WorldWideScience

Sample records for technology information network

  1. Survey of network and information security technology

    International Nuclear Information System (INIS)

    Liu Baoxu; Wang Xiaozhen

    2007-01-01

    With the rapidly development of the computer network technology and informationize working of our Country, Network and Information Security issues becomes the focal point problem that people shows solicitude for. On the basis analysing security threat and challenge of network information and their developing trend. This paper briefly analyses and discusses the main relatively study direction and content about the theory, technology and practice of Network and Information Security. (authors)

  2. Networking and Information Technology Workforce Study: Final Report

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — This report presents the results of a study of the global Networking and Information Technology NIT workforce undertaken for the Networking and Information...

  3. 78 FR 17418 - Rural Health Information Technology Network Development Grant

    Science.gov (United States)

    2013-03-21

    ... Information Technology Network Development Grant AGENCY: Health Resources and Services Administration (HRSA...-competitive replacement award under the Rural Health Information Technology Network Development Grant (RHITND... relinquishing its fiduciary responsibilities for the Rural Health Information Technology Network Development...

  4. Nuclear technology databases and information network systems

    International Nuclear Information System (INIS)

    Iwata, Shuichi; Kikuchi, Yasuyuki; Minakuchi, Satoshi

    1993-01-01

    This paper describes the databases related to nuclear (science) technology, and information network. Following contents are collected in this paper: the database developed by JAERI, ENERGY NET, ATOM NET, NUCLEN nuclear information database, INIS, NUclear Code Information Service (NUCLIS), Social Application of Nuclear Technology Accumulation project (SANTA), Nuclear Information Database/Communication System (NICS), reactor materials database, radiation effects database, NucNet European nuclear information database, reactor dismantling database. (J.P.N.)

  5. The Networking and Information Technology Research and Development NITRD Program 2012 Strategic Plan

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — Information technology IT computers, wired and wireless digital networks, electronic data and information, IT devices and systems, and software applications?today...

  6. 75 FR 57521 - Networking and Information Technology Research and Development (NITRD) Program: Draft NITRD 2010...

    Science.gov (United States)

    2010-09-21

    ... NATIONAL SCIENCE FOUNDATION Networking and Information Technology Research and Development (NITRD...) for Networking and Information Technology Research and Development (NITRD). ACTION: Notice, request.... SUMMARY: With this notice, the National Coordination Office for Networking and Information Technology...

  7. Construction and discussion of the science and technology information network of SWIP

    International Nuclear Information System (INIS)

    Wang Li; Zhang Yiming

    2010-01-01

    The digital library needs to be developed with the advancement of digitalisation and network, and the construction of digital information resource is more indispensable. This paper introduces the exploration and the work performed by the Research Office of Science and Technology Information of the Southwestern Institute of Physics with respect to preliminary construction of science and technology (S and T) information network resources and the magnitude alteration of S and T information service platform subsequently and the building of a dynamical network information service mode of its own characteristics. (authors)

  8. Work of scientific and technological information under network environment

    International Nuclear Information System (INIS)

    Chen Yingxi; Huang Daifu; Yang Lifeng

    2010-01-01

    With the development of internet and information technology, the work of scientific and technological information is faced with great challenge. This article expounds the new changes of scientific and technological information in enterprise under network environment by giving a minute description on the situation the work faced and characteristic of the work. Not only does it carry out enthusiastic discussion upon problems which are present in the work of scientific and technological information in the company, but puts forward proposals and specific measures as well. Service theory is also offered by adjusting and reforming the resources construction, service ways and the job of providing contents. We should take vigorous action to the research work of scientific and technological information, changing the information directional service into knowledge providing service. (authors)

  9. Space-based Networking Technology Developments in the Interplanetary Network Directorate Information Technology Program

    Science.gov (United States)

    Clare, Loren; Clement, B.; Gao, J.; Hutcherson, J.; Jennings, E.

    2006-01-01

    Described recent development of communications protocols, services, and associated tools targeted to reduce risk, reduce cost and increase efficiency of IND infrastructure and supported mission operations. Space-based networking technologies developed were: a) Provide differentiated quality of service (QoS) that will give precedence to traffic that users have selected as having the greatest importance and/or time-criticality; b) Improve the total value of information to users through the use of QoS prioritization techniques; c) Increase operational flexibility and improve command-response turnaround; d) Enable new class of networked and collaborative science missions; e) Simplify applications interfaces to communications services; and f) Reduce risk and cost from a common object model and automated scheduling and communications protocols. Technologies are described in three general areas: communications scheduling, middleware, and protocols. Additionally developed simulation environment, which provides comprehensive, quantitative understanding of the technologies performance within overall, evolving architecture, as well as ability to refine & optimize specific components.

  10. 75 FR 55360 - Networking and Information Technology Research and Development (NITRD) Program: Draft NITRD 2010...

    Science.gov (United States)

    2010-09-10

    ... NATIONAL SCIENCE FOUNDATION Networking and Information Technology Research and Development (NITRD... Information Technology Research and Development (NITRD). ACTION: Notice, request for public comment. FOR..., the National Coordination Office for Networking and Information Technology Research and Development...

  11. Information network architectures

    Science.gov (United States)

    Murray, N. D.

    1985-01-01

    Graphs, charts, diagrams and outlines of information relative to information network architectures for advanced aerospace missions, such as the Space Station, are presented. Local area information networks are considered a likely technology solution. The principle needs for the network are listed.

  12. Technological Cooperation Networks at Bio-Manguinhos: the Role of Information and Communication Technologies

    Directory of Open Access Journals (Sweden)

    Lázaro Pereira de Oliveira

    2015-01-01

    Full Text Available This article identifies and discusses the contribution of information and communication technologies (ICTs to the technological cooperation projects of Bio-Manguinhos, a pharmaceutical manufacturer that belongs to Osvaldo Cruz Foundation (FIOCRUZ, responsible for producing vaccines, reagents and biopharmaceuticals, with priority on meeting the needs of the Brazilian public health system. It is a case study with a qualitative approach for descriptive and explanatory purposes. The data were collected from 14 interviews conducted with managers of research and development (R&D projects with high relevance to the organization. The results allow concluding that the ICTs requiring greater interdependence between partners and two-way knowledge flows have not yet been used. They also show the importance of closer cooperation between the information technology (IT and R&D areas. A future positioning of Bio-Manguinhos as a technological center focused on discovery and sale of new active ingredients can favor the use of tools that promote greater integration between the partners of technology cooperation networks.

  13. An open, interoperable, and scalable prehospital information technology network architecture.

    Science.gov (United States)

    Landman, Adam B; Rokos, Ivan C; Burns, Kevin; Van Gelder, Carin M; Fisher, Roger M; Dunford, James V; Cone, David C; Bogucki, Sandy

    2011-01-01

    Some of the most intractable challenges in prehospital medicine include response time optimization, inefficiencies at the emergency medical services (EMS)-emergency department (ED) interface, and the ability to correlate field interventions with patient outcomes. Information technology (IT) can address these and other concerns by ensuring that system and patient information is received when and where it is needed, is fully integrated with prior and subsequent patient information, and is securely archived. Some EMS agencies have begun adopting information technologies, such as wireless transmission of 12-lead electrocardiograms, but few agencies have developed a comprehensive plan for management of their prehospital information and integration with other electronic medical records. This perspective article highlights the challenges and limitations of integrating IT elements without a strategic plan, and proposes an open, interoperable, and scalable prehospital information technology (PHIT) architecture. The two core components of this PHIT architecture are 1) routers with broadband network connectivity to share data between ambulance devices and EMS system information services and 2) an electronic patient care report to organize and archive all electronic prehospital data. To successfully implement this comprehensive PHIT architecture, data and technology requirements must be based on best available evidence, and the system must adhere to health data standards as well as privacy and security regulations. Recent federal legislation prioritizing health information technology may position federal agencies to help design and fund PHIT architectures.

  14. Information technology as a facilitator of suppliers’ collaborative communication, network governance and relationship longevity in supply chains

    Directory of Open Access Journals (Sweden)

    Richard Chinomona

    2013-08-01

    Full Text Available There is an increasing awareness about the paramount importance of information technology within business in the context of large businesses. However, research about the investigation of the role of information technology resources in fostering collaborative communication, network governance and relationship longevity in the small and medium enterprise sector has remained scant. The primary objective of this study was to investigate the influence of information technology on collaborative communication, network governance and relationship longevity in Zimbabwe’s SME sector. Five research hypotheses were posited and sample data from 162 small and medium enterprise suppliers were collected and used to empirically test the hypotheses. The results of this study showed that information technology resources positively influenced small and medium enterprise suppliers’ collaborative communication, network governance and consequential relationship longevity with their buyers in a significant way. Overall, the current study findings provided tentative support to the proposition that information technology resources, collaborative communication and network governance should be recognised as significant antecedents for improved relationship longevity between suppliers and their buyers in the SME setting. Therefore, managers in the small and medium enterprise sector and small and medium enterprise owners need to pay attention to both collaborative communication and network governance in order to optimise information technology resource impact on their relationship longevity with their business counterparts. Limitations and future research directions were also indicated.

  15. Investigations on an environmental technology transfer information network; Kankyo gijutsu iten joho network chosa

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    With developing countries (APEC countries) as the main objects, investigations were carried out to issue environmental technology transfer information that Japan has accumulated, and advance exchanges of technical information with persons related inside and outside Japan. As a result of the investigations, it was found that the environmental technology information that serves more effectively for the developing countries is the technical information that has been developed by repeating improvements, has provided actual results in work sites, and is actually used, rather than the state-of-art technologies. Based on this result, business entities having factories and operation centers located in Mie Prefecture and the city of Yokkaichi were asked to provide data for the actually used environmental technologies. Out of 51 items provided by 17 companies, nine items were selected to be used as prototype database materials for an information network. The objects of information sources will be expanded to a nationwide scale in the future to improve the contents of the database. Problems of handling information copyrights and technical know-hows were presented in the course of data collection, urging the necessity of due considerations on the matter. Necessity was indicated on maintenance and management of data base as well as its quantitative expansion. 1 ref., 4 figs.

  16. Research information network survey of innovative technology for the earth. 2; Chikyu kankyo taisaku gijutsu no kenkyu joho network chosa. 2

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    In order to construct the information network system for a research of innovative technology for the earth, a prototype has been made. To draw necessary functions for the information network system, an information flow in a general research work is analyzed to classify it based on the functions. The information collecting function, information accumulating and sharing function, special information system for research, information providing function, and communication function of the net work correspond to the collecting information, accumulating information, being engaged in research, providing information, and communication of researcher`s actions, respectively. The services on network system supposed from these functions are the homepage search mailing list, intranet service, special information system for research, WWW Internet broadcasting, and BBS/news/conference tool, respectively. It was found that latest Internet technology enabled to construct easily controlled system environment for users and WWW would develop as a standard communication tool. 2 refs., 26 figs., 27 tabs.

  17. Success Factors and Challenges of an Information Communication Technology Network in Rural Schools

    Science.gov (United States)

    Mihai, Maryke A.

    2017-01-01

    In April 2008, an interactive information communication technology (ICT) network was established in Mpumalanga, South Africa. the network involved the implementation of SMART board interactive whiteboards (IWBs) and collaboration between a leading school and several disadvantaged schools. the main purpose of the Mpumalanga IWB project was to reach…

  18. User Requirements for Technology to Assist Aging in Place: Qualitative Study of Older People and Their Informal Support Networks.

    Science.gov (United States)

    Elers, Phoebe; Hunter, Inga; Whiddett, Dick; Lockhart, Caroline; Guesgen, Hans; Singh, Amardeep

    2018-06-06

    Informal support is essential for enabling many older people to age in place. However, there is limited research examining the information needs of older adults' informal support networks and how these could be met through home monitoring and information and communication technologies. The purpose of this study was to investigate how technologies that connect older adults to their informal and formal support networks could assist aging in place and enhance older adults' health and well-being. Semistructured interviews were conducted with 10 older adults and a total of 31 members of their self-identified informal support networks. They were asked questions about their information needs and how technology could support the older adults to age in place. The interviews were transcribed and thematically analyzed. The analysis identified three overarching themes: (1) the social enablers theme, which outlined how timing, informal support networks, and safety concerns assist the older adults' uptake of technology, (2) the technology concerns theme, which outlined concerns about cost, usability, information security and privacy, and technology superseding face-to-face contact, and (3) the information desired theme, which outlined what information should be collected and transferred and who should make decisions about this. Older adults and their informal support networks may be receptive to technology that monitors older adults within the home if it enables aging in place for longer. However, cost, privacy, security, and usability barriers would need to be considered and the system should be individualizable to older adults' changing needs. The user requirements identified from this study and described in this paper have informed the development of a technology that is currently being prototyped. ©Phoebe Elers, Inga Hunter, Dick Whiddett, Caroline Lockhart, Hans Guesgen, Amardeep Singh. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 06.06.2018.

  19. Leadership Under Challenge: Information Technology R&D in a Competitive World. An Assessment of the Federal Networking and Information Technology R&D Program

    National Research Council Canada - National Science Library

    Marburger, John H; Kvamme, E. F; Scalise, George; Reed, Daniel A

    2007-01-01

    ...).That leadership is essential to U.S. economic prosperity, security, and quality of life. This report presents a formal assessment of the Federal Networking and Information Technology R&D (NITRD...

  20. Information technology resources assessment

    Energy Technology Data Exchange (ETDEWEB)

    Loken, S.C. [ed.

    1993-01-01

    The emphasis in Information Technology (IT) development has shifted from technology management to information management, and the tools of information management are increasingly at the disposal of end-users, people who deal with information. Moreover, the interactive capabilities of technologies such as hypertext, scientific visualization, virtual reality, video conferencing, and even database management systems have placed in the hands of users a significant amount of discretion over how these resources will be used. The emergence of high-performance networks, as well as network operating systems, improved interoperability, and platform independence of applications will eliminate technical barriers to the use of data, increase the power and range of resources that can be used cooperatively, and open up a wealth of possibilities for new applications. The very scope of these prospects for the immediate future is a problem for the IT planner or administrator. Technology procurement and implementation, integration of new technologies into the existing infrastructure, cost recovery and usage of networks and networked resources, training issues, and security concerns such as data protection and access to experiments are just some of the issues that need to be considered in the emerging IT environment. As managers we must use technology to improve competitiveness. When procuring new systems, we must take advantage of scalable resources. New resources such as distributed file systems can improve access to and efficiency of existing operating systems. In addition, we must assess opportunities to improve information worker productivity and information management through tedmologies such as distributed computational visualization and teleseminar applications.

  1. Mississippi Curriculum Framework for Computer Information Systems Technology. Computer Information Systems Technology (Program CIP: 52.1201--Management Information Systems & Business Data). Computer Programming (Program CIP: 52.1201). Network Support (Program CIP: 52.1290--Computer Network Support Technology). Postsecondary Programs.

    Science.gov (United States)

    Mississippi Research and Curriculum Unit for Vocational and Technical Education, State College.

    This document, which is intended for use by community and junior colleges throughout Mississippi, contains curriculum frameworks for two programs in the state's postsecondary-level computer information systems technology cluster: computer programming and network support. Presented in the introduction are program descriptions and suggested course…

  2. Experiences with using information and communication technology to build a multi-municipal support network for informal carers.

    Science.gov (United States)

    Torp, Steffen; Bing-Jonsson, Pia C; Hanson, Elizabeth

    2013-09-01

    This multi-municipal intervention study explored whether informal carers of frail older people and disabled children living at home made use of information and communication technology (ICT) to gain knowledge about caring and to form informal support networks, thereby improving their health. Seventy-nine informal carers accessed web-based information about caring and an e-based discussion forum via their personal computers. They were able to maintain contact with each other using a web camera and via normal group meetings. After the first 12 months, 17 informal carers participated in focus group interviews and completed a short questionnaire. Four staff members were also interviewed. Participant carers who had prior experiences with a similar ICT-based support network reported greater satisfaction and more extensive use of the network than did participants with no such prior experience. It seems that infrequent usage of the service may be explained by too few other carers to identify with and inappropriate recruitment procedures. Nevertheless, carers of disabled children reported that the intervention had resulted in improved services across the participant municipalities. To achieve optimal effects of an ICT-based support network due attention must be given to recruitment processes and social environment building for which care practitioners require training and support.

  3. Telemedicine technologies information technologies in medicine and telehealth

    CERN Document Server

    Fong, Bernard; Li, CK

    2010-01-01

    This book brings together a broad range of topics demonstrating how information and wireless technologies can be used in healthcare. In this book, the authors focus on how medical information can be reliably transmitted through wireless communication networks. It explains how they can be optimized to carry medical information in various situations by utilizing readily available traditional wireless local area network (WLAN) and broadband wireless access (BWA) systems. In addition, the authors discuss consumer healthcare technology, which is becoming more popular as reduction in manufacturing c

  4. Grand Challenges: Science, Engineering, and Societal Advances, Requiring Networking and Information Technology Research and Development

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — ...the U.S. Government makes critical decisions about appropriate investments in IT R and D to help society forward both socially and economically. To inform that...

  5. A unified plant information network

    International Nuclear Information System (INIS)

    Niederauer, G.F.

    1986-01-01

    Technology is bringing power plants fully into the age of computerization. Microcomputers, data base managers, networking, and friendly, expert software are principal technology factors. Monitoring will improve, and the number and power of computers is increasing. The huge information flow will cause computers to be integrated into a communication network. The total plant operating triangle includes process, engineering, and management systems. The total network will integrate all of these into a Total Unified Plant Information Network (TUPIN). Software will take the type of information beyond monitored data. Analysis will improve through direct access to logical, physical, and procedural models by end users. Information management will improve through widespread use of hierarchical, relational, and expert data base managers. Expert systems will aid in diagnostics and interpretation. The goal is to automate plant operations to enhance safety and performance and to reduce cost by making both the plants and the personnel more expert

  6. A network meta-analysis on the effects of information technology application on preoperative knowledge of patients.

    Science.gov (United States)

    Lai, Yi-Horng

    2015-01-01

    The application of information technology in health education plan in Taiwan has existed for a long time. The purpose of this study is to explore the relationship between information technology application in health education and patients' preoperative knowledge by synthesizing existing researches that compare the effectiveness of information technology application and traditional instruction in the health education plan. In spite of claims regarding the potential benefits of using information technology in health education plan, results of previous researches were conflicting. This study is carried out to examine the effectiveness of information technology by using network meta-analysis, which is a statistical analysis of separate but similar studies in order to test the pooled data for statistical significance. Information technology application in health education discussed in this study include interactive technology therapy (person-computer), group interactive technology therapy (person-person), multimedia technology therapy and video therapy. The result has shown that group interactive technology therapy is the most effective, followed by interactive technology therapy. And these four therapies of information technology are all superior to the traditional health education plan (leaflet therapy).

  7. Revolutionizing Healthcare Through Information Technology

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — The Presidents Information Technology Advisory Committee PITAC is appointed by the President to provide independent expert advice on maintaining Americas preeminence...

  8. Information Technology Service

    International Nuclear Information System (INIS)

    Ageron, M.; Boninchi, V.; Chartoire, M.; Combroux, A.; Giraud, N.; Jacquet, G.; Lagrange, B.; Malleret, S.; Martin, C.; Mas, J.; Morgue, M.; Ollivier, T.

    1998-01-01

    The information technology service works out the choices concerning the information technology systems of general use in the laboratory: computers, network, peripherals, workstations, software. It intervenes at the same time in the definition of the procedures and equipment specific to the research groups. The entire data acquisition is centralized by the service. The personnel is sharing the following two large directions of activities: - management of information technology park (setup, configuration and maintenance of the materials and soft ensemble, training and assistance afforded to users); - participation in software projects either in elaboration of applications or in realization and maintenance of specific tools

  9. Application of wireless sensor network technology in logistics information system

    Science.gov (United States)

    Xu, Tao; Gong, Lina; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-04-01

    This paper introduces the basic concepts of active RFID (WSN-ARFID) based on wireless sensor networks and analyzes the shortcomings of the existing RFID-based logistics monitoring system. Integrated wireless sensor network technology and the scrambling point of RFID technology. A new real-time logistics detection system based on WSN and RFID, a model of logistics system based on WSN-ARFID is proposed, and the feasibility of this technology applied to logistics field is analyzed.

