet policy in Australia provides a snapshot of developments on various topics (access, privacy, censorship as a means of understanding better the state of play in Australia, and also how this compares to internet policy in other parts of the world, especially Europe and North America. Given changing geopolitics, the influence of internet policy in the rest of the Asia Pacific through vehicles such as the Regional Comprehensive Economic Partnership (RCEP may become increasingly important in Australia in the coming years. This leaves Australia, and its internet policy, at a crossroads, which may reflect broader dynamics in internet policy internationally, and makes this an interesting time in which to explore what is happening in this particular country.
Olsen, Søren Bøye
In a choice experiment setup, this paper suggests that internet surveys can be a viable alternative to traditional mail surveys when gathering feedback from a sample of respondents. In a study concerning preferences for avoiding encroachment of nature areas in future motorway planning in Denmark......, two samples of respondents are surveyed – one by internet and one by mail. Results suggest that additional self-selection mechanisms in the internet survey mode lead to the internet sample being less representative of the survey population than is the case for the mail sample. Similar response rates...... are obtained in the two samples, but the internet sample is apparently less prone to protest bidding. A thorough parametric analysis cannot reject that stated preferences elicited by use of the two different modes of sampling are identical. This suggests that the fear of a potential survey mode effect...
Bocci, V.; Chiodi, G.; Fresch, P.; Iacoangeli, F.; Recchia, L.
The advent of high performance microcontrollers equipped with analog and digital peripherals, makes the design of a complete particle detector and a relative acquisition system on a single microcontroller chip possible. The existence of a world wide data infrastructure such as the internet, allows for the conception of a distributed network of cheap detectors able to elaborate and send data as well as to respond to setting commands. The internet infrastructure enables the distribution of the absolute time, with precision of a few milliseconds, to all devices independently of their physical location, when the sky view is accessible it possible to use a GPS module to reach synchronization of tens of nanoseconds. These devices can be far apart from each other and their relative distance can range from a few meters to thousands of kilometers. This allows for the design of a crowdsourcing experiment of citizen science, based on the use of many small scintillation-based particle detectors to monitor the high energetic cosmic ray and the radiation environment.
Pow, Jacky; Li, Sandy C.
In Web 2.0 environments, the quality of published information can vary significantly and much of the information on the Internet is unproven. This unverified information hinders rather than facilitates student learning, especially among undergraduate students who depend heavily on Internet resources for their studies. Currently, we do not have…
Ma, Hing Keung
Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial) use of Internet is discussed. It is argued that the behavior of Internet use is similar to daily life social behavior. In other words, Internet behavior is a kind of social behavior. Kohlberg's theory of moral development is employed to delineate the moral reasoning of the antisocial Internet behavior. The following behaviors are regarded as antisocial Internet behavior: (1) the use of Internet to carry out illegal activities such as selling faked products or offensive pornographic materials, (2) the use of Internet to bully others (i.e., cyberbullying) such as distributing libelous statements against a certain person, (3) the use of Internet to cheat others, and (4) the use of Internet to do illegal gambling. The characteristics of the moral stages that are associated with these antisocial Internet behaviors are investigated in detail. PMID:22125466
Hing Keung Ma
Full Text Available Internet addiction and the moral implication of antisocial Internet behavior will be investigated in this paper. More and more people use the Internet in their daily life. Unfortunately the percentage of people who use the internet excessively also increases. The concept of Internet addiction or pathological use of Internet is discussed in detail, and the characteristics of Internet addicts are also delineated. The social (especially the antisocial use of Internet is discussed. It is argued that the behavior of Internet use is similar to daily life social behavior. In other words, Internet behavior is a kind of social behavior. Kohlberg's theory of moral development is employed to delineate the moral reasoning of the antisocial Internet behavior. The following behaviors are regarded as antisocial Internet behavior: (1 the use of Internet to carry out illegal activities such as selling faked products or offensive pornographic materials, (2 the use of Internet to bully others (i.e., cyberbullying such as distributing libelous statements against a certain person, (3 the use of Internet to cheat others, and (4 the use of Internet to do illegal gambling. The characteristics of the moral stages that are associated with these antisocial Internet behaviors are investigated in detail.
The Internet of Things (IoT) represents the concept of cognitive networked devices that measure their environment and act on it intelligently. For instance, health sensors monitor vital human signs and inform their owner; smart meters measure the energy consumption and relay the information in real
Full Text Available The possibilities offered by the use of the Internet increasingly intensify the problem of Internet addiction, which has become more prevalent in the last decade, marked by the growing availability of mobile devices and new media and their exacerbation of the problem. Research on Internet addiction, initiated by Kimberly Young at the end of the twentieth century, usually appears in the literature in the context of young people who have been found to be most vulnerable. The phenomenon is known as Adolescent Internet Addiction. Compulsive use of the Internet is a complex phenomenon, its effects being visible in almost all aspects of a young person’s social life. It is manifested in a variety of pathological behaviors and emotional states grouped into several major psycho-physical and social effects that may appear simultaneously, e.g. anger, depression, loneliness or anxiety associated with the lack of access to the network, the weakening of social ties, withdrawal from real life, lack of educational achievement, chronic fatigue or deteriorating health. The authors of this study aim to assess the level of Internet addiction among adolescents in Poland and indicate its main behavioral manifestations, in the students surveyed, which influence their pathological use of the Internet. Our study involved a total of 505 students from three high schools located in Rzeszow (N = 505 and was carried out by questionnaires, including, among others, The Problematic Use of the Internet (PUI which is the Polish adaptation of Kimberly Young’s Internet Addiction Test (IAT (Cronbach’s α = 0.89. Statistical analysis of responses from the PUI test allowed us to determine (1 the level of Internet addiction among these adolescents, whereas the univariate (ANOVA analysis enabled us (2 to verify the hypothesis of the existence of differences in the level of Internet addiction among the investigated groups as far as gender, place of residence or grade are concerned
Han, Xinming; Zheng, Xiangjiang
This paper summarizes the research situation of circular economy and tourism industrial network at home and abroad, introduces the concept and characteristics of tourism industrial network, and analyzes the coupling mechanism of tourism industrial network based on circular economy.
Loontjens, Ton; Put, Jos; Coussens, Betty; Palmen, Jo; Sleijpen, Ton; Plum, Bart
Reversible, supramolecular polymer networks based on commercially available bulk chemicals, and prepared using an industrially attractive route are described. The difunctional, low molecular weight polytetramethyleneoxide is functionalized with trimellitic imide, and reversibly crosslinked with the
The benefits to medical practitioners of using the Internet are growing rapidly as the Internet becomes easier to use and ever more biomedical resources become available on line. The Internet is the largest computer network in the world; it is also a virtual community, larger than many nation states, with its own rules of behaviour or "netiquette." There are several types of Internet connection and various ways of acquiring a connection. Once connected, you can obtain, free of charge, programs that allow easy use of the Internet's resources and help on how to use these resources; you can access many of these resources through the hypertext references in the on line version of this series (go to http:@www.bmj.com/bmj/ to reach the electronic version). You can then explore the various methods for accessing, manipulating, or disseminating data on the Internet, such as electronic mail, telnet, file transfer protocol, and the world wide web. Results from a search of the world wide web for information on the rare condition of Recklinghausen's neurofibromatosis illustrate the breadth of medical information available on the Internet.
Higuera Portilla, Jorge Eduardo; Polo Cantero, José
The syntactic and semantic interoperability is a challenge of the Wireless Sensor Networks (WSN) with smart sensors in pervasive computing environments to increase their harmonization in a wide variety of applications. This chapter contains a detailed description of interoperability in heterogeneous WSN using the IEEE 1451 standard. This work focuses on personal area networks (PAN) with smart sensors and actuators. Also, a technical, syntactic and semantic levels of interoperability based on ...
Ramakrishnan, AG; Raja, Kumar S; Ram, Ragu HV
The effectiveness of Gabor filters for texture segmentation is well known. In this paper, we propose a texture identification scheme, based on a neural network (NN) using Gabor features. The features are derived from both the Gabor cosine and sine filters. Through experiments, we demonstrate the effectiveness of a NN based classifier using Gabor features for identifying textures in a controlled environment. The neural network used for texture identification is based on the multilayer perceptr...
This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...... the speed of technological obsolescence, market share dominance, and the black boxing of technology influence consumer intention to adopt WiMax and 3G wireless internet for their laptop computers. The results, implications for industry, and areas for further research are discussed....
Szabó, Dávid; Gulyás, András; Fitzek, Frank
5G communication networks enable the steering and control of Internet of Things and therefore require extreme low latency communication referred to as the tactile Internet. In this paper we show that the massive use of network coding throughout the network significantly improves latency and reduce...... the frequency of packet re-transmission, so an architecture built around network coding may be a feasible road towards realizing the tactile internet vision. Our contribution is threefold: (i) we show how network coding improves latency and reduces packet re-transmission with respect to other coding schemes...
Rodríguez Gómez, José Luis
Análisis de la privacidad en internet, y, en particular, en las redes sociales y la blogosfera. Se parte del concepto jurídico de privacidad y se analizan los riesgos crecientes que la acosan. Anàlisi de la privacitat a Internet, i, en particular, en les xarxes socials i la blogosfera. Es parteix del concepte jurídic de privacitat i s'analitzen els riscos creixents que l'assetgen. Analysis of Internet privacy, and in particular, social networks and the blogosphere. It begins with legal ...
Lokesh Mittal; Ritika Mittal
IPTV is one of the mostly used technology of Internet and IP application. IPTV is a service for the delivery of broadcast TV, movies on demand and other interactive multimedia services over a secure, end-to-end operator managed broadband IP data network with desired QoS to the public with a broadband Internet connection. IPTV system may also include Internet services such as Web access and VoIP where it may be called Triple Play and is typically supplied by a broadband operator using the same...
Full Text Available This paper will address the rumors and the Internet in two ways: rumors as the subject of the Internet and the Internet as a channel of dissemination of rumors. We define rumors in a broadly way as an unverified information circulating within a social group. In a strict sense, rumors can be understand as false information that people believe. A rumor is an urban myth, a legend, a hoax, or a contemporary narrative, a tale of everyday life, false or dubious, but in which we believed because it is likely, and it conveys a moral message.
... 40 Protection of Environment 32 2010-07-01 2010-07-01 false Internet access to certain off-site... DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.5 Internet access to certain off... elements in the risk management plan database available on the Internet: (a) The concentration of the...
The Internet is dramatically changing the world of research and teaching. However academics would have to learn new skills on Internet use to fully transform their research and teaching. The objective of the study therefore was to assess the impact of Internet competence on the use of the Internet for teaching and research ...
Sachpazidis, Ilias [Fraunhofer Institute for Computer Graphics, Fraunhoferstr. 5, D-64283, Darmstadt (Germany)]. E-mail: Ilias.Sachpazidis@igd.fraunhofer.de; Ohl, Roland [MedCom Gesellschaft fuer medizinische Bildverarbeitung mbH, Runderturmstr. 12, D-64283, Darmstadt (Germany); Kontaxakis, George [Universidad Politecnica de Madrid, ETSI Telecomunicacion, Madrid 28040 (Spain); Sakas, Georgios [Fraunhofer Institute for Computer Graphics, Fraunhoferstr. 5, D-64283, Darmstadt (Germany)
This paper explores the advantages and disadvantages of a medical network based on point-to-point communication and a medical network based on Jabber instant messaging protocol. Instant messaging might be, for many people, a convenient way of chatting over the Internet. We will attempt to illustrate how an instant messaging protocol could serve in the best way medical services and provide great flexibility to the involved parts. Additionally, the directory services and presence status offered by the Jabber protocol make it very attractive to medical applications that need to have real time and store and forward communication. Furthermore, doctors connected to Internet via high-speed networks could benefit by saving time due to the data transmission acceleration over Jabber.
Pulman, Andy; Taylor, Jacqui
The Internet has revolutionized the health world, enabling self-diagnosis and online support to take place irrespective of time or location. Alongside the positive aspects for an individual's health from making use of the Internet, debate has intensified on how the increasing use of Web technology might have a negative impact on patients, caregivers, and practitioners. One such negative health-related behavior is Munchausen by Internet. Munchausen by Internet occurs when medically well individuals fake recognized illnesses in virtual environments, such as online support groups. This paper focuses on the aspect of Munchausen by Internet in which individuals actively seek to disrupt groups for their own satisfaction, which has not yet been associated with the wider phenomena of Internet trolls (users who post with the intention of annoying someone or disrupting an online environment). A wide-ranging review was conducted to investigate the causes and impacts of online identity deception and Munchausen by Internet drawing on academic research and case studies reported online and in the media. The limited research relating to motivation, opportunity, detection, effects, and consequences of Munchausen by Internet is highlighted and it is formally linked to aspects of trolling. Case studies are used to illustrate the phenomenon. What is particularly worrying is the ease with which the deception can be carried out online, the difficulty in detection, and the damaging impact and potential danger to isolated victims. We suggest ways to deal with Munchausen by Internet and provide advice for health group facilitators. We also propose that Munchausen by Internet and Munchausen by Internet trolling should be formally acknowledged in a revised version of the Diagnostic and Statistical Manual DSM-5. This will assist in effectively identifying and minimizing the growth of this behavior as more people seek reassurance and support about their health in the online environment. We
Born between 1977 and 1997, Net-generation is the first generation to grow up surrounded by home computers, video games, and the Internet. As children of the Baby Boomers, the Internet is the medium of choice for the Net-geners. Based on the assumption that Net-generation has unique characteristics, this study examined (1) how Net-geners addicted to the Internet differ from the non-addicted and (2) how these attributes, together with the seductive properties of the Internet, are related to Internet addiction. Data were gathered from a probability sample of 699 Net-geners between the ages of 16 and 24. Results show that Net-geners addicted to the Internet tend to be young female students. Being emotionally open on the Net and a heavy user of ICQ were most influential in predicting Net-geners' problematic use of the Internet. Addicted Net-geners are also strongly linked to the pleasure of being able to control the simulated world in online games. The finding reinforces previous research that "dependents" of the Internet spend most of their time in the synchronous communication environment engaging in interactive online games, chat rooms, and ICQ for pleasure-seeking or escape, while "non-dependents" use information-gathering functions available on the Internet. Furthermore, Internet addicts tend to watch television significantly less, indicating a displacement effect on traditional media use for the Net-generation.
Sahut, Jean-Michel; Kucerova, Zuzana
Internet banking providers tend to introduce to consumers as many services as possible very often without knowing what the customers really want and expect from them. Within the traditional banking environment it was almost impossible to monitor and record data on second-by-second actions and interactions with the customers. The fact is that the electronic environment allows Internet banking providers to capture enormous amount of information about customer behaviour during the whole process ...
Iansiti, M; MacCormack, A
The rise of the World Wide Web has provided one of the most challenging environments for product development in recent history. The market needs that a product is meant to satisfy and the technologies required to satisfy them can change radically--even as the product is under development. In response to such factors, companies have had to modify the traditional product-development process, in which design implementation begins only once a product's concept has been determined in its entirety. In place of that traditional approach, they have pioneered a flexible product-development process that allows designers to continue to define and shape products even after implementation has begun. This innovation enables Internet companies to incorporate rapidly evolving customer requirements and changing technologies into their designs until the last possible moment before a product is introduced to the market. Flexible product development has been most fully realized in the Internet environment because of the turbulence found there, but the foundations for it exist in a wide range of industries where the need for responsiveness is paramount. When technology, product features, and competitive conditions are predictable or evolve slowly, a traditional development process works well. But when new competitors and technologies appear overnight, when standards and regulations are in flux, and when a company's entire customer base can easily switch to other suppliers, businesses don't need a development process that resists change--they need one that embraces it.
Dossick, Stephen E; Kaiser, Gail E
We introduce CHIME, the Columbia Hypermedia IMmersion Environment, a metadata-based information environment, and describe its potential applications for internet and intranet-based distributed software development...
Li, Yajun; Zhang, Xinghui; Lu, Furong; Zhang, Qin; Wang, Yun
The purpose of this study was to examine the prevalence of Internet addiction in a nationally representative sample of Chinese elementary and middle school students and to investigate Internet addiction among Internet users with different usages. The data were from the National Children's Study of China (NCSC) in which 24,013 fourth- to ninth-grade students were recruited from 100 counties in 31 provinces in China. Only 54.2% of the students had accessed the Internet. According to the criteria of Young's Diagnostic Questionnaire (YDQ), an eight-item instrument, the prevalence of Internet addiction in the total sample was 6.3%, and among Internet users was 11.7%. Among the Internet users, males (14.8%) and rural students (12.1%) reported Internet addiction more than females (7.0%) and urban students (10.6%). The percentage of Internet addicts in elementary school students (11.5%) was not significantly lower than the percentage of middle school students (11.9%). There was no statistically significant difference between the four geographical regions (9.6%, 11.5%, 12.3%, 11.1%) characterized by different levels of economy, health, education, and social environment. As the frequency of Internet use and time spent online per week increased, the percentage of Internet addicts increased. When considering the location and purpose of Internet use, the percentage of Internet addicts was highest in adolescents typically surfing in Internet cafes (18.1%) and playing Internet games (22.5%).
for students coming from underprivileged backgrounds thus bringing a digital divide in skills. The chapter draws upon an empirical study done in India on how an intervention comprised of Internet training designed on Bloom’s Digital Taxonomy and action research workshops based on the learning domains...... of the digital taxonomy was an effective approach for empowering women students through learning to use the Internet. The chapter puts forward the argument that an intervention for learning to use the Internet can be effective where focus is on the reflective and conceptual skills in using the Internet than......Internet technologies play a significant role to enhance creativity of the students in learning environments. Internet literacy is vital to effectively use the Internet tools to enhance creative learning environments. In the developing countries Internet literacy is still an unfulfilled dream...
British scientists are preparing to build the next generation internet - 'The Grid'. The government is expected to announce about 100 million pounds of funding for the project, to be done in collaboration with CERN (1/2 p).
British scientists are urging the Government to support a project to build a computing 'Grid' to succeed the Internet. They believe that fortunes await the countries and companies who commit themselves from the very beginning (1 page).
British scientists are developing a successor to the internet that will not only give researchers access to information but also raw computing power via seamless connections to the rest of the world (1 page).
Increasing use of internet has numerous reflections on relationships. Within the range of chatroom friendship and flirting to shared sexuality, cybersex addiction and criminal behaviours are among the most intriguing...
Gosling, Samuel D; Mason, Winter
Today the Internet plays a role in the lives of nearly 40% of the world's population, and it is becoming increasingly entwined in daily life. This growing presence is transforming psychological science in terms of the topics studied and the methods used. We provide an overview of the literature, considering three broad domains of research: translational (implementing traditional methods online; e.g., surveys), phenomenological (topics spawned or mediated by the Internet; e.g., cyberbullying), and novel (new ways to study existing topics; e.g., rumors). We discuss issues (e.g., sampling, ethics) that arise when doing research online and point to emerging opportunities (e.g., smartphone sensing). Psychological research on the Internet comes with new challenges, but the opportunities far outweigh the costs. By integrating the Internet, psychological research has the ability to reach large, diverse samples and collect data on actual behaviors, which will ultimately increase the impact of psychological research on society.
Gharibi, Mirmojtaba; Boutaba, Raouf; Waslander, Steven L
The Internet of Drones (IoD) is a layered network control architecture designed mainly for coordinating the access of unmanned aerial vehicles to controlled airspace, and providing navigation services between locations referred to as nodes...
Demiray, Emine; Candemir, Özden
Internet access tools and devices are developing with the prevalence of the Internet, which is considered revolutionary in information and communications technology. Beside the widespread use of the Internet among young people, statistics show that the number of older people that use the Internet is also on the rise. The purpose of the study is to…
Full Text Available Salah satu alasan pengguna komputer untuk berhubungan dengan Internet adalah mendapat kesempatan untuk menyalin ('download' informasi yang tersimpan dari server jaringan komputer lain (misalnya menyalin program aplikasi komputer, data mentah, dan sebagainya. File Transfer Protocol (FfP adalah cara di Internet untuk mengirim file dari satu tempat ke komputer pengguna. Untuk keperluan ini dapat menggunakan program FTP khusus atau dengan menggunakan Web browser.