  10. Dissemination of information in a networked environment

    International Nuclear Information System (INIS)

    Jayakumar, C.; Narayanan, A.

    1999-01-01

    The advent of Internet technology and its adoption by the organisations has resulted in the evolution of Intranets. Intranets ultimately use the technology to meet the information and computational needs to achieve organisational objectives and goals. Important services like E mail and Web are a handy solution to disseminate information for research and special libraries. The campus wide network and the creation of networked society are ubiquitous and an attempt has been made to extend the information service to the patrons by possible means. The role of library and information professionals in dissemination of information for the networked society is relevant and highly demanding. The right information for the right people at right time is to be achieved with available infrastructure. Few sample applications are described in this paper and the information need has to be met for the present and future networked information users. (author)

  11. Social Networks and Technology Adoption

    OpenAIRE

    Hogset, Heidi

    2005-01-01

    This study analyzes social network effects on Kenyan smallholders' decision to adopt improved natural resource management techniques. These effects are decomposed into effects from social influence and learning through networks (strong ties), group effects, weak ties effects, informal finance, and conflicts arising from technological externalities, controlling for non-network effects.

  12. Current state of information technology use in a US primary care practice-based research network

    Directory of Open Access Journals (Sweden)

    James Andrews

    2004-02-01

    Conclusion While interest in enabling information technologies was high in KAN, adoption was variable, with use of several key technologies reported as low.The results suggest that research in this network that would be dependent on or enhanced by IT might be impeded and, generally, greater attention should be given to enhancing the IT infrastructure in primary care.

  13. Proceedings of a Conference on Telecommunication Technologies, Networkings and Libraries

    Science.gov (United States)

    Knight, N. K.

    1981-12-01

    Current and developing technologies for digital transmission of image data likely to have an impact on the operations of libraries and information centers or provide support for information networking are reviewed. Technologies reviewed include slow scan television, teleconferencing, and videodisc technology and standards development for computer network interconnection through hardware and software, particularly packet switched networks computer network protocols for library and information service applications, the structure of a national bibliographic telecommunications network; and the major policy issues involved in the regulation or deregulation of the common communications carriers industry.

  14. Networking Technologies and the Rate of Technological Change

    Directory of Open Access Journals (Sweden)

    Charles Mitchell

    2005-12-01

    Full Text Available Network technology is changing rapidly and those adept at ICT analysis need resolve rate of change issues. Developments in networking now are in the direction of heuristic intelligence. Since about 1980, networking techniques have encouraged combining bits of information with imagination cognitively to improve ideas about reality. ICT enterprise projects utilize networking to sustain requisite imagination. Assumptions and misassuptions of project builders are rationally comprehended as networking sustains creative processes. The monopolization of valuable network techniques influences in the direction of esoteric networking. Data presents that substantial knowledge and networking is now occurring globally. As a netaphor, networking

  15. Survey of Promising Technologies for 5G Networks

    Directory of Open Access Journals (Sweden)

    Nam Tuan Le

    2016-01-01

    Full Text Available As an enhancement of cellular networks, the future-generation 5G network can be considered an ultra-high-speed technology. The proposed 5G network might include all types of advanced dominant technologies to provide remarkable services. Consequently, new architectures and service management schemes for different applications of the emerging technologies need to be recommended to solve issues related to data traffic capacity, high data rate, and reliability for ensuring QoS. Cloud computing, Internet of things (IoT, and software-defined networking (SDN have become some of the core technologies for the 5G network. Cloud-based services provide flexible and efficient solutions for information and communications technology by reducing the cost of investing in and managing information technology infrastructure. In terms of functionality, SDN is a promising architecture that decouples control planes and data planes to support programmability, adaptability, and flexibility in ever-changing network architectures. However, IoT combines cloud computing and SDN to achieve greater productivity for evolving technologies in 5G by facilitating interaction between the physical and human world. The major objective of this study provides a lawless vision on comprehensive works related to enabling technologies for the next generation of mobile systems and networks, mainly focusing on 5G mobile communications.

  16. Networking and Information Technology Research and Development. Supplement of the President's Budget for Fiscal Year 2006

    National Research Council Canada - National Science Library

    2005-01-01

    This Supplement to the President's Budget for Fiscal Year 2006 offers a brief technical outline of the 2006 budget request for the Networking and Information Technology Research and Development (NITRD) Program...

  17. Information technology road map 2015

    International Nuclear Information System (INIS)

    2009-09-01

    This book introduces information technology road map 2015 with presentation, process, plan and conclusion of it. It also has introduction of IT road map by field : information technology road map 2015 on the next-generation of semiconductor, display, light emitting diode and light industry, home network and home electronic appliances, digital TV and broadcasting, radio technology, satellite communications, mobile communication for the next-generation, BcN field, software, computer for the next-generation and security of knowledge information.

  18. Corporate environmental management and information technology

    DEFF Research Database (Denmark)

    Rikhardsson, Pall M.

    2001-01-01

    software, the Internet, computer networks, telecommunications devices, etc. Information technology also has an impact on how companies perform environmental management. This paper looks at the relations between corporate environmental management and information technology. First it presents a framework...... for mapping information technology. Using this framework it focuses on the use of information technology in corporate environmental management, describes the market for standard environmental management information systems and implementation experiences from one large international company.......Information technology has changed, is changing and will continue to change the face of business as we further enter the Information Society. Today it would be difficult for a company to function effectively without the aid of various information technologies such as accounting software, production...

  19. Making Choices in the Virtual World: The New Model at United Technologies Information Network.

    Science.gov (United States)

    Gulliford, Bradley

    1998-01-01

    Describes changes in services of the United Technologies Corporation Information Network from a traditional library system to a virtual system of World Wide Web sites, a document-delivery unit, telephone and e-mail reference, and desktop technical support to provide remote access. Staff time, security, and licensing issues are addressed.…

  20. Network technology for depot modernization

    Energy Technology Data Exchange (ETDEWEB)

    Hostick, C.J.

    1990-12-01

    This report was prepared by the Pacific Northwest Laboratory to summarize existing and emerging information system technology and standards applicable to Depot System Command (DESCOM) modernization efforts. The intent of this summarization is to provide the Revitalization of Army Depots for the Year 2000 (READY 2000) team a clear understanding of the enabling information system technologies required to support effective modernization activities. Much of the information contained in this report was acquired during the last year in support of the US Army Armament, Munitions, and Chemical Command (AMCCOM) Facility Integrated Manufacturing Management System (FIMMS) project at PNL, which is targeting the modernization of plant-wide information systems at Army Ammunition Plants. The objective of information system modernization is to improve the effectiveness of an organization in performing its mission. Information system modernization strives to meet this objective by creating an environment where data is electronically captured near the source and readily available to all areas of the organization. Advanced networks, together with related information system technology, are the enabling mechanisms that make modern information system infrastructures possible. The intent of this paper is to present an overview of advanced information system network technology to support depot modernization planners in making technology management decisions. Existing and emerging Open System Interconnection (OSI) and Government Open System Interconnection Profile (GOSIP) standards are explained, as well as a brief assessment of existing products compliant with these standards. Finally, recommendations for achieving plant-wide integration using existing products are presented, and migration strategies for full OSI compliance are introduced. 5 refs., 16 figs. (JF)

  1. Evolution of the Research Libraries Information Network.

    Science.gov (United States)

    Richards, David; Lerche, Carol

    1989-01-01

    Discusses current RLIN (Research Libraries Information Network) communications technology and motivations for change. Goals, topology, hardware, software, and protocol, terminal wiring, and deployment are considered. Sidebars provide a diagram of the current RLIN communications technology and describe the integrated RLIN network. (one reference)…

  2. Information Assurance in Wireless Networks

    Science.gov (United States)

    Kabara, Joseph; Krishnamurthy, Prashant; Tipper, David

    2001-09-01

    Emerging wireless networks will contain a hybrid infrastructure based on fixed, mobile and ad hoc topologies and technologies. In such a dynamic architecture, we define information assurance as the provisions for both information security and information availability. The implications of this definition are that the wireless network architecture must (a) provide sufficient security measures, (b) be survivable under node or link attack or failure and (c) be designed such that sufficient capacity remains for all critical services (and preferably most other services) in the event of attack or component failure. We have begun a research project to investigate the provision of information assurance for wireless networks viz. survivability, security and availability and here discuss the issues and challenges therein.

  3. PREFACE: Complex Networks: from Biology to Information Technology

    Science.gov (United States)

    Barrat, A.; Boccaletti, S.; Caldarelli, G.; Chessa, A.; Latora, V.; Motter, A. E.

    2008-06-01

    The field of complex networks is one of the most active areas in contemporary statistical physics. Ten years after seminal work initiated the modern study of networks, interest in the field is in fact still growing, as indicated by the ever increasing number of publications in network science. The reason for such a resounding success is most likely the simplicity and broad significance of the approach that, through graph theory, allows researchers to address a variety of different complex systems within a common framework. This special issue comprises a selection of contributions presented at the workshop 'Complex Networks: from Biology to Information Technology' held in July 2007 in Pula (Cagliari), Italy as a satellite of the general conference STATPHYS23. The contributions cover a wide range of problems that are currently among the most important questions in the area of complex networks and that are likely to stimulate future research. The issue is organised into four sections. The first two sections describe 'methods' to study the structure and the dynamics of complex networks, respectively. After this methodological part, the issue proceeds with a section on applications to biological systems. The issue closes with a section concentrating on applications to the study of social and technological networks. The first section, entitled Methods: The Structure, consists of six contributions focused on the characterisation and analysis of structural properties of complex networks: The paper Motif-based communities in complex networks by Arenas et al is a study of the occurrence of characteristic small subgraphs in complex networks. These subgraphs, known as motifs, are used to define general classes of nodes and their communities by extending the mathematical expression of the Newman-Girvan modularity. The same line of research, aimed at characterising network structure through the analysis of particular subgraphs, is explored by Bianconi and Gulbahce in Algorithm

  4. Utilizing Information Technology to Facilitate Rapid Acquisition

    Science.gov (United States)

    2006-06-01

    PAGES 109 14. SUBJECT TERMS Rapid Acquisition, eCommerce , eProcurement, Information Technology, Contracting, Global Information Network...Agency. 5 eCommerce and eProcurement, and possess an adequate knowledge of information technology. D. RESEARCH QUESTIONS 1. Primary Research... eCommerce , Information Technology, and eProcurement knowledge, and government and private industry reports utilizing numerous library and Internet

  5. Latest Trends in Home Networking Technologies

    Science.gov (United States)

    Tsutsui, Akihiro

    Broadband access service, including FTTH, is now in widespread use in Japan. More than half of the households that have broadband Internet access construct local area networks (home networks) in their homes. In addition, information appliances such as personal computers, networked audio, and visual devices and game machines are connected to home networks, and many novel service applications are provided via the Internet. However, it is still difficult to install and incorporate these devices and services because networked devices have been developed in different communities. I briefly explain the current status of information appliances and home networking technologies and services and discuss some of the problems in this and their solutions.

  6. Application of the Information Encryption Technology in the Industrial Control Network Based on FPGA

    Directory of Open Access Journals (Sweden)

    Guo Yao-Hua

    2014-07-01

    Full Text Available With the rapid development of information technology industry, Information encryption is an effective means of information security. Data encryption system based on FPGA in the field of industry is elaborated in this paper, and the data acquisition module, the basic principle of 3DES algorithm, its implementation in FPGA and PMC bus interface module are introduced. Based on the function simulation, test and analysis of the design results, this scheme has the characteristics of high reliability, fast algorithm and less hardware resources, and it can be widely used in industrial networks.

  7. Corporate Environmental Management and Information Technology

    DEFF Research Database (Denmark)

    Rikhardsson, Pall M.

    2000-01-01

    software, the internet, computer networks, telecommunications devices, etc. Information technology also has an impact on how companies perform environmental management. This paper explores the relations between environmental management and information technology in general terms. It offers a classification...... framework for the use of information technology in corporate environmental management (CEM), describes the market for standard environmental management information systems solutions, what main functionalities are available and what main trends are visible.......Information technology has changed, is changing and will continue to change the face of business as we further enter the Information Society. Today it would be difficult for a company to function effectively without the aid of various information technologies such as accounting software, production...

  8. Competitiveness through cooperation between electricity and information technology. TESLA - Information technology and electric power systems technology programme 1998-2002

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-11-01

    The electricity markets are being opened up to competition all round the world. To succeed in competition electricity sellers want new information technology tools to use in managing the sale of electricity. The network companies are aiming to step up utilization of their distribution capacity and to optimize power quality and the reliability of supply. Consumers need solutions with which they can manage their own power consumption and tendering sellers. The Nordic countries have been the first to deregulate their electricity markets. This head start in time is being made use of to generate a head start in technology. Tekes has initiated a technology programme for the years 1998 to 2002, named TESLA - Information Technology and Electric Power Systems, to promote the competitiveness of the Finnish electricity industry in changing conditions. The objective of the programme is to adapt information technology extensively to power distribution and thus develop the potential for Finland`s electricity industry to succeed on world markets. At the moment power distribution technology forms about one third of Finland`s energy technology exports. The programme is also aimed at developing new data transfer and data processing applications for companies in information technology clusters. For Finnish parties in the electricity markets the programme will produce ways and means of (1) improving management and use of distribution networks, (2) implementing competition in electricity sales, and (3) increasing the efficiency of electricity use

  9. eNewborn: The Information Technology Revolution and Challenges for Neonatal Networks.

    Science.gov (United States)

    Haumont, Dominique; NguyenBa, Cuong; Modi, Neena

    2017-01-01

    Among preterm infants, 1-2% are born before 32 weeks of gestation or have a birth weight below 1,500 g. They contribute disproportionately to the burden of mortality and morbidity related to preterm birth, whether in the neonatal period or later in life. They are the target population studied in neonatal networks. Improving neonatal care and later outcome is a major issue in public health. Neonatologists, health care providers, public authorities, parents and families, industry, and all organizations dedicated to infant health must bring their efforts together and dedicate their actions in order to do so. Neonatal networks are the strongest platforms through which to achieve this goal. The progressive information technology (IT) revolution is leading to a new approach. The power of search engines and new technological devices opens extraordinary new perspectives in terms of speed, storing, sharing, and innovative approaches in providing health care. However, difficulties are expected with old applications that cannot evolve in the new IT environment. Security and privacy in data collection are future challenges to be addressed. Here, we describe the eNewborn project and its original software. The main functionalities are interactive navigation, harmonization with other formats, linkage with other databases, and strict security and privacy procedures. © 2017 S. Karger AG, Basel.

  10. UPGRADE FOR HARDWARE/SOFTWARE SERVER AND NETWORK TOPOLOGY IN INFORMATION SYSTEMS

    Directory of Open Access Journals (Sweden)

    Oleksii O. Kaplun

    2011-02-01

    Full Text Available The network modernization, educational information systems software and hardware updates problem is actual in modern term of information technologies prompt development. There are server applications and network topology of Institute of Information Technology and Learning Tools of National Academy of Pedagogical Sciences of Ukraine analysis and their improvement methods expound in the article. The article materials represent modernization results implemented to increase network efficiency and reliability, decrease response time in Institute’s network information systems. The article gives diagrams of network topology before upgrading and after finish of optimization and upgrading processes.

  11. Understanding computer and information technology

    International Nuclear Information System (INIS)

    Choi, Yun Cheol; Han, Tack Don; Im, Sun Beom

    2009-01-01

    This book consists of four parts. The first part describes IT technology and information community understanding of computer system, constitution of software system and information system and application of software. The second part is about computer network, information and communication, application and internet service. The third part contains application and multi media, application of mobile computer, ubiquitous computing and ubiquitous environment and computer and digital life. The last part explains information security and ethics of information-oriented society, information industry and IT venture, digital contents technology and industry and the future and development of information-oriented society.

  12. Internet technologies and information services

    CERN Document Server

    Miller, Joseph

    2014-01-01

    Internet Technologies and Information Services: Second Edition is a vital asset to students preparing for careers in library and information science and provides expanded coverage to important new developments while still covering Internet foundations. In addition to networking, the Internet, HTML, web design, web programming, XML, and web searching, this new edition covers additional topics such as cloud computing, content management systems, eBook technologies, mobile technologies and applications, relational database management systems (RDMS), open source software, and virtual priva

  13. Research Award: Information and Networks

    International Development Research Centre (IDRC) Digital Library (Canada)

    IDRC CRDI

    ... of networked technologies has created new opportunities for advancing human ... The I&N Research Awardee will ideally explore research questions centred ... Examples of questions include: ... engineering or computer/information science;.

  14. Advances in Computing and Information Technology : Proceedings of the Second International Conference on Advances in Computing and Information Technology

    CERN Document Server

    Nagamalai, Dhinaharan; Chaki, Nabendu

    2013-01-01

    The international conference on Advances in Computing and Information technology (ACITY 2012) provides an excellent international forum for both academics and professionals for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The Second International Conference on Advances in Computing and Information technology (ACITY 2012), held in Chennai, India, during July 13-15, 2012, covered a number of topics in all major fields of Computer Science and Information Technology including: networking and communications, network security and applications, web and internet computing, ubiquitous computing, algorithms, bioinformatics, digital image processing and pattern recognition, artificial intelligence, soft computing and applications. Upon a strength review process, a number of high-quality, presenting not only innovative ideas but also a founded evaluation and a strong argumentation of the same, were selected and collected in the present proceedings, ...

  15. Information communications technologies that surpass the global communications network. Sekai tsushinmo o koeru joho tsushin gijutsu

    Energy Technology Data Exchange (ETDEWEB)

    1990-05-01

    Development of information communications technologies that surpass the global communications network is being pushed forward in order to establish the global village that McLuhan foretold in 1964. Effects of hybrid intensification with the intensification of communications technologies and computer technologies have become evident as facsimiles, automated teller machines of banks, home videos, automatic response telephones with synthetic voices, compact disks, portable telephones, video games and high-definition televisions were developed and put to use in a wide range. Intensification and integration of computer technologies and communications technologies has every possibility, but it also has a peculiar aspect of lacking guiding principles. Uncertain factors of the values of informations in the market are ever increasing, and their true values are yet to be found. Anyhow, it is a long way to the goal of the global village.

  16. Future Wireless Networks and Information Systems Volume 1

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in ICFWI 2011 conference. The 2011 International Conference on Future Wireless Networks and Information Systems (ICFWI 2011) has been held on November 30 ~ December 1, 2011, Macao, China. Topics covered include Wireless Information Networks, Wireless Networking Technologies, Mobile Software and Services, intelligent computing, network management, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Wireless Networks and Information Systems and also serve as an excellent reference work for researchers and graduate students working on Wireless Networks and Information Systems.

  17. Information Technology Industry 2004

    National Research Council Canada - National Science Library

    Altieri, Richard; Buccheit, Nathan; Burke, Kyle; Dillard, Norvel; Dolan, Patrick; Edwards, Gregory; Elins, Daniel; Gaines, Leonard; Goodwin, Steven; Lawrence, Michael

    2004-01-01

    .... This study will define the Information Technology Industry, give an overview of current domestic and international conditions, and then analyze the state of national network security and challenges faced by the U.S. government and U.S...

  18. Current state of information technology use in a US primary care practice-based research network.

    Science.gov (United States)

    Andrews, James E; Pearce, Kevin A; Sydney, Carey; Ireson, Carol; Love, Margaret

    2004-01-01

    To examine the current levels of information technology (IT) use in a primary care practice-based research network (PBRN) in order to inform future development of its infrastructure. Every primary care practitioner who is a member of the Kentucky Ambulatory Network (KAN),as well as the office managers of each practice. Practitioners included family practitioners, general practitioners, nurse practitioners and physician assistants. A cross-sectional study using two survey instruments: one for office managers and one for practitioners. The office manager survey included questions related to the current state of IT within the practice, plans for enhancement and general IT issues from the perspective of managing a practice. The practitioner survey was designed to measure current IT use and attitudes of primary care practitioners. Response rates for the surveys were 46% (n = 68) for the office managers and 51% (n = 116) for practitioners. All but one practice had internet access; however, 43% had only dial-up service. Only 21% of practitioners use an electronic medical record (EMR), with dollar cost being the barrier reported most frequently (58%). More than half of the office managers were either 'somewhat interested' (45%) or 'very interested' (17%) in a low-cost, standardised EMR that was, at the time, to be sponsored by the American Academy of Family Physicians. For practitioners, 71% were either 'somewhat' or 'very' interested in such a system. Responses to other IT issues are reported. While interest in enabling information technologies was high in KAN, adoption was variable, with use of several key technologies reported as low.The results suggest that research in this network that would be dependent on or enhanced by IT might be impeded and, generally, greater attention should be given to enhancing the IT infrastructure in primary care.

  19. Resilient Disaster Network Based on Software Defined Cognitive Wireless Network Technology

    Directory of Open Access Journals (Sweden)

    Goshi Sato

    2015-01-01

    Full Text Available In order to temporally recover the information network infrastructure in disaster areas from the Great East Japan Earthquake in 2011, various wireless network technologies such as satellite IP network, 3G, and Wi-Fi were effectively used. However, since those wireless networks are individually introduced and installed but not totally integrated, some of networks were congested due to the sudden network traffic generation and unbalanced traffic distribution, and eventually the total network could not effectively function. In this paper, we propose a disaster resilient network which integrates various wireless networks into a cognitive wireless network that users can use as an access network to the Internet at the serious disaster occurrence. We designed and developed the disaster resilient network based on software defined network (SDN technology to automatically select the best network link and route among the possible access networks to the Internet by periodically monitoring their network states and evaluate those using extended AHP method. In order to verify the usefulness of our proposed system, a prototype system is constructed and its performance is evaluated.

  20. Public libraries, information society and technology: communication

    Directory of Open Access Journals (Sweden)

    Elsa Barber

    2001-01-01

    Full Text Available The research team focuses in the influence that Argentinian public libraries (popular and public have with library automation and public services oriented to the use of information technologies, and the acquisition of communitarian information skills within the information society. The methodology consists of a survey already successfully approved in previous investigations by the research team (UBACYT FI013 and TF06. The questionnaire focuses on related variables. On one hand, the variables were related to libraries automation processes (equipment, information systems,working modules, retrospective conversion, digitization, networks,and so on. And on the other hand, with given information technologies services (access to networks and documents in every media, Web navigation assistance, information technology local server, services to minorities, and so on. Data would be gathered with specific applications from the social sciences field. The final stage would be to study specific aspects of the automation processes of the libraries surveyed, in order to verify the reciprocal relationship between the automation level reached. And subsequently, to examine the likelihood of establishing new services that respond to the community information trends within the information technology and telecommunications development context.

  1. CLARA and ScienTI Networks: Technology and Information for Knowledge Building in the Latin American Scientific Community

    OpenAIRE

    Rejane Sartori; Roberto Carlos Dos Santos Pacheco

    2006-01-01

    Knowledge-based development produces wealth and opens the frontiers of competitiveness, technological innovation and wealth distribution. In developed countries the process is intrinsically bound to the ability of innovative production and the dynamics of network knowledge construction. Within this process the academic and research communities participate effectively in the dynamics of knowledge and innovation, an environment strongly based on information and communication technology. However...

  2. Mass storage technology in networks

    Science.gov (United States)

    Ishii, Katsunori; Takeda, Toru; Itao, Kiyoshi; Kaneko, Reizo

    1990-08-01

    Trends and features of mass storage subsystems in network are surveyed and their key technologies spotlighted. Storage subsystems are becoming increasingly important in new network systems in which communications and data processing are systematically combined. These systems require a new class of high-performance mass-information storage in order to effectively utilize their processing power. The requirements of high transfer rates, high transactional rates and large storage capacities, coupled with high functionality, fault tolerance and flexibility in configuration, are major challenges in storage subsystems. Recent progress in optical disk technology has resulted in improved performance of on-line external memories to optical disk drives, which are competing with mid-range magnetic disks. Optical disks are more effective than magnetic disks in using low-traffic random-access file storing multimedia data that requires large capacity, such as in archive use and in information distribution use by ROM disks. Finally, it demonstrates image coded document file servers for local area network use that employ 130mm rewritable magneto-optical disk subsystems.

  3. Sanitization and Disposal of Excess Information Technology Equipment

    Science.gov (United States)

    2009-09-21

    Report No. D-2009-104 September 21, 2009 Sanitization and Disposal of Excess Information Technology Equipment...2009 2. REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Sanitization and Disposal of Excess Information Technology ...Defense (Networks and Information Integration)/DOD Chief Information Officer DRMS Defense Reutilization and Marketing Service IT Information

  4. Models, Entropy and Information of Temporal Social Networks

    Science.gov (United States)

    Zhao, Kun; Karsai, Márton; Bianconi, Ginestra

    Temporal social networks are characterized by heterogeneous duration of contacts, which can either follow a power-law distribution, such as in face-to-face interactions, or a Weibull distribution, such as in mobile-phone communication. Here we model the dynamics of face-to-face interaction and mobile phone communication by a reinforcement dynamics, which explains the data observed in these different types of social interactions. We quantify the information encoded in the dynamics of these networks by the entropy of temporal networks. Finally, we show evidence that human dynamics is able to modulate the information present in social network dynamics when it follows circadian rhythms and when it is interfacing with a new technology such as the mobile-phone communication technology.

  5. Discussion on the Technology and Method of Computer Network Security Management

    Science.gov (United States)

    Zhou, Jianlei

    2017-09-01

    With the rapid development of information technology, the application of computer network technology has penetrated all aspects of society, changed people's way of life work to a certain extent, brought great convenience to people. But computer network technology is not a panacea, it can promote the function of social development, but also can cause damage to the community and the country. Due to computer network’ openness, easiness of sharing and other characteristics, it had a very negative impact on the computer network security, especially the loopholes in the technical aspects can cause damage on the network information. Based on this, this paper will do a brief analysis on the computer network security management problems and security measures.

  6. Database of Information technology resources

    OpenAIRE

    Barzda, Erlandas

    2005-01-01

    The subject of this master work is the internet information resource database. This work also handles the problems of old information systems which do not meet the new contemporary requirements. The aim is to create internet information system, based on object-oriented technologies and tailored to computer users’ needs. The internet information database system helps computers administrators to get the all needed information about computers network elements and easy to register all changes int...

  7. Information and technology: Improving food security in Uganda ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2014-06-23

    Jun 23, 2014 ... Information and technology: Improving food security in Uganda ... knowledge to make decisions about planting, harvesting, and managing livestock, but ... to be effective for minimizing risks and increasing agricultural productivity. ... In time, this network of information – made possible by digital technology ...

  8. Report on the survey in fiscal 1998. Survey on an environment technology transfer information network; 1998 nendo hokokusho. Kankyo gijutsu iten joho network chosa

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-03-01

    This paper describes a survey on an environment technology transfer information network. Based on the achievements obtained by the surveys in fiscal 1995 and 1996, the ICETT has participated as one organization constituting the APEC environment technology exchange virtual center, and begun providing information since April 1997. As the environment technology information, those items actually employed by factories and operation sites in Japan are put into a data base, and into a home page including training information centering around those contained in the data base, and examples of works done by local governments for prevention of pollution. Furthermore in fiscal 1997, a simulation software for a model process has been developed. Fiscal 1998 strengthened the data base for environment preservation technology information, investigated environment preserving model companies and summarized them including even their management aspect. Investigations were carried out in developing countries on application of cleaner technologies. Gaps far exceeding anticipation exist in every field between these developing countries and Japan. Environment protection measures applied and succeeded in the developing countries as the means to narrow the gaps were collected, and compiled as the specific examples. (NEDO)

  9. 32 CFR 147.15 - Guideline M-Misuse of Information technology systems.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Guideline M-Misuse of Information technology... CLASSIFIED INFORMATION Adjudication § 147.15 Guideline M—Misuse of Information technology systems. (a) The... ability to properly protect classified systems, networks, and information. Information Technology Systems...

  10. 2014 World Conference on Information Systems and Technologies

    CERN Document Server

    Correia, Ana; Tan, Felix; Stroetmann, Karl

    2014-01-01

    This book contains a selection of articles from The 2014 World Conference on Information Systems and Technologies (WorldCIST'14), held between the 15th and 18th of April in Funchal, Madeira, Portugal, a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences and challenges of modern Information Systems and Technologies research, technological development and applications. The main topics covered are: Information and Knowledge Management; Organizational Models and Information Systems; Intelligent and Decision Support Systems; Software Systems, Architectures, Applications and Tools; Computer Networks, Mobility and Pervasive Systems; Radar Technologies; Human-Computer Interaction; Health Informatics; and Information Technologies in Education.

  11. Blending Formal and Informal Learning Networks for Online Learning

    Science.gov (United States)

    Czerkawski, Betül C.

    2016-01-01

    With the emergence of social software and the advance of web-based technologies, online learning networks provide invaluable opportunities for learning, whether formal or informal. Unlike top-down, instructor-centered, and carefully planned formal learning settings, informal learning networks offer more bottom-up, student-centered participatory…

  12. Leadership Under Challenge: Information Technology R and D in a Competitive World

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — The United States is today the global leader in networking and information technology NIT. That leadership is essential to U.S. economic prosperity, security, and...

  13. 2015 World Conference on Information Systems and Technologies

    CERN Document Server

    Correia, Ana; Costanzo, Sandor; Reis, Luis

    2015-01-01

    This book contains a selection of articles from The 2015 World Conference on Information Systems and Technologies (WorldCIST'15), held between the 1st and 3rd of April in Funchal, Madeira, Portugal, a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences and challenges of modern Information Systems and Technologies research, technological development and applications. The main topics covered are: Information and Knowledge Management; Organizational Models and Information Systems; Intelligent and Decision Support Systems; Big Data Analytics and Applications; Software Systems, Architectures, Applications and Tools; Multimedia Systems and Applications; Computer Networks, Mobility and Pervasive Systems; Human-Computer Interaction; Health Informatics; Information Technologies in Education; Information Technologies in Radiocommunications.

  14. Computing, Information and Communications Technology (CICT) Website

    Science.gov (United States)

    Hardman, John; Tu, Eugene (Technical Monitor)

    2002-01-01

    The Computing, Information and Communications Technology Program (CICT) was established in 2001 to ensure NASA's Continuing leadership in emerging technologies. It is a coordinated, Agency-wide effort to develop and deploy key enabling technologies for a broad range of mission-critical tasks. The NASA CICT program is designed to address Agency-specific computing, information, and communications technology requirements beyond the projected capabilities of commercially available solutions. The areas of technical focus have been chosen for their impact on NASA's missions, their national importance, and the technical challenge they provide to the Program. In order to meet its objectives, the CICT Program is organized into the following four technology focused projects: 1) Computing, Networking and Information Systems (CNIS); 2) Intelligent Systems (IS); 3) Space Communications (SC); 4) Information Technology Strategic Research (ITSR).

  15. On library information resources construction under network environment

    International Nuclear Information System (INIS)

    Guo Huifang; Wang Jingjing

    2014-01-01

    Information resources construction is the primary task and critical measures for libraries. In the 2lst century, the knowledge economy era, with the continuous development of computer network technology, information resources have become an important part of libraries which have been a significant indicator of its capacity construction. The development of socialized Information, digitalization and internalization has put forward new requirements for library information resources construction. This paper describes the impact of network environment on construction of library information resources and proposes the measures of library information resources. (authors)

  16. Information Systems at Enterprise. Design of Secure Network of Enterprise

    Science.gov (United States)

    Saigushev, N. Y.; Mikhailova, U. V.; Vedeneeva, O. A.; Tsaran, A. A.

    2018-05-01

    No enterprise and company can do without designing its own corporate network in today's information society. It accelerates and facilitates the work of employees at any level, but contains a big threat to confidential information of the company. In addition to the data theft attackers, there are plenty of information threats posed by modern malware effects. In this regard, the computational security of corporate networks is an important component of modern information technologies of computer security for any enterprise. This article says about the design of the protected corporate network of the enterprise that provides the computers on the network access to the Internet, as well interoperability with the branch. The access speed to the Internet at a high level is provided through the use of high-speed access channels and load balancing between devices. The security of the designed network is performed through the use of VLAN technology as well as access lists and AAA server.

  17. Spatial anomaly detection in sensor networks using neighborhood information

    NARCIS (Netherlands)

    Bosman, H.H.W.J.; Iacca, G.; Tejada, A.; Wörtche, H.J.; Liotta, A.

    2016-01-01

    The field of wireless sensor networks (WSNs), embedded systems with sensing and networking capabil- ity, has now matured after a decade-long research effort and technological advances in electronics and networked systems. An important remaining challenge now is to extract meaningful information from

  18. Spatial anomaly detection in sensor networks using neighborhood information

    NARCIS (Netherlands)

    Bosman, H.H.W.J.; Iacca, G.; Tejada, A.; Wörtche, H.J.; Liotta, A.

    The field of wireless sensor networks (WSNs), embedded systems with sensing and networking capability, has now matured after a decade-long research effort and technological advances in electronics and networked systems. An important remaining challenge now is to extract meaningful information from

  19. Mechanisms of Communicating Health Information Through Facebook: Implications for Consumer Health Information Technology Design.

    Science.gov (United States)

    Menefee, Hannah K; Thompson, Morgan J; Guterbock, Thomas M; Williams, Ishan C; Valdez, Rupa S

    2016-08-11

    Consumer health information technology (IT) solutions are designed to support patient health management and have the ability to facilitate patients' health information communication with their social networks. However, there is a need for consumer health IT solutions to align with patients' health management preferences for increased adoption of the technology. It may be possible to gain an understanding of patients' needs for consumer health IT supporting their health information communication with social networks by explicating how they have adopted and adapted social networking sites, such as Facebook, for this purpose. Our aim was to characterize patients' use of all communication mechanisms within Facebook for health information communication to provide insight into how consumer health IT solutions may be better designed to meet patients' communication needs and preferences. This study analyzed data about Facebook communication mechanisms use from a larger, three-phase, sequential, mixed-methods study. We report here on the results of the study's first phase: qualitative interviews (N=25). Participants were over 18, used Facebook, were residents or citizens of the United States, spoke English, and had a diagnosis consistent with type 2 diabetes. Participants were recruited through Facebook groups and pages. Participant interviews were conducted via Skype or telephone between July and September 2014. Data analysis was grounded in qualitative content analysis and the initial coding framework was informed by the findings of a previous study. Participants' rationales for the use or disuse of a particular Facebook mechanism to communicate health information reflected six broad themes: (1) characteristics and circumstances of the person, (2) characteristics and circumstances of the relationship, (3) structure and composition of the social network, (4) content of the information, (5) communication purpose, and (6) attributes of the technology. The results of this

  20. Distributed Data Networks That Support Public Health Information Needs.

    Science.gov (United States)

    Tabano, David C; Cole, Elizabeth; Holve, Erin; Davidson, Arthur J

    Data networks, consisting of pooled electronic health data assets from health care providers serving different patient populations, promote data sharing, population and disease monitoring, and methods to assess interventions. Better understanding of data networks, and their capacity to support public health objectives, will help foster partnerships, expand resources, and grow learning health systems. We conducted semistructured interviews with 16 key informants across the United States, identified as network stakeholders based on their respective experience in advancing health information technology and network functionality. Key informants were asked about their experience with and infrastructure used to develop data networks, including each network's utility to identify and characterize populations, usage, and sustainability. Among 11 identified data networks representing hundreds of thousands of patients, key informants described aggregated health care clinical data contributing to population health measures. Key informant interview responses were thematically grouped to illustrate how networks support public health, including (1) infrastructure and information sharing; (2) population health measures; and (3) network sustainability. Collaboration between clinical data networks and public health entities presents an opportunity to leverage infrastructure investments to support public health. Data networks can provide resources to enhance population health information and infrastructure.

  1. Building technology and information competences among university students through an academic contest and social networking

    Directory of Open Access Journals (Sweden)

    Maria-Eugenia Ruiz-Molina

    2013-08-01

    Full Text Available Spanish universities have recently adapted their studies to the requirements of the European Higher Education Area (EHEA. As part of these requirements, the development of computer and informational skills must be considered as an academic objective. Amongst other activities geared towards developing these skills, an informational video was disseminated. The design of the communication campaign promoting this video, developed through viral marketing and social networking sites, was the result of empirical research carried out by students of the University of Valencia. This paper describes the research objectives, questions, techniques and main findings of the study. A survey was conducted on a sample of 844 valid questionnaires completed by students after watching the video, following a non-probability procedure of quota sampling (gender and type of studies and convenience sampling in order to achieve a representative sample of the total population. After processing data through descriptive analysis techniques, we were given a fairly detailed picture of the most commonly used electronic devices, social networking sites and activities developed by students using Web 2.0. In particular, personal computers were the most commonly used electronic devices for access to the Internet. Regarding the most commonly used social networking services, Tuenti and Facebook are the most popular websites among students, the majority of whom use social networks several times a day for chatting and sending messages. Concerning the students’ opinions about the video, most of them liked the video and its individual elements (music, images, story, etc.. They also find the message easy to understand. However, differences observed across gender and type of studies suggest the need to include several social networks as well as video features in order to effectively reach these different groups of students. This information enables the design of a communication plan to

  2. 11th International Conference on Computing and Information Technology

    CERN Document Server

    Meesad, Phayung; Boonkrong, Sirapat

    2015-01-01

    This book presents recent research work and results in the area of communication and information technologies. The book includes the main results of the 11th International Conference on Computing and Information Technology (IC2IT) held during July 2nd-3rd, 2015 in Bangkok, Thailand. The book is divided into the two main parts Data Mining and Machine Learning as well as Data Network and Communications. New algorithms and methods of data mining asr discussed as well as innovative applications and state-of-the-art technologies on data mining, machine learning and data networking.

  3. [Information technology in medical education].

    Science.gov (United States)

    Ramić, A

    1999-01-01

    The role of information technology in educational models of under-graduate and post-graduate medical education is growing in 1980's influenced by PC's break-in in medical practice and creating relevant data basis, and, particularly, in 1990's by integration of information technology on international level, development of international network, Internet, Telemedicin, etc. The development of new educational information technology is evident, proving that information in transfer of medical knowledge, medical informatics and communication systems represent the base of medical practice, medical education and research in medical sciences. In relation to the traditional approaches in concept, contents and techniques of medical education, new models of education in training of health professionals, using new information technology, offer a number of benefits, such as: decentralization and access to relevant data sources, collecting and updating of data, multidisciplinary approach in solving problems and effective decision-making, and affirmation of team work within medical and non-medical disciplines. Without regard to the dynamics of change and progressive reform orientation within health sector, the development of modern medical education is inevitable for all systems a in which information technology and available data basis, as a base of effective and scientifically based medical education of health care providers, give guarantees for efficient health care and improvement of health of population.