Porter, M E
Many of the pioneers of Internet business, both dot-coms and established companies, have competed in ways that violate nearly every precept of good strategy. Rather than focus on profits, they have chased customers indiscriminately through discounting, channel incentives, and advertising. Rather than concentrate on delivering value that earns an attractive price from customers, they have pursued indirect revenues such as advertising and click-through fees. Rather than make trade-offs, they have rushed to offer every conceivable product or service. It did not have to be this way--and it does not have to be in the future. When it comes to reinforcing a distinctive strategy, Michael Porter argues, the Internet provides a better technological platform than previous generations of IT. Gaining competitive advantage does not require a radically new approach to business; it requires building on the proven principles of effective strategy. Porter argues that, contrary to recent thought, the Internet is not disruptive to most existing industries and established companies. It rarely nullifies important sources of competitive advantage in an industry; it often makes them even more valuable. And as all companies embrace Internet technology, the Internet itself will be neutralized as a source of advantage. Robust competitive advantages will arise instead from traditional strengths such as unique products, proprietary content, and distinctive physical activities. Internet technology may be able to fortify those advantages, but it is unlikely to supplant them. Porter debunks such Internet myths as first-mover advantage, the power of virtual companies, and the multiplying rewards of network effects. He disentangles the distorted signals from the marketplace, explains why the Internet complements rather than cannibalizes existing ways of doing business, and outlines strategic imperatives for dot-coms and traditional companies.
If you're a developer or electronics engineer who is curious about Internet of Things, then this is the book for you. With only a rudimentary understanding of electronics, Raspberry Pi, or similar credit-card sized computers, and some programming experience using managed code such as C# or Java, you will be taught to develop state-of-the-art solutions for Internet of Things in an instant.
Full Text Available A very good method that can be used to protect a private network is the implementation of a firewall between Internet and Intranet. This firewall will filter the packets that transit the network according with the security policy defined at the system level. The SSL protocol allows verifying the identity of a WEB server based on a digital certificate issued by a certification authority. Secure data transport over the Internet is done by using encryption methods.
A very good method that can be used to protect a private network is the implementation of a firewall between Internet and Intranet. This firewall will filter the packets that transit the network according with the security policy defined at the system level. The SSL protocol allows verifying the identity of a WEB server based on a digital certificate issued by a certification authority. Secure data transport over the Internet is done by using encryption methods.
Ольга Юрьевна Заславская
Full Text Available This article discusses the development of one of the most important areas of information education and information educational environment - the “Internet of things”. The study was conducted by analyzing the historicized tric development of information and telecommunication technologies, the emergence stage of network technologies and methods for their use in time-personal sphere of professional activity of the person. Special attention is given to the need to develop and adopt common standards for interaction between mobile information and communication devices among themselves. Historical aspects of formation of the concept-ment of Internet of things, its emergence and transformation in the conditions of development of information and telecommunication technologies. The problems of the relationship between the development of the information educational environment, sub-jects of the educational process and the Internet of things, the Internet of things in the place of the information educational environment of educational organization, finding necessary and sufficient conditions under which the Internet of Things becomes part of the IOS, impact of the Internet of things in the educational process. The purpose of this article is to examine the possibility of inclusion in the space of the Internet of things the education system, the study of the relationship between the development of the information educational environment, the subjects of the image of the masticatory processes and resources that can share specialized educational information.
Tsitsika, Artemis; Critselis, Elena; Janikian, Mari; Kormas, George; Kafetzis, Dimitrios A
The study objectives were to evaluate the correlates and psychosocial implications of internet gambling among adolescents, as well as the association between internet gambling and problematic internet use. A cross-sectional study design was applied among a random sample (N = 484) of adolescents (71.2% boys; 28.8% girls; mean age ± standard deviation, SD = 14.88 ± 0.55 years). Self-completed questionnaires, including internet gambling practices, internet use characteristics, Young Internet Addiction Test, and Strengths and Difficulties Questionnaire were utilized. The prevalence of internet gambling was 15.1%. Internet gambling was associated with psychosocial maladjustment, including Abnormal Conduct Problems (gender adjusted odds ratio, AOR = 3.83; 95% confidence interval, 95% CI: 1.86-7.92) and Borderline Peer Problems (AOR = 2.04; 95% CI: 1.09-3.85). The likelihood of concomitant problematic internet use was significantly higher among internet gamblers (AOR = 1.81; 95% CI: 1.03-3.19). Multivariate regression analyses indicated that among all characteristics of internet use assessed, utilizing the internet for the purposes of gambling practices was independently associated with problematic internet use among adolescents (AOR = 3.43; 95% CI: 1.40-8.39). Thus, the study findings suggest that adolescents who participate in internet gambling practices are more likely to concomitantly present with problematic internet use.
Heating, Ventilation, Air-Conditioning and Refrigeration (HVAC&R) systems have wide applications in providing a desired indoor environment for different types of buildings. It is well acknowledged that 30%-40% of the total energy generated is consumed by buildings and HVAC&R systems alone account for more than 50% of the building energy consumption. Low operational efficiency especially under partial load conditions and poor control are part of reasons for such high energy consumption. To improve energy efficiency, HVAC&R systems should be properly operated to maintain a comfortable and healthy indoor environment under dynamic ambient and indoor conditions with the least energy consumption. This research focuses on the optimal operation of HVAC&R systems. The optimization problem is formulated and solved to find the optimal set points for the chilled water supply temperature, discharge air temperature and AHU (air handling unit) fan static pressure such that the indoor environment is maintained with the least chiller and fan energy consumption. To achieve this objective, a dynamic system model is developed first to simulate the system behavior under different control schemes and operating conditions. The system model is modular in structure, which includes a water-cooled vapor compression chiller model and a two-zone VAV system model. A fuzzy-set based extended transformation approach is then applied to investigate the uncertainties of this model caused by uncertain parameters and the sensitivities of the control inputs with respect to the interested model outputs. A multi-layer feed forward neural network is constructed and trained in unsupervised mode to minimize the cost function which is comprised of overall energy cost and penalty cost when one or more constraints are violated. After training, the network is implemented as a supervisory controller to compute the optimal settings for the system. In order to implement the optimal set points predicted by the
S. I. Balandin
Full Text Available The paper describes implementation of dataflow networks based on Smart-M3 platform for use cases related to the Internet of Things. The mechanism for automatic substitution of computational agents created on top of Smart-M3 platform is described. The paper reviews concurrency issues of the developed solution regarding Smart-M3 platform, as well as in the broader context of the Internet of Things.
Full Text Available Sound classifiers embedded in digital hearing aids are usually designed by using sound databases that do not include the distortions associated to the feedback that often occurs when these devices have to work at high gain and low gain margin to oscillation. The consequence is that the classifier learns inappropriate sound patterns. In this paper we explore the feasibility of using different sound databases (generated according to 18 configurations of real patients, and a variety of learning strategies for neural networks in the effort of reducing the probability of erroneous classification. The experimental work basically points out that the proposed methods assist the neural network-based classifier in reducing its error probability in more than 18%. This helps enhance the elderly user's comfort: the hearing aid automatically selects, with higher success probability, the program that is best adapted to the changing acoustic environment the user is facing.
Rendtorff, Jacob Dahl; Mattsson, Jan
/implications – The important implication for managerial research of this study would be for banks to focus on customer competency with an ethical concern instead of only being concerned with technical solutions for effective internet operations. Practical implications – Since more and more businesses are digitally based......Purpose – The purpose of this paper is to discuss some ethical issues in the internet encounter between customer and bank. Empirical data related to the difficulties that customers have when they deal with the bank through internet technology and electronic banking. The authors discuss...... the difficulties that customers expressed from an ethical standpoint. Design/methodology/approach – The key problem of the paper is “how does research handle the user's lack of competence in a web-based commercial environment?” The authors illustrate this ethical dilemma with data from a Danish Bank collected...
Otis, Jeremy R.; Berman, Dustin; Butts, Jonathan; Lopez, Juan
Industrial Control Systems (ICS) monitor and control operations associated with the national critical infrastructure (e.g., electric power grid, oil and gas pipelines and water treatment facilities). These systems rely on technologies and architectures that were designed for system reliability and availability. Security associated with ICS was never an inherent concern, primarily due to the protections afforded by network isolation. However, a trend in ICS operations is to migrate to commercial networks via TCP/IP in order to leverage commodity benefits and cost savings. As a result, system vulnerabilities are now exposed to the online community. Indeed, recent research has demonstrated that many exposed ICS devices are being discovered using readily available applications (e.g., ShodanHQ search engine and Google-esque queries). Due to the lack of security and logging capabilities for ICS, most knowledge about attacks are derived from real world incidents after an attack has already been carried out and the damage has been done. This research provides a method for introducing sensors into the ICS environment that collect information about network-based attacks. The sensors are developed using an inexpensive Gumstix platform that can be deployed and incorporated with production systems. Data obtained from the sensors provide insight into attack tactics (e.g., port scans, Nessus scans, Metasploit modules, and zero-day exploits) and characteristics (e.g., attack origin, frequency, and level of persistence). Findings enable security professionals to draw an accurate, real-time awareness of the threats against ICS devices and help shift the security posture from reactionary to preventative.
Vondráčková, Petra; Gabrhelík, Roman
Background and aims Out of a large number of studies on Internet addiction, only a few have been published on the prevention of Internet addiction. The aim of this study is provide a systematic review of scientific articles regarding the prevention of Internet addiction and to identify the relevant topics published in this area of interest. Methods The Preferred Reporting Items for Systematic Reviews and Meta-Analyses guidelines were adopted. The EBSCO, ProQuest Central, and PubMed databases were searched for texts published in English and Spanish between January 1995 and April 2016. A total of 179 original texts were obtained. After de-duplication and topic-relevance review, 108 texts were systematically classified and subjected to descriptive analysis and subsequent content analysis. Results The results of the content analysis yielded the following thematic areas: (a) target groups, (b) the improvement of specific skills, (c) program characteristics, and (d) environmental interventions. Discussion and conclusion Literature on the prevention of Internet addiction is scarce. There is an urgent need to introduce and implement new interventions for different at-risk populations, conduct well-designed research, and publish data on the effectiveness of these interventions. Developing prevention interventions should primarily target children and adolescents at risk of Internet addiction but also parents, teachers, peers, and others who are part of the formative environment of children and adolescents at risk of Internet addiction. Newly designed interventions focused on Internet addiction should be rigorously evaluated and the results published. PMID:27998173
Vondráčková, Petra; Gabrhelík, Roman
Background and aims Out of a large number of studies on Internet addiction, only a few have been published on the prevention of Internet addiction. The aim of this study is provide a systematic review of scientific articles regarding the prevention of Internet addiction and to identify the relevant topics published in this area of interest. Methods The Preferred Reporting Items for Systematic Reviews and Meta-Analyses guidelines were adopted. The EBSCO, ProQuest Central, and PubMed databases were searched for texts published in English and Spanish between January 1995 and April 2016. A total of 179 original texts were obtained. After de-duplication and topic-relevance review, 108 texts were systematically classified and subjected to descriptive analysis and subsequent content analysis. Results The results of the content analysis yielded the following thematic areas: (a) target groups, (b) the improvement of specific skills, (c) program characteristics, and (d) environmental interventions. Discussion and conclusion Literature on the prevention of Internet addiction is scarce. There is an urgent need to introduce and implement new interventions for different at-risk populations, conduct well-designed research, and publish data on the effectiveness of these interventions. Developing prevention interventions should primarily target children and adolescents at risk of Internet addiction but also parents, teachers, peers, and others who are part of the formative environment of children and adolescents at risk of Internet addiction. Newly designed interventions focused on Internet addiction should be rigorously evaluated and the results published.
Grieco, Giovanni; Porta, Marina; Merlini, Anna Elisabetta; Caironi, Valeria; Reggiori, Donatella
Geotube is a project promoted by Il Geco cultural association for the dissemination of Geoscience education in schools by open multimedia environments. The approach is based on the following keystones: • A deep and permanent epistemological reflection supported by confrontation within the International Scientific Community • A close link with the territory • A local to global inductive approach to basic concepts in Geosciences • The construction of an open framework to stimulate creativity The project has been developed as an educational activity for secondary schools (11 to 18 years old students). It provides for the creation of a network of institutions to be involved in order to ensure the required diversified expertise. They can comprise: Universities, Natural Parks, Mountain Communities, Municipalities, schools, private companies working in the sector, and so on. A single project lasts for one school year (October to June) and requires 8-12 work hours at school, one or two half day or full day excursions and a final event of presentation of outputs. The possible outputs comprise a pdf or ppt guidebook, a script and a video completely shooted and edited by the students. The framework is open in order to adapt to the single class or workgroup needs, the level and type of school, the time available and different subjects in Geosciences. In the last two years the two parts of the project have been successfully tested separately, while the full project will be presented at schools in in its full form in April 2016, in collaboration with University of Milan, Campo dei Fiori Natural Park, Piambello Mountain Community and Cunardo Municipality. The production of geotube outputs has been tested in a high school for three consecutive years. Students produced scripts and videos on the following subjects: geologic hazards, volcanoes and earthquakes, and climate change. The excursions have been tested with two different high schools. Firstly two areas have been
Niu, Geng-Feng; Sun, Xiao-Jun; Subrahmanyam, Kaveri; Kong, Fan-Chang; Tian, Yuan; Zhou, Zong-Kui
Intense craving is a core feature of addictive disorder, and cue-induced craving is believed to be a key factor in the maintenance and relapse of addictive behaviors. With the rapid development of the Internet, Internet addiction has become a widespread behavioral problem accompanied by many negative effects. This study used the cue-reactivity paradigm to examine cue-induced craving for the Internet among Internet addicts and non-addicts. Participants were exposed to Internet-related words, and asked to report their craving for the Internet. Results indicated that Internet-related words aroused cue-induced craving for the Internet among both Internet addicts and non-addicts; however, the craving was more intense among Internet addicts. These results suggest that craving may not be a unipolar, all or none state found only in addicts, but may also be present among non-addicts. They indicate that Internet-related words may be able to induce craving for the Internet, and that Internet addiction and other addictions may share similar underlying mechanisms. This finding has important implications for designing interventions for Internet addiction. Copyright © 2016 Elsevier Ltd. All rights reserved.
Wen-Yu Lee, Silvia; Tsai, Chin-Chung; Wu, Ying-Tien; Tsai, Meng-Jung; Liu, Tzu-Chien; Hwang, Fu-Kwun; Lai, Chih-Hung; Liang, Jyh-Chong; Wu, Huang-Ching; Chang, Chun-Yen
Internet-based science learning has been advocated by many science educators for more than a decade. This review examines relevant research on this topic. Sixty-five papers are included in the review. The review consists of the following two major categories: (1) the role of demographics and learners' characteristics in Internet-based science learning, such as demographic background, prior knowledge, and self-efficacy; and (2) the learning outcomes derived from Internet-based science learning, such as attitude, motivation, conceptual understanding, and conceptual change. Some important conclusions are drawn from the review. For example, Internet-based science learning is equally favorable, or in some cases more so, to learning for female students compared to male students. The learner's control is essential for enhancing students' attitudes and motivation toward learning in Internet-based science learning environments. Nevertheless, appropriate guidance from teachers, moderators, or the Internet-based learning environment itself is still quite crucial in Internet-based science learning. Recommendations for future research related to the effects of Internet-based science learning on students' metacognitive reflections, epistemological development, and worldviews are suggested.
Baker, Mary; Stevens, Charise; Chaparro, Brennen; Paschall, Dwayne
A voice-tracking algorithm was developed and tested for the purposes of electronically separating the voice signals of simultaneous talkers. Many individuals suffer from hearing disorders that often inhibit their ability to focus on a single speaker in a multiple speaker environment (the cocktail party effect). Digital hearing aid technology makes it possible to implement complex algorithms for speech processing in both the time and frequency domains. In this work, an average magnitude difference function (AMDF) was performed on mixed voice signals in order to determine the fundamental frequencies present in the signals. A time prediction neural network was trained to recognize normal human voice inflection patterns, including rising, falling, rising-falling, and falling-rising patterns. The neural network was designed to track the fundamental frequency of a single talker based on the training procedure. The output of the neural network can be used to design an active filter for speaker segregation. Tests were done using audio mixing of two to three speakers uttering short phrases. The AMDF function accurately identified the fundamental frequencies present in the signal. The neural network was tested using a single speaker uttering a short sentence. The network accurately tracked the fundamental frequency of the speaker.
Xia, Youshen; Wang, Jun
This paper proposes a new recurrent neural network-based Kalman filter for speech enhancement, based on a noise-constrained least squares estimate. The parameters of speech signal modeled as autoregressive process are first estimated by using the proposed recurrent neural network and the speech signal is then recovered from Kalman filtering. The proposed recurrent neural network is globally asymptomatically stable to the noise-constrained estimate. Because the noise-constrained estimate has a robust performance against non-Gaussian noise, the proposed recurrent neural network-based speech enhancement algorithm can minimize the estimation error of Kalman filter parameters in non-Gaussian noise. Furthermore, having a low-dimensional model feature, the proposed neural network-based speech enhancement algorithm has a much faster speed than two existing recurrent neural networks-based speech enhancement algorithms. Simulation results show that the proposed recurrent neural network-based speech enhancement algorithm can produce a good performance with fast computation and noise reduction. Copyright © 2015 Elsevier Ltd. All rights reserved.
Cohen, Elizabeth; Cooperstock, Jeremy; Kyriakakis, Chris
Music archives and libraries have cultural preservation at the core of their charters. New forms of art often race ahead of the preservation infrastructure. The ability to stream multiple synchronized ultra-low latency streams of audio and video across a continent for a distributed interactive performance such as music and dance with high-definition video and multichannel audio raises a series of challenges for the architects of digital libraries and those responsible for cultural preservation. The archiving of such performances presents numerous challenges that go beyond simply recording each stream. Case studies of storage and subsequent retrieval issues for Internet2 collaborative performances are discussed. The development of shared reality and immersive environments generate issues about, What constitutes an archived performance that occurs across a network (in multiple spaces over time)? What are the families of necessary metadata to reconstruct this virtual world in another venue or era? For example, if the network exhibited changes in latency the performers most likely adapted. In a future recreation, the latency will most likely be completely different. We discuss the parameters of immersive environment acquisition and rendering, network architectures, software architecture, musical/choreographic scores, and environmental acoustics that must be considered to address this problem.
Kessler, Fritz; Battersby, Sarah E.; Finn, Michael P.; Clarke, Keith
The field of map projections can be described as mathematical, static, and challenging. However, this description is evolving in concert with the development of the Internet. The Internet has enabled new outlets for software applications, learning, and interaction with and about map projections . This chapter examines specific ways in which the Internet has moved map projections from a relatively obscure paper-based setting to a more engaging and accessible online environment. After a brief overview of map projections, this chapter discusses four perspectives on how map projections have been integrated into the Internet. First, map projections and their role in web maps and mapping services is examined. Second, an overview of online atlases and the map projections chosen for their maps is presented. Third, new programming languages and code libraries that enable map projections to be included in mapping applications are reviewed. Fourth, the Internet has facilitated map projection education and research especially with the map reader’s comprehension and understanding of complex topics like map projection distortion is discussed.
Park, Kihong; Willinger, Walter
The Internet may be viewed as a "complex system" with diverse features and many components that can give rise to unexpected emergent phenomena, revealing much about its own engineering. This book brings together chapter contributions from a workshop held at the Santa Fe Institute in March 2001. This volume captures a snapshot of some features of the Internet that may be fruitfully approached using a complex systems perspective, meaning using interdisciplinary tools and methods to tackle the subject area. The Internet penetrates the socioeconomic fabric of everyday life; a broader and deeper grasp of the Internet may be needed to meet the challenges facing the future. The resulting empirical data have already proven to be invaluable for gaining novel insights into the network's spatio-temporal dynamics, and can be expected to become even more important when tryin to explain the Internet's complex and emergent behavior in terms of elementary networking-based mechanisms. The discoveries of fractal or self-similar network traffic traces, power-law behavior in network topology and World Wide Web connectivity are instances of unsuspected, emergent system traits. Another important factor at the heart of fair, efficient, and stable sharing of network resources is user behavior. Network systems, when habited by selfish or greedy users, take on the traits of a noncooperative multi-party game, and their stability and efficiency are integral to understanding the overall system and its dynamics. Lastly, fault-tolerance and robustness of large-scale network systems can exhibit spatial and temporal correlations whose effective analysis and management may benefit from rescaling techniques applied in certain physical and biological systems. The present book will bring together several of the leading workers involved in the analysis of complex systems with the future development of the Internet.