  4. Research on the information network for R and D on the innovative technology for the earth; Chikyu kankyo taisaku gijutsu no kenkyu joho network chosa

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    With an objective to structure an information network system to promote research information exchange on global environment preserving technologies, the currently used RITE information system was reviewed, and the WWW home page was discussed. Three years have passed since the structuring of the RITE information system, during which remarkably popularized use of the Internet can be seen. With respect to provision of research information through the Internet, IP connection is possible in almost all the countries; a variety of research information utilizing WWW are provided; multi-media functions are advancing in image information, audio information and animated image information; and retrieval servers are improved according to applicable fields. Regarding the RITE information system, discussions are given on improvement in the Internet access environment, and expansion in information providing scope and information exchange environment. A WWW home page was prepared on a trial basis, which indicated that a considerable amount of information can be provided even under the presently retained information and the current network environment. 2 refs., 28 figs., 3 tabs.

  5. 2016 World Conference on Information Systems and Technologies

    CERN Document Server

    Correia, Ana; Adeli, Hojjat; Reis, Luis; Teixeira, Marcelo

    2016-01-01

    This book contains a selection of articles from The 2016 World Conference on Information Systems and Technologies (WorldCIST'16), held between the 22nd and 24th of March at Recife, Pernambuco, Brazil. WorldCIST is a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences and challenges of modern Information Systems and Technologies research, together with their technological development and applications. The main topics covered are: Information and Knowledge Management; Organizational Models and Information Systems; Software and Systems Modeling; Software Systems, Architectures, Applications and Tools; Multimedia Systems and Applications; Computer Networks, Mobility and Pervasive Systems; Intelligent and Decision Support Systems; Big Data Analytics and Applications; Human-Computer Interaction; Health Informatics; Information Technologies in Education; Information Technologies in Radiocommunications.

  6. NETWORK-CENTRIC WARFARE AND NETWORK ENABLED CAPABILITY IMPLICATIONS OVER THE C4ISR TYPE INFORMATION NETWORKS IN THE ROMANIAN ARMED FORCES

    Directory of Open Access Journals (Sweden)

    Cristea DUMITRU

    2015-06-01

    Full Text Available The last two decades mark out the humankind evolution toward the Information Age, a new stage of societal development where the modern society is affected, among other factors, by the explosive technological changes. Within the context, technology represents the main changing driver. To be more specific, small innovations appeared in the information technology and communications are considered to be responsible global transformations in the economy, politics or culture structure. This assertion also extends its validity over the military phenomenon, which is just another human behavior. The use on large scale of the information technology and communications led to a cybernetic battlefield and the change of the waging war philosophy, with the arising of new concepts that better describe the new reality: Network Centric Warfare, and Network Enabled Capabilities.

  7. Information Technology and the Third Industrial Revolution.

    Science.gov (United States)

    Fitzsimmons, Joe

    1994-01-01

    Discusses the so-called third industrial revolution, or the information revolution. Topics addressed include the progression of the revolution in the U.S. economy, in Europe, and in Third World countries; the empowering technologies, including digital switches, optical fiber, semiconductors, CD-ROM, networks, and combining technologies; and future…

  8. Integrated Engineering Information Technology, FY93 accommplishments

    Energy Technology Data Exchange (ETDEWEB)

    Harris, R.N.; Miller, D.K.; Neugebauer, G.L.; Orona, J.R.; Partridge, R.A.; Herman, J.D.

    1994-03-01

    The Integrated Engineering Information Technology (IEIT) project is providing a comprehensive, easy-to-use computer network solution or communicating with coworkers both inside and outside Sandia National Laboratories. IEIT capabilities include computer networking, electronic mail, mechanical design, and data management. These network-based tools have one fundamental purpose: to help create a concurrent engineering environment that will enable Sandia organizations to excel in today`s increasingly competitive business environment.

  9. Use of online social networking sites among pre-service information technology teachers

    Directory of Open Access Journals (Sweden)

    Elif Buğra Kuzu

    2013-12-01

    Full Text Available The current study aimed to investigate the current status and perceptions of pre-service information technology (IT teachers regarding the use of online social networking sites (SNSs. The investigation was further supported through participant feedback regarding the design and implementation of a blended learning environment to embrace online SNSs in instructional settings. The study had a qualitative nature and employed a focus group interview to collect data. Participants were ten fourth graders who were randomly selected from voluntary undergraduate students enrolled at an IT education department of a Turkish state university. Researchers resorted to content analysis through an inductive coding process, provided themes addressing student perceptions and needs, and proposed implications and suggestions for further instructional practices.

  10. An Overview of Computer Network security and Research Technology

    OpenAIRE

    Rathore, Vandana

    2016-01-01

    The rapid development in the field of computer networks and systems brings both convenience and security threats for users. Security threats include network security and data security. Network security refers to the reliability, confidentiality, integrity and availability of the information in the system. The main objective of network security is to maintain the authenticity, integrity, confidentiality, availability of the network. This paper introduces the details of the technologies used in...

  11. Research on NGN network control technology

    Science.gov (United States)

    Li, WenYao; Zhou, Fang; Wu, JianXue; Li, ZhiGuang

    2004-04-01

    Nowadays NGN (Next Generation Network) is the hotspot for discussion and research in IT section. The NGN core technology is the network control technology. The key goal of NGN is to realize the network convergence and evolution. Referring to overlay network model core on Softswitch technology, circuit switch network and IP network convergence realized. Referring to the optical transmission network core on ASTN/ASON, service layer (i.e. IP layer) and optical transmission convergence realized. Together with the distributing feature of NGN network control technology, on NGN platform, overview of combining Softswitch and ASTN/ASON control technology, the solution whether IP should be the NGN core carrier platform attracts general attention, and this is also a QoS problem on NGN end to end. This solution produces the significant practical meaning on equipment development, network deployment, network design and optimization, especially on realizing present network smooth evolving to the NGN. This is why this paper puts forward the research topic on the NGN network control technology. This paper introduces basics on NGN network control technology, then proposes NGN network control reference model, at the same time describes a realizable network structure of NGN. Based on above, from the view of function realization, NGN network control technology is discussed and its work mechanism is analyzed.

  12. International Center for Gas Technology Information

    International Nuclear Information System (INIS)

    Gad, L.H.

    1993-01-01

    Based on an acknowledgement of the growing importance of natural gas, a number of European countries, USA, Japan and the Russian Federation have worked together in order to establish a common center of information on natural gas technology under the auspices of the International Energy Agency. Centers were to be established in Washington and in Denmark. The centers will concern themselves with establishing an international information center for gas technology, effecting natural gas technology transfer between global regions, carrying out analytical studies on the energy market and the development of technology within the field of natural gas. The structure of the decision-making processes that will be employed is explained in addition to the organization and economy. The centers should build up a global information network between the relevant countries, their gas companies, institutions etc. (AB)

  13. Information and Communication Technologies Innovations conference

    CERN Document Server

    Kocarev, Ljupco

    2012-01-01

    Information and Communication Technologies has enlarged its horizon and it is practiced under multidisciplinary contexts that introduce new challenges to theoretical and technical approaches. The most critical benefit of introducing new ICT technologies in our real world living are the new ways of working that the online world makes possible. Complexity, uncertainty and scaling issues of real world problems as well as natural phenomena in ecology, medicine and biology demanding ICT assistance create challenging application domains for artificial intelligence, decision support and intelligence systems, wireless sensor networks, pervasive and ubiquitous computing, multimedia information systems, data management systems, internet and web applications and services, computer networks, security and cryptography, distributed systems, GRID and cloud computing. This book offers a collection of papers presented at the Third International Conference on ICT Innovations held in September 2011, in Skopje, Macedonia. The co...

  14. Information security foundations, technologies and applications

    CERN Document Server

    Awad, Ali Ismail; Fairhurst, Michael

    2018-01-01

    This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security.

  15. Information technology and computational physics

    CERN Document Server

    Kóczy, László; Mesiar, Radko; Kacprzyk, Janusz

    2017-01-01

    A broad spectrum of modern Information Technology (IT) tools, techniques, main developments and still open challenges is presented. Emphasis is on new research directions in various fields of science and technology that are related to data analysis, data mining, knowledge discovery, information retrieval, clustering and classification, decision making and decision support, control, computational mathematics and physics, to name a few. Applications in many relevant fields are presented, notably in telecommunication, social networks, recommender systems, fault detection, robotics, image analysis and recognition, electronics, etc. The methods used by the authors range from high level formal mathematical tools and techniques, through algorithmic and computational tools, to modern metaheuristics.

  16. Report on investigation in fiscal 2000 of industrial technology exchange with international networking organizations; 2000 nendo kokusaitekina network gata soshiki tono sangyo gijutsu koryu chosa hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-03-01

    With an objective to promote exchange of industrial technologies, investigations and analyses were made on identification of the current status of networking organizations in different countries working as windows for industrial technology exchange, and on the actual status of technology commercialization methods in overseas incubators. Activities were taken in the following three fields: 1) the current status of networking organizations and incubators in different countries, 2) typology of technology commercialization, technical fields, and success factors, and 3) possibility of the use of technology information in the networking organizations. In Item 1), investigations were performed on the current status and actual activity status of the networking organizations including research parks and individual incubators intended of information exchange, mainly in the United States, UK, and Finland. In Item 2), considerations are given on the points related to technology incubation based on the information about the networking organizations and incubators in each country, and the way the industry-academia cooperation should be. In Item 3), discussions were given on the roles of the networking organizations and the possibility of utilization of technological information in the networking organizations in Japan. (NEDO)

  17. 2017 World Conference on Information Systems and Technologies

    CERN Document Server

    Correia, Ana; Adeli, Hojjat; Reis, Luís; Costanzo, Sandra

    2017-01-01

    This book presents a selection of papers from the 2017 World Conference on Information Systems and Technologies (WorldCIST'17), held between the 11st and 13th of April 2017 at Porto Santo Island, Madeira, Portugal. WorldCIST is a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences and challenges involved in modern Information Systems and Technologies research, together with technological developments and applications. The main topics covered are: Information and Knowledge Management; Organizational Models and Information Systems; Software and Systems Modeling; Software Systems, Architectures, Applications and Tools; Multimedia Systems and Applications; Computer Networks, Mobility and Pervasive Systems; Intelligent and Decision Support Systems; Big Data Analytics and Applications; Human–Computer Interaction; Ethics, Computers & Security; Health Informatics; Information Technologies in Education; and Information Tec...

  18. Somatic surveillance: corporeal control through information networks

    OpenAIRE

    Monahan, Torin; Wall, Tyler

    2007-01-01

    Somatic surveillance is the increasingly invasive technological monitoring of and intervention into body functions. Within this type of surveillance regime, bodies are recast as nodes on vast information networks, enabling corporeal control through remote network commands, automated responses, or self-management practices. In this paper, we investigate three developments in somatic surveillance: nanotechnology systems for soldiers on the battlefield, commercial body-monitoring systems for hea...

  19. Feasibility of integrating other federal information systems into the Global Network of Environment and Technology, GNET{reg_sign}

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-05-01

    The Global Environment and Technology Enterprise (GETE) of the Global Environment and Technology Foundation (GETF) has been tasked by the US Department of Energy`s (DOE), Federal Energy Technology Center (FETC) to assist in reducing DOE`s cost for the Global Network of Environment and Technology (GNET{reg_sign}). As part of this task, GETE is seeking federal partners to invest in GNET{reg_sign}. The authors are also seeking FETC`s commitment to serve as GNET`s federal agency champion promoting the system to potential agency partners. This report assesses the benefits of partnering with GNET{reg_sign} and provides recommendations for identifying and integrating other federally funded (non-DOE) environmental information management systems into GNET{reg_sign}.

  20. Exploring knowledge transfer within manufacturing networks and codified information characteristics: the hidden dangers of inaccurate information

    NARCIS (Netherlands)

    Steenhuis, H.J.; de Bruijn, E.J.

    2004-01-01

    Technology transfer is an important aspect of, and takes frequently place in, international manufacturing networks. A key component of a specific technology is the knowledge and information that accompanies it. This study explores the difficulties with transferring technological knowledge and

  1. Modern Quantum Technologies of Information Security

    OpenAIRE

    Korchenko, Oleksandr; Vasiliu, Yevhen; Gnatyuk, Sergiy

    2010-01-01

    In this paper, the systematisation and classification of modern quantum technologies of information security against cyber-terrorist attack are carried out. The characteristic of the basic directions of quantum cryptography from the viewpoint of the quantum technologies used is given. A qualitative analysis of the advantages and disadvantages of concrete quantum protocols is made. The current status of the problem of practical quantum cryptography use in telecommunication networks is consider...

  2. Mobile technology in health information systems - a review.

    Science.gov (United States)

    Zhang, X-Y; Zhang, P-Y

    2016-05-01

    Mobile technology is getting involved in every sphere of life including medical health care. There has been an immense upsurge in mobile phone-based health innovations these days. The expansion of mobile phone networks and the proliferation of inexpensive mobile handsets have made the digital information and communication technology capabilities very handy for the people to exploit if for any utility including health care. The mobile phone based innovations are able to transform weak and under performing health information system into more modern and efficient information system. The present review article will enlighten all these aspects of mobile technology in health care.

  3. Computer network access to scientific information systems for minority universities

    Science.gov (United States)

    Thomas, Valerie L.; Wakim, Nagi T.

    1993-08-01

    The evolution of computer networking technology has lead to the establishment of a massive networking infrastructure which interconnects various types of computing resources at many government, academic, and corporate institutions. A large segment of this infrastructure has been developed to facilitate information exchange and resource sharing within the scientific community. The National Aeronautics and Space Administration (NASA) supports both the development and the application of computer networks which provide its community with access to many valuable multi-disciplinary scientific information systems and on-line databases. Recognizing the need to extend the benefits of this advanced networking technology to the under-represented community, the National Space Science Data Center (NSSDC) in the Space Data and Computing Division at the Goddard Space Flight Center has developed the Minority University-Space Interdisciplinary Network (MU-SPIN) Program: a major networking and education initiative for Historically Black Colleges and Universities (HBCUs) and Minority Universities (MUs). In this paper, we will briefly explain the various components of the MU-SPIN Program while highlighting how, by providing access to scientific information systems and on-line data, it promotes a higher level of collaboration among faculty and students and NASA scientists.

  4. Research on the Architecture of a Basic Reconfigurable Information Communication Network

    Directory of Open Access Journals (Sweden)

    Ruimin Wang

    2013-01-01

    Full Text Available The current information network cannot fundamentally meet some urgent requirements, such as providing ubiquitous information services and various types of heterogeneous network, supporting diverse and comprehensive network services, possessing high quality communication effects, ensuring the security and credibility of information interaction, and implementing effective supervisory control. This paper provides the theory system for the basic reconfigurable information communication network based on the analysis of present problems on the Internet and summarizes the root of these problems. It also provides an in-depth discussion about the related technologies and the prime components of the architecture.

  5. Tufts academic health information network: concept and scenario.

    Science.gov (United States)

    Stearns, N S

    1986-04-01

    Tufts University School of Medicine's new health sciences education building, the Arthur M. Sackler Center for Health Communications, will house a modern medical library and computer center, classrooms, auditoria, and media facilities. The building will also serve as the center for an information and communication network linking the medical school and adjacent New England Medical Center, Tufts' primary teaching hospital, with Tufts Associated Teaching Hospitals throughout New England. Ultimately, the Tufts network will join other gateway networks, information resource facilities, health care institutions, and medical schools throughout the world. The center and the network are intended to facilitate and improve the education of health professionals, the delivery of health care to patients, the conduct of research, and the implementation of administrative management approaches that should provide more efficient utilization of resources and save dollars. A model and scenario show how health care delivery and health care education are integrated through better use of information transfer technologies by health information specialists, practitioners, and educators.

  6. Advances in Computing and Information Technology : Proceedings of the Second International

    CERN Document Server

    Nagamalai, Dhinaharan; Chaki, Nabendu

    2012-01-01

    The international conference on Advances in Computing and Information technology (ACITY 2012) provides an excellent international forum for both academics and professionals for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The Second International Conference on Advances in Computing and Information technology (ACITY 2012), held in Chennai, India, during July 13-15, 2012, covered a number of topics in all major fields of Computer Science and Information Technology including: networking and communications, network security and applications, web and internet computing, ubiquitous computing, algorithms, bioinformatics, digital image processing and pattern recognition, artificial intelligence, soft computing and applications. Upon a strength review process, a number of high-quality, presenting not only innovative ideas but also a founded evaluation and a strong argumentation of the same, were selected and collected in the present proceedings, ...

  7. Policy gaps and technological deficiencies in social networking environments: Implications for information sharing

    Directory of Open Access Journals (Sweden)

    Stephen M. Mutula

    2013-06-01

    Objectives: The study sought to investigate the following research objectives to: (1 describe the types of social networks, (2 examine global penetration of the social networks, (3 outline the users’ legitimate rights that must be protected in the social networking sites (SNS, (4 determine the methods employed by SNS to protect the users’ legitimate rights and (5 identify the policy gaps and technological deficiencies in the protection of the users’ legitimate rights in the SNS. Method: A literature survey and content analysis of the SNS user policies were used to address objective four and objective five respectively. Results: The most actively used sites were Facebook and Twitter. Asian markets were leading in participation and in creating content than any other region. Business, education, politics and governance sectors were actively using social networking sites. Social networking sites relied upon user trust and internet security features which however, were inefficient and inadequate. Conclusion: Whilst SNS were impacting people of varying ages and of various professional persuasions, there were increased concerns about the violation and infringement of the users’ legitimate rights. Reliance on user trust and technological security features SNS to protect the users’ legitimate rights seemed ineffectual and inadequate.

  8. European Lifelong Guidance Policy Network Representatives' Conceptions of the Role of Information and Communication Technologies Related to National Guidance Policies

    Science.gov (United States)

    Kettunen, Jaana; Vuorinen, Raimo; Ruusuvirta, Outi

    2016-01-01

    This article reports findings from a phenomenographic investigation into European Lifelong Guidance Policy Network representatives' conceptions of the role of information and communication technologies (ICT) related to national lifelong guidance policies. The role of ICT in relation to national lifelong guidance policies was conceived as (1)…

  9. Networking of research information on global environment protection technologies; Chikyu kankyo taisaku gijutsu no kenkyu joho network jigyo

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-03-01

    Networking is being executed with an objective of exchanging information on global environment technologies at an international level. In order to further promote the information exchange, and to make web sites user-friendly, fiscal 1998 has performed structuring a thesis renewal system. As a result of structuring the thesis renewal system, researchers can use the system as using a word processor by inputting data from a terminal in their laboratories. The data can also be made into a data base nearly semi-automatically. In addition to reducing time loss, delay and input errors because of re-entry, the researchers can make the data into a database on nearly a real time basis, and can provide their own theses to any part of the world through Internet. With regard to retaining Internet security, the security software having been introduced last year was renewed. In addition, detailed status such as daily access has become possible of identification as a result of introducing the net intellect. (NEDO)

  10. Information Literacy and technology to improve learning and education

    NARCIS (Netherlands)

    Mooij, Ton; Smeets, Ed

    2011-01-01

    Mooij, T., & Smeets, E. (2011, 13-16 September). Information Literacy and technology to improve learning and education. Presentation and discussion in a cross-network symposium of networks 16 and 12 at the ‘European Conference on Educational Research’ of the “European Educational Research

  11. Syllabus for Privacy and Information Technology, Fall 2017, UCLA Information Studies

    OpenAIRE

    Borgman, Christine L.

    2017-01-01

    Privacy is a broad topic that covers many disciplines, stakeholders, and concerns. This course addresses the intersection of privacy and information technology, surveying a wide array of topics of concern for research and practice in the information fields. Among the topics covered are the history and changing contexts of privacy; privacy risks and harms; law, policies, and practices; privacy in searching for information, in reading, and in libraries; surveillance, networks, and privacy by de...