Rash, James; Parise, Ron; Hogie, Keith; Criscuolo, Ed; Langston, Jim; Powers, Edward I. (Technical Monitor)
The Operating Missions as Nodes on the Internet (OMNI) project has shown that Internet technology works in space missions through a demonstration using the UoSAT-12 spacecraft. An Internet Protocol (IP) stack was installed on the orbiting UoSAT-12 spacecraft and tests were run to demonstrate Internet connectivity and measure performance. This also forms the basis for demonstrating subsequent scenarios. This approach provides capabilities heretofore either too expensive or simply not feasible such as reconfiguration on orbit. The OMNI project recognized the need to reduce the risk perceived by mission managers and did this with a multi-phase strategy. In the initial phase, the concepts were implemented in a prototype system that includes space similar components communicating over the TDRS (space network) and the terrestrial Internet. The demonstration system includes a simulated spacecraft with sample instruments. Over 25 demonstrations have been given to mission and project managers, National Aeronautics and Space Administration (NASA), Department of Defense (DoD), contractor technologists and other decisions makers, This initial phase reached a high point with an OMNI demonstration given from a booth at the Johnson Space Center (JSC) Inspection Day 99 exhibition. The proof to mission managers is provided during this second phase with year 2000 accomplishments: testing the use of Internet technologies onboard an actual spacecraft. This was done with a series of tests performed using the UoSAT-12 spacecraft. This spacecraft was reconfigured on orbit at very low cost. The total period between concept and the first tests was only 6 months! On board software was modified to add an IP stack to support basic IP communications. Also added was support for ping, traceroute and network timing protocol (NTP) tests. These tests show that basic Internet functionality can be used onboard spacecraft. The performance of data was measured to show no degradation from current
The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...
Full Text Available This paper presents a wavelet-neural network based on the L1-norm minimisation for learning chaotic time series.The proposed approach, which is based on multi-resolution analysis, uses wavelets as activation functions in thehidden layer of the wavelet-network. We propose using the L1-norm, as opposed to the L2-norm, due to the wellknownfact that the L1-norm is superior to the L2-norm criterion when the signal has heavy tailed distributions oroutliers. A comparison of the proposed approach with previous reported schemes using a time series benchmark ispresented. Simulation results show that the proposed wavelet-network based on the L1-norm performs better thanthe standard back-propagation network and the wavelet-network based on the traditional L2-norm when applied tosynthetic data.
Chaves, Leonardo W. F.; Nochta, Zoltán
In this chapter we introduce the Internet of Things (IoT) from the perspective of companies. The Internet of Things mainly refers to the continuous tracking and observation of real-world objects over the Internet. The resulting information can be used to optimize many processes along the entire value chain. Important prerequisites for the IoT are that the objects of interest can be uniquely identified and that their environment can be monitored with sensors. Currently, technologies, such as different types of barcodes, active and passive Radio Frequency Identification (RFID) and wireless sensor networks play the most important role. However, these technologies either do not provide monitoring of their environment or they are too expensive for widespread adoption. Organic Electronics is a new technology that allows printing electronic circuits using organic inks. It will produce ultra-low cost smart labels equipped with sensors, and thus it will become an enabler of the IoT. We discuss how organic smart labels can be used to implement the Internet of Things. We show how this technology is expected to develop. Finally, we indicate technical problems that arise when processing large volumes of data that will result from the usage of organic smart labels in business applications.
This paper reviews a number of theoretical issues dealing with the strategic management process in fast-evolving, uncertain environments and examines the fit between theory and practice by means of two case studies, two successful dot.com incumbents from the first generation of Internet start-ups.
Full Text Available Internet congestion occurs when resource demands exceeds the network capacity. But, it is not the only reason. Congestion can happen on some users because some others user has higher sending rate. Then some users with lower sending rate will experience congestion. This partial congestion is caused by inexactly feedback. At this moment congestion are solved by the involvement of two controlling mechanisms. These mechanisms are flow/congestion control in the TCP source and Active Queue Management (AQM in the router. AQM will provide feedback to the source a kind of indication for the occurrence of the congestion in the router, whereas the source will adapt the sending rate appropriate with the feedback. These mechanisms are not enough to solve internet congestion problem completely. Therefore, this paper will explain internet congestion causes, weakness, and congestion control technique that researchers have been developed. To describe congestion system mechanisms and responses, the system will be simulated by Matlab.
The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged in this co......The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged...... in the age of the internet; civil watch-surveillance on social networking sites; and networked interactive surveillance in transnational space. This book is a result of a research action launched by the intergovernmental network COST (European Cooperation in Science and Technology)....
Markussen, Randi; Ronquillo, Lorena; Schürmann, Carsten
This paper discusses the Decryption and Counting Ceremony held in conjunction with the internet voting trial on election day in the Ministry of Local Government and Regional Development of Norway in 2013. We examine the organizers' ambition of making the decryption and counting of electronic votes...... public in order to sustain trust in internet voting. We introduce a pragmatic approach to trust that emphasises the inseparability of truth from witnessing it. Based on this and on a description of how the event was made observable and how the complexities in the counting process were disclosed, we...... discuss what we term economy of truth from the perspective of the IT community involved in the ceremony. We claim that broadening the economy of truth by including more explicitly social and political perspectives in the ceremony, and in internet elections in general, and how witnessing is brought about...
Full Text Available Internet is a global communication system interconnected with computer networks and intended to exchange the information of any kind. It is frequently called »network of all the networks« because it incorporates thousands and thousands of various computer networks all around the world and in order to communicate, has the same technical standards. The Internet has become an exclusive, unique source of information forever growing population. It has also become an ideal communication channel because of its dynamics, interaction, tractability and miraculously manageable updating of the content published. Nowadays, when fisheries starts playing and important role in Croatia, many people seek professional advice and guidance via Internet in order to fulfil their demanding professional tasks.
Full Text Available Internet addiction, which has become a global social issue, can be broadly conceptualized as an inability to control ones use of the Internet which leads to negative consequences in daily life. Only Internet Gaming Disorder has been included in the appendix of the diagnostic and statistical manual of mental disorders fifth edition (DSM-5, but it has already been argued that Internet addiction could also comprise problematic use of other Internet applications developing an addictive behavior. This paper aims to give a current review of the gradually evolving body of literature on Internet addiction. [J Contemp Med 2016; 6(3.000: 235-247
Pasluosta, Cristian F; Chiu, Alan W L
This chapter describes the implementation of a neural network-based predictive control system for driving a prosthetic hand. Nonlinearities associated with the electromechanical aspects of prosthetic devices present great challenges for precise control of this type of device. Model-based controllers may overcome this issue. Moreover, given the complexity of these kinds of electromechanical systems, neural network-based modeling arises as a good fit for modeling the fingers' dynamics. The results of simulations mimicking potential situations encountered during activities of daily living demonstrate the feasibility of this technique.
Rash, James; Parise, Ron; Hogie, Keith; Criscuolo, Ed; Langston, Jim; Jackson, Chris; Price, Harold; Powers, Edward I. (Technical Monitor)
The Operating Missions as Nodes on the Internet (OMNI) project at NASA's Goddard Space flight Center (GSFC), is demonstrating the use of standard Internet protocols for spacecraft communication systems. This year, demonstrations of Internet access to a flying spacecraft have been performed with the UoSAT-12 spacecraft owned and operated by Surrey Satellite Technology Ltd. (SSTL). Previously, demonstrations were performed using a ground satellite simulator and NASA's Tracking and Data Relay Satellite System (TDRSS). These activities are part of NASA's Space Operations Management Office (SOMO) Technology Program, The work is focused on defining the communication architecture for future NASA missions to support both NASA's "faster, better, cheaper" concept and to enable new types of collaborative science. The use of standard Internet communication technology for spacecraft simplifies design, supports initial integration and test across an IP based network, and enables direct communication between scientists and instruments as well as between different spacecraft, The most recent demonstrations consisted of uploading an Internet Protocol (IP) software stack to the UoSAT- 12 spacecraft, simple modifications to the SSTL ground station, and a series of tests to measure performance of various Internet applications. The spacecraft was reconfigured on orbit at very low cost. The total period between concept and the first tests was only 3 months. The tests included basic network connectivity (PING), automated clock synchronization (NTP), and reliable file transfers (FTP). Future tests are planned to include additional protocols such as Mobile IP, e-mail, and virtual private networks (VPN) to enable automated, operational spacecraft communication networks. The work performed and results of the initial phase of tests are summarized in this paper. This work is funded and directed by NASA/GSFC with technical leadership by CSC in arrangement with SSTL, and Vytek Wireless.
Wenrich, John Richard
The Internet presents a new phenomenon to educators and students in the K-12 environment. It's ease of use and ready access to material provides an overwhelming resource for use in the K-12 classroom. This study looked at content management of Internet resources in the K-12 school environment. Content management is defined as the methods of organizing access to the information available on the Internet allowing the teacher to effectively use resources in a classroom setting. Teachers have man...
Farré López, Xavier
El propósito principal de este proyecto es estudiar el origen y funcionamiento de las Rich Internet Applicacions (RIA), que son un nuevo tipo de aplicaciones mucho más óptimas e impactantes que las tradicionales aplicaciones Web. Para llevarlo a cabo primero se ha definido el concepto de aplicación Web y se han expuesto las limitaciones que tienen. El siguiente paso ha sido definir el concepto de Rich Internet Applications y se han listado los objetivos por los que han sido ...
Sørensen, Birgitte Holm
?Power users? are children who explore the cutting edge of new media and develop their competencies at a level where few adults can follow. Adults concerns over children?s and adolescents? activities on the Internet can often be ascribed to the fact that the children master the new media faster...... than their parents and their teachers. Adults who take the time to familiarise themselves with common practice on the Internet will usually abandon their concerns in favour of a more positive and supportive attitude....
in the age of the internet; civil watch-surveillance on social networking sites; and networked interactive surveillance in transnational space. This book is a result of a research action launched by the intergovernmental network COST (European Cooperation in Science and Technology).......The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged...
Xu, Ke; He, Huan
This brief guides the reader through three basic Internet resource pricing models using an Internet cost analysis. Addressing the evolution of service types, it presents several corresponding mechanisms which can ensure pricing implementation and resource allocation. The authors discuss utility optimization of network pricing methods in economics and underline two classes of pricing methods including system optimization and entities' strategic optimization. The brief closes with two examples of the newly proposed pricing strategy helping to solve the profit distribution problem brought by P2P
Gallez, Sarah; Lobet-Maris, Claire
Basée sur une approche ethnographique, cet article présente une typologie originale de profils types de jeunes (12-18 ans) concernant leurs pratiques sociales d’Internet. Cette typologie a été construite au terme d‘un suivi de près d'une année d’un panel de jeunes comprenant des observations participantes, des entretiens en face à face et en ligne et des journaux de bord. Cette typologie, recouvrant divers régimes de signification que revêt Internet pour les jeunes, tend à démontrer que la to...
van Deursen, Alexander Johannes Aloysius Maria; Courtois, Cédric; van Dijk, Johannes A.G.M.
This study added communication Internet skills to an existing skill framework of operational, formal, information, and strategic skills. The study investigated how people deal with inadequate skill levels by identifying support sources. Furthermore, we investigated which of the Internet skills
Full Text Available Technology affects almost all areas, including translation. Many products of technology have made translational works easier, one of which is internet. Despite the wide use of internet, the potentials it has are sometimes unnoticed. While web-based dictionaries or thesaurus often serve as translators’ assistants and online Machine Translation issues become topics of many researches, other uses of internet related to translation may not be known by many. Internet can help disseminate newborn ideas, theories and findings worldwide to enhance translation theories. Besides, the contact between internet and translation generates new areas to examine. Internet also provides helping hand in the area of translation research. Researcher or anyone conducting research in the field of translation can find a range of research gaps as well as reference. Those who need group discussions to collect required data from informants, or researchers of the same interest coming from all over the world can meet and conduct Focus Group Discussion (FGD on virtual world. Furthermore, internet offers various forms of assistance for translation practitioners. The commonly used internet assistance consists of dictionaries, thesaurus and Machine Translations available on the internet. Other forms of aid provided by internet take form of parallel texts, images, and videos, which can be very helpful. Internet provides many things which can be utilized for the purpose of translation. Internet keeps on providing more as it develops from time to time in line with the development of technology. Internet awaits utilization of theorists, researchers, practitioners and those having concern on translation.
Full Text Available The Internet of Things IoT helps to encompass many aspects of life from connecting homes and cities to connecting cars and roads roads to devices that helps in examining individuals behavior and then the data collected is used.IoT is to make lives better secure and enjoyable. IoT solutions will promote cleaner environment improve peoples health with preventative care mechanisms and the constant supervision of elderly family members. It provides a platform for communication between objects where objects can organize and manage themselves. In this paper an attempt is made to understand how analytics can be applied to IoT data. Various statistical and data mining techniques will help to derive knowledge out of huge data collected by the IoT devices.
Actually, there are many different and varied new ways to take part in gambling activities such as gambling via the Internet, mobile phone and interactive television. Among these media, the rise in Internet gambling activity has been very rapid. Nevertheless, few empirical studies have been carried out on the psychosocial effects of Internet gambling. While there is no conclusive evidence that Internet gambling is more likely than other gambling media to cause problem gambling, there are a number of factors that make online activities like Internet gambling potentially seductive and/or addictive. Such factors include anonymity, convenience, escape, dissociation/immersion, accessibility, event frequency, interactivity, disinhibition, simulation, and asociability. It would also appear that virtual environments have the potential to provide short-term comfort, excitement and/or distraction. The introduction of the Internet to gambling activities changes some of the fundamental situational and structural characteristics. The major change is that gambling activities are bought into the home and workplace environment. Thus, Internet gambling can become an in-house or work activity. One of the major concerns relating to those changes and the increase in gambling opportunities is the potential rise in the number of problem and pathological gamblers. Addictions always result from an interaction and interplay between many factors but in the case of gambling, it could be argued that technology and technological advance can themselves be an important contributory factor as we saw in examining the salient factors in Internet gambling. It is difficult to determine the prevalence of online (problem or not) gamblers, as it is obviously a figure that changes and has changed relatively quickly over the past decade. Nevertheless, the rate of Internet gambling is increasing and some recent studies using self-selected samples suggest, for example, that the prevalence of problem
Dec 8, 2017 ... INTERNET5 — an Internet that helps achieve SDG 5 on gender equality — aims to support research focused on what works in building social, political, and economic empowerment for women and girls. It seeks to understand how to improve women's skills and access to the Internet and to explore how ...
Purpose: This paper seeks to overview the issues, concerns and challenges relating to internet abuse and internet addiction in the workplace. Design/methodology/approach: Using psychological literature, the paper outlines a number of important and inter-related areas including brief overviews of internet abuse, and the most extreme form of…
Machovec, George S.
Discusses the history, goals, and partnerships of the University Corporation for Advanced Internet Development (UCAID) created in October 1997 and the hiring of Doug Van Houweling as CEO. UCAID supports Internet2 (or Internet II) a collaborative effort between higher education and industry to facilitate and coordinate the development of advanced…
Gofin, Rosa; Avitzour, Malka
To examine the prevalence of traditional and Internet bullying and the personal, family, and school environment characteristics of perpetrators and victims. Students (12-14 years old) in 35 junior high schools were randomly selected from the Jerusalem Hebrew (secular and religious) and Arab educational system (n = 2,610). Students answered an anonymous questionnaire, addressing personal, family, and school characteristics. Traditional bullying and Internet bullying for perpetrators and victims were categorized as either occurring at least sometimes during the school year or not occurring. Twenty-eight percent and 8.9 % of students were perpetrators of traditional and Internet bullying, respectively. The respective proportions of victims were 44.9 and 14.4 %. Traditional bullies presented higher Odds Ratios (ORs) for boys, for students with poor social skills (those who had difficulty in making friends, were influenced by peers in their behavior, or were bored), and for those who had poor communication with their parents. Boys and girls were equally likely to be Internet bullies and to use the Internet for communication and making friends. The OR for Internet bullying victims to be Internet bullying perpetrators was 3.70 (95 % confidence interval 2.47-5.55). Victims of traditional bullying felt helpless, and victims of traditional and Internet bullying find school to be a frightening place. There was a higher OR of Internet victimization with reports of loneliness. Traditional bully perpetrators present distinctive characteristics, while Internet perpetrators do not. Victims of traditional and Internet bullying feel fear in school. Tailored interventions are needed to address both types of bullying.
Full Text Available Recent developments in communications technologies and, in particular, the advent of the Internet and its widespread applications in all spheres of human activity, have posed a serious challenge to the mainstream neo-institutional theory of the commons (common goods and, especially, common pool resources theory (CPR. Although the term ‘new commons’ has been coined to describe a new area of study, previous attempts to analyze Internet goods within the framework of CPR theory have not been successful, as they have not been able to capture the important new characteristics of the Internet commons. Based upon an empirical analysis of over 20 Internet goods, the current author proves that, basically, Internet goods do not fall within the common pool category of goods. In addition to the key characteristics used so far within mainstream theory - excludability and substractability, other attributes such as sharing potential, joint use in production rather than in consumption only, and non-hierarchical governance of production definitely are relevant, and should be included in any analysis of Internet commons. This analysis has proven that the neoinstitutional approach retains its explanatory power with respect to the Internet commons, especially by emphasizing the path-dependent evolution of the Internet and the role of informal and formal rules shaping its operating environment. At the same time, it does not capture the direct impact of major breakthroughs in information and telecommunication technologies (ICT on the Internet commons. The proposed eclectic framework, one which addresses the specific features of Internet goods, allows to grasp the full complexity of the Internet commons. It integrates new concepts developed in various disciplines of social sciences (economics, sociology, history, anthropology with the mainstream theory of the commons, developed from the neo-institutional perspective. Among those new concepts and theories, the most
Puig i Polo, Càrol; Varela, Alberto
En este apartado se reseñarán algunos de los recursos educativos que se encuentran en Internet, tanto libros como cursos. Os animamos a que naveguéis por la Red para descubrir mucho más. Peer Reviewed
Full Text Available Turkey passed an internet censorship law in 2007 with the declared objective of protecting families and minors (Akdeniz, 2010. It established a unit within the regulator BTK (Information and Communication Technologies Authority responsible for imposing bans and blocks on websites based on nine catalogue crimes defined by other national laws (Akgül 2008, 2009a, 2009b. As of May 2015, 80,000 websites were banned based on civil code related complaints and intellectual property rights violations, reports the independent website Engelliweb. Blocking decisions rendered by penal courts are enforced even when they are based on grounds other that the nine catalogue crimes - such as terrorism, organised crime and crime against the state. Passed in parliament while ignoring the pleas of NGOs and of the internet sector, the Internet Law No. 5651 has since been used to temporarily ban popular platforms such as Blogger, Last.fm, Vimeo, Wordpress and YouTube. At the same time, some blocking decisions by the courts (e.g., Google and Facebook were not enforced by the authorities. Since its introduction, the European Court of Human Rights has ruled that Law No. 5651 (Council of Europe, 2011 is against the European Convention on Human Rights (ECHR, 2013. This article provides an overview of internet censorship and its social background in Turkey.
Fatmaa El Zahraa Mohamed Abdou
A general study about the internet search engines, the study deals main 7 points; the differance between search engines and search directories, components of search engines, the percentage of sites covered by search engines, cataloging of sites, the needed time for sites appearance in search engines, search capabilities, and types of search engines.
Valverde, S.; Solé, R. V.
Internet is known to display a highly heterogeneous structure and complex fluctuations in its traffic dynamics. Congestion seems to be an inevitable result of user's behavior coupled to the network dynamics and it effects should be minimized by choosing appropriate routing strategies. But what are the requirements of routing depth in order to optimize the traffic flow? In this paper we analyse the behavior of Internet traffic with a topologically realistic spatial structure as described in a previous study [S.-H. Yook et al., Proc. Natl Acad. Sci. USA 99, 13382 (2002)]. The model involves self-regulation of packet generation and different levels of routing depth. It is shown that it reproduces the relevant key, statistical features of Internet's traffic. Moreover, we also report the existence of a critical path horizon defining a transition from low-efficient traffic to highly efficient flow. This transition is actually a direct consequence of the web's small world architecture exploited by the routing algorithm. Once routing tables reach the network diameter, the traffic experiences a sudden transition from a low-efficient to a highly-efficient behavior. It is conjectured that routing policies might have spontaneously reached such a compromise in a distributed manner. Internet would thus be operating close to such critical path horizon.
Full Text Available Internet search engines are powerful tools to find electronics objects such as addresses of individuals and institutions, documents, statistics of all kinds, dictionaries, catalogs, product information etc. This paper explains how to build and run some very common search engines on Unix platforms, so as to serve documents through the Web.
Snoek, C.G.M.; Smeulders, A.W.M.
In this tutorial, we focus on the challenges in internet video search, present methods how to achieve state-of-the-art performance while maintaining efficient execution, and indicate how to obtain improvements in the near future. Moreover, we give an overview of the latest developments and future
Bogetoft, Peter; Nielsen, Kurt
We discuss the design of interactive, internet based benchmarking using parametric (statistical) as well as nonparametric (DEA) models. The user receives benchmarks and improvement potentials. The user is also given the possibility to search different efficiency frontiers and hereby to explore...
Ritz, John; Knaack, Zane
In the 21st century, electronic connectivity is a major component of everyday life. One expects to have mobile phone coverage and to have access to log a computer or tablet onto the internet. This connectivity enables users to keep track of personal affairs and conduct work from remote locations. Designers and manufacturers are also connecting…
Full Text Available Increasing use of internet has numerous reflections on relationships. Within the range of chatroom friendship and flirting to shared sexuality, cybersex addiction and criminal behaviours are among the most intriguing. Searching for sexual satisfaction on internet may have a number of functions such as decreasing anxiety and distress; expressing emotions such as loneliness, depression, anger and disappointment; or providing support to not being able to judge the level of intimacy in a realtionship. The incredible ease with which one obtains sexual content on the internet, at home, at the work place or even through mobile phones is one of the most important reason for its widespread prevalence. Another important allure of the cybersex is its anonimity, the relative ease to disguise normally disturbing characteristics and its being mostly ignored by others. It is also low-cost. On the other hand it causes increased social isolation, damages trust in relationships, and causes the individual to seek for help due to dramatic consequences following a period of virtual mirroring, when the feeling of finding a soulmate causes mutual adoration and idealization. This review examines the definition of infidelity in the context of internet use, its characteristics, types and various aspects; its negative consequences on relationships; its effects on couples and families; and treatment alternatives. The problems caused by increasing compulsivity of cybersex are also highlighted.
Webster, Sandra K.; Kelliher, Thomas P.
Psychology and computer science were clustered into a course in "Internet Psychology" with the goal of enabling students to use electronic networks responsibly and creatively and to understand the principles of psychology as they operate in the electronic context. Fourteen students from a variety of majors registered for the class.…
Langsted, Lars Bo; Tranberg, Charlotte Bagger
Kapitlet om internet-kriminalitet rummer, udover en kort indføring i strafferettens almindelige del, bl.a. beskrivelser af de nye værnetingsregler for internetkriminalitet, reglerne om hacking, virusangreb, Denial-of-service, uretmæssig anvendelse af PIN-koder m.v. og identitetstyveri. Bogen er en...
Langsted, Lars Bo; Tranberg, Charlotte Bagger
Kapitlet om internet-kriminalitet rummer, udover en kort indføring i strafferettens almindelige del, bl.a. beskrivelser af de nye værnetingsregler for internetkriminalitet, reglerne om hacking, virusangreb, Denial-of-service, uretmæssig anvendelse af PIN-koder m.v. og identitetstyveri. Bogen er en...
Haddadi, H.; Uhlig, S.; Moore, A.; Mortier, R.; Rio, M.
Despite the large number of papers on network topology modeling and inference, there still exists ambiguity about the real nature of the Internet AS and router level topology. While recent findings have illustrated the inaccuracies in maps inferred from BGP peering and traceroute measurements,
Discusses the impact of Internet access on library reference services based on 1994 interviews with almost two dozen university librarians. Highlights include library policy, overcrowded workstations and methods of controlling use, recreational use of terminals that interferes with more formal library use, restriction as a form of censorship, and…
Full Text Available Este artículo introduce algunos caminos para acceder a información sobre trabajo social en internet, específicamente en relación con las asociaciones y gremios a nivel nacional, regional e internacional. El artículo está dividido en tres partes. La primer
to freei ohe representacion smaller and easier to understand. August 13, 1982 seictnoRFC #822 oRn Standard for ARPA Internet Text Messages 1...WhoZiWhatZit Cordon-Bleu>, Cruses:Childs@WGBH.Boston. Galloping Gourmeto ANT.Down-Under (Australian N tional Television ), CheapLeODiscount-Liquors;, Cruisers
Full Text Available The tremendous impact of applying new technologies is obvious when it comes to museums. Internet forms an integral part of museums everyday life and decision making. Websites, online communities, social media, and mobile applications comprise elements of the modern museum’s digital self, which complements the real museum of permanent and temporary exhibitions, storage rooms, visitors’ facilities, laboratories and, most important, museum objects. This environment inevitably affects museum marketing strategies and creates relevant opportunities.
Ebeling-Witte, Susan; Frank, Michael L; Lester, David
To investigate the association between shyness and Internet usage, 88 undergraduate students completed the Revised Cheek and Buss Shyness Scale, the Online Cognition Scale, a computer/Internet familiarity scale, the Eysenck Personality Questionnaire Revised (short version) and the Abbreviated Duke Social Support Index. Significant correlations were found between shyness, Internet use, and personality traits. A stepwise regression analysis indicated that shyness was predicted by introversion, neuroticism, and problematic Internet usage as assessed by the Online Cognition Scale.
Joiner, Richard; Gavin, Jeff; Brosnan, Mark; Cromby, John; Gregory, Helen; Guiller, Jane; Maras, Pam; Moon, Amy
In 2002, we found gender differences in the use of the Internet. Since then, however, the Internet has changed considerably. We therefore conducted a follow-up study in 2012. The study involved 501 students (389 females and 100 males, 12 participants unspecified gender) and we measured Internet use, Internet anxiety, and Internet identification. We found that males had a greater breadth of Internet use; they used the Internet more for games and entertainment than females. The differentiation between males and females in terms of Internet use is evident, and in some ways is even more distinct than 10 years ago. In our previous research we had found no gender differences in the use of the Internet for communication, whereas in the current study we have found that females use the Internet for communication than males and were using social network sites more than males. We also found, consistent with our previous study, that Internet identification and Internet anxiety were related to Internet use.
Soft sensors are key solutions in process industries. Important parameters which are difficult or cost a lot to measure can be predicted using soft sensors. In this paper neural network based clinker quality predictor is developed. The predictor genuinely estimates LSF, SM, AM and C3S values. There is a time delay while ...
In this study, an oil-fired boiler system is modeled as a multivariable plant with two inputs (feed water rate and oil-fired flow rate) and two outputs (steam temperature and pressure). The plant parameters are modeled using artificial neural network, based on experimental data collected directly from the physical plant.
Cheak, Alicia; Angehrn, Albert; Sloep, Peter
This paper addresses the challenge of enhancing the social dimension of lifelong Competence Development and Management Systems with social network-based concepts and tools. Our premise is that through a combination of social network visualization tools, simulations, stimulus agents and management
Full Text Available As Internet access grows at different rates across regions, the Internet has had variable effects on regional economies through agglomeration and spillover effects. This paper uses province-level panel data from 2000 to 2013 to study inequality in Internet access, its spatial effect on regional economies in China and the channels through which the spillover effects are most evident. We find that the Internet has dispersed quickly from core cities, such as Beijing and Shanghai, to coastal provinces; and has had increasingly significant effects on neighboring regions. However, the Internet speed is still comparatively low outside the core cities. We then use endogenous growth models to quantify the effect of Internet access on regional economies. Our results show that, while Internet dispersion is positively associated with economic growth, the spillover effect varies significantly by region and is more pronounced in developed regions. So is the effect of the science and technology environment. Developed regions have benefited the most in the process. The three channels of spillover are listed here in order of relative significance: economy, proximity and urbanization. The spillover effect of the Internet may lead to the divergence of regional economies, working against the national goal of reducing regional inequality.
Masi, Christopher M; Suarez-Balcazar, Yolanda; Cassey, Margaret Z; Kinney, Leah; Piotrowski, Z Harry
OBJECTIVE To determine whether access to health information via in-home Internet technology can positively influence empowerment among residents of a low-income urban community. DESIGN In-home Internet access and training were provided to volunteers, who, along with a comparison group, were interviewed prior to and 1 year after initiation of the program. Community-based participatory research methods were used to design and implement the intervention. SETTING A 57-block area on the West Side of Chicago. PATIENTS/PARTICIPANTS Twenty-five community residents completed all phases of the technology intervention. Thirty-five randomly selected neighbors of these residents served as the comparison group. INTERVENTIONS Members of the intervention group received Internet access via WebTV, training, technical support, and access to a community specific health-oriented web page during the course of the study. MEASUREMENTS AND MAIN RESULTS Intervention group members were similar to comparison group members in terms of empowerment at baseline. After receiving Internet access and training, empowerment related to health decision-making improved significantly in the intervention group. Similar changes did not occur in the comparison group. Affinity for and appreciation of information technology also increased in the intervention group but not in the comparison group. As a result, differences in attitudes toward technology increased between the 2 groups over time. CONCLUSIONS Using community-based participatory research methods, we found that Internet access to community-specific and general health information can lead to increased empowerment and appreciation of information technology. These benefits accrued among the intervention group but not among a random group of their neighbors. PMID:12848835
Full Text Available The networking infrastructure of wireless mesh networks (WMNs is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic—i.e., neural networks (NNs. This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission. The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance.
Kojić, Nenad; Reljin, Irini; Reljin, Branimir
The networking infrastructure of wireless mesh networks (WMNs) is decentralized and relatively simple, but they can display reliable functioning performance while having good redundancy. WMNs provide Internet access for fixed and mobile wireless devices. Both in urban and rural areas they provide users with high-bandwidth networks over a specific coverage area. The main problems affecting these networks are changes in network topology and link quality. In order to provide regular functioning, the routing protocol has the main influence in WMN implementations. In this paper we suggest a new routing protocol for WMN, based on good results of a proactive and reactive routing protocol, and for that reason it can be classified as a hybrid routing protocol. The proposed solution should avoid flooding and creating the new routing metric. We suggest the use of artificial logic-i.e., neural networks (NNs). This protocol is based on mobile agent technologies controlled by a Hopfield neural network. In addition to this, our new routing metric is based on multicriteria optimization in order to minimize delay and blocking probability (rejected packets or their retransmission). The routing protocol observes real network parameters and real network environments. As a result of artificial logic intelligence, the proposed routing protocol should maximize usage of network resources and optimize network performance.
Cromer, Donna E.; And Others
Six articles cover topics related to the impact of the Internet on reference services, including Internet's effect on communication between reference librarians; integrating the use of electronic resources with traditional reference duties; reference services and the virtual library; offering remote services; Internet instruction; and Internet…
Machovec, George S.
Discusses the growth of the Internet and the attitudes of users toward advertising, provides examples of kinds of advertising used on electronic networks, and lists several companies that help advertisers use the Internet. Fifteen guidelines are suggested to help advertisers use the Internet in a reasonable and appropriate way. (Contains 11…
Full Text Available The aim of this paper is to examine internet advertising, to understand its strengths and weaknesses, to compare the content and potential of traditional media with Web sites and to describe the specific types of internet advertising. The paper also tries to present some facts and figures regarding internet advertising.
Hoogesteger, Martijn; de Oliveira Schmidt, R.; Sperotto, Anna; Pras, Aiko
Internet traffic statistics can provide valuable information to network analysts and researchers about the way nowadays networks are used. In the past, such information was provided by Internet2 in a public website called Internet2 NetFlow: Weekly Reports. The website reported traffic statistics
Hoogesteger, Martijn; de Oliveira Schmidt, R.; Pras, Aiko
Motivated by the fact that comprehensive and long term Internet traffic measurements can be hard to obtain, we have proposed and developed the Internet Traffic Statistics Archive (ITSA). Since 2013, ITSA concentrates reports on high-level statistics of Internet traffic worldwide. Examples of
Kathryn L. Mills
Full Text Available The rise of digital media use and the ability to be in almost constant connection to the Internet has raised a number of concerns about how Internet use could impact cognitive abilities. In particular, parents and policy makers are concerned with how being ‘constantly online’ might disrupt social and cognitive development. This review integrates the latest empirical evidence on Internet use with relevant experimental studies to discuss how online behaviors, and the structure of the online environment, might affect the cognitive development of adolescents. Popular concerns are discussed in light of the reviewed evidence, and remaining gaps in knowledge are highlighted.
Jiang, Tao; Cao, Yang
This book reports the latest findings on intelligent energy management of Internet data centers in smart-grid environments. The book gathers novel research ideas in Internet data center energy management, especially scenarios with cyber-related vulnerabilities, power outages and carbon emission constraints. The book will be of interest to university researchers, R&D engineers and graduate students in communication and networking areas who wish to learn the core principles, methods, algorithms, and applications of energy management of Internet data centers in smart grids.
Implementing multifactorial psychotherapy research in online virtual environments (IMPROVE-2: study protocol for a phase III trial of the MOST randomized component selection method for internet cognitive-behavioural therapy for depression
Full Text Available Abstract Background Depression is a global health challenge. Although there are effective psychological and pharmaceutical interventions, our best treatments achieve remission rates less than 1/3 and limited sustained recovery. Underpinning this efficacy gap is limited understanding of how complex psychological interventions for depression work. Recent reviews have argued that the active ingredients of therapy need to be identified so that therapy can be made briefer, more potent, and to improve scalability. This in turn requires the use of rigorous study designs that test the presence or absence of individual therapeutic elements, rather than standard comparative randomised controlled trials. One such approach is the Multiphase Optimization Strategy, which uses efficient experimentation such as factorial designs to identify active factors in complex interventions. This approach has been successfully applied to behavioural health but not yet to mental health interventions. Methods/Design A Phase III randomised, single-blind balanced fractional factorial trial, based in England and conducted on the internet, randomized at the level of the patient, will investigate the active ingredients of internet cognitive-behavioural therapy (CBT for depression. Adults with depression (operationalized as PHQ-9 score ≥ 10, recruited directly from the internet and from an UK National Health Service Improving Access to Psychological Therapies service, will be randomized across seven experimental factors, each reflecting the presence versus absence of specific treatment components (activity scheduling, functional analysis, thought challenging, relaxation, concreteness training, absorption, self-compassion training using a 32-condition balanced fractional factorial design (2IV 7-2. The primary outcome is symptoms of depression (PHQ-9 at 12 weeks. Secondary outcomes include symptoms of anxiety and process measures related to hypothesized mechanisms
Khan, Faraz Idris; Hameed, Sufian
Programmable management framework have paved the way for managing devices in the network. Lately, emerging paradigm of Software Defined Networking (SDN) have rev-olutionized programmable networks. Designers of networking applications i.e. Internet of things (IoT) have started investigating potentials of SDN paradigm in improving network management. IoT envision interconnecting various embedded devices surround-ing our environment with IP to enable internet connectivity. Unlike traditional net...
Pedersen, Leif Toudal; Saldo, Roberto
Abstract An Internet based distribution system for ice, weather and ocean information has been set up. The system provides near real time access to a large variety of data about the polar environment in a standard user environment. The system is freely available at: http://www.seaice.dk Specific...
Online knowledge communities can affect the status of languages within the internet linguistic landscape. Despite the prominence of English in the online environment, multilingualism is increasingly being promoted in these environments. It is against this background that the status, presentation and representation of ...
Kataoka, Kotaro; Uehara, Keisuke; Oe, Masafumi; Murai, Jun
In disaster sites of 2011 Tohoku Earthquake, digital communication was virtually unavailable due to the serious damage to the existing Internet and ICT resources. Thus there were urgent demands for recovering the Internet connectivity and first aid communication tools. This paper describes the design and deployment of networking systems that provide Internet connectivity using 3G mobile links or VSAT satellite links. In this paper we examine two approaches for post-disaster networking: quickly deployable package and on-demand networking. Based on a comparison of their characteristics and deployment experiences, this paper tries to extract lessons that contribute to improving the preparedness to another disaster. This paper also shares our significant operational experience acquired through supporting a maximum of 54 sites in Tohoku area including evacuation shelters, temporary hospitals and local government offices.
Mascheroni, Giovanna; Stald, Gitte Bang
This paper examines the emergence of a new research agenda in the study of mobile phones and mobile media. This is an example of issues and concerns migrating from one research field – namely internet studies in general, and studies of children’s internet safety more specifically – to another....... It also shows how policy, academic, and public agendas converge and form the discursive environment in which smartphones are being domesticated. Finally, it addresses the issue of how this new set of research questions can be and are addressed, and what the epistemological implications of the convergence...... of internet and mobile studies are....
Veronica Adriana Popescu
Full Text Available This presentation is aimed at briefly underlining the most important developments in informatics, following the introduction of the new informational techniques and technologies.Our presentation began by enumerating the programming languages used over time, by presenting the computers industry and computers generations. We have focused on numerous technical aspects, such as hardware structure; however the basis was represented by the way how information and computer networks are organized. At said point, an analysis was made of the Intranet and Internet, with a particular focus on the evolution of the Internet and its advantages and disadvantages. The Internet has represented and continues to represent a great challenge for its users, whereas as beneficial its advantages might be, the more dangerous it can become its use by some users in less controlled environments
Kasper, Thomas Edward; Short, Mary Beth; Milam, Alex Clinton
This study examined the relation between Internet pornography use and narcissism. Participants (N=257) completed an online survey that included questions on Internet pornography use and 3 narcissism measures (i.e., Narcissistic Personality Inventory, Pathological Narcissistic Inventory, and the Index of Sexual Narcissism). The hours spent viewing Internet pornography was positively correlated to participants' narcissism level. In addition, those who have ever used Internet pornography endorsed higher levels of all 3 measures of narcissism than did those who have never used Internet pornography.
Full Text Available The targeted development of internet marketing faces the dynamic environment and its alterations that occur both – in business terms and conditions and in the use of etools and applicable concepts. The growing importance of internet marketing is indicated by a growth in emarkets, an increasing number of new generation consumers, investments of organizations in ebased decisions, a strong interest of scientists representing different fields as well as by widening the base of knowledge related to the above introduced phenomenon. Despite a continuously increasing amount of scientific literature on Internet marketing, this area of research is still at the initial stage. The article is aimed at analysing the fields of ongoing researches into Internet marketing and at identifying the areas required for deeper examination. The article has applied for the methods such as a comparative analysis and summary of scientific literature, information comparison and techniques for grouping and the graphical visualization of information.
Moulton, Christine L.; Harrell, John M.; Hepp, Jared J.
The Internet of Things (IoT) integrates a variety of different devices that provide more information than can currently be easily handled. While there is much good there are also many problems in the IoT world and not all of the potential solutions can be used in the unique environment of the military. The tactical edge of the military is an even harsher environment with both constrained communications and resources but still having requirements to process data in real time for improved command decisions.
Full Text Available With the introduction of new technologies, computer and internet use have become an unavoidable necessity in our daily lives. Internet was originally designed to facilitate communication and research. However the dramatic increase in use of internet in recent years has led to its pathologic use. Turkey, as a developing country with an increasing rate of internet access and computer use is at high risk for this disorder. In our country, this disorder is especially seen in young people who are more skilled in internet and computer use. And because their excessive internet use has led to negative consequences in their academic, social and family lives, patients and their families began search of treatment for this disorder. So clinicians must be aware of this newly emerging disorder and they should be able to apply the appropriate therapeutic interventions. This paper aims to summarize the pharmacological and cognitive-behavioral treatment of internet addiction.