  12. Enabling Controlling Complex Networks with Local Topological Information.

    Science.gov (United States)

    Li, Guoqi; Deng, Lei; Xiao, Gaoxi; Tang, Pei; Wen, Changyun; Hu, Wuhua; Pei, Jing; Shi, Luping; Stanley, H Eugene

    2018-03-15

    Complex networks characterize the nature of internal/external interactions in real-world systems including social, economic, biological, ecological, and technological networks. Two issues keep as obstacles to fulfilling control of large-scale networks: structural controllability which describes the ability to guide a dynamical system from any initial state to any desired final state in finite time, with a suitable choice of inputs; and optimal control, which is a typical control approach to minimize the cost for driving the network to a predefined state with a given number of control inputs. For large complex networks without global information of network topology, both problems remain essentially open. Here we combine graph theory and control theory for tackling the two problems in one go, using only local network topology information. For the structural controllability problem, a distributed local-game matching method is proposed, where every node plays a simple Bayesian game with local information and local interactions with adjacent nodes, ensuring a suboptimal solution at a linear complexity. Starring from any structural controllability solution, a minimizing longest control path method can efficiently reach a good solution for the optimal control in large networks. Our results provide solutions for distributed complex network control and demonstrate a way to link the structural controllability and optimal control together.

  13. Policy gaps and technological deficiencies in social networking environments: Implications for information sharing

    Directory of Open Access Journals (Sweden)

    Stephen M. Mutula

    2013-06-01

    Full Text Available Background: With the growing adoption and acceptance of social networking, there are increased concerns about the violation of the users’ legitimate rights such as privacy, confidentiality, trust, security, safety, content ownership, content accuracy, integrity, access and accessibility to computer and digital networks amongst others.Objectives: The study sought to investigate the following research objectives to: (1 describe the types of social networks, (2 examine global penetration of the social networks, (3 outline the users’ legitimate rights that must be protected in the social networking sites (SNS, (4 determine the methods employed by SNS to protect the users’ legitimate rights and (5 identify the policy gaps and technological deficiencies in the protection of the users’ legitimate rights in the SNS.Method: A literature survey and content analysis of the SNS user policies were used to address objective four and objective five respectively.Results: The most actively used sites were Facebook and Twitter. Asian markets were leading in participation and in creating content than any other region. Business, education, politics and governance sectors were actively using social networking sites. Social networking sites relied upon user trust and internet security features which however, were inefficient and inadequate.Conclusion: Whilst SNS were impacting people of varying ages and of various professional persuasions, there were increased concerns about the violation and infringement of the users’ legitimate rights. Reliance on user trust and technological security features SNS to protect the users’ legitimate rights seemed ineffectual and inadequate.

  14. Overlay networks toward information networking

    CERN Document Server

    Tarkoma, Sasu

    2010-01-01

    With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the evolution of Internet architecture. Inspired by the author's articles on content based routing, Overlay Networks: Toward Information Networking provides a complete introduction to overlay networks. Examining what they are and what kind of structures they require, the text covers the key structures, protocols, and algorithms used in overlay networks. It reviews the current state of th

  15. Canonical correlation analysis between collaborative networks and innovation: A case study in information technology companies in province of Tehran, Iran

    Directory of Open Access Journals (Sweden)

    Ahmad Jafar Nejad

    2013-07-01

    Full Text Available The increase competitions as well as technological advancements have created motivation among business owners to look for more innovative ideas from outside their organizations. Many enterprises collaborate with other organizations to empower themselves through innovative ideas. These kinds of collaborations can be observed as a concept called Regional Innovation System. These collaborations include inter-firm collaborations, research organizations, intermediary institutions and governmental agencies. The primary objective of this paper is to evaluate relationships between Collaborative Networks and Innovation in information technology business units located in province of Tehran, Iran. The research method utilized for the present study is descriptive-correlation. To evaluate the relationships between independent and dependent variables, canonical correlation analysis (CCA is used. The results confirm the previous findings regarding the relationship between Collaborative Networks and Innovation. Among various dimensions of Collaboration, Collaboration with governmental agencies had a very small impact on the relationship between collaboration networks and innovation. In addition, the results show that in addition to affecting product innovation and process innovation, collaboration networks also affected management innovation.

  16. What Do Information Technology Support Services Really Cost?

    Science.gov (United States)

    Leach, Karen; Smallen, David

    1998-01-01

    A study examined the cost of information-technology support services in higher education institutions. The report describes the project's origins and work to date and reports initial results in three areas: network services, desktop repair services, and administrative information systems, looking in each case at economies of scale, outsourcing…

  17. Research of using mobile agents for information discovery in P2P networks

    International Nuclear Information System (INIS)

    Lan Yan; Yao Qing

    2003-01-01

    The technology of P2P is a new network-computing model that has great value of commerce and technology. After analyzing the current information discovery technology in P2P network, a new solution that is based on mobile agent is proposed. The mobile agent solution can reduce the need of bandwidth, be adapt to the dynamic of P2P network, and be asynchronous and be very fault tolerant. (authors)

  18. Information Literacy and technology to improve learning and education

    OpenAIRE

    Mooij, Ton; Smeets, Ed

    2011-01-01

    Mooij, T., & Smeets, E. (2011, 13-16 September). Information Literacy and technology to improve learning and education. Presentation and discussion in a cross-network symposium of networks 16 and 12 at the ‘European Conference on Educational Research’ of the “European Educational Research Association” (EERA), Berlin, Germany.

  19. Information sensing and interactive technology of Internet of Things

    Science.gov (United States)

    Xiao, Zhiliang

    2017-11-01

    With the rapid development of economic, the Internet of Things based on Internet technology is more and more concerned by all circles of society, and the Internet of Things begins to penetrate into various fields of society. The Internet of things is an extension of the Internet, the difference between the Internet and the Internet of Things is that the purpose of things aims to achieve the exchange and exchange of information and data, contract the people and goods through a variety of technologies and equipment from items to items. Information perception and interaction technology are two very important technologies in the development of things, but also is the important technology in the history of the development of network technology. This paper briefly analyzes the characteristics of the original information perception, and the difference between the interactive technology of the Internet of Things and the human-computer interaction technology. On this basis, this paper mainly elaborates from the two aspects of information perception and interactive technology.

  20. The key network communication technology in large radiation image cooperative process system

    International Nuclear Information System (INIS)

    Li Zheng; Kang Kejun; Gao Wenhuan; Wang Jingjin

    1998-01-01

    Large container inspection system (LCIS) based on radiation imaging technology is a powerful tool for the customs to check the contents inside a large container without opening it. An image distributed network system is composed of operation manager station, image acquisition station, environment control station, inspection processing station, check-in station, check-out station, database station by using advanced network technology. Mass data, such as container image data, container general information, manifest scanning data, commands and status, must be on-line transferred between different stations. Advanced network communication technology is presented

  1. Application and study of advanced network technology in large container inspection system

    International Nuclear Information System (INIS)

    Li Zheng; Kang Kejun; Gao Wenhuan; Wang Jingjin

    1996-01-01

    Large Container Inspection System (LCIS) based on radiation imaging technology is a powerful tool for the customs to check the contents inside a large container without opening it. An image distributed network system is composed of center manager station, image acquisition station, environment control station, inspection processing station, check-in station, check-out station, database station by using advanced network technology. Mass data, such as container image data, container general information, manifest scanning data, commands and status, must be on-line transferred between different stations. Advanced network technology and software programming technique are presented

  2. Research and Development of a Network-Based Intelligent Maintenance Information System

    Institute of Scientific and Technical Information of China (English)

    ZANG Tie-gang; YANG Ming-zhong; GUO Shun-sheng

    2003-01-01

    A maintenance information system is an important part of equipment management. An intelli gent maintenance information system ( IMIS) is a synthesis of network technology, information technology and intelligent technology. The IMIS is used to finish flexible maintenance decision-making and fast maintenance planning, which helps enterprises to effectively reduce maintenance cost and increase working efficiency. Because the IMIS integrates advanced technologies, its performance is better than a traditional one.The difference between an IMIS and a traditional maintenance information system, and the functions, structure, important realizations, and application of an IMIS are discussed in this paper.

  3. The science, technology and research network (STARNET) a searchable thematic compilation of web resources

    Science.gov (United States)

    Blados, W.R.; Cotter, G.A.; Hermann, T.

    2007-01-01

    International alliances in space efforts have resulted in a more rapid diffusion of space technology. This, in turn, increases pressure on organizations to push forward with technological developments and to take steps to maximize their inclusion into the research and development (R&D) process and the overall advancement and enhancement of space technology. To cope with this vast and rapidly growing amount of data and information that is vital to the success of the innovation, the Information Management Committee (IMC) of the Research Technology Agency (RTA) developed the science, technology and research network (STARNET). The purpose of this network is to facilitate access to worldwide information elements in terms of science, technology and overall research. It provides a virtual library with special emphasis on international security; a "one stop" information resource for policy makers, program managers, scientists, engineers, researchers and others. ?? 2007 IEEE.

  4. Business Value of Information Technology in Network Environments

    Science.gov (United States)

    Liu, Yucong

    2012-01-01

    Information Technology (IT) business value research is suggested as fundamental to the contribution of the IS discipline. The IS research community has accumulated a critical mass of IT business value studies, but only limited or mixed results have been found on the direct relationship between IT and firm performance. Extant studies mostly focus…

  5. The research of network database security technology based on web service

    Science.gov (United States)

    Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin

    2013-03-01

    Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.

  6. Technologies for Home Networking

    DEFF Research Database (Denmark)

    A broad overview of the home networking field, ranging from wireless technologies to practical applications. In the future, it is expected that private networks (e.g. home networks) will become part of the global network ecosystem, participating in sharing their own content, running IP...

  7. Information theoretic description of networks

    Science.gov (United States)

    Wilhelm, Thomas; Hollunder, Jens

    2007-11-01

    We present a new information theoretic approach for network characterizations. It is developed to describe the general type of networks with n nodes and L directed and weighted links, i.e., it also works for the simpler undirected and unweighted networks. The new information theoretic measures for network characterizations are based on a transmitter-receiver analogy of effluxes and influxes. Based on these measures, we classify networks as either complex or non-complex and as either democracy or dictatorship networks. Directed networks, in particular, are furthermore classified as either information spreading and information collecting networks. The complexity classification is based on the information theoretic network complexity measure medium articulation (MA). It is proven that special networks with a medium number of links ( L∼n1.5) show the theoretical maximum complexity MA=(log n)2/2. A network is complex if its MA is larger than the average MA of appropriately randomized networks: MA>MAr. A network is of the democracy type if its redundancy Rdictatorship network. In democracy networks all nodes are, on average, of similar importance, whereas in dictatorship networks some nodes play distinguished roles in network functioning. In other words, democracy networks are characterized by cycling of information (or mass, or energy), while in dictatorship networks there is a straight through-flow from sources to sinks. The classification of directed networks into information spreading and information collecting networks is based on the conditional entropies of the considered networks ( H(A/B)=uncertainty of sender node if receiver node is known, H(B/A)=uncertainty of receiver node if sender node is known): if H(A/B)>H(B/A), it is an information collecting network, otherwise an information spreading network. Finally, different real networks (directed and undirected, weighted and unweighted) are classified according to our general scheme.

  8. Information persistence using XML database technology

    Science.gov (United States)

    Clark, Thomas A.; Lipa, Brian E. G.; Macera, Anthony R.; Staskevich, Gennady R.

    2005-05-01

    The Joint Battlespace Infosphere (JBI) Information Management (IM) services provide information exchange and persistence capabilities that support tailored, dynamic, and timely access to required information, enabling near real-time planning, control, and execution for DoD decision making. JBI IM services will be built on a substrate of network centric core enterprise services and when transitioned, will establish an interoperable information space that aggregates, integrates, fuses, and intelligently disseminates relevant information to support effective warfighter business processes. This virtual information space provides individual users with information tailored to their specific functional responsibilities and provides a highly tailored repository of, or access to, information that is designed to support a specific Community of Interest (COI), geographic area or mission. Critical to effective operation of JBI IM services is the implementation of repositories, where data, represented as information, is represented and persisted for quick and easy retrieval. This paper will address information representation, persistence and retrieval using existing database technologies to manage structured data in Extensible Markup Language (XML) format as well as unstructured data in an IM services-oriented environment. Three basic categories of database technologies will be compared and contrasted: Relational, XML-Enabled, and Native XML. These technologies have diverse properties such as maturity, performance, query language specifications, indexing, and retrieval methods. We will describe our application of these evolving technologies within the context of a JBI Reference Implementation (RI) by providing some hopefully insightful anecdotes and lessons learned along the way. This paper will also outline future directions, promising technologies and emerging COTS products that can offer more powerful information management representations, better persistence mechanisms and

  9. European network for health technology assessment, EUnetHTA: planning, development, and implementation of a sustainable European network for health technology assessment

    DEFF Research Database (Denmark)

    Kristensen, Finn Børlum; Mäkelä, Marjukka; Neikter, Susanna Allgurin

    2009-01-01

    OBJECTIVES: The European network on Health Technology Assessment (EUnetHTA) aimed to produce tangible and practical results to be used in the various phases of health technology assessment and to establish a framework and processes to support this. This article presents the background, objectives......, and organization of EUnetHTA, which involved a total of sixty-four partner organizations. METHODS: Establishing an effective and sustainable structure for a transnational network involved many managerial, policy, and methodological tools, according to the objective of each task or Work Package. Transparency...... the use of HTA at national and regional levels. Responsiveness to political developments in Europe should be balanced with maintaining a high level of ambition to promote independent, evidence-based information and well-tested tools for best practice based on a strong network of HTA institutions....

  10. Bandwidth Optimization On Design Of Visual Display Information System Based Networking At Politeknik Negeri Bali

    Science.gov (United States)

    Sudiartha, IKG; Catur Bawa, IGNB

    2018-01-01

    Information can not be separated from the social life of the community, especially in the world of education. One of the information fields is academic calendar information, activity agenda, announcement and campus activity news. In line with technological developments, text-based information is becoming obsolete. For that need creativity to present information more quickly, accurately and interesting by exploiting the development of digital technology and internet. In this paper will be developed applications for the provision of information in the form of visual display, applied to computer network system with multimedia applications. Network-based applications provide ease in updating data through internet services, attractive presentations with multimedia support. The application “Networking Visual Display Information Unit” can be used as a medium that provides information services for students and academic employee more interesting and ease in updating information than the bulletin board. The information presented in the form of Running Text, Latest Information, Agenda, Academic Calendar and Video provide an interesting presentation and in line with technological developments at the Politeknik Negeri Bali. Through this research is expected to create software “Networking Visual Display Information Unit” with optimal bandwidth usage by combining local data sources and data through the network. This research produces visual display design with optimal bandwidth usage and application in the form of supporting software.

  11. Emergent information technologies and enabling policies for counter-terrorism

    CERN Document Server

    Popp, R

    2006-01-01

    Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security After the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks. Advanced and emerging information technologies offer key assets in confronting a secretive, asymmetric, and networked enemy. Yet, in a free and open society, policies must ensure that these powerful technologies are used responsibly, and that privacy and civil liberties remain protected. Emergent Information Technologies and Enabling Policies for Counter-Terrorism provides a unique, integrated treatment of cutting-edge counter-terrorism technologies and their corresponding policy options. Featuring contributions from nationally recognized authorities and experts, this book brings together a diverse knowledge base for those charged with protecting our nation from terrorist attacks while preserving our civil liberti...

  12. Network management paradigm in education as a component of information society

    Directory of Open Access Journals (Sweden)

    O. O. Kolesnic

    2014-05-01

    Full Text Available Network organization has always existed, but that today information technologies create the material basis for the penetration of this type of structure in all areas. This allows to interpret the formation of a network management paradigm as one of the innovative processes of information society . The effects on the development of the virtual environment in the form of a network society leads to the fact that traditional forms of management education change it its own characteristics and there are conditions for the effective use of new forms of governance, it is connected with the network nature of education as a space object management. In practice, the process of modernization of the existing network of educational institutions and organizations that generally means use of information technology and the significant decline in the share of traditional hierarchical forms of control by increasing the share of collective polyarchical forms. Today, the introduction of a network management paradigm of education is performed primarily as a stochastic process of entering educational institutions in the space of network society. The main methodological shortcomings of network management in education is the lack of understanding of its specificity in the context of providing social impact of educational activities. Promising area of implementation of network management in education is the use of targeted management practices that focus on the development of very specific forms of network co­operation in education.

  13. The Role of Electronic Learning Technology in Networks Systems

    International Nuclear Information System (INIS)

    Abd ELhamid, A.; Ayad, N.M.A.; Fouad, Y.; Abdelkader, T.

    2016-01-01

    Recently, Electronic Learning Technology (ELT) has been widely spread as one of the new technologies in the world through using Information and Communication Technology (ICT). One of the strategies of ELT is Simulation, for instance Military and Medical simulations that are used to avoid risks and reduce Costs. A wireless communication network refers to any network not physically connected by cables, which enables the desired convenience and mobility for the user. Wireless communication networks have been useful in areas such as commerce, education and defense. According to the nature of a particular application, they can be used in home-based and industrial systems or in commercial and military environments. Historically, Mobile Ad-hoc Networks (MANET) have primarily been used for tactical military network related applications to improve battlefield communications/ survivability. MANET is a collection of wireless nodes that can dynamically be set up anywhere and anytime without using any pre-existing network infrastructure. Mobility in wireless networks basically refers to nodes changing its point of attachment to the network. Also, how the end terminals can move, there are many mobility models described the movement of nodes, many researchers use the Random Way point Mobility Model (RWPM). In this paper, a Graphical User Interface (GUI) for RWPM simulation is introduced as a proposal to be used through ELT Project. In the research area of computer and communications networks, simulation is a very useful technique for the behavior of networks

  14. Research Award: Information and Networks (I&N) Deadline: 12 ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Jean-Claude Dumais

    2012-09-12

    Sep 12, 2012 ... The growth of networked technologies has created new opportunities for advancing human ... The I&N research awardee will ideally explore research questions centred ... such as engineering or computer/information science.

  15. Comprehensive information system development and networking in ...

    African Journals Online (AJOL)

    Background/Aim: Hospital Information System(HIS) and Networking development is now the most important technology that must be embraced by all hospitals and clinics these days. Patients sometimes used to face problems in order to have quick and good services in the hospitals, often due to delay in searching for the ...

  16. An information technology framework for strengthening telehealthcare service delivery.

    Science.gov (United States)

    Chen, Li-Chin; Chen, Chi-Wen; Weng, Yung-Ching; Shang, Rung-Ji; Yu, Hui-Chu; Chung, Yufang; Lai, Feipei

    2012-10-01

    Telehealthcare has been used to provide healthcare service, and information technology infrastructure appears to be essential while providing telehealthcare service. Insufficiencies have been identified, such as lack of integration, need of accommodation of diverse biometric sensors, and accessing diverse networks as different houses have varying facilities, which challenge the promotion of telehealthcare. This study designs an information technology framework to strengthen telehealthcare delivery. The proposed framework consists of a system architecture design and a network transmission design. The aim of the framework is to integrate data from existing information systems, to adopt medical informatics standards, to integrate diverse biometric sensors, and to provide different data transmission networks to support a patient's house network despite the facilities. The proposed framework has been evaluated with a case study of two telehealthcare programs, with and without the adoption of the framework. The proposed framework facilitates the functionality of the program and enables steady patient enrollments. The overall patient participations are increased, and the patient outcomes appear positive. The attitudes toward the service and self-improvement also are positive. The findings of this study add up to the construction of a telehealthcare system. Implementing the proposed framework further assists the functionality of the service and enhances the availability of the service and patient acceptances.

  17. Digital Denmark: From Information Society to Network Society

    DEFF Research Database (Denmark)

    Henten, Anders; Falch, Morten

    2000-01-01

    for a welfare society. However, globalisation and the spreading use of new information and communication technologies and services challenge this position. This article examines Denmark's performance in implementing its IS 2000 plans, the background to the Digital Denmark report, and its implications......The Danish Government recently issued a new policy report, Digital Denmark, on the "conversion to a network society", as a successor to its Information Society 2000 report (1994). This is part of a new round of information society policy vision statements that are, or will be forthcoming from...... national governments everywhere. Denmark provides an interesting case study because it ranks high in the benchmark indicators of information network society developments. This position has been obtained largely by public sector initiatives and without erosion of the highly reputed Scandinavian model...