Ong, Say How; Tan, Yi Ren
In our technology-savvy population, mental health professionals are seeing an increasing trend of excessive Internet use or Internet addiction. Researchers in China, Taiwan and Korea have done extensive research in the field of Internet addiction. Screening instruments are available to identify the presence of Internet addiction and its extent. Internet addiction is frequently associated with mental illnesses such as anxiety, depression, conduct disorder and attention deficit hyperactivity disorder (ADHD). Treatment modalities include individual and group therapies, cognitive behavioural therapy (CBT), family therapy and psychotropic medications. A significant proportion of Singapore adolescents engaging in excessive Internet use are also diagnosed to have concomitant Internet addiction. Despite the presence of a variety of treatment options, future research in this area is needed to address its growing trend and to minimise its negative psychological and social impact on the individuals and their families.
Full Text Available Some addictions cannot be connected with substance abuse (pathological gambling, video games playing, binge eating, compulsive physical activity, emotional relationship addiction, TV addiction. Since 1995, Internet addiction has been accepted as a clinical entity with profound negative effect on social, familial, educational and economical personal functioning. The diagnosis of Internet addiction could be established if the person spends more than 38 hours per week on the Internet exempting online professional needs. Basic symptoms are the increased number of hours spent in front of the computer along with the Internet use, development of abstinent syndrome if the Internet access is prohibited, sleep inversion, neglect of basic social requirements and personal hygiene, many somatic symptoms developed due to prolonged sitting or monitor watching, dissocial behavior. In this paper, data about the Internet addiction are presented and a case report of an adolescent with developed Internet addiction.
Palmer, Neal G; Yacyshyn, James R; Northcott, Herbert C; Nebbe, Brian; Flores-Mir, Carlos; Major, Paul W
An anonymous, self-administered, mail-out survey of Canadian Orthodontists was conducted to evaluate the characteristics of orthodontic Internet use. The response rate was 45.6% (304 of 667). A total of 76.6% of orthodontists reported having Internet access at work, and an additional 12.4% reported having Internet access from a different location. Statistically significant associations between Internet usage and office staff size (P < .001) and years of practice (P = .046) were observed. Offices with larger staffs had greater Internet access. Number of staffs and number of case starts were positively correlated (P < .001, r = 0.498). The odds ratio for having Internet access on the basis of increased case starts from the less than 100 to 300-399 categories was 5.67. Although not statistically significant, there was a trend for greater Internet access by younger practitioners.
The Internet has revolutionized the way knowledge is currently produced, stored and disseminated. A few finger clicks on a keyboard can save time and many hours of search in libraries or shopping in stores. Online trademarks with an (e-) prefix such as e-library, e-business, e-health etc., are increasingly part of our daily professional vocabularies. However, the Internet has also produced multiple negative side effects, ranging from an unhealthy dependency to a dehumanization of human relationships. Fraudulent, unethical and scam practices are also flourishing through for example misleading online advertising methods. Some social and professional networks gather users' profiles for selling and advertising purposes, sometimes by making it technically difficult to unsubscribe. Here, I discuss some of these unethical aspects and propose some potential solutions to reduce them.
Madsen, Charlotte Øland
Research scope: The topic of the research project is to investigate how new internet technologies such as e-trade and customer relation marketing and management are implemented in Danish food processing companies. The aim is to use Weick's (1995) sensemaking concept to analyse the strategic...... processes leading to the use of internet marketing technologies and to investigate how these new technologies are interpreted into the organisation. Investigating the organisational socio-cognitive processes underlying the decision making processes will give further insight into the socio......'s social networks and roles, and how these changes affect the organisation's use of new technology (Barley 1986; 1990; Compton, White & DeWine 1991; Orlikowski 2000)....
Salazar Soler, Jorge; Silvestre Bergés, Santiago
Este es un curso de introducción a la IoT (Internet de las cosas). En los capítulos primeros capítulos se introducen los conceptos básicos sobre la IoT. Seguidamente se presentan nociones básicas sobre el protocolo de internet IPv6 que es el más utilizado en el entorno de la IoT y se describen las principales aplicaciones, el estado actual del mercado y las tecnologías que permiten la existencia de la IoT. Finalmente se analizan los retos de futuro que se consideran más importa...
Full Text Available El potencial democratizador de las redes electrónicas dependerá de cómo se desarrollen y usen en un contexto social específico. El aparecimiento y fortalecimiento de espacios en Internet contribuirá a concretar ese potencial, si ello sucede como resultado de necesarias convergencias se logrará un mayor impacto. Así, el reto que presenta el ciberespacio es grande para las organizaciones de mujeres que quieren impulsar nuevas formas de comunicación de género. A las mujeres en la actualidad se les presenta un reto, buscar formas de incidir en la configuración de espacios en Internet para introducir un enfoque de género tanto en los contenidos como en los códigos y las estructuras
Full Text Available En contra de los sueños románticos que, no hace tantos años, muchos albergamos, Internet se ha convertido en un inmenso mercado en el cual es cada vez más difícil encontrar alguna cosa genuina y del que es cada vez más improbable salir ileso. La Internet de hoy es tan distinta de lo que fue que poca gente recuerda cómo se gestó y cual era su 'espíritu' en los comienzos. La Red de redes fue el resultado de un proceso, no previsto, que empezó como red militar, siguió como red universitaria, luego alcanzó nivel intercontinental y finalmente se globalizó tanto como el mundo al que ella misma contribuyó a unificar.
Tämä opinnäytetyö käsittelee Internet-sivujen luomista yrityksen yhteystyökumppaneille ja ammattilaisasiakkaille. Opinnäytetyössä ei käsitellä Internet-sivujen tietoteknistä toteutusta, vaan työssä keskitytään sivuston sisällön ja visuaalisen ilmeen suunnitteluun. Opinnäytetyön tarkoituksena on selvittää, minkälainen verkkopalvelu palvelisi parhaiten Uponor Suomi Oy:n yhteistyökumppaneita. Teoriaosiossa perehdytään verkkopalveluprojektin eri työvaiheisiin eli selvitetään, miten kannattaa toim...
José Francisco Amador Montaño
Full Text Available RESUMEN Este artículo presenta una propuesta sobre la utilización de las potencialidades de Internet en la educación. Es una reflexión sobre el qué hacer y la responsabilidad d elas instituciones educativas y de los docentes frente a los retos cotnemporáneos que ofrece la tecnología y la ciencia.
This bachelor thesis analyzes web sites which deal with mathematics and mathematics teaching. These include web sites of college and universities. The theoretic part of the thesis includes analysis of possibilities offered by internet for the use in mathematics education. In the practical part we evaluate websites by four functions. The theme is extended by SEO test and special interest webs dedicated to the popularization of mathematics.
Mariana Caetano S. S. Schwindt
Full Text Available Resenha: O livro visa determinar a natureza jurídica do acesso à internet na busca para efetivar e garantir a concretização de direitos fundamentais, partindo da constatação de que a chamada ‘brecha digital’ gera desigualdades de desenvolvimento econômico, social e cultural, bem como obsta o crescimento do país.
Alberto Giovanni Biuso
Full Text Available The social-interactive nature of the human being has produced different political, ethical, and technological structures. The Internet is one of them. A thorough understanding of the World Wide Web’s role, potentiality and risks surely requires sound sociological, psychological and cognitive paradigms but it always and above all requires a radical theoretical look at human and posthuman exists and acts on the web and its devices.
Today, testing applications for Internet (web sites and other applications) is being verified using proprietary test solutions. An application is developed and another application is developed to test the first one. Test Competence Centre at Ericsson AB has expertise on testing telecom applications using TTCN-2 and TTCN-3 notations. These notations have lot of potential and are being used for testing in various areas. So far, not much work has been done on using TTCN notations for testing Int...
The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged in this co......The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged...... institutions have a growing interest in accessing this personal data. Here, contributors explore this changing landscape by addressing topics such as commercial data collection by advertising, consumer sites and interactive media; self-disclosure in the social web; surveillance of file-sharers; privacy...... in the age of the internet; civil watch-surveillance on social networking sites; and networked interactive surveillance in transnational space. This book is a result of a research action launched by the intergovernmental network COST (European Cooperation in Science and Technology)....
The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged in this co......The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged...... in this context. With such platforms comes the massive provision and storage of personal data that are systematically evaluated, marketed, and used for targeting users with advertising. In a world of global economic competition, economic crisis, and fear of terrorism after 9/11, both corporations and state...... in the age of the internet; civil watch-surveillance on social networking sites; and networked interactive surveillance in transnational space. This book is a result of a research action launched by the intergovernmental network COST (European Cooperation in Science and Technology)....
We turn on the lights in our house from a desk in an office miles away. Our refrigerator alerts us to buy milk on the way home. A package of cookies on the supermarket shelf suggests that we buy it, based on past purchases. The cookies themselves are on the shelf because of a "smart" supply chain. When we get home, the thermostat has already adjusted the temperature so that it's toasty or bracing, whichever we prefer. This is the Internet of Things -- a networked world of connected devices, objects, and people. In this book, Samuel Greengard offers a guided tour through this emerging world and how it will change the way we live and work. Greengard explains that the Internet of Things (IoT) is still in its early stages. Smart phones, cloud computing, RFID (radio-frequency identification) technology, sensors, and miniaturization are converging to make possible a new generation of embedded and immersive technology. Greengard traces the origins of the IoT from the early days of personal computers and the Internet...
Mihajlov, Martin; Vejmelka, Lucija
Easy access to communication and information technologies has increased our dependence on technology for various aspects of our lives. Nevertheless, this remarkable growth of Internet Usage has been inextricably paired with a rise of excessive and dysfunctional Internet use. Conceptualized around 1996, a few years after the inception of the World Wide Web, Internet addiction has developed into a global issue influencing varying segments of the population at different levels. Despite heated debates on its addictive nature, consensus is emerging regarding the existence of this problematic behavior. In this paper we provide a comprehensive overview of the literature on Internet addiction in last 20 years. Purpose of this paper is to present crucial findings on Internet addiction to health profession. Besides numerous benefits of Internet use, the virtual environment brings various risks in every age group. The Internet is very significant in the everyday activities of children and youth and professional interventions with this age group should be specific considering their developmental characteristics. Exposure to online risks can have long-lasting and intense negative effects. Effective programs in prevention and treatment should include a multi-sectoral and interdisciplinary approach. Detail review of the symptomatology, diagnosis model an possibilities of treatment can be multiple beneficial to the health professionals and other helping professions due to actual needs for interventions in the field of the internet addiction treatment. Internet addiction is slowly becoming a societal concern as it particularly affects adolescents and children, who are more exposed and consequently more vulnerable. Findings presented in the paper can benefit in practice of treatment internet addiction and also as framework for further researches in the field.
Information society service in the Internet environment and copyright The creation and the development of the Internet is one of the milestones of the technological, social and informational development of the human mankind. The Internet has developed from a merely technological tool into the techno-social phenomenon. For many people, including me, the Internet has become ultimately prevailing means of communication. The number of users of the Internet has risen to the extent that Internet ha...
Full Text Available This paper proposes a method whereby a device can transmit and receive information using a beacon, and also describes application scenarios for the proposed method. In a multi-device to multi-device (MD2MD content-centric networking (CCN environment, the main issue involves searching for and connecting to nearby devices. However, if a device can’t find another device that satisfies its requirements, the connection is delayed due to the repetition of processes. It is possible to rapidly connect to a device without repetition through the selection of the optimal device using the proposed method. Consequently, the proposed method and scenarios are advantageous in that they enable efficient content identification and delivery in a content-centric Internet of Things (IoT environment, in which multiple mobile devices coexist.
Full Text Available Abstract Background The Internet provides a new meeting ground, especially for gay men, that did not exist in the early 1990s. Several studies have found increased levels of high risk sexual behaviour and sexually transmissible infections (STI among gay men who seek sex on the Internet, although the underlying processes are not fully understood. Research funded by the UK Medical Research Council (2002–2004 provided the opportunity to consider whether the Internet represents a new sexual risk environment for gay and bisexual men living in London. Methods The objectives of the Internet and HIV study are to: (i measure the extent to which gay men living in London seek sexual partners on the Internet; (ii compare the characteristics of London gay men who do and do not seek sex on the Internet; (iii examine whether sex with Internet-partners is less safe than with other sexual partners; (iv compare use of the Internet with other venues where men meet sexual partners; (v establish whether gay men use the Internet to actively seek partners for unprotected anal intercourse; (vi determine the potential for using the Internet for HIV prevention. These objectives have been explored using quantitative and qualitative research methods in four samples of London gay men recruited and interviewed both online and offline. The four samples were: (i gay men recruited through Internet chat rooms and profiles; (ii HIV positive gay men attending an NHS hospital outpatients clinic; (iii gay men seeking an HIV test in an NHS HIV testing or sexual health clinic; (iv gay men recruited in the community. Results Quantitative data were collected by means of confidential, anonymous self-administered questionnaires (n>4000 completed on-line by the Internet sample. Qualitative data were collected by means of one-to-one interviews (n = 128 conducted either face-to-face or on-line. Conclusion The strength of the Internet and HIV study is its methodological plurality, drawing
Full Text Available The internet, new media, and social media environments should not be assessed only in terms of conveniences and opportunities that offer within the framework of technology. Along with the positive properties of these environments, there also exist negative aspects of carrying risks, and that may lead to problems. Despite the positive properties such as interaction, sharing, speed, flexibility and convenience, that might also be approached as a global network allowing negativities such as displaying, surveillance, inspection, and profiling. The negativities as mentioned earlier might lead to unrecoverable scientific, socio-economic, psychosocial, social and other consequences. The book “Exhibition and Surveillance on the Internet: a critical reading” by Mukadder Çakır is a thought-provoking book which brings many significant approaches to the internet environment and its tools in a critical context.
Mjalli, F.S.; Al-Asheh, S. [Chemical Engineering Department, Qatar University, Doha (Qatar)
In this work advanced nonlinear neural networks based control system design algorithms are adopted to control a mechanistic model for an ethanol fermentation process. The process model equations for such systems are highly nonlinear. A neural network strategy has been implemented in this work for capturing the dynamics of the mechanistic model for the fermentation process. The neural network achieved has been validated against the mechanistic model. Two neural network based nonlinear control strategies have also been adopted using the model identified. The performance of the feedback linearization technique was compared to neural network model predictive control in terms of stability and set point tracking capabilities. Under servo conditions, the feedback linearization algorithm gave comparable tracking and stability. The feedback linearization controller achieved the control target faster than the model predictive one but with vigorous and sudden controller moves. (Abstract Copyright , Wiley Periodicals, Inc.)
Shebel A. Alsabbah
Full Text Available Taking into consideration the cost, size and drawbacks might be found with real hardware instrument for measuring pH values such that the complications of the wiring, installing, calibrating and troubleshooting the system, would make a person look for a cheaper, accurate, and alternative choice to perform the measuring operation, Where’s hereby, a feedforward artificial neural network-based pH estimator has to be proposed. The proposed estimator has been designed with multi- layer perceptrons. One input which is a measured base stream and two outputs represent pH values at strong base and strong/weak acids for a titration process. The created data base has been obtained with consideration of temperature variation. The final numerical results ensure the effectiveness and robustness of the design neural network-based pH estimator.
Smith, Merritt H.; Pallis, Jani M.
Continuing improvement in processing speed has made it feasible to solve the Reynolds-Averaged Navier-Stokes equations for simple three-dimensional flows on advanced workstations. Combining multiple workstations into a network-based heterogeneous parallel computer allows the application of programming principles learned on MIMD (Multiple Instruction Multiple Data) distributed memory parallel computers to the solution of larger problems. An overset-grid flow solution code has been developed which uses a cluster of workstations as a network-based parallel computer. Inter-process communication is provided by the Parallel Virtual Machine (PVM) software. Solution speed equivalent to one-third of a Cray-YMP processor has been achieved from a cluster of nine commonly used engineering workstation processors. Load imbalance and communication overhead are the principal impediments to parallel efficiency in this application.
Cheng, Longlong; Zhang, Guangju; Wan, Baikun; Hao, Linlin; Qi, Hongzhi; Ming, Dong
Functional electrical stimulation (FES) has been widely used in the area of neural engineering. It utilizes electrical current to activate nerves innervating extremities affected by paralysis. An effective combination of a traditional PID controller and a neural network, being capable of nonlinear expression and adaptive learning property, supply a more reliable approach to construct FES controller that help the paraplegia complete the action they want. A FES system tuned by Radial Basis Function (RBF) Neural Network-based Proportional-Integral-Derivative (PID) model was designed to control the knee joint according to the desired trajectory through stimulation of lower limbs muscles in this paper. Experiment result shows that the FES system with RBF Neural Network-based PID model get a better performance when tracking the preset trajectory of knee angle comparing with the system adjusted by Ziegler- Nichols tuning PID model.
Full Text Available The basic aim of this study was to determine the relationship between university students’ frequency of internet use, duration of internet connection, environments that they connect to the internet, duration use of mobile devices, frequency of social networking leisure activities and internet addiction levels. The participants included a total of 363 university students of whom 255 were female and 108 were male. Quantitative research methods were used in this study. A survey was developed by the researchers and administered to the students. Based on statistical analysis; it was revealed that the frequency of internet use was every day throughout the week, students frequently stayed connected to the internet at home with their computers and the frequency of mobile devices and social network use was found as “Always”. In addition, university students stated that they connected to the internet in their leisure time.
Critselis, Elena; Janikian, Mari; Paleomilitou, Noni; Oikonomou, Despoina; Kassinopoulos, Marios; Kormas, George; Tsitsika, Artemis
Background and aims: Adolescent Internet gambling is associated with concomitant addictive behaviors. This study aimed to assess the prevalence of Internet gambling practices, its impact upon psychosocial development and to evaluate the association between gambling practices and Internet addictive behavior among Cypriot adolescents. Methods: A cross-sectional study was conducted in a convenience sample (n = 805) of adolescents attending selected public schools (9th and 10th grades) in Cyprus....
J. Ramola Premalatha
Internet banking has evolved from helping customers meet their basic banking needs to meeting their sophisticated needs. In recent years, the number of internet banking users has been increasing exponentially. As customers get more and more educated, getting insight about internet banking has become a primary area of concern for all leading banks in India. Hence, the study is made to analyse the perception of customers specifically who are computer literate, in a semi-urban area about interne...
van Deursen, Alexander; Courtois, Cédric; van Dijk, Jan
This study added communication Internet skills to an existing skill framework of operational, formal, information, and strategic skills. The study investigated how people deal with inadequate skill levels by identifying support sources. Furthermore, we investigated which of the Internet skills actually matter for attaining beneficial Internet outcomes and whether support sources employed moderate these effects. Results of a large-scale survey revealed three support patterns: independents, soc...
Full Text Available We present an algorithm of quantum restricted Boltzmann machine network based on quantum gates. The algorithm is used to initialize the procedure that adjusts the qubit and weights. After adjusting, the network forms an unsupervised generative model that gives better classification performance than other discriminative models. In addition, we show how the algorithm can be constructed with quantum circuit for quantum computer.
Berthe, Abdoulaye; Lecointre, Aubin; Dragomirescu, Daniela; Plana, Robert
This paper describes a detailed performance evaluation of distributed Medium Access Control (MAC) protocols for Wireless Sensor Networks based on Impulse Radio Ultra Wideband (IR-UWB) Physical layer (PHY). Two main classes of Medium Access Control protocol have been considered: Slotted and UnSlotted with reliability. The reliability is based on Automatic Repeat ReQuest (ARQ). The performance evaluation is performed using a complete Wireless Sensor Networks (WSN) simulator built on the Global ...
Capó-Vicedo, Josep; Mula, Josefa; Capó i Vicedo, Jordi
Purpose: This paper aims to provide a social network-based model for improving knowledge management in multi-level supply chains formed by small and medium-sized enterprises (SMEs). Design/methodology/approach: This approach uses social network analysis techniques to propose and represent a knowledge network for supply chains. Also, an empirical experience from an exploratory case study in the construction sector is presented. Findings: This proposal improves the establishment of inter-organi...
Kammerl, Rudolf; Wartberg, Lutz
Interrelations Between Adolescent Problematic Internet Use and Parental Internet Mediation Everyday life of adolescents and their parents is increasingly characterized by digital media usage (also referred to as "process of mediatization"). In the current study, associations between problematic Internet use of the adolescents (as a possible consequence of the process of mediatization) and parental media education were explored. For this purpose, throughout Germany 1,095 family dyads (an adolescent and a related parent) were investigated with a standardized questionnaire measuring different aspects of parental media education and adolescent problematic Internet use. We conducted two multiple linear regression analyses (dimensional approach) with adolescent problematic Internet use based on self-ratings (model 1, corrected R 2 = 0.18) and parental assessment (model 2, corrected R 2 = 0.24) as response variables. Consistently for self- and parental ratings, adolescent problematic Internet use was statistically significant related to male gender (of the adolescent), a more frequent inconsistent media education (adolescents' and parents' perspective) and a stronger monitoring (parents' perspective). Additionally, we observed associations between the parental rating of adolescent problematic Internet use and a less frequent active and restrictive Internet Mediation (parents' perspective). The findings of the present study show the importance of parental media education for problematic Internet use in adolescence and especially, the role of inconsistent media education should be investigated again in further studies.
Critselis, Elena; Janikian, Mari; Paleomilitou, Noni; Oikonomou, Despoina; Kassinopoulos, Marios; Kormas, George; Tsitsika, Artemis
Adolescent Internet gambling is associated with concomitant addictive behaviors. This study aimed to assess the prevalence of Internet gambling practices, its impact upon psychosocial development and to evaluate the association between gambling practices and Internet addictive behavior among Cypriot adolescents. A cross-sectional study was conducted in a convenience sample (n = 805) of adolescents attending selected public schools (9th and 10th grades) in Cyprus. Anonymous self-completed questionnaires were used including the Internet Addiction Test and the Strengths and Difficulties Questionnaire. Among the study population (n = 805), approximately one third (n = 28; 34.9%) reported Internet gambling. Internet gamblers were twice as likely to utilize Internet café portals (adjusted odds ratio for gender and age, AOR: 2.13; 95% confidence interval, 95% CI: 1.56-2.91) for interactive game-playing (AOR: 6.84; 95% CI: 4.23-11.07), chat-rooms (AOR: 2.57; 95% CI: 1.31-4.85), and retrieval of sexual information (AOR: 1.99; 95% CI: 1.42-2.81). Among Internet gamblers 26.0% (n = 73) reported borderline addictive Internet use and 4.3% (n = 12) addictive behavior. Internet gamblers more often had comprehensive psychosocial and emotional maladjustment (AOR: 4.00; 95% CI: 1.97-8.13), including Abnormal Conduct Problems (AOR: 3.26; 95% CI: 2.00-5.32), Emotional Symptoms (AOR: 1.78; 95% CI: 1.02-3.11), and Peer Problems (AOR: 2.44; 95% CI: 1.08-5.48) scores. The multivariate regression analyses indicated that the single independent predictor associated with Internet addictive behavior was Internet gambling (AOR: 5.66; 95% CI: 1.45-22.15). Internet gambling is associated with addictive Internet use, as well as emotional maladjustment and behavioral problems, among Cypriot adolescents. Longitudinal studies are needed to elucidate whether Internet gambling constitutes a risk factor for the development of Internet addictive behavior among adolescents.
Zhu, Yanni; Shen, Xiaotong; Pan, Wei
The importance of network-based approach to identifying biological markers for diagnostic classification and prognostic assessment in the context of microarray data has been increasingly recognized. To our knowledge, there have been few, if any, statistical tools that explicitly incorporate the prior information of gene networks into classifier building. The main idea of this paper is to take full advantage of the biological observation that neighboring genes in a network tend to function together in biological processes and to embed this information into a formal statistical framework. We propose a network-based support vector machine for binary classification problems by constructing a penalty term from the Finfinity-norm being applied to pairwise gene neighbors with the hope to improve predictive performance and gene selection. Simulation studies in both low- and high-dimensional data settings as well as two real microarray applications indicate that the proposed method is able to identify more clinically relevant genes while maintaining a sparse model with either similar or higher prediction accuracy compared with the standard and the L1 penalized support vector machines. The proposed network-based support vector machine has the potential to be a practically useful classification tool for microarrays and other high-dimensional data.
Forum: Censorship and Electronic Communication in the K-12 Environment. Right-of-Way on the Information Superhighway: Access and Policy Issues for Schools [and] Censorship and Electronic Environments in Schools [and] The Internet May be the Safest Haven [and] A Delicate Balance: Keeping Children out of the Gutters along the Information Highway.
Mazur, Joan M.; And Others
Four essays discuss Internet use in schools and focuses on censorship of online information. Highlights include legal cases that may set a precedent for future litigation involving liability and electronic access; descriptions of two schools' experiences with online access; and advice from librarians, including a draft interpretation of the…
Andersen, Thomas Barnebeck; Bentzen, Jeanet Sinding; Dalgaard, Carl-Johan Lars
We test the hypothesis that the Internet is a useful technology for controlling corruption. In order to do so, we develop a novel identification strategy for Internet diffusion. Power disruptions damage digital equipment, which increases the user cost of IT capital, and thus lowers the speed...... of Internet diffusion. A natural phenomenon causing power disruptions is lightning activity, which makes lightning a viable instrument for Internet diffusion. Using ground-based lightning detection censors as well as global satellite data, we construct lightning density data for the contiguous U.S. states...... and a large cross section of countries. Empirically, lightning density is a strong instrument for Internet diffusion and our IV estimates suggest that the emergence of the Internet has served to reduce the extent of corruption across U.S. states and across the world....
Full Text Available This paper describes the early stages of research and development of an educational environment designed to enable learners to participate in remote, group based large-scale activities based on local area network and wide area network technologies working on a range of systems and within different learning situations, such as in class group work, remote group work or independent learning. The environment covers specifically routing, switching and wireless principles in the domain of computer networking. This is accomplished using the ‘multiuser functionality' feature found within the Cisco Academy programme, Packet Tracer application. The initial research explores how a ‘virtual Internet' can be implemented to enable learners to engage with the scale and complexity of the Internet without interacting with active routing infrastructures thereby interfering with others. Different communities of interest from Cisco Systems as well as their Academy Programme academic affiliates have contributed to the development of the resource as well as to research into how individuals participate in learning as a result of using this software. This paper tells the story of the iterative action research process with two initial learning situations of ‘remote many' participation and ‘in class many' participation in a large scale networking exercise. As research is still in the development process, this paper explores the experiences and observations gathered from engaging with the two learning scenarios, describing how each interaction exercise was perceived by participants and their educators. Initial findings from both activities indicate that the concept of an ‘Internet on the Internet' to deliver simulated practical learning has considerable potential and brings an alternative dimension to the practical learning experience. Research is ongoing, with the work in this paper informing the continual iterative process.
Brunner, Marcus; Abramowicz, Henrik; Niebert, Norbert; Correia, Luis M.
In this paper, we describe several approaches to address the challenges of the network of the future. Our main hypothesis is that the Future Internet must be designed for the environment of applications and transport media of the 21st century, vastly different from the initial Internet's life space. One major requirement is the inherent support for mobile and wireless usage. A Future Internet should allow for the fast creation of diverse network designs and paradigms and must also support their co-existence at run-time. We detail the technical and business scenarios that lead the development in the EU FP7 4WARD project towards a framework for the Future Internet.
Mohamed Amine Ferrag
Full Text Available In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail. These protocols are categorized based on the target environment: (1 Machine to Machine Communications (M2M, (2 Internet of Vehicles (IoV, (3 Internet of Energy (IoE, and (4 Internet of Sensors (IoS. Threat models, countermeasures, and formal security verification techniques used in authentication protocols for the IoT are presented. In addition a taxonomy and comparison of authentication protocols that are developed for the IoT in terms of network model, specific security goals, main processes, computation complexity, and communication overhead are provided. Based on the current survey, open issues are identified and future research directions are proposed.
Hsiao, Bo; Zhu, Yu-Qian; Chen, Li-Yueh
Introduction: Previous research has identified Internet anxiety and Internet identification as two important factors that predict usage and experience on the Internet. However, little is known about the relationship between them. This research aimed to untangle the relationship between Internet anxiety and Internet identification, and to…
Billari, Francesco C.; Giuntella, Osea; Stella, Luca
The spread of high-speed Internet epitomizes the digital revolution, affecting several aspects of our life. Using German panel data, we test whether the availability of broadband Internet influences fertility choices in a low-fertility setting, which is well-known for the difficulty to combine work and family life. We exploit a strategy devised by Falck et al. (2014) to obtain causal estimates of the impact of broadband on fertility. We find positive effects of highspeed Internet availability...
Enterprises are now connected internally and externally to other Enterprises via the Internet in ways that are increasingly difficult to manage, especially as these interconnections become more dynamic. Current methods of coordinating the effects of change as they propagate through these networks of connections are not likely to scale. What is needed is a new paradigm for how the Internet supports such coordination. Indeed, the Internet should and could provide fundamental coordination functi...
Internet Technologies and Information Services: Second Edition is a vital asset to students preparing for careers in library and information science and provides expanded coverage to important new developments while still covering Internet foundations. In addition to networking, the Internet, HTML, web design, web programming, XML, and web searching, this new edition covers additional topics such as cloud computing, content management systems, eBook technologies, mobile technologies and applications, relational database management systems (RDMS), open source software, and virtual priva
Napoli, Philip M.; Karppinen, Kari
This paper examines the emergence of diversity as a guiding principle of Internet governance. This paper compares how diversity is being interpreted and applied in Internet governance discourse and related research with its interpretation and application in traditional communications policy-making and policy research. As this paper illustrates, a somewhat more narrow conceptualization of diversity has developed within the Internet governance context than has been the case in traditional com...
Kidmose, Egon; Pedersen, Jens Myrup
2016 was a year when the discussions about Internet of Things and security gained significant grounds. Not only was it yet another year where the challenges of cybercrime became visible to the general public, maybe the presumable Russian hacking of Hillary Clinton's emails as the most prominent...... example, but at the end of the year the Mirai Botnet used Internet of Things devices to perform successful attacks on several Internet infrastructure points....
Final thesis is about the usage of GIS technology on the Internet. One emphasis of the thesis is a description of the elementary facts of the GIS technology. It is explained the information system, geographical or space information system and space data (about the quality, organization). I also mentioned some basic facts about Internet. The second emphasis is description of the lattice of the GIS technology with its breakthrough on the Internet and the meaning and possibilities of usage of th...
Stetsenko Anatolij Ivanovich
It is reviewed scientific journals that have free public access. Investigated the information resources of powerlifting on the internet. Accentuated the importance of using professionally-oriented information resources in the learning process. It is established that Ukrainian language environment of the internet in the sphere of powerlifting has been relatively much attention in comparison with other power sports. Formed the base of internet resources for students of physical culture and spor...
We analyzed psychological research that consider the Internet as a resource for solving the problems of adolescence. Based on the understanding of self-consciousness as a central adolescence new formation, we formulated a set of tasks of adolescence. It is shown that for the successful solution of age problems by teenagers on the Internet, specialized environments should be designed. Internet as a medium of teenagers’ socialization is characterized by a high degree of variety and uncontrollab...
Bentall, M; Turton, B
Asynchronous Transfer Mode (ATM) is a protocol that allows data, sound and video being transferred between independent networks via ISDN links to be supplied to, and interpreted by, the various system protocols.ATM and Internet Protocol explains the working of the ATM and B-ISDN network for readers with a basic understanding of telecommunications. It provides a handy reference to everyone working with ATM who may not require the full standards in detail, but need a comprehensive guide to ATM. A substantial section is devoted to the problems of running IP over ATM and there is some discussion o
Cèsar Carreras Monfort
Full Text Available La revista Internet Archaeology News s'adreça a un públic restringit, especialitzat en arqueologia i sobretot en aplicacions de caràcter informàtic i noves metodologies de treball. El fet que la revista neixi amb la voluntat d'ésser innovadora en el seu camp i molt especialitzada no treu que el nivell de les col·laboracions sigui de força qualitat gràcies a la política del equip editorial.
in the age of the internet; civil watch-surveillance on social networking sites; and networked interactive surveillance in transnational space. This book is a result of a research action launched by the intergovernmental network COST (European Cooperation in Science and Technology)....... institutions have a growing interest in accessing this personal data. Here, contributors explore this changing landscape by addressing topics such as commercial data collection by advertising, consumer sites and interactive media; self-disclosure in the social web; surveillance of file-sharers; privacy...
Internet Congestion Control provides a description of some of the most important topics in the area of congestion control in computer networks, with special emphasis on the analytical modeling of congestion control algorithms. The field of congestion control has seen many notable advances in recent years and the purpose of this book, which is targeted towards the advanced and intermediate reader, is to inform about the most important developments in this area. The book should enable the reader to gain a good understanding of the application of congestion control theory to a number of applic
Dür, Wolfgang; Lamprecht, Raphael; Heusler, Stefan
A long-range quantum communication network is among the most promising applications of emerging quantum technologies. We discuss the potential of such a quantum internet for the secure transmission of classical and quantum information, as well as theoretical and experimental approaches and recent advances to realize them. We illustrate the involved concepts such as error correction, teleportation or quantum repeaters and consider an approach to this topic based on catchy visualizations as a context-based, modern treatment of quantum theory at high school.
Full Text Available En muchas ocasiones de ha oído hablar que internet y las nuevas tecnologías de la comunicación llevarán a la humanidad a un mundo homogeneizado en donde todos compartirán la misa cultura del “ciberespacio” y hablarán el mismo lenguaje. Nuevas iniciativas en América Latina combinan la tecnología de punta y la radio para poner fin a este mito y contribuir a una comunicación más democrática.
Miles, J; Petrie, C; Steel, M
The first 50 websites identified on searching the Internet for 'weight loss diets' were assessed systematically and their content compared with published clinical guidelines for management of obesity. The relevance and quality of the sites varied enormously. Only 3 confined themselves to sound dietary advice. Most promoted dietary supplements or other 'slimming aids', often of uncertain composition and based on dubious physiological principles. Potential hazards--for example, those of very low calorie diets--were rarely highlighted and certain regimens on offer were potentially dangerous. PMID:10884770
in this context. With such platforms comes the massive provision and storage of personal data that are systematically evaluated, marketed, and used for targeting users with advertising. In a world of global economic competition, economic crisis, and fear of terrorism after 9/11, both corporations and state...... in the age of the internet; civil watch-surveillance on social networking sites; and networked interactive surveillance in transnational space. This book is a result of a research action launched by the intergovernmental network COST (European Cooperation in Science and Technology)....
Buchanan, Nancy L.
Library resources are prevalent on the Internet. Library catalogs, electronic books, electronic periodicals, periodical indexes, reference sources, and U.S. Government documents are available by telnet, Gopher, World Wide Web, and FTP. Comparatively few copyrighted library resources are available freely on the Internet. Internet implementations of library resources can add useful features, such as full-text searching. There are discussion lists, Gophers, and World Wide Web pages to help users keep up with new resources and changes to existing ones. The future will bring more library resources, more types of library resources, and more integrated implementations of such resources to the Internet.
Wahlster, Wolfgang; Wess, Stefan; Friedrich, Hermann; Widenka, Thomas
The Internet of Services and the Internet of Things are major building blocks of the Future Internet. The digital enterprise of the future is based not only on mobile, social, and cloud technologies, but also on semantic technologies and the future Internet of Everything. Semantic technologies now enable mass customization for the delivery of goods and services that meet individual customer needs and tastes with near mass production efficiency and reliability. This is creating a competitive advantage in the industrial economy, the service economy, and the emerging data economy, leading to
Brian C. Briggeman; Detre, Joshua D.; Doye, Damona G.; Lansford, Notie H., Jr.
The Oklahoma Agricultural Bank Simulation Game (Ag Bank Sim) is a software based, experiential learning tool through which participants historically have learned key financial, economic, and banking lessons. The game offers a “real world” experience in which management decisions affect institutions interacting in a geographic market, enhancing understanding of the complex, competitive environment within which commercial banks operate. A new Internet version of the game has been developed, all...
Li, Yajun; Zhang, Xinghui; Lu, Furong; Zhang, Qin
Abstract The purpose of this study was to examine the prevalence of Internet addiction in a nationally representative sample of Chinese elementary and middle school students and to investigate Internet addiction among Internet users with different usages. The data were from the National Children's Study of China (NCSC) in which 24,013 fourth- to ninth-grade students were recruited from 100 counties in 31 provinces in China. Only 54.2% of the students had accessed the Internet. According to the criteria of Young's Diagnostic Questionnaire (YDQ), an eight-item instrument, the prevalence of Internet addiction in the total sample was 6.3%, and among Internet users was 11.7%. Among the Internet users, males (14.8%) and rural students (12.1%) reported Internet addiction more than females (7.0%) and urban students (10.6%). The percentage of Internet addicts in elementary school students (11.5%) was not significantly lower than the percentage of middle school students (11.9%). There was no statistically significant difference between the four geographical regions (9.6%, 11.5%, 12.3%, 11.1%) characterized by different levels of economy, health, education, and social environment. As the frequency of Internet use and time spent online per week increased, the percentage of Internet addicts increased. When considering the location and purpose of Internet use, the percentage of Internet addicts was highest in adolescents typically surfing in Internet cafes (18.1%) and playing Internet games (22.5%). PMID:23971432
Lagowski, J. J.
critiques of the original piece of information, but, in general, we have no way of establishing the credentials of the critics. It may take an enormous amount of time for an Internet publication to accrue a critique that is equivalent to that received by a equivalent quantum of information in a peer reviewed, paper-oriented journal. It is difficult to decide (unless you already know because of your expertise) when an Internet publication has "passed the test," in contrast to the paper published in a refereed journal. When the printed paper appears, most of the critics associated with that journal have agreed (through the editorial process) that it is probably worthwhile publishing. The appearance of an Internet paper does not carry the same implication since anyone can put anything on the Internet. Anyone who has a computer and a network connection is empowered to publish on the Internet, and often does. Putting a neophyte--a beginning student--in this kind of environment with little or no guidance would seem to abrogate certain responsibilities that teachers have to guide a student's intellectual growth and ability to make critical judgments. This is not an argument against the use of the Internet for teaching; rather it is a plea to use this new tool with care lest our students be harmed intellectually. "As the twig is bent. . ." The Internet can be likened to an open library where anyone can come in and put a book or a note on a scrap of paper anywhere on the shelves. Further, anyone can go in anytime they wish and make a copy of anything to take away. Without the value added by a librarian, who brings a known (if not necessarily perfect) order to the holdings, the open library is virtually worthless to people who have specific tasks to perform, e.g., finding the NMR spectrum of (or anything characteristic of) a specific compound. Unless we learn how to assure the usefulness and reliability of information on the Internet, one of the era's most valuable resources may
Seo, Jung Woo; Lee, Sang Jin
Large-scale network environments require effective detection and response methods against DDoS attacks. Depending on the advancement of IT infrastructure such as the server or network equipment, DDoS attack traffic arising from a few malware-infected systems capable of crippling the organization's internal network has become a significant threat. This study calculates the frequency of network-based packet attributes and analyzes the anomalies of the attributes in order to detect IP-spoofed DDoS attacks. Also, a method is proposed for the effective detection of malware infection systems triggering IP-spoofed DDoS attacks on an edge network. Detection accuracy and performance of the collected real-time traffic on a core network is analyzed thru the use of the proposed algorithm, and a prototype was developed to evaluate the performance of the algorithm. As a result, DDoS attacks on the internal network were detected in real-time and whether or not IP addresses were spoofed was confirmed. Detecting hosts infected by malware in real-time allowed the execution of intrusion responses before stoppage of the internal network caused by large-scale attack traffic.