  18. Travels of the information highway: New media technology and public relations

    Directory of Open Access Journals (Sweden)

    Pavlik John V.

    2003-01-01

    Full Text Available The formation superhighway is perhaps best thought of as metaphor for the Emerging digital data networks that are rapidly encircling the globe. It is a mistake to think there will be just one information superhighway; there will be many, including the worldwide web of computer networks known as the Internet, the broadband packet-switched telecommunications network of optical fiber, coaxial cable and twisted pair capable of delivering video on demand and emerging technologies such as wireless communications, and direct broadcast satellite that will utilize compression techniques to provide digital interactive television and other new information services. It is also a mistake to expect the corporate spokespersons, government leaders and other technology advocates to deliver on all their promises; much of the promised technology is little more than vaporware, the term those in the computer industry use to describe much-anticipated but never delivered software packages.

  19. Privacy and technology challenges for ubiquitous social networking

    DEFF Research Database (Denmark)

    Sapuppo, Antonio; Seet, Boon-Chong

    2015-01-01

    towards important challenges such as social sensing, enabling social networking and privacy protection. In this paper we firstly investigate the methods and technologies for acquisition of the relevant context for promotion of sociability among inhabitants of USN environments. Afterwards, we review...... architectures and techniques for enabling social interactions between participants. Finally, we identify privacy as the major challenge for networking in USN environments. Consequently, we depict design guidelines and review privacy protection models for facilitating personal information disclosure....

  20. The Role of Globe Innovation Networks in Development of Information Society

    Directory of Open Access Journals (Sweden)

    Anna T. Girenko

    2016-12-01

    Full Text Available The author explores the evolution of the concept of the information society. There is identified the role of the formation of global innovation networks. The formation of global innovation networks is carried out through coordination and cooperation of scientific and technological activities on the basis of bilateral and multilateral relations, information exchange, scientific and technical services areas of development, implementation of scientific-technical activities in the framework of the international organizations, as well as through the development of national and regional innovation networks.

  1. Technological Advances and Information Education 1982-2007: Some Perspectives

    Science.gov (United States)

    Guy, Fred

    2007-01-01

    The paper considers technological advances in relation to information education over the 25 years of existence of the journal, "Education for Information." Some key developments before 1980 such as the appearance of MARC and library co-operatives are mentioned along with key post-1980 developments including networking, the World Wide…

  2. Information technologies in biomedicine

    CERN Document Server

    Kawa, Jacek; Wieclawek, Wojciech

    2014-01-01

    New computerized approaches to various problems have become critically important in healthcare. Computer assisted diagnosis has been extended towards a support of the clinical treatment. Mathematical information analysis, computer applications have become standard tools underpinning the current rapid progress with developing Computational Intelligence. A computerized support in the analysis of patient information and implementation of a computer aided diagnosis and treatment systems, increases the objectivity of the analysis and speeds up the response to pathological changes. This book presents a variety of state-of-the-art information technology and its applications to the networked environment to allow robust computerized approaches to be introduced throughout the healthcare enterprise. Image analysis and its application is the traditional part that deals with the problem of data processing, recognition and classification. Bioinformatics has become a dynamically developed field of computer assisted biologic...

  3. Organizational Application of Social Networking Information Technologies

    Science.gov (United States)

    Reppert, Jeffrey R.

    2012-01-01

    The focus of this qualitative research study using the Delphi method is to provide a framework for leaders to develop their own social networks. By exploring concerns in four areas, leaders may be able to better plan, implement, and manage social networking systems in organizations. The areas addressed are: (a) social networking using…

  4. FY 1998 Blue Book: Computing, Information, and Communications: Technologies for the 21st Century

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — As the 21st century approaches, the rapid convergence of computing, communications, and information technology promises unprecedented opportunities for scientific...

  5. Agricultural informational flow in informal communication networks ...

    African Journals Online (AJOL)

    Agricultural informational flow in informal communication networks of farmers in Ghana. ... should identify such farmers who can serve as intermediaries between actors to help disseminate information in rural communities. Keywords: key communicators, farmers, rural communities, social networks, extension agents ...

  6. FY 2001 Blue Book: Information Technology: The 21st Century Revolution

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — At the dawn of the 21st century, the U.S. is enjoying an era of unprecedented possibilities and prosperity built on dramatic advances in science and technology....

  7. FY 1999 Blue Book: Computing, Information, and Communications: Networked Computing for the 21st Century

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — U.S.research and development R and D in computing, communications, and information technologies has enabled unprecedented scientific and engineering advances,...

  8. Social networking services: technologies and applications

    OpenAIRE

    Puzyrnyy, Oleksandr

    2011-01-01

    Puzyrnyy, Oleksandr. 2011. Social networking services: technologies and applications. Bachelor's Thesis. Kemi-Tornio University of Applied Sciences. Business and Culture. Pages 52. The aim of this thesis is to describe the concept of social networking, its technological base, business opportunities and future perspectives. The study discovers how social networks are made and which different purposes they might have. In addition, social networking is viewed as a part of business strategy o...

  9. Technological Developments in Networking, Education and Automation

    CERN Document Server

    Elleithy, Khaled; Iskander, Magued; Kapila, Vikram; Karim, Mohammad A; Mahmood, Ausif

    2010-01-01

    "Technological Developments in Networking, Education and Automation" includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the following areas: Computer Networks: Access Technologies, Medium Access Control, Network architectures and Equipment, Optical Networks and Switching, Telecommunication Technology, and Ultra Wideband Communications. Engineering Education and Online Learning: including development of courses and systems for engineering, technical and liberal studies programs; online laboratories; intelligent

  10. Commitment to Cybersecurity and Information Technology Governance: A Case Study and Leadership Model

    Science.gov (United States)

    Curtis, Scipiaruth Kendall

    2012-01-01

    The continual emergence of technologies has infiltrated government and industry business infrastructures, requiring reforming organizations and fragile network infrastructures. Emerging technologies necessitates countermeasures, commitment to cybersecurity and information technology governance for organization's survivability and sustainability.…

  11. Conceptual Framework for Developing a Diabetes Information Network.

    Science.gov (United States)

    Riazi, Hossein; Langarizadeh, Mostafa; Larijani, Bagher; Shahmoradi, Leila

    2016-06-01

    To provide a conceptual framework for managing diabetic patient care, and creating an information network for clinical research. A wide range of information technology (IT) based interventions such as distance learning, diabetes registries, personal or electronic health record systems, clinical information systems, and clinical decision support systems have so far been used in supporting diabetic care. Previous studies demonstrated that IT could improve diabetes care at its different aspects. There is however no comprehensive conceptual framework that defines how different IT applications can support diverse aspects of this care. Therefore, a conceptual framework that combines different IT solutions into a wide information network for improving care processes and for research purposes is widely lacking. In this study we describe the theoretical underpin of a big project aiming at building a wide diabetic information network namely DIANET. A literature review and a survey of national programs and existing regulations for diabetes management was conducted in order to define different aspects of diabetic care that should be supported by IT solutions. Both qualitative and quantitative research methods were used in this study. In addition to the results of a previous systematic literature review, two brainstorming and three expert panel sessions were conducted to identify requirements of a comprehensive information technology solution. Based on these inputs, the requirements for creating a diabetes information network were identified and used to create a questionnaire based on 9-point Likert scale. The questionnaire was finalized after removing some items based on calculated content validity ratio and content validity index coefficients. Cronbach's alpha reliability coefficient was also calculated (αTotal= 0.98, Pconceptual framework. The questionnaires were returned by 10 clinicians. Each requirement item was labeled as essential, semi-essential, or non

  12. National information network and database system of hazardous waste management in China

    Energy Technology Data Exchange (ETDEWEB)

    Ma Hongchang [National Environmental Protection Agency, Beijing (China)

    1996-12-31

    Industries in China generate large volumes of hazardous waste, which makes it essential for the nation to pay more attention to hazardous waste management. National laws and regulations, waste surveys, and manifest tracking and permission systems have been initiated. Some centralized hazardous waste disposal facilities are under construction. China`s National Environmental Protection Agency (NEPA) has also obtained valuable information on hazardous waste management from developed countries. To effectively share this information with local environmental protection bureaus, NEPA developed a national information network and database system for hazardous waste management. This information network will have such functions as information collection, inquiry, and connection. The long-term objective is to establish and develop a national and local hazardous waste management information network. This network will significantly help decision makers and researchers because it will be easy to obtain information (e.g., experiences of developed countries in hazardous waste management) to enhance hazardous waste management in China. The information network consists of five parts: technology consulting, import-export management, regulation inquiry, waste survey, and literature inquiry.

  13. Information Technology Use in Community Pharmacies in Harare ...

    African Journals Online (AJOL)

    Information technology (IT) has transformed the practice of pharmacy worldwide. This study was undertaken to determine the pharmacists\\' IT use, utilization patterns and their opinions regarding IT use. The majority of pharmacies had networked computers (71.7%) and internet connections (60.9%). Pharmacists had poor ...

  14. Deep Space Network information system architecture study

    Science.gov (United States)

    Beswick, C. A.; Markley, R. W. (Editor); Atkinson, D. J.; Cooper, L. P.; Tausworthe, R. C.; Masline, R. C.; Jenkins, J. S.; Crowe, R. A.; Thomas, J. L.; Stoloff, M. J.

    1992-01-01

    The purpose of this article is to describe an architecture for the DSN information system in the years 2000-2010 and to provide guidelines for its evolution during the 1990's. The study scope is defined to be from the front-end areas at the antennas to the end users (spacecraft teams, principal investigators, archival storage systems, and non-NASA partners). The architectural vision provides guidance for major DSN implementation efforts during the next decade. A strong motivation for the study is an expected dramatic improvement in information-systems technologies--i.e., computer processing, automation technology (including knowledge-based systems), networking and data transport, software and hardware engineering, and human-interface technology. The proposed Ground Information System has the following major features: unified architecture from the front-end area to the end user; open-systems standards to achieve interoperability; DSN production of level 0 data; delivery of level 0 data from the Deep Space Communications Complex, if desired; dedicated telemetry processors for each receiver; security against unauthorized access and errors; and highly automated monitor and control.

  15. 77 FR 67028 - NASA Advisory Council; Information Technology Infrastructure Committee; Meeting

    Science.gov (United States)

    2012-11-08

    .... SUPPLEMENTARY INFORMATION: The agenda topics for the meeting will include: Information Technology--The Effects... Center Chandra/X-Ray Astronomy Mobile Applications Wide Area Networks The meeting will be open to the....S. visa information to include type, number, and expiration date, U.S. Social Security Number (if...

  16. Technologies That Support Marketing and Market Development in SMEs—Evidence from Social Networks

    NARCIS (Netherlands)

    Eggers, Fabian; Hatak, Isabella; Kraus, Sascha; Niemand, Thomas

    2017-01-01

    This study builds on previous research on information technology implementation and usage in small and medium-sized enterprises (SMEs) and applies a special focus on social networks. Specifically, this research investigates antecedents of social network usage in SMEs and respective performance

  17. Division of Information Technology - Overview

    International Nuclear Information System (INIS)

    Szlachciak, J.

    2010-01-01

    Full text: The Division of Information Technology continued its service-oriented activities in 2009. Our main duty was day-to-day support to all units in the Institute in IT related matters. One of our tasks was the acquiring, configuration and delivery of new computer equipment to our users. We automated the standard software installation task and decreased the delivery time for new and fully reconfigured computers to end users. We prepared the technical specifications for several bid and we verified thai the received bids complied with the specification. In addition to regular purchasing of computer equipment we supported the special software -related needs of EU projects. We purchased new licenses for: Computer Simulation Technology Studio Suite, Pulsar Physics General Particle Tracerm. Altium Designer. Autodesk Inventor. Autodesk AutoCAD Electrical, Altera Quartus II. Lahey/Fujitsu Fortran Professional. Code Gear Delphi, Steema Software TeeChart Pro, ANSYS Academic Research, Math Works Matlab, Keil PK51 Professional Developer's Kit, Corel Corporation CorelDraw Graphics Suite, Abbyy FineReader Professional, Adobe Acrobat Professional. We also renewed and increased the number of licenses for Microsoft and GFI products. We implemented a full high definition video conferencing system based on equipment from Lifesize. One-video conferencing terminal is placed in Swierk. another, enabling 4-way conferences, is located in Warsaw. This equipment is mainly used for teleconferences between our Institute and our partners in DESY and CERN. By the implementation of such a system we significantly improved the exchange of information and saved on travel costs. In addition the rooms housing the video conferencing systems were equipped with professional data projectors. We continued the modernization of the Local Area Network infrastructure. The first main achievement was a full replacement of cables and active network devices in the building where the Departments of Plasma

  18. Thinking about information work of nuclear science and technology in the age of big data: speaking of the information analysis and research

    International Nuclear Information System (INIS)

    Chen Tieyong

    2014-01-01

    Human society is entering a 'PB' (1024TB) the new era as the unit of structured and unstructured data, In the network era, with the development of mobile communications, electronic commerce, the emergence and development of social network. Now, a large-scale production, sharing and application data era is opening. How to explore the value of data, to conquer big data, to get useful information, is an important task of our science and technology information workers. This paper tries to analyze the development of the nuclear science and technology information work from big data obtain, analysis, application. Our analysis and research work for information will be increasingly based on all data and analysis, Instead of random sampling. The data 'sound' is possible. A lot of results of information analysis and research can be expressed quantitatively. We should attach great importance to data collection, careful analysis of the big data. We involves the professional division of labor, but also to cooperation In nuclear science and technology information analysis and research process. In addition, we should strengthen the nuclear science and technology information resource construction, improve Information supply; strengthen the analysis and research of nuclear science and technology information, improve the information service; strengthen information management of nuclear science and technology, pay attention to the security problems and intellectual property rights in information sharing; strengthen personnel training, continuously improve the nuclear science and technology information work efficiency and performance. In the age of big data, our nuclear science and technology information workers shall be based on the information analysis and study as the core, one hand grasping information collection, another hand grasping information service, forge ahead and innovation, continuous improvement working ability of nuclear science and technology information, improve the

  19. Theoretical and methodological significance of Information and Communication Technology in educational practice.

    NARCIS (Netherlands)

    Mooij, Ton

    2016-01-01

    In September 1998 the Research Network ‘ICT in Education and Training’ was initiated at the conference of the European Educational Research Association (EERA). The new network reflected the recognition and growing importance of information and communication technology (ICT) with respect to education

  20. CRITICAL INFORMATION INFRASTRUCTURE SECURITY - NETWORK INTRUSION DETECTION SYSTEMS

    Directory of Open Access Journals (Sweden)

    Cristea DUMITRU

    2011-12-01

    Full Text Available Critical Information Infrastructure security will always be difficult to ensure, just because of the features that make it irreplaceable tor other critical infrastructures normal operation. It is decentralized, interconnected interdependent, controlled by multiple actors (mainly private and incorporating diverse types of technologies. It is almost axiomatic that the disruption of the Critical Information Infrastructure affects systems located much farther away, and the cyber problems have direct consequences on the real world. Indeed the Internet can be used as a multiplier in order to amplify the effects of an attack on some critical infrastructures. Security challenges increase with the technological progress. One of the last lines of defense which comes to complete the overall security scheme of the Critical Information Infrastructure is represented by the Network Intrusion Detection Systems.

  1. Social networks as a new tool of information warfare in the modern world

    Directory of Open Access Journals (Sweden)

    B. W. Kovalevych

    2014-03-01

    Full Text Available With the rapid development of information technologies, especially the Internet, people are becoming increasingly dependent on information that surrounds them. And social networks, where a person spends most of their time, become the ideal instruments of influence on the people consciousness and information warfare. Due to psychological factors ( such as ‘spiral of silence’, the herd instinct, the entire credibility of published information, opinion leaders, the desire for self­realization or replacement of reality that influence the human behavior in the network and the use of models of influence (model of network attack, model of involving users as volunteers, total block model, social networks become a platform for the dissemination of political ideas, ideologies and implementation of the ‘color revolutions’. However, social media play a positive role, especially in the establishment of civil society and the free flow of information. Positive or negative impact of networks primary depends on the purpose of use of social networking tools.

  2. ODIN. Online Database Information Network: ODIN Policy & Procedure Manual.

    Science.gov (United States)

    Townley, Charles T.; And Others

    Policies and procedures are outlined for the Online Database Information Network (ODIN), a cooperative of libraries in south-central Pennsylvania, which was organized to improve library services through technology. The first section covers organization and goals, members, and responsibilities of the administrative council and libraries. Patrons…

  3. The 9th international conference on computing and information technology

    CERN Document Server

    Unger, Herwig; Boonkrong, Sirapat; IC2IT2013

    2013-01-01

    This volume contains the papers of the 9th International Conference on Computing and Information Technology (IC2IT 2013) held at King Mongkut's University of Technology North Bangkok (KMUTNB), Bangkok, Thailand, on May 9th-10th, 2013. Traditionally, the conference is organized in conjunction with the National Conference on Computing and Information Technology, one of the leading Thai national events in the area of Computer Science and Engineering. The conference as well as this volume is structured into 3 main tracks on Data Networks/Communication, Data Mining/Machine Learning, and Human Interfaces/Image processing.  

  4. Information technology and its role in anaesthesia training and continuing medical education.

    Science.gov (United States)

    Chu, Larry F; Erlendson, Matthew J; Sun, John S; Clemenson, Anna M; Martin, Paul; Eng, Reuben L

    2012-03-01

    Today's educators are faced with substantial challenges in the use of information technology for anaesthesia training and continuing medical education. Millennial learners have uniquely different learning styles than previous generations of students. These preferences distinctly incorporate the use of digital information technologies and social technologies to support learning. To be effective teachers, modern educators must be familiar with these new information technologies and understand how to use them for medical education. Examples of new information technologies include learning management systems, lecture capture, social media (YouTube, Flickr), social networking (Facebook), Web 2.0, multimedia (video learning triggers and point-of-view video) and mobile computing applications. The information technology challenges for educators in the twenty-first century include: (a) understanding how technology shapes the learning preferences of today's anaesthesia residents, (b) distinguishing between the function and properties of new learning technologies and (c) properly using these learning technologies to enhance the anaesthesia curriculum. Copyright © 2012 Elsevier Ltd. All rights reserved.

  5. Collaborative Information Technologies

    Science.gov (United States)

    Meyer, William; Casper, Thomas

    1999-11-01

    Significant effort has been expended to provide infrastructure and to facilitate the remote collaborations within the fusion community and out. Through the Office of Fusion Energy Science Information Technology Initiative, communication technologies utilized by the fusion community are being improved. The initial thrust of the initiative has been collaborative seminars and meetings. Under the initiative 23 sites, both laboratory and university, were provided with hardware required to remotely view, or project, documents being presented. The hardware is capable of delivering documents to a web browser, or to compatible hardware, over ESNET in an access controlled manner. The ability also exists for documents to originate from virtually any of the collaborating sites. In addition, RealNetwork servers are being tested to provide audio and/or video, in a non-interactive environment with MBONE providing two-way interaction where needed. Additional effort is directed at remote distributed computing, file systems, security, and standard data storage and retrieval methods. This work supported by DoE contract No. W-7405-ENG-48

  6. Congenital Heart Information Network

    Science.gov (United States)

    ... heart defects. Important Notice The Congenital Heart Information Network website is temporarily out of service. Please join ... and Uwe Baemayr for The Congenital Heart Information Network Exempt organization under Section 501(c)3. Copyright © ...