Full Text Available The goal of this study is to improve thermal comfort and indoor air quality with the adaptive network-based fuzzy inference system (ANFIS model and improved particle swarm optimization (PSO algorithm. A method to optimize air conditioning parameters and installation distance is proposed. The methodology is demonstrated through a prototype case, which corresponds to a typical laboratory in colleges and universities. A laboratory model is established, and simulated flow field information is obtained with the CFD software. Subsequently, the ANFIS model is employed instead of the CFD model to predict indoor flow parameters, and the CFD database is utilized to train ANN input-output “metamodels” for the subsequent optimization. With the improved PSO algorithm and the stratified sequence method, the objective functions are optimized. The functions comprise PMV, PPD, and mean age of air. The optimal installation distance is determined with the hemisphere model. Results show that most of the staff obtain a satisfactory degree of thermal comfort and that the proposed method can significantly reduce the cost of building an experimental device. The proposed methodology can be used to determine appropriate air supply parameters and air conditioner installation position for a pleasant and healthy indoor environment.
Full Text Available It is essential for transportation management centers to equip and manage a network of fixed and mobile sensors in order to quickly detect traffic incidents and further monitor the related impact areas, especially for high-impact accidents with dramatic traffic congestion propagation. As emerging small Unmanned Aerial Vehicles (UAVs start to have a more flexible regulation environment, it is critically important to fully explore the potential for of using UAVs for monitoring recurring and non-recurring traffic conditions and special events on transportation networks. This paper presents a space-time network- based modeling framework for integrated fixed and mobile sensor networks, in order to provide a rapid and systematic road traffic monitoring mechanism. By constructing a discretized space-time network to characterize not only the speed for UAVs but also the time-sensitive impact areas of traffic congestion, we formulate the problem as a linear integer programming model to minimize the detection delay cost and operational cost, subject to feasible flying route constraints. A Lagrangian relaxation solution framework is developed to decompose the original complex problem into a series of computationally efficient time-dependent and least cost path finding sub-problems. Several examples are used to demonstrate the results of proposed models in UAVs’ route planning for small and medium-scale networks.
Koff, Rosalind N.; Moreno, Megan A.
Internet use is widespread among the older adolescent population. Given the pervasiveness and frequency of internet use, concerns have been raised regarding the impact of excess internet use on adolescent health. In order to understand the impact of internet use on health, we must have accurate and reliable measures of internet use. This study…
The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged in this co......The Internet has been transformed in the past years from a system primarily oriented on information provision into a medium for communication and community-building. The notion of “Web 2.0”, social software, and social networking sites such as Facebook, Twitter and MySpace have emerged...... in this context. With such platforms comes the massive provision and storage of personal data that are systematically evaluated, marketed, and used for targeting users with advertising. In a world of global economic competition, economic crisis, and fear of terrorism after 9/11, both corporations and state...... institutions have a growing interest in accessing this personal data. Here, contributors explore this changing landscape by addressing topics such as commercial data collection by advertising, consumer sites and interactive media; self-disclosure in the social web; surveillance of file-sharers; privacy...
Skinner, Harvey; Biscope, Sherry; Poland, Blake
The rapid growth of the Internet is increasingly international with young people being the early adopters in most countries. However, the quality of Internet access looms as a major barrier hidden behind Internet use statistics. The goal of this study was to provide an in-depth evaluation of young people's perspectives on using the Internet to obtain health information and resources (e-health). Using an inductive qualitative research design, 27 focus groups were conducted in Ontario, Canada. The 210 young participants were selected to reflect diversity in age, sex, geographic location, cultural identity and risk. A major finding was how the quality of Internet access influenced young people's ability to obtain health information and resources. Quality of Internet access was affected by four key factors: 1. Privacy, 2. Gate-keeping, 3. Timeliness and 4. Functionality. Privacy was particularly relevant to these young people in getting access to sensitive health information (e.g. sexual activities). Variations in access quality also impacted participation in mutual support, fostering social networks and getting specific health questions answered. These results serve as a warning about using Internet penetration statistics alone as a measure of access. Concerted attention is needed on improving the quality of Internet access for achieving the potential of e-health. This is imperative for addressing the digital divide affecting populations both within countries and globally between countries.
This exploratory study investigated gender differences in Internet identification and Internet anxiety. A sample of 231 students (138 females and 93 males) from four different schools participated in the study. A structured interview schedule was used to collect data. Factor analysis was carried out to test for construct validity.
In this study, the uses and gratifications theory was applied to investigate the Internet users' motivations and their relationship with attitudes toward the Internet as well as types of Web site visited by users. Subjects were 185 college students who completed a self-report questionnaire. Four motivations and five types of Web sites were…
Computer use is a widespread leisure activity for adolescents. Leisure contexts, such as Internet cafes, constitute specific social environments for computer use and may hold significant educational potential. This article reports a phenomenological study of adolescents' experiences of educational computer use at Internet cafes in Turkey. The…
Letwinsky, Karim Medico
The purpose of this quantitative study was to investigate the relationship between mathematics teachers' self-efficacy and the use of technology and the Internet in secondary education classrooms. The focus was on the Internet as a tool to promote mathematics communication and literacy in the online environment. A total of 100 mathematics teachers…
Yellowlees, Peter M.; Cook, James N.
Objective: The authors evaluate an Internet virtual reality technology as an education tool about the hallucinations of psychosis. Method: This is a pilot project using Second Life, an Internet-based virtual reality system, in which a virtual reality environment was constructed to simulate the auditory and visual hallucinations of two patients…
Katzer, C.; Fetchenhauer, D.; Belschak, F.
Bullying is not a phenomenon exclusive to the school environment. Pupils also become victims of verbal aggression (teasing, threats, insults, or harassment) in the context of internet chatrooms. The present study addresses the following questions: (1) How often does bullying occur in internet
The Open University, an open distance learning institution, is increasingly using a Virtual Learning Environment (VLE) that requires internet access. This paper investigates how the move to a VLE has affected one group of students who do not have internet access--offender learners studying in prison. Members of the armed forces and secure hospital…
Full Text Available Internet of Things (IoT) is an evolutionary development with the potential to greatly influence and impact society, economy and environment. Through IoT, all devices become Internet connected. These connected devices are controlled by largescale...
Moreira Moura, G.C.; Sadre, R.; Pras, A.
Analogous to the real world, sources of malicious activities on the Internet tend to be concentrated in certain networks instead of being evenly distributed. In this article, we formally define and frame such areas as Internet Bad Neighborhoods. By extending the reputation of malicious IP addresses
Moreira Moura, Giovane; Sadre, R.; Pras, Aiko
Analogous to the real world, sources of malicious activities on the Internet tend to be concentrated in certain networks instead of being evenly distributed. In this article we formally define and frame such areas as Internet Bad Neighborhoods. By extending the reputation of malicious IP addresses
Discussion of middleware focuses on the Internet 2 Middleware Initiative. Topics include a description of middleware as a layer of software in a distributed system; middleware characteristics, including transparency, portability, reliability, scalability, and interoperability; and the Internet 2 Middleware Initiative which is focused on research…
This booklet provides parents with basic information about how to use the computer to find information and communicate with others. It describes what is needed to get started on the Internet and points to some of the many resources available online for parents and children. The book discusses: a brief definition of the Internet, including what the…
PROF. O. E. OSUAGWU
Dec 1, 2013 ... Some of the common vulnerabilities found in the Internet. Information Services ..... serious vulnerability, allowing advanced hacking to be conducted by a novice with no more elaborate tools than a copy of Internet Explorer. Microsoft responded quickly .... To keep things simple, we will use a. Perl version of ...
Rainfinity, a company resulting from the commercialization of Reliable Array of Independent Nodes (RAIN), produces the product, Rainwall. Rainwall runs a cluster of computer workstations, creating a distributed Internet gateway. When Rainwall detects a failure in software or hardware, traffic is shifted to a healthy gateway without interruptions to Internet service. It more evenly distributes workload across servers, providing less down time.
Starting from 1998, the government of the United States took up responsibility for creating and overseeing the Internet Corporation for Assigned Names and Numbers. That Corporation manages the global infrastructures of identifiers on the internet. Beginning with 2003, the United Nations has
Feher, Annamaria; Towell, Elizabeth
A survey of 142 information technology (IT) managers, CIOs, and CEOs in manufacturing, government, financial services, education, health care, retailing, aerospace, chemicals, and wholesaling examined business use of the Internet and found that although 85% of respondents are using the Internet, the perception is that their customers and vendors…
Full Text Available This article considers the issue of providing vulnerability management for Internet user workstations. The author suggests agentless approach to security analysis of a browser, main Internet-faced applications, plugins and extensions, such as Java, Flash, Adobe Reader, ActiveX controls. An example of practical implementation of this approach is provided.
Dragoni, Nicola; Giaretta, Alberto; Mazzara, Manuel
The Internet of Things makes possible to connect each everyday object to the Internet, making computing pervasive like never before. From a security and privacy perspective, this tsunami of connectivity represents a disaster, which makes each object remotely hackable. We claim that, in order...
Mößner, Nicola; Kitcher, Philip
The internet has considerably changed epistemic practices in science as well as in everyday life. Apparently, this technology allows more and more people to get access to a huge amount of information. Some people even claim that the internet leads to a "democratization of knowledge." In the following text, we will analyze this statement.…
Mitton, Nathalie; Simplot-Ryl, David
Nowadays, we daily meet new wireless technologies. This is often achieved through the use of RFID (Radio Frequency IDentification) tags and wireless sensors. Our environment and surrounding objects become communicating. New applications thus arise in domains such as logistic, health, rescue and environment preservation. Embedding such devices in various industrial goods could lead to a world in which objects communicate and interact with other objects and with people, i.e. the so-called "Internet of things". This article describes the various types of RFID tags, and the hot topic for research and some examples of applications are given.
in a University in Southern India to empower the female students through Internet usage. The study was done to find out the problems the woman students faced in gaining access and using Internet and how they can be empowered through Internet usage. Future workshop was conducted to find out the problems...... and reflecting. The paper will explore the various cultural issues and explicate how the social context plays a major role in the use of Internet even if there is sufficient access. These issues will be addressed from an empowerment perspective. The paper ends by recommending the methods to be adopted for more......Information and Communication Technology (ICT) has been widely recognized as a tool for human development (UNDP 2001). The rate at which ICT are growing is changing the way knowledge is developed, acquired and delivered. (Tongia, et al. 2005) Internet is one of the Information & Communication...
Petersen, Anja Bechmann
, the Internet continues to play a minor role when compared to older media. The content of the cross media concepts and organizations' history are crucial elements in deciding the priority and use of platforms. Methodologically, the article approaches cross media and the roles of the Internet on a micro......Convergence is one of the hot topics in Internet studies. Recently, however, media organizations have turned their focus to cross media communication. Media organizations are interested in optimizing communication across platforms such as TV, radio, websites, mobile telephones and newspapers....... The aim of this article is to examine the roles of the Internet when emphasis is put on cross media rather than convergence. This article proposes not one unidirectional convergent tendency but manifold roles of the Internet in cross media communication. Inside the media organizations, however...
Full Text Available The architecture of a networked system is its underlying technical and logical structure, including transmission equipment, communication protocols, infrastructure, and connectivity between its components or nodes. This article introduces the idea of network architecture as internet governance, and more specifically, it outlines the dialectic between centralised and distributed architectures, institutions and practices, and how they mutually affect each other. The article argues that network architecture is internet governance in the sense that, by changing the design of the networks subtending internet-based services and the global internet itself, its politics are affected – the balance of rights between users and providers, the capacity of online communities to engage in open and direct interaction, the fair competition between actors of the internet market.
Robles, Rosslin John; Kim, Haeng-Kon; Kim, Tai-Hoon
An Application programming interface or API is an interface implemented by a software program that enables it to interact with other software. Many companies provide free API services which can be utilized in Control Systems. SCADA is an example of a control system and it is a system that collects data from various sensors at a factory, plant or in other remote locations and then sends this data to a central computer which then manages and controls the data. In this paper, we designed a scheme for Weather Condition in Internet SCADA Environment utilizing data from external API services. The scheme was designed to double check the weather information in SCADA.
Miller, Ryan J
In an era when social media sites like YouTube, Facebook, and Twitter dominate the popular press, many surgeons overlook the foundational tactics and strategies necessary for long-term practice development and lead generation on the Internet. This article analyzes common errors made by surgeons during the development and implementation of Web site projects, focusing on the areas of strategy development; domain name identification; site plan creation; design considerations; content development; vendor selection; and launch, promotion, and staff training. The article emphasizes that, because the Web site remains the foundation of a surgeon's branding message, minimizing errors during development and construction is critical, particularly in highly competitive or saturated markets, for today's facial plastic surgery practice. Copyright © 2010 Elsevier Inc. All rights reserved.
Beretta, Giordano B.
In 1990, the first monochrome print-on-demand (POD) systems wee successfully brought to market. Subsequent color versions have been less successful, in my view mostly because they require a different workflow than traditional systems and the highly skilled specialists have not been trained. This hypothesis is based on the observation that direct-to-plate systems for short run printing, which do not require a new workflow, are quite successful in the market place. The internet and the World Wide Web are the enabling technologies that are fostering a new print model that is very likely to replace color POD before the latter can establish itself. In this model the consumers locate the material they desire from a contents provider, pay through a digital cash clearinghouse, and print the material at their own cost on their local printer. All the basic technologies for this model are in place; the main challenge is to make the workflow sufficiently robust for individual use.
The three pillars of Internet Security are Infrastructure, Applications and People. In this series of lectures we will examine those three pillars and how vital it is for individuals to understand the vulnerabilities of this technology so they can made informed decisions about risks and how they can reduce those risks for themselves and their colleagues.First we will focus on the infrastructure: network; servers; operating systems and all those things that are mostly invisible. Moving up a level, into the visible realm, we discuss the application and see things like buffer overflows, viruses and how as application developers and users we can protect ourselves. Finally, it's all about people. The strongest security technology in the world is easily defeated if people don't understand their role in the whole system.
Shim, J. P.; Avital, Michel; Dennis, Alan R.
Recent research reports illustrate that Internet of things (IoT) is projected to be a multi-trillion dollar opportunity by 2020, with 50 billion devices connected by then. The IoT is a leading-edge topic in Information Systems (IS). In a hyperconnected economy, IoT can transform a business...... radically. Numerous devices are being produced with software and connectivity added to them, making them what is commonly referred to as "smart" devices. The IoT is in position to make a huge impact on the world where it is considered to be the next industrial revolution. It will influence the way consumers......, businesses, and governments interact with the world. The panel covers IoT issues, such as devices/connection efficiency, security, privacy, analytics, monetization and end-user services, IoT and Blockchain convergence, platform and standards, and compliances. Three themes, i.e., how IoT transforms business...
A. A. Salama
Full Text Available In this paper, we present a review of different recommender system algorithms that are utilized in social networks based e-Learning systems. Future research will include our proposed our e-Learning system that utilizes Recommender System and Social Network. Since the world is full of indeterminacy, the neutrosophics found their place into contemporary research. The fundamental concepts of neutrosophic set, introduced by Smarandache in [21, 22, 23] and Salama et al. in [24-66].The purpose of this paper is to utilize a neutrosophic set to analyze social networks data conducted through learning activities.
Frank, Florian; Weigel, Robert
This paper presents a newly developed methodology for VHDL-AMS model integration into SPICE-based EMC simulations. To this end the VHDL-AMS model, which is available in a compiled version only, is characterized under typical loading conditions, and afterwards a neural network based technique is applied to convert characteristic voltage and current data into an equivalent circuit in SPICE syntax. After the explanation of the whole method and the presentation of a newly developed switched state space dynamic neural network model, the entire analysis process is demonstrated using a typical application from automotive industry.
Weber, Felix; Bhowmik, Subrata; Høgsberg, Jan Becker
This paper validates numerically and experimentally a new neural network-based real-time force tracking scheme for magnetorheological (MR) dampers on a five-storey shear frame with MR damper. The inverse model is trained with absolute values of measured velocity and force because the targeted...... current is a positive quantity. The validation shows accurate results except of small current spikes when the desired force is in the vicinity of the residual MR damper force. In the closed-loop, higher frequency components in the current are triggered by the transition of the actual MR damper force from...
In the present study, the network-based statistics (NBS approach was used to assess differences in functional connectivity between specific cerebellar and cerebral “nodes” in SCA2 patients. Altered inter-nodal connectivity was found between more posterior regions in the cerebellum and regions in the cerebral cortex clearly related to cognition and emotion. Furthermore, more anterior cerebellar lobules showed altered inter-nodal connectivity with motor and somatosensory cerebral regions. The present data suggest that in SCA2 a cerebellar dysfunction affects long-distance cerebral regions and that the clinical symptoms may be specifically related with connectivity changes between motor and non-motor cerebello-cortical nodes.
Full Text Available The focus of this article is on the coordination of civil-service training in a decentralized civil-service system. The Estonian case is studied. The article investigates network-based coordination, analyzes the power sources of the central coordinator and discusses the opportunities and limitations of creating coherence through network-type cooperation. The article concludes that the key power sources for the central coordinator are financial, human and technical resources paired with knowledge, leadership and commitment. The case study shows that, in a decentralized civil service system, a common understanding on training and development can be fostered by intense collaboration through networks.
Paul, R R; Mukherjee, A; Dutta, P K; Banerjee, S; Pal, M; Chatterjee, J; Chaudhuri, K; Mukkerjee, K
Aim: To describe a novel neural network based oral precancer (oral submucous fibrosis; OSF) stage detection method. Method: The wavelet coefficients of transmission electron microscopy images of collagen fibres from normal oral submucosa and OSF tissues were used to choose the feature vector which, in turn, was used to train the artificial neural network. Results: The trained network was able to classify normal and oral precancer stages (less advanced and advanced) after obtaining the image as an input. Conclusions: The results obtained from this proposed technique were promising and suggest that with further optimisation this method could be used to detect and stage OSF, and could be adapted for other conditions. PMID:16126873
Reusable Launch Vehicles (RLVs) have different mission requirements than the Space Shuttle, which is used for benchmark guidance design. Therefore, alternative Terminal Area Energy Management (TAEM) and Approach and Landing (A/L) Guidance schemes can be examined in the interest of cost reduction. A neural network based solution for a finite horizon trajectory optimization problem is presented in this paper. In this approach the optimal trajectory of the vehicle is produced by adaptive critic based neural networks, which were trained off-line to maintain a gradual glideslope.
ZAINUDDIN MUDA Z. MONGGILO
Full Text Available Internet can develop the communication and information freedom on society but unfortunately in some nations, especially in Asia, it cannot be fully accessed because of government censorship. This report explains the relationship between the practice of Internet censorship imposed by the Chinese government and the freedom of its citizens (in the internet surfing experience as the realization of human rights in the freedom of expression and opinion (seek, receive-use, and communicate information which is traced through the relevant literature study. China is a unique case since the internet censorship regulation contributes to its status as the country with the least internet freedom yet at the same time it is credited as having the most internet users globally. In addition, China known as the communist country that began opening up to globalization and information of technology, but the government’s control over it is still so tight and binding, not only in the press, or the traditional media, but also in new media with the internet censorship. The control over this information may have a clear objective to maintain a climate of information in the community, but on the other hand, such control is tantamount to restricting the right of citizens to make, use, and distribute information, and more fatal as a violation of human rights.
Hoy, Matthew B
The "Internet of Things" is a popular buzzword but a poorly understood concept. In short, it refers to everyday objects that can sense the environment around them and communicate that data to other objects and services via the Internet. This column will briefly explain what the Internet of Things is and how it might be useful for libraries. It will also discuss some of the problems with and objections to this technology. A list of currently available Internet of Things examples is also included.