  7. The internet of things and the development of network technology in China

    Science.gov (United States)

    Wang, Ruxin; Zhao, Jianzhen; Ma, Hangtong

    2018-04-01

    The English name of the Internet of Things the Internet of Things, referred to as: the IOT. Internet of Things through the pass, radio frequency identification technology, global positioning system technology, real-time acquisition of any monitoring, connectivity, interactive objects or processes, collecting their sound, light, heat, electricity, mechanics, chemistry, biology, the location of a variety of the information you need network access through a variety of possible things and things, objects and people in the Pan-link intelligent perception of items and processes, identification and management. The Internet of Things IntelliSense recognition technology and pervasive computing, ubiquitous network integration application, known as the third wave of the world's information industry development following the computer, the Internet. Not so much the Internet of Things is a network, as Internet of Things services and applications, Internet of Things is also seen as Internet application development. Therefore, the application of innovation is the core of the development of Internet of Things, and 2.0 of the user experience as the core innovation is the soul of Things.

  8. Third International Conference on Computational Science, Engineering and Information Technology (CCSEIT-2013), v.1

    CERN Document Server

    Kumar, Ashok; Annamalai, Annamalai

    2013-01-01

      This book is the proceedings of Third International Conference on Computational Science, Engineering and Information Technology (CCSEIT-2013) that was held in Konya, Turkey, on June 7-9. CCSEIT-2013 provided an excellent international forum for sharing knowledge and results in theory, methodology and applications of computational science, engineering and information technology. This book contains research results, projects, survey work and industrial experiences representing significant advances in the field. The different contributions collected in this book cover five main areas: algorithms, data structures and applications;  wireless and mobile networks; computer networks and communications; natural language processing and information theory; cryptography and information security.  

  9. Development of Information Technology and Communication in Mexico: Reflections on Technology, Social and Organizational Man

    Directory of Open Access Journals (Sweden)

    Anahí Gallardo Velázquez

    2012-11-01

    Full Text Available Technology is a tool for everyday application,  which  allows men to accomplish the tasks for which it was designed as an efficient being, but if someone decides to discard it, that would be impossible, since we live in a society that punishes the technological illiterate. Mexico and Latin America participate with people and its organizations in the network, in the liquid life of the knowledge and information society. Mexico in particular, advances to important steps in the development of digital infrastructure, but it is not as important as the developed countries in this subject, in spite of its intention to be part of this global world of information and communication technologies. This survey is a reflection on the importance of Information and Communication Technology (ICT, in our country, from an organizational perspective, understanding by this,  a deeper search of the impact of technological development, specifically ICT, in the human being.

  10. The role of information technologies in the development of school social education practice

    Directory of Open Access Journals (Sweden)

    Selivanova Natalia L.

    2016-01-01

    Full Text Available The paper discusses various ways and specifics of applying information technologies in the process of school students’ social education and reveals the role of IT in the development of the student’s personality. Special attention is paid to the social education potential of network communities, the internet, virtual museums and mobile technologies. The paper also explains the risks of information technologies in social education.

  11. The application of data encryption technology in computer network communication security

    Science.gov (United States)

    Gong, Lina; Zhang, Li; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-04-01

    With the rapid development of Intemet and the extensive application of computer technology, the security of information becomes more and more serious, and the information security technology with data encryption technology as the core has also been developed greatly. Data encryption technology not only can encrypt and decrypt data, but also can realize digital signature, authentication and authentication and other functions, thus ensuring the confidentiality, integrity and confirmation of data transmission over the network. In order to improve the security of data in network communication, in this paper, a hybrid encryption system is used to encrypt and decrypt the triple DES algorithm with high security, and the two keys are encrypted with RSA algorithm, thus ensuring the security of the triple DES key and solving the problem of key management; At the same time to realize digital signature using Java security software, to ensure data integrity and non-repudiation. Finally, the data encryption system is developed by Java language. The data encryption system is simple and effective, with good security and practicality.

  12. Network security system for health and medical information using smart IC card

    Science.gov (United States)

    Kanai, Yoichi; Yachida, Masuyoshi; Yoshikawa, Hiroharu; Yamaguchi, Masahiro; Ohyama, Nagaaki

    1998-07-01

    A new network security protocol that uses smart IC cards has been designed to assure the integrity and privacy of medical information in communication over a non-secure network. Secure communication software has been implemented as a library based on this protocol, which is called the Integrated Secure Communication Layer (ISCL), and has been incorporated into information systems of the National Cancer Center Hospitals and the Health Service Center of the Tokyo Institute of Technology. Both systems have succeeded in communicating digital medical information securely.

  13. Research of the key technology in satellite communication networks

    Science.gov (United States)

    Zeng, Yuan

    2018-02-01

    According to the prediction, in the next 10 years the wireless data traffic will be increased by 500-1000 times. Not only the wireless data traffic will be increased exponentially, and the demand for diversified traffic will be increased. Higher requirements for future mobile wireless communication system had brought huge market space for satellite communication system. At the same time, the space information networks had been greatly developed with the depth of human exploration of space activities, the development of space application, the expansion of military and civilian application. The core of spatial information networks is the satellite communication. The dissertation presented the communication system architecture, the communication protocol, the routing strategy, switch scheduling algorithm and the handoff strategy based on the satellite communication system. We built the simulation platform of the LEO satellites networks and simulated the key technology using OPNET.

  14. Development of IT-based data communication network technology

    International Nuclear Information System (INIS)

    Hong, Seok Boong; Jeong, K. I.; Yoo, Y. R.

    2010-10-01

    - Developing broadband high-reliability real-time communications technology for NPP - Developing reliability and performance validation technology for communications network - Developing security technology for NPP communications network - Developing field communications network for harsh environment of NPP - International standard registration(Oct. 28, 2009, IEC 61500

  15. Internal evaluation of the European network for health technology assessment project.

    Science.gov (United States)

    Håheim, Lise Lund; Imaz, Iñaki; Loud, Marlène Läubli; Gasparetto, Teresa; González-Enriquez, Jesús; Dahlgren, Helena; Trofimovs, Igor; Berti, Elena; Mørland, Berit

    2009-12-01

    The internal evaluation studied the development of the European network for Health Technology Assessment (EUnetHTA) Project in achieving the general objective of establishing an effective and a sustainable network of health technology assessment (HTA) in Europe. The Work Package 3 group was dedicated to this task and performed the work. Information on activities during the project was collected from three sources. First, three yearly cross-sectional studies surveyed the participants' opinions. Responses were by individuals or by institutions. The last round included surveys to the Steering Committee, the Stakeholder Forum, and the Secretariat. Second, the Work Package Lead Partners were interviewed bi-annually, five times in total, to update the information on the Project's progress. Third, additional information was sought in available documents. The organizational structure remained stable. The Project succeeded in developing tools aimed at providing common methodology with intent to establish a standard of conducting and reporting HTA and to facilitate greater collaboration among agencies. The participants/agencies expressed their belief in a network and in maintaining local/national autonomy. The Work Package Leaders expressed a strong belief in the solid base of the Project for a future network on which to build, but were aware of the need for funding and governmental support. Participants and Work Package Leaders have expressed support for a future network that will improve national and international collaboration in HTA based on the experience from the EUnetHTA project.

  16. Information Technology Management: Select Controls for the Information Security of the Ground-Based Midcourse Defense Communications Network

    National Research Council Canada - National Science Library

    Truex, Kathryn M; Lamar, Karen J; Leighton, George A; Woodruff, Courtney E; Brunetti, Tina N; Russell, Dawn M

    2006-01-01

    ... to the Ground-Based Midcourse Defense Communications Network should read this report to reduce the risk of interruption, misuse, modification, and unauthorized access to information in the system...

  17. National Network for Immunization Information

    Science.gov (United States)

    ... American College of Obstetricians and Gynecologists . © Copyright National Network for Immunization Information. The information contained in the National Network for Immunization Information Web site should not be ...

  18. Visionary network 2030. Technology vision for future distribution network

    International Nuclear Information System (INIS)

    Kumpulainen, L.; Laaksonen, H.; Komulainen, R.

    2006-11-01

    Objective of this research was to create the long term vision of a distribution network technology to be used for the near future rebuild and necessary R and D efforts. Present status of the grid was briefly handled and created scenarios for the operational environment changes and available technology International view was used for getting familiar with the present solutions and future expectations in other countries. Centralised power generation is supposed to form the majority, but also the distributed generation will play more and more important role, which is hard to predict due to the uncertainty of the development of the regulation. Higher reliability and safety in major faults are expected from the future network with the reasonable costs. Impact of the climate change and impregnant using restrictions cause difficulties especially for the overhead lines in the forests. In the rural network also the ageing is the problem. For the urban networks the land usage and environmental issues get more challenging and the network reinforcement is necessary due to the increased use of electricity. As a result several technical solutions are available. Additions to the technology today, several new solutions were introduced. Important solutions in the future network are supposed to be the wide range of underground cable, high degree utilisation of the communication and network automation solutions, considerable shorter protection zones and new layout solution. In a long run the islanding enabled by the distributed energy systems and totally new network structures and solutions based on power electronics are supposed to improve the power quality and profitability. Separate quality classes in network design principally are also supposed to be approved. Getting into the vision needs also the Roadmap project, which coordinates and focuses the development of the industry. So the limited national development resources can be effectively utilised. A coordinated national

  19. Information transmission on hybrid networks

    Science.gov (United States)

    Chen, Rongbin; Cui, Wei; Pu, Cunlai; Li, Jie; Ji, Bo; Gakis, Konstantinos; Pardalos, Panos M.

    2018-01-01

    Many real-world communication networks often have hybrid nature with both fixed nodes and moving modes, such as the mobile phone networks mainly composed of fixed base stations and mobile phones. In this paper, we discuss the information transmission process on the hybrid networks with both fixed and mobile nodes. The fixed nodes (base stations) are connected as a spatial lattice on the plane forming the information-carrying backbone, while the mobile nodes (users), which are the sources and destinations of information packets, connect to their current nearest fixed nodes respectively to deliver and receive information packets. We observe the phase transition of traffic load in the hybrid network when the packet generation rate goes from below and then above a critical value, which measures the network capacity of packets delivery. We obtain the optimal speed of moving nodes leading to the maximum network capacity. We further improve the network capacity by rewiring the fixed nodes and by considering the current load of fixed nodes during packets transmission. Our purpose is to optimize the network capacity of hybrid networks from the perspective of network science, and provide some insights for the construction of future communication infrastructures.

  20. Software-Defined Networks as a Stage of the Network Technology Evolution

    Directory of Open Access Journals (Sweden)

    A. A. Krasotin

    2013-01-01

    Full Text Available The authors of the article focus on the concept of a software defined network. In the beginning, the brief historical account is given concerning software defined networks as a scientific concept, its formation and technological and scientific meaning. The software defined network concept is treated in the article not as the final state-of-the-art in networking, but rather as a possible step and direction in the development of a networking paradigm. The article touches on pros and cons as well of the software defined networking and gives an account of possible stages of development of this technology in the context of other technologies, considering its hybrid with MPLS, as an example. OpenFlow protocol constitutes the main part of the article. The authors further discuss various kinds of existing libraries realizing programmable management routines for a software defined network using OpenFlow. All of these libraries provide API for building modular applications for software defined network management. Touching on practical side of implementation the results of comparative tests of throughput and latency, achieved with these libraries are shown.

  1. NASA Information Technology Implementation Plan

    Science.gov (United States)

    2000-01-01

    NASA's Information Technology (IT) resources and IT support continue to be a growing and integral part of all NASA missions. Furthermore, the growing IT support requirements are becoming more complex and diverse. The following are a few examples of the growing complexity and diversity of NASA's IT environment. NASA is conducting basic IT research in the Intelligent Synthesis Environment (ISE) and Intelligent Systems (IS) Initiatives. IT security, infrastructure protection, and privacy of data are requiring more and more management attention and an increasing share of the NASA IT budget. Outsourcing of IT support is becoming a key element of NASA's IT strategy as exemplified by Outsourcing Desktop Initiative for NASA (ODIN) and the outsourcing of NASA Integrated Services Network (NISN) support. Finally, technology refresh is helping to provide improved support at lower cost. Recently the NASA Automated Data Processing (ADP) Consolidation Center (NACC) upgraded its bipolar technology computer systems with Complementary Metal Oxide Semiconductor (CMOS) technology systems. This NACC upgrade substantially reduced the hardware maintenance and software licensing costs, significantly increased system speed and capacity, and reduced customer processing costs by 11 percent.

  2. Information sharing for effective IT incident resolving in IT service provider networks: A financial service case study

    NARCIS (Netherlands)

    Vlietland, J.; Vliet, J.C.

    2015-01-01

    Information technology (IT)-enabled financial services are typically delivered by a network of interdependent IT service providers. Such networks need information to resolve IT incidents in their delivered IT services. The objective of this research is to identify the set of information that needs

  3. Health information multitype library reference referral networking: panacea for the '90s.

    Science.gov (United States)

    Teplitskaia, H

    1998-07-01

    Librarians are exploring new approaches to information sharing to cope with a rapidly changing environment dominated by budget cuts, information explosion, and globalization of the economy, science, and culture. In 1990, the University of Illinois at Chicago Library of the Health Sciences (UIC LHS) initiated a pilot project aimed at establishing an effective balance between state-of-the-art information technology and traditional library methods and promoting cooperation among health information professionals by establishing the Health Information Referral Network (HIRN) in the state of Illinois. HIRN's background and development, Internet home page, and networking techniques reviewed in this paper are applicable to multitype libraries and information centers interested in improving information use and the referral process.

  4. 11th Kasseler symposium energy systems technology. Information and communication technologies for tommorow's energy supply; Elftes Kasseler Symposium Energie-Systemtechnik. Informations- und Kommunikationstechnologien fuer die Energieversorgung von morgen

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2006-07-01

    The theme of the 11{sup th} Kassel Symposium Energy System Technology is 'Information and Communication Technologies for tomorrow's Energy Supply' and is aimed at technical engineering experts. The symposium intends to provide an overview of the state of the art, the newest trends and practical experiences in the 'Energy and Communication' field within a decentralised power supply environment. The speeches cover a range of topics from standards and norms for communication interfaces and protocols for decentralised power supply through contributions concerning decentralised generators, quality of supply, the potentials of effective energy management in distribution networks and the role of information management in virtual power stations. The network theme 'Energy and Communication' is also concluded during this symposium. Within this network, which has been supported by the Federal Ministry of Research and Education, the capacity and abilities of non-university institutes which are active in the field of research and knowledge-management could be optimally linked with the extensive concept potential of universities and the market-oriented line taken by industry through consolidating and linking up colleges and universities, commercial companies and non-university research facilities in the energy and communication technology sphere. With the aim of 'Optimising the Use of Decentralised Power Supply Systems by Integrating Modern Methods of Communication', the network has developed proposals for the following areas - Decentralized power quality and grid management - Communication structures and technology - Energy management and operation control strategies - Information management which, in the form of project ideas and proposals for research projects, should be realised after the scheme expires. The results of the networks and relevant research results will be presented by scientists in four blocks of lectures, each one

  5. Development of an Educational Network to Strengthen Education, Training and Outreach in Latin America: LANENT-Latin American Network for Education in Nuclear Technology

    International Nuclear Information System (INIS)

    Da Silva, A.

    2016-01-01

    Full text: In the current century, networks have played an important role in the dissemination of experiences, information exchange and training of human resources for different area of expertise. The IAEA has encouraged in regions, through its member states, the creation of educational networks to meet rapidly and efficiently the dissemination and exchange of knowledge between professionals and students in the nuclear area. With this vision, the Latin American Network for Education in Nuclear Technology (LANENT) was established to contribute to preserving, promoting and sharing nuclear knowledge as well as fostering nuclear knowledge transfer in the Latin American region. LANENT seeks to increase technical and scientific cooperation among its members in so far as to promote the benefits of nuclear technology and foster the progress and development of nuclear technology in areas such as education, health, the industry, the government, the environment, the mining industry, among others. By means of LANENT, the participating institutions of this network, devoted to education and training of professionals and technicians in the Latin American region, may have access to major information on nuclear technology so as to make their human resources broaden their nuclear knowledge. Moreover, this network seeks to communicate the benefits of nuclear technology to the public with the aim of arousing interest in nuclear technology of the younger generations. This paper will present and analyze results and initiatives developed by LANENT in Latin America. (author

  6. Health Information Technology as a Universal Donor to Bioethics Education.

    Science.gov (United States)

    Goodman, Kenneth W

    2017-04-01

    Health information technology, sometimes called biomedical informatics, is the use of computers and networks in the health professions. This technology has become widespread, from electronic health records to decision support tools to patient access through personal health records. These computational and information-based tools have engendered their own ethics literature and now present an opportunity to shape the standard medical and nursing ethics curricula. It is suggested that each of four core components in the professional education of clinicians-privacy, end-of-life care, access to healthcare and valid consent, and clinician-patient communication-offers an opportunity to leverage health information technology for curricular improvement. Using informatics in ethics education freshens ethics pedagogy and increases its utility, and does so without additional demands on overburdened curricula.

  7. Trends in Energy Management Technology: BCS Integration Technologies - Open Communications Networking

    Energy Technology Data Exchange (ETDEWEB)

    Webster, Tom

    2002-09-18

    Our overall purpose in writing this series of articles is to provide Federal energy managers some basic informational tools to assist their decision making process relative to energy management systems design, specification, procurement, and energy savings potential. Since Federal buildings rely on energy management systems more than their commercial counterparts, it is important for energy practitioners to have a high level of knowledge and understanding of these complex systems. This is the second article in a series and will focus on building control system (BCS) networking fundamentals and an assessment of current approaches to open communications protocols. This is important because networking is a complex subject and the networks form the basic infrastructure for energy management functions and for integrating a wide variety of OEM equipment into a complete EMCIS. The first article [1] covered enabling technologies for emerging energy management systems. Future topics will concentrate on more practical aspects including applications software, product offerings, networking strategies, and case studies of actual installations. Please refer to the first article for a more complete overview of the purpose and background for this series.

  8. Environmental effects of information and communications technologies.

    Science.gov (United States)

    Williams, Eric

    2011-11-16

    The digital revolution affects the environment on several levels. Most directly, information and communications technology (ICT) has environmental impacts through the manufacturing, operation and disposal of devices and network equipment, but it also provides ways to mitigate energy use, for example through smart buildings and teleworking. At a broader system level, ICTs influence economic growth and bring about technological and societal change. Managing the direct impacts of ICTs is more complex than just producing efficient devices, owing to the energetically expensive manufacturing process, and the increasing proliferation of devices needs to be taken into account. © 2011 Macmillan Publishers Limited. All rights reserved

  9. 10th International Conference on Computing and Information Technology

    CERN Document Server

    Unger, Herwig; Meesad, Phayung

    2014-01-01

    Computer and Information Technology (CIT) are now involved in governmental, industrial, and business domains more than ever. Thus, it is important for CIT personnel to continue academic research to improve technology and its adoption to modern applications. The up-to-date research and technologies must be distributed to researchers and CIT community continuously to aid future development. The 10th International Conference on Computing and Information Technology (IC 2 IT2014) organized by King Mongkut's University of Technology North Bangkok (KMUTNB) and partners provides an exchange of the state of the art and future developments in the two key areas of this process: Computer Networking and Data Mining. Behind the background of the foundation of ASEAN, it becomes clear that efficient languages, business principles and communication methods need to be adapted, unified and especially optimized to gain a maximum benefit to the users and customers of future IT systems.