Wong, Irene Lai Kuen; So, Ernest Moon Tong
The study investigated Internet gambling involvement and pathological gambling among Hong Kong adolescents aged 12-19 years. The diagnostic and statistical manual (4th edition) multiple response format for juveniles (DSM-IV-MR-J) (Fisher in J Gambl Stud 16:253-273, 2000) was filled by 1,004 students (597 boys, 407 girls) recruited by random selection of classes. The response rate was 86.6 %. Results indicate that more respondents participated in land-based gambling than Internet gambling (63.5 vs. 3.5 %) but online gamblers are 1.5 and 3.2 times more likely to develop pathological and at-risk gambling than non-Internet gamblers. Using the DSM-IV-MR-J criteria, 5.7 and 22.9 % of the Internet gamblers could be classified as at-risk gamblers and pathological gamblers, respectively. Majority (94.3 %) wagered online at home, and 91.4 % made their first bet before 18 years. Many perceived Internet gambling as a trendy (71.4 %) and safe entertainment (54.3 %). Problematic Internet gambling was significantly associated with the male gender, school grades, online gambling frequency, amount wagered and a gambling family environment. Survey results have implications for gambling research and preventive programs.
Sawhney, Anil; Mund, Andre; Koczenasz, Jeremy
Describes a way to incorporate practical content into the construction engineering and management curricula: the Internet-based Interactive Construction Management Learning System, which uses interactive and adaptive learning environments to train students in the areas of construction methods, equipment and processes using multimedia, databases,…
Full Text Available Internet of Things (IoT transforms network communication to Machine-to-Machine (M2M basis and provides open access and new services to citizens and companies. It extends the border of Internet and will be developed as one part of the future 5G networks. However, as the resources of IoT’s front devices are constrained, many security mechanisms are hard to be implemented to protect the IoT networks. Intrusion detection system (IDS is an efficient technique that can be used to detect the attackers when cryptography is broken, and it can be used to enforce the security of IoT networks. In this article, we analyzed the intrusion detection requirements of IoT networks and then proposed a uniform intrusion detection method for the vast heterogeneous IoT networks based on an automata model. The proposed method can detect and report the possible IoT attacks with three types: jam-attack, false-attack, and reply-attack automatically. We also design an experiment to verify the proposed IDS method and examine the attack of RADIUS application.
Sánchez Montero, José Antonio
Full Text Available Based on a real experience of an Internet integrated information system within a business environment, this article analyzes the main problems for an Internet quality information retrieval, describes a hypermedia navigation framework and, finally, establishes a methodology for the selection and management of Internet information resources.
A través de la experiencia práctica de implantación de un sistema integrado de recursos de información Internet en un entorno empresarial, se describen los principales problemas para la recuperación de información de calidad en Internet, el diseño de esquemas de navegación en entornos hipermediales, y una metodología para la selección y gestión de recursos de información Internet.
Bailey, Eleanor; Krysinska, Karolina; O'Dea, Bridianne; Robinson, Jo
Bereavement by suicide is associated with a number of consequences including poor mental health outcomes and increased suicide risk. Despite this, the bereaved by suicide may be reluctant to seek help from friends, family, and professionals. Internet forums and social networking sites are a popular avenue of support for the bereaved, but to date there is a lack of research into their use and efficacy. To survey users of suicide bereavement Internet forums and Facebook groups regarding their help-seeking behaviors, use of forums, and perceived benefits and limitations of such use. This study employed a cross-sectional design in which users of suicide bereavement Internet forums and Facebook groups completed an anonymous online survey. Participants were 222 users of suicide bereavement Internet forums. Most participants (93.2%) had sought face-to-face help from sources other than Internet forums, but were more likely to seek help in the near future from informal rather than formal sources. Forums were perceived as highly beneficial and there were few limitations. The generalizability of these results to other internet forums may be limited. Additionally, we were not able to examine differences between forums in terms of quality or user-reported efficacy. Finally, the data reflects the subjective views of forum users, which may differ from the views of moderators or experts. Internet forums, including Facebook groups, appear to be a useful adjunct to face-to-face help-seeking for supporting those who have been bereaved by suicide.
Goto, Yasushi; Nagase, Takahide
Owing to new developments in Internet technologies, the amount of available oncology information is growing. Both patients and caregivers are increasingly using the Internet to obtain medical information. However, while it is easy to provide information, ensuring its quality is always a concern. Thus, many instruments for evaluating the quality of health information have been created, each with its own advantages and disadvantages. The increasing importance of online search engines such as Google warrants the examination of the correlation between their rankings and medical quality. The Internet also mediates the exchange of information from one individual to another. Mailing lists of advocate groups and social networking sites help spread information to patients and caregivers. While text messages are still the main medium of communication, audio and video messages are also increasing rapidly, accelerating the communication on the Internet. Future health information developments on the Internet include merging patients' personal information on the Internet with their traditional health records and facilitating the interaction among patients, caregivers and health-care providers. Through these developments, the Internet is expected to strengthen the mutually beneficial relationships among all stakeholders in the field of medicine.
Wang, Jieqiong; Zhang, Caicai; Wan, Shibiao; Peng, Gang
Previous studies on congenital amusia mainly focused on the impaired fronto-temporal pathway. It is possible that neural pathways of amusia patients on a larger scale are affected. In this study, we investigated changes in structural connections by applying both tract-based and network-based analysis to DTI data of 12 subjects with congenital amusia and 20 demographic-matched normal controls. TBSS (tract-based spatial statistics) was used to detect microstructural changes. The results showed that amusics had higher diffusivity indices in the corpus callosum, the right inferior/superior longitudinal fasciculus, and the right inferior frontal-occipital fasciculus (IFOF). The axial diffusivity values of the right IFOF were negatively correlated with musical scores in the amusia group. Network-based analysis showed that the efficiency of the brain network was reduced in amusics. The impairments of WM tracts were also found to be correlated with reduced network efficiency in amusics. This suggests that impaired WM tracts may lead to the reduced network efficiency seen in amusics. Our findings suggest that congenital amusia is a disconnection syndrome.
Full Text Available Previous studies on congenital amusia mainly focused on the impaired fronto-temporal pathway. It is possible that neural pathways of amusia patients on a larger scale are affected. In this study, we investigated changes in structural connections by applying both tract-based and network-based analysis to DTI data of 12 subjects with congenital amusia and 20 demographic-matched normal controls. TBSS (tract-based spatial statistics was used to detect microstructural changes. The results showed that amusics had higher diffusivity indices in the corpus callosum, the right inferior/superior longitudinal fasciculus, and the right inferior frontal-occipital fasciculus (IFOF. The axial diffusivity values of the right IFOF were negatively correlated with musical scores in the amusia group. Network-based analysis showed that the efficiency of the brain network was reduced in amusics. The impairments of WM tracts were also found to be correlated with reduced network efficiency in amusics. This suggests that impaired WM tracts may lead to the reduced network efficiency seen in amusics. Our findings suggest that congenital amusia is a disconnection syndrome.
Chen, Lei; Pan, Hongying; Zhang, Yu-Hang; Feng, Kaiyan; Kong, XiangYin; Huang, Tao; Cai, Yu-Dong
Bone and dental diseases are serious public health problems. Most current clinical treatments for these diseases can produce side effects. Regeneration is a promising therapy for bone and dental diseases, yielding natural tissue recovery with few side effects. Because soft tissues inside the bone and dentin are densely populated with nerves and vessels, the study of bone and dentin regeneration should also consider the co-regeneration of nerves and vessels. In this study, a network-based method to identify co-regeneration genes for bone, dentin, nerve and vessel was constructed based on an extensive network of protein-protein interactions. Three procedures were applied in the network-based method. The first procedure, searching, sought the shortest paths connecting regeneration genes of one tissue type with regeneration genes of other tissues, thereby extracting possible co-regeneration genes. The second procedure, testing, employed a permutation test to evaluate whether possible genes were false discoveries; these genes were excluded by the testing procedure. The last procedure, screening, employed two rules, the betweenness ratio rule and interaction score rule, to select the most essential genes. A total of seventeen genes were inferred by the method, which were deemed to contribute to co-regeneration of at least two tissues. All these seventeen genes were extensively discussed to validate the utility of the method.
Sun, Ran; Wang, Jihe; Zhang, Dexin; Shao, Xiaowei
This paper presents an adaptive neural networks-based control method for spacecraft formation with coupled translational and rotational dynamics using only aerodynamic forces. It is assumed that each spacecraft is equipped with several large flat plates. A coupled orbit-attitude dynamic model is considered based on the specific configuration of atmospheric-based actuators. For this model, a neural network-based adaptive sliding mode controller is implemented, accounting for system uncertainties and external perturbations. To avoid invalidation of the neural networks destroying stability of the system, a switching control strategy is proposed which combines an adaptive neural networks controller dominating in its active region and an adaptive sliding mode controller outside the neural active region. An optimal process is developed to determine the control commands for the plates system. The stability of the closed-loop system is proved by a Lyapunov-based method. Comparative results through numerical simulations illustrate the effectiveness of executing attitude control while maintaining the relative motion, and higher control accuracy can be achieved by using the proposed neural-based switching control scheme than using only adaptive sliding mode controller.
Full Text Available The aim of sentiment classification is to efficiently identify the emotions expressed in the form of text messages. Machine learning methods for sentiment classification have been extensively studied, due to their predominant classification performance. Recent studies suggest that ensemble based machine learning methods provide better performance in classification. Artificial neural networks (ANNs are rarely being investigated in the literature of sentiment classification. This paper compares neural network based sentiment classification methods (back propagation neural network (BPN, probabilistic neural network (PNN & homogeneous ensemble of PNN (HEN using varying levels of word granularity as features for feature level sentiment classification. They are validated using a dataset of product reviews collected from the Amazon reviews website. An empirical analysis is done to compare results of ANN based methods with two statistical individual methods. The methods are evaluated using five different quality measures and results show that the homogeneous ensemble of the neural network method provides better performance. Among the two neural network approaches used, probabilistic neural networks (PNNs outperform in classifying the sentiment of the product reviews. The integration of neural network based sentiment classification methods with principal component analysis (PCA as a feature reduction technique provides superior performance in terms of training time also.
Akay, Altug; Dragomir, Andrei; Erlandsson, Bjorn-Erik
Intelligently extracting knowledge from social media has recently attracted great interest from the Biomedical and Health Informatics community to simultaneously improve healthcare outcomes and reduce costs using consumer-generated opinion. We propose a two-step analysis framework that focuses on positive and negative sentiment, as well as the side effects of treatment, in users' forum posts, and identifies user communities (modules) and influential users for the purpose of ascertaining user opinion of cancer treatment. We used a self-organizing map to analyze word frequency data derived from users' forum posts. We then introduced a novel network-based approach for modeling users' forum interactions and employed a network partitioning method based on optimizing a stability quality measure. This allowed us to determine consumer opinion and identify influential users within the retrieved modules using information derived from both word-frequency data and network-based properties. Our approach can expand research into intelligently mining social media data for consumer opinion of various treatments to provide rapid, up-to-date information for the pharmaceutical industry, hospitals, and medical staff, on the effectiveness (or ineffectiveness) of future treatments.
M. V. Pergal
Full Text Available Two series of polyurethane (PU networks based on Boltorn® hyperbranched polyester (HBP and hydroxyethoxy propyl terminated poly(dimethylsiloxane (EO-PDMS or hydroxy propyl terminated poly(dimethylsiloxane (HPPDMS, were synthesized. The effect of the type of soft PDMS segment on the properties of PUs was investigated by Fourier transform infrared spectroscopy (FTIR, contact angle measurements, surface free energy determination, X-ray photoelectron spectroscopy (XPS, scanning electron microscopy (SEM, atomic force microscopy (AFM, dynamic mechanical thermal analysis (DMTA and differential scanning calorimetry (DSC. The surface characterization of PUs showed existence of slightly amphiphilic character and it revealed that PUs based on HP-PDMS have lower surface free energy, more hydrophobic surface and better waterproof performances than PUs based on EO-PDMS. PUs based on HPPDMS had higher crosslinking density than PUs based on EO-PDMS. DSC and DMTA results revealed that these newlysynthesized PUs exhibit the glass transition temperatures of the soft and hard segments. DMTA, SEM and AFM results confirmed existence of microphase separated morphology. The results obtained in this work indicate that PU networks based on HBP and PDMS have improved surface and thermomechanical properties.
Wu, Jian; Yuan, Shenfang; Zhou, Genyuan; Ji, Sai; Wang, Zilong; Wang, Yang
The verification of aerospace structures, including full-scale fatigue and static test programs, is essential for structure strength design and evaluation. However, the current overall ground strength testing systems employ a large number of wires for communication among sensors and data acquisition facilities. The centralized data processing makes test programs lack efficiency and intelligence. Wireless sensor network (WSN) technology might be expected to address the limitations of cable-based aeronautical ground testing systems. This paper presents a wireless sensor network based aircraft strength testing (AST) system design and its evaluation on a real aircraft specimen. In this paper, a miniature, high-precision, and shock-proof wireless sensor node is designed for multi-channel strain gauge signal conditioning and monitoring. A cluster-star network topology protocol and application layer interface are designed in detail. To verify the functionality of the designed wireless sensor network for strength testing capability, a multi-point WSN based AST system is developed for static testing of a real aircraft undercarriage. Based on the designed wireless sensor nodes, the wireless sensor network is deployed to gather, process, and transmit strain gauge signals and monitor results under different static test loads. This paper shows the efficiency of the wireless sensor network based AST system, compared to a conventional AST system.
Full Text Available The verification of aerospace structures, including full-scale fatigue and static test programs, is essential for structure strength design and evaluation. However, the current overall ground strength testing systems employ a large number of wires for communication among sensors and data acquisition facilities. The centralized data processing makes test programs lack efficiency and intelligence. Wireless sensor network (WSN technology might be expected to address the limitations of cable-based aeronautical ground testing systems. This paper presents a wireless sensor network based aircraft strength testing (AST system design and its evaluation on a real aircraft specimen. In this paper, a miniature, high-precision, and shock-proof wireless sensor node is designed for multi-channel strain gauge signal conditioning and monitoring. A cluster-star network topology protocol and application layer interface are designed in detail. To verify the functionality of the designed wireless sensor network for strength testing capability, a multi-point WSN based AST system is developed for static testing of a real aircraft undercarriage. Based on the designed wireless sensor nodes, the wireless sensor network is deployed to gather, process, and transmit strain gauge signals and monitor results under different static test loads. This paper shows the efficiency of the wireless sensor network based AST system, compared to a conventional AST system.
Meissner, U. F.; Rueppel, U.; Gutzke, T.; Seewald, G.; Petersen, M.
The management of groundwater resources for the supply of German cities and sub- urban areas has become a matter of public interest during the last years. Negative headlines in the Rhein-Main-Area dealt with cracks in buildings as well as damaged woodlands and inundated agriculture areas as an effect of varying groundwater levels. Usually a holistic management of groundwater resources is not existent because of the complexity of the geological system, the large number of involved groups and their divergent interests and a lack of essential information. The development of a network- based information system for an efficient groundwater management was the target of the project: ?Grundwasser-Online?. The management of groundwater resources has to take into account various hydro- geological, climatic, water-economical, chemical and biological interrelations . Thus, the traditional approaches in information retrieval, which are characterised by a high personnel and time expenditure, are not sufficient. Furthermore, the efficient control of the groundwater cultivation requires a direct communication between the different water supply companies, the consultant engineers, the scientists, the govern- mental agencies and the public, by using computer networks. The presented groundwater information system consists of different components, especially for the collection, storage, evaluation and visualisation of groundwater- relevant information. Network-based technologies are used . For the collection of time-dependant groundwater-relevant information, modern technologies of Mobile Computing have been analysed in order to provide an integrated approach in the man- agement of large groundwater systems. The aggregated information is stored within a distributed geo-scientific database system which enables a direct integration of simu- lation programs for the evaluation of interactions in groundwater systems. Thus, even a prognosis for the evolution of groundwater states
Full Text Available The uses of internet in business are for information exchange, product catalog, promotion media, electronic mail, bulletin boards, electronic questioner, and mailing list. Internet can also be used for dialog, discussion, and consultation with customer online, therefore consumer can be proactively and interactively involved in designing, developing, marketing, and selling products. There are 2 methods for marketing products via internet, which are push and pull marketing. The advantages of internet in business strategy are global and interactive communication, information supply; consumer based service; increased cooperation; possibility to open new marketplace, product or services; and integrated the activity on-line. There are 2 applications in electronic commerce, which are business-to-business and business-to-consumer commerce. Electronic commerce payment transaction is arranged by Electronic Funds Transfer system, whereas the data security is governed by Secure Socket Layer, which then be developed to Secure Electronic Transaction. Abstract in Bahasa Indonesia : Internet dalam bisnis digunakan untuk pertukaran informasi, katalog produk, media promosi, surat elektronik, bulletin boards, kuesioner elektronik, dan mailing list. Internet juga bisa digunakan untuk berdialog, berdiskusi, dan konsultasi dengan konsumen secara on-line, sehingga konsumen dapat dilibatkan secara proaktif dan interaktif dalam perancangan, pengembangan, pemasaran, dan penjualan produk. Pemasaran lewat internet ada 2 metode, yaitu push dan pull marketing. Keunggulan strategi bisnis yang dapat diperoleh dari internet adalah komunikasi global dan interaktif; menyediakan informasi dan pelayanan sesuai dengan kebutuhan konsumen; meningkatkan kerja sama; memungkinkan untuk membuka pasar, produk, atau pelayanan baru; serta mengintegrasikan aktivitas secara on-line. Aplikasi Electronic Commerce ada 2, yaitu: Business-to-Consumer dan Business-to-Business Commerce. Pembayaran
Kuss, Daria J
In the 2000s, online games became popular, while studies of Internet gaming addiction emerged, outlining the negative consequences of excessive gaming, its prevalence, and associated risk factors. The establishment of specialized treatment centers in South-East Asia, the US, and Europe reflects the growing need for professional help. It is argued that only by understanding the appeal of Internet gaming, its context, and neurobiologic correlates can the phenomenon of Internet gaming addiction be understood comprehensively. The aim of this review is to provide an insight into current perspectives on Internet gaming addiction using a holistic approach, taking into consideration the mass appeal of online games, the context of Internet gaming addiction, and associated neuroimaging findings, as well as the current diagnostic framework adopted by the American Psychiatric Association. The cited research indicates that the individual’s context is a significant factor that marks the dividing line between excessive gaming and gaming addiction, and the game context can gain particular importance for players, depending on their life situation and gaming preferences. Moreover, the cultural context is significant because it embeds the gamer in a community with shared beliefs and practices, endowing their gaming with particular meaning. The cited neuroimaging studies indicate that Internet gaming addiction shares similarities with other addictions, including substance dependence, at the molecular, neurocircuitry, and behavioral levels. The findings provide support for the current perspective of understanding Internet gaming addiction from a disease framework. The benefits of an Internet gaming addiction diagnosis include reliability across research, destigmatization of individuals, development of efficacious treatments, and the creation of an incentive for public health care and insurance providers. The holistic approach adopted here not only highlights empirical research that
Kuss, Daria J
In the 2000s, online games became popular, while studies of Internet gaming addiction emerged, outlining the negative consequences of excessive gaming, its prevalence, and associated risk factors. The establishment of specialized treatment centers in South-East Asia, the US, and Europe reflects the growing need for professional help. It is argued that only by understanding the appeal of Internet gaming, its context, and neurobiologic correlates can the phenomenon of Internet gaming addiction be understood comprehensively. The aim of this review is to provide an insight into current perspectives on Internet gaming addiction using a holistic approach, taking into consideration the mass appeal of online games, the context of Internet gaming addiction, and associated neuroimaging findings, as well as the current diagnostic framework adopted by the American Psychiatric Association. The cited research indicates that the individual's context is a significant factor that marks the dividing line between excessive gaming and gaming addiction, and the game context can gain particular importance for players, depending on their life situation and gaming preferences. Moreover, the cultural context is significant because it embeds the gamer in a community with shared beliefs and practices, endowing their gaming with particular meaning. The cited neuroimaging studies indicate that Internet gaming addiction shares similarities with other addictions, including substance dependence, at the molecular, neurocircuitry, and behavioral levels. The findings provide support for the current perspective of understanding Internet gaming addiction from a disease framework. The benefits of an Internet gaming addiction diagnosis include reliability across research, destigmatization of individuals, development of efficacious treatments, and the creation of an incentive for public health care and insurance providers. The holistic approach adopted here not only highlights empirical research that
Full Text Available The Future Internet will consist of billions of people, things and services having the potential to interact with each other and their environment. This highly interconnected global network structure presents new types of challenges from a security...