  10. Building secure network by integrated technology

    International Nuclear Information System (INIS)

    An Dehai; Xu Rongsheng; Liu Baoxu

    2000-01-01

    The author introduces a method which can realize the most powerful network security prevention by the network security integrated technologies such as firewall, realtime monitor, network scanner, Web detection and security, etc

  11. Bridging the Gap from Networking Technologies to Applications: Workshop Report

    Science.gov (United States)

    Johnson, Marjory J.; desJardins, Richard

    2000-01-01

    application and technological challenges that remain. Next we present the technology roadmaps that were created at the workshop, summarizing the status of various mechanisms that are currently under development and forecasting when various advances are likely to occur within the next one-to-three-year time span. Then we identify issues that were raised at the workshop that might hinder technology development or that might impede integration into NGI applications. We also report some specific guidelines that were offered at the workshop to enable application developers to integrate and effectively use emerging NGI technology building blocks. Finally, we describe NREN activities to incorporate emerging technologies into NASA applications. These activities include support for other NASA High-Performance Computing and Communications Program areas such as IPG (Information Power Grid), support for NASA science enterprises such as Earth science and Mars program prototyping activities, support for satellite/terrestrial networking applications such as the TransAtlantic and TransPacific demonstrations and the Interplanetary Internet, support for NASA telemedicine applications such as the Virtual Collaborative Clinic, and participation in NGI advanced technology testbed initiatives such as the QBone and the NTON/Supernet. For each activity we highlight the primary technological challenge that is associated with it.

  12. The role of Spaces and Occasions in the Transformation of Information Technologies

    DEFF Research Database (Denmark)

    Clausen, Christian; Koch, Christian

    1999-01-01

    The article adopts the view that technological change is a social process involving negotiations of a network of players. It aims at informing management of technology by identifying occasions and spaces where IT can be adressed and changed. the focus is on Enterprise Resource Planning systems....

  13. Information Diffusion in Facebook-Like Social Networks Under Information Overload

    Science.gov (United States)

    Li, Pei; Xing, Kai; Wang, Dapeng; Zhang, Xin; Wang, Hui

    2013-07-01

    Research on social networks has received remarkable attention, since many people use social networks to broadcast information and stay connected with their friends. However, due to the information overload in social networks, it becomes increasingly difficult for users to find useful information. This paper takes Facebook-like social networks into account, and models the process of information diffusion under information overload. The term view scope is introduced to model the user information-processing capability under information overload, and the average number of times a message appears in view scopes after it is generated is proposed to characterize the information diffusion efficiency. Through theoretical analysis, we find that factors such as network structure and view scope number have no impact on the information diffusion efficiency, which is a surprising result. To verify the results, we conduct simulations and provide the simulation results, which are consistent with the theoretical analysis results perfectly.

  14. Use of information technology by academics in selected universities ...

    African Journals Online (AJOL)

    There was negligible use of networking and Internet. Major obstacles to effective use of information technology include lack of access to IT, inadequate skills in use of computers, and incessant power supply. The study concludes that, use of IT is a recent development in these universities, and recommends provision of ...

  15. Information Technology (IT) Ethics: Training and Awareness Materials for the Department of the Navy

    Science.gov (United States)

    2002-06-01

    people in DoD. Although every effort is taken to prevent it, the fact remains that computers and information technology create ethical issues that...illegal activity of this type takes place. 3. Collection, Stewardship, and Use of Information In this era of computer networks and the Internet ...NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS Approved for public release; distribution is unlimited INFORMATION TECHNOLOGY (IT) ETHICS

  16. Information flow analysis of interactome networks.

    Directory of Open Access Journals (Sweden)

    Patrycja Vasilyev Missiuro

    2009-04-01

    Full Text Available Recent studies of cellular networks have revealed modular organizations of genes and proteins. For example, in interactome networks, a module refers to a group of interacting proteins that form molecular complexes and/or biochemical pathways and together mediate a biological process. However, it is still poorly understood how biological information is transmitted between different modules. We have developed information flow analysis, a new computational approach that identifies proteins central to the transmission of biological information throughout the network. In the information flow analysis, we represent an interactome network as an electrical circuit, where interactions are modeled as resistors and proteins as interconnecting junctions. Construing the propagation of biological signals as flow of electrical current, our method calculates an information flow score for every protein. Unlike previous metrics of network centrality such as degree or betweenness that only consider topological features, our approach incorporates confidence scores of protein-protein interactions and automatically considers all possible paths in a network when evaluating the importance of each protein. We apply our method to the interactome networks of Saccharomyces cerevisiae and Caenorhabditis elegans. We find that the likelihood of observing lethality and pleiotropy when a protein is eliminated is positively correlated with the protein's information flow score. Even among proteins of low degree or low betweenness, high information scores serve as a strong predictor of loss-of-function lethality or pleiotropy. The correlation between information flow scores and phenotypes supports our hypothesis that the proteins of high information flow reside in central positions in interactome networks. We also show that the ranks of information flow scores are more consistent than that of betweenness when a large amount of noisy data is added to an interactome. Finally, we

  17. DOE waste information network: Data management and communications

    International Nuclear Information System (INIS)

    Fore, C.S.

    1986-01-01

    The U.S. Department of Energy's Waste Information Network (WIN) is an integral part of DOE's Hazardous Waste Remedial Actions Program. WIN has played an active role in the national program's mission to identify the magnitude and nature of existing DOE hazardous chemical and mixed radioactive waste streams and inventories and to provide a mechanism for disseminating pertinent information on technology activities. The information systems activity is structured into three key areas: data base development, data analysis, and data dissemination. As a result of this effort, several key data bases have been developed. Data dissemination is important to the use and management of the diversity of information and communication features developed by the program

  18. A Real-Time Construction Safety Monitoring System for Hazardous Gas Integrating Wireless Sensor Network and Building Information Modeling Technologies.

    Science.gov (United States)

    Cheung, Weng-Fong; Lin, Tzu-Hsuan; Lin, Yu-Cheng

    2018-02-02

    In recent years, many studies have focused on the application of advanced technology as a way to improve management of construction safety management. A Wireless Sensor Network (WSN), one of the key technologies in Internet of Things (IoT) development, enables objects and devices to sense and communicate environmental conditions; Building Information Modeling (BIM), a revolutionary technology in construction, integrates database and geometry into a digital model which provides a visualized way in all construction lifecycle management. This paper integrates BIM and WSN into a unique system which enables the construction site to visually monitor the safety status via a spatial, colored interface and remove any hazardous gas automatically. Many wireless sensor nodes were placed on an underground construction site and to collect hazardous gas level and environmental condition (temperature and humidity) data, and in any region where an abnormal status is detected, the BIM model will alert the region and an alarm and ventilator on site will start automatically for warning and removing the hazard. The proposed system can greatly enhance the efficiency in construction safety management and provide an important reference information in rescue tasks. Finally, a case study demonstrates the applicability of the proposed system and the practical benefits, limitations, conclusions, and suggestions are summarized for further applications.

  19. Mobile infostation network technology

    Science.gov (United States)

    Rajappan, Gowri; Acharya, Joydeep; Liu, Hongbo; Mandayam, Narayan; Seskar, Ivan; Yates, Roy

    2006-05-01

    Inefficient use of network resources on the battlefield is a serious liability: if an asset communicates with the network command for data-a terrain map, for instance-it ties up the end-to-end network resources. When many such assets contend for data simultaneously, traffic is limited by the slowest link along the path from the network command to the asset. A better approach is for a local server, known as an infostation, to download data on an anticipated-need basis when the network load is low. The infostation can then dump data when needed to the assets over a high-speed wireless connection. The infostation serves the local assets over an OFDM-based wireless data link that has MIMO enhancements for high data rate and robustness. We aim for data rate in excess of 100 Mbps, spectral efficiency in excess of 5 bits/sec/Hz, and robustness to poor channel conditions and jammers. We propose an adaptive physical layer that determines power levels, modulation schemes, and the MIMO enhancements to use based on the channel state and the level of interference in the system. We also incorporate the idea of superuser: a user who is allowed preferential use of the high data rate link. We propose a MAC that allows for this priority-based bandwidth allocation scheme. The proposed infostation MAC is integrated tightly with the physical layer through a cross-layer design. We call the proposed infostation PHY, MAC, and network technology, collectively, as the Mobile Infostation Network Technology (MINT).

  20. Blockchain in government : Benefits and implications of distributed ledger technology for information sharing

    NARCIS (Netherlands)

    Ølnes, Svein; Ubacht, J.; Janssen, M.F.W.H.A.

    2017-01-01

    Blockchain refers to a range of general purpose technologies to exchange information and transact digital assets in distributed networks. The core question addressed in this paper is whether blockchain technology will lead to innovation and transformation of governmental processes. To address

  1. Information spread of emergency events: path searching on social networks.

    Science.gov (United States)

    Dai, Weihui; Hu, Hongzhi; Wu, Tunan; Dai, Yonghui

    2014-01-01

    Emergency has attracted global attentions of government and the public, and it will easily trigger a series of serious social problems if it is not supervised effectively in the dissemination process. In the Internet world, people communicate with each other and form various virtual communities based on social networks, which lead to a complex and fast information spread pattern of emergency events. This paper collects Internet data based on data acquisition and topic detection technology, analyzes the process of information spread on social networks, describes the diffusions and impacts of that information from the perspective of random graph, and finally seeks the key paths through an improved IBF algorithm. Application cases have shown that this algorithm can search the shortest spread paths efficiently, which may help us to guide and control the information dissemination of emergency events on early warning.

  2. Information Spread of Emergency Events: Path Searching on Social Networks

    Directory of Open Access Journals (Sweden)

    Weihui Dai

    2014-01-01

    Full Text Available Emergency has attracted global attentions of government and the public, and it will easily trigger a series of serious social problems if it is not supervised effectively in the dissemination process. In the Internet world, people communicate with each other and form various virtual communities based on social networks, which lead to a complex and fast information spread pattern of emergency events. This paper collects Internet data based on data acquisition and topic detection technology, analyzes the process of information spread on social networks, describes the diffusions and impacts of that information from the perspective of random graph, and finally seeks the key paths through an improved IBF algorithm. Application cases have shown that this algorithm can search the shortest spread paths efficiently, which may help us to guide and control the information dissemination of emergency events on early warning.

  3. Key Health Information Technologies and Related Issues for Iran: A Qualitative Study.

    Science.gov (United States)

    Hemmat, Morteza; Ayatollahi, Haleh; Maleki, Mohammadreza; Saghafi, Fatemeh

    2018-01-01

    Planning for the future of Health Information Technology (HIT) requires applying a systematic approach when conducting foresight studies. The aim of this study was to identify key health information technologies and related issues for Iran until 2025. This was a qualitative study and the participants included experts and policy makers in the field of health information technology. In-depth semi-structured interviews were conducted and data were analyzed by using framework analysis and MAXQDA software. The findings revealed that the development of national health information network, electronic health records, patient health records, a cloud-based service center, interoperability standards, patient monitoring technologies, telehealth, mhealth, clinical decision support systems, health information technology and mhealth infrastructure were found to be the key technologies for the future. These technologies could influence the economic, organizational and individual levels. To achieve them, the economic and organizational obstacles need to be overcome. In this study, a number of key technologies and related issues were identified. This approach can help to focus on the most important technologies in the future and to priorities these technologies for better resource allocation and policy making.

  4. Final Report on the Proposal to Provide Asian Science and Technology Information

    Energy Technology Data Exchange (ETDEWEB)

    Kahaner, David K. [Asian Technology Information Program

    2003-07-23

    The Asian Technology Information Program (ATIP) conducted a seven-month Asian science and technology information program for the Office:of Energy Research (ER), U.S: Department of Energy (DOE.) The seven-month program consists of 1) monitoring, analyzing, and dissemiuating science and technology trends and developments associated with Asian high performance computing and communications (HPC), networking, and associated topics, 2) access to ATIP's annual series of Asian S&T reports for ER and HPC related personnel and, 3) supporting DOE and ER designated visits to Asia to study and assess Asian HPC.

  5. The Role Of New Information And Communcatıon Technologıes In The Performance Of Publıc Relatıons (Case Study: Electronıc Payment Card Network ""Shaparak"")"

    OpenAIRE

    Vosoghpour, Farkhondeh; Jafari, Ali

    2016-01-01

    The main objective of this study is the role of new information and communication technologies in the performance of public relations (case study of Shaparak network). This survey method is scrolling and measuring tool is a questionnaire. The statistical society of present research is shaparak’s staffs that are 90 peoples based on Statistics. Sampling in this study were all counting. The results showed that the use of new information technologies and communication and information ...

  6. Technology Information Center

    International Nuclear Information System (INIS)

    Emerson, E.L.; Shepherd, E.W.; Minor, E.E.

    1980-01-01

    A Transportation Technology Center (TTC) has been established at Sandia to address the transportation of nuclear waste and spent fuel. The Technology Information Center (TIC) acts as TTC's clearing house for nuclear material transportation information. TIC's activities are divided into three activities: public information, policy information, and technical information. Some of the uses of TIC's activities are briefly outlined

  7. Multimedia Information Networks in Social Media

    Science.gov (United States)

    Cao, Liangliang; Qi, Guojun; Tsai, Shen-Fu; Tsai, Min-Hsuan; Pozo, Andrey Del; Huang, Thomas S.; Zhang, Xuemei; Lim, Suk Hwan

    The popularity of personal digital cameras and online photo/video sharing community has lead to an explosion of multimedia information. Unlike traditional multimedia data, many new multimedia datasets are organized in a structural way, incorporating rich information such as semantic ontology, social interaction, community media, geographical maps, in addition to the multimedia contents by themselves. Studies of such structured multimedia data have resulted in a new research area, which is referred to as Multimedia Information Networks. Multimedia information networks are closely related to social networks, but especially focus on understanding the topics and semantics of the multimedia files in the context of network structure. This chapter reviews different categories of recent systems related to multimedia information networks, summarizes the popular inference methods used in recent works, and discusses the applications related to multimedia information networks. We also discuss a wide range of topics including public datasets, related industrial systems, and potential future research directions in this field.

  8. Handbook of social network technologies and applications

    CERN Document Server

    Furht, Borko

    2010-01-01

    Social networking is a concept that has existed for a long time; however, with the explosion of the Internet, social networking has become a tool for people to connect and communicate in ways that were impossible in the past. The recent development of Web 2.0 has provided many new applications, such as Myspace, Facebook, and LinkedIn. The purpose of ""Handbook of Social Networks: Technologies and Applications"" is to provide comprehensive guidelines on the current and future trends in social network technologies and applications in the field of Web-based Social Networks. This handbook includes

  9. System for prediction of environmental emergency dose information network system

    International Nuclear Information System (INIS)

    Misawa, Makoto; Nagamori, Fumio

    2009-01-01

    In cases when an accident happens to arise with some risk for emission of a large amount radioactivity from the nuclear facilities, the environmental emergency due to this accident should be predicted rapidly and be informed immediately. The SPEEDI network system for such purpose was completed and now operated by Nuclear Safety Technology Center (NUSTEC) commissioned to do by Ministry of Education, Culture, Sports, Science and Technology, Japan. Fujitsu has been contributing to this project by developing the principal parts of the network performance, by introducing necessary servers, and also by keeping the network in good condition, such as with construction of the system followed by continuous operation and maintenance of the system. Real-time prediction of atmospheric diffusion of radionuclides for nuclear accidents in the world is now available with experimental verification for the real-time emergency response system. Improvement of worldwide version of the SPEEDI network system, accidental discharge of radionuclides with the function of simultaneous prediction for multiple domains and its evaluation is possible. (S. Ohno)

  10. How Did the Information Flow in the #AlphaGo Hashtag Network? A Social Network Analysis of the Large-Scale Information Network on Twitter.

    Science.gov (United States)

    Kim, Jinyoung

    2017-12-01

    As it becomes common for Internet users to use hashtags when posting and searching information on social media, it is important to understand who builds a hashtag network and how information is circulated within the network. This article focused on unlocking the potential of the #AlphaGo hashtag network by addressing the following questions. First, the current study examined whether traditional opinion leadership (i.e., the influentials hypothesis) or grassroot participation by the public (i.e., the interpersonal hypothesis) drove dissemination of information in the hashtag network. Second, several unique patterns of information distribution by key users were identified. Finally, the association between attributes of key users who exerted great influence on information distribution (i.e., the number of followers and follows) and their central status in the network was tested. To answer the proffered research questions, a social network analysis was conducted using a large-scale hashtag network data set from Twitter (n = 21,870). The results showed that the leading actors in the network were actively receiving information from their followers rather than serving as intermediaries between the original information sources and the public. Moreover, the leading actors played several roles (i.e., conversation starters, influencers, and active engagers) in the network. Furthermore, the number of their follows and followers were significantly associated with their central status in the hashtag network. Based on the results, the current research explained how the information was exchanged in the hashtag network by proposing the reciprocal model of information flow.

  11. An information technology enabled sustainability test-bed (ITEST) for occupancy detection through an environmental sensing network

    Energy Technology Data Exchange (ETDEWEB)

    Dong, Bing; Lam, Khee Poh; Zhang, Rui; Chiou, Yun-Shang [Center for Building Performance and Diagnostics, Carnegie Mellon University, Pittsburgh, PA 15213 (United States); Andrews, Burton; Hoeynck, Michael; Benitez, Diego [Research and Technology Center, Robert BOSCH LLC, Pittsburgh, PA 15212 (United States)

    2010-07-15

    This paper describes a large-scale wireless and wired environmental sensor network test-bed and its application to occupancy detection in an open-plan office building. Detection of occupant presence has been used extensively in built environments for applications such as demand-controlled ventilation and security; however, the ability to discern the actual number of people in a room is beyond the scope of current sensing techniques. To address this problem, a complex sensor network is deployed in the Robert L. Preger Intelligent Workplace comprising a wireless ambient-sensing system, a wired carbon dioxide sensing system, and a wired indoor air quality sensing system. A wired camera network is implemented as well for establishing true occupancy levels to be used as ground truth information for deriving algorithmic relationships with the environment conditions. To our knowledge, this extensive and diverse ambient-sensing infrastructure of the ITEST setup as well as the continuous data-collection capability is unprecedented. Final results indicate that there are significant correlations between measured environmental conditions and occupancy status. An average of 73% accuracy on the occupancy number detection was achieved by Hidden Markov Models during testing periods. This paper serves as an exploration to the research of ITEST for occupancy detection in offices. In addition, its utility extends to a wide variety of other building technology research areas such as human-centered environmental control, security, energy efficient and sustainable green buildings. (author)

  12. The Effects of Risk and Size of Company on Business Performance in Information Technology Outsourcing

    Science.gov (United States)

    Balogun, Shereef Adewale

    2013-01-01

    Information technology (IT) outsourcing is a practical way to transfer information technology by industries of different firms. The problem occurs when companies outsource services to domestic and international data centers as network security issues arise. This leads to competition between companies causing the size of the company to become more…

  13. Information Technology Systems Vulnerabilities Detecting based on Network’s Traffic Analysis

    Directory of Open Access Journals (Sweden)

    Dmitry Anatolevich Melnikov

    2013-12-01

    Full Text Available This paper proposes traffic analysis procedure that is very effective and sometimes single countermeasure on counteracting of network attacks and information leakage channels (hidden control channels. Traffic analysis envisages certain measures to control the security of the Russian Federation information technology infrastructure and, most importantly, to establish the reasons of the occurred and predictable computer incidents.

  14. Teaching with technology: automatically receiving information from the internet and web.

    Science.gov (United States)

    Wink, Diane M

    2010-01-01

    In this bimonthly series, the author examines how nurse educators can use the Internet and Web-based computer technologies such as search, communication, and collaborative writing tools, social networking and social bookmarking sites, virtual worlds, and Web-based teaching and learning programs. This article presents information and tools related to automatically receiving information from the Internet and Web.

  15. Health information technology needs help from primary care researchers.

    Science.gov (United States)

    Krist, Alex H; Green, Lee A; Phillips, Robert L; Beasley, John W; DeVoe, Jennifer E; Klinkman, Michael S; Hughes, John; Puro, Jon; Fox, Chester H; Burdick, Tim

    2015-01-01

    While health information technology (HIT) efforts are beginning to yield measurable clinical benefits, more is needed to meet the needs of patients and clinicians. Primary care researchers are uniquely positioned to inform the evidence-based design and use of technology. Research strategies to ensure success include engaging patient and clinician stakeholders, working with existing practice-based research networks, and using established methods from other fields such as human factors engineering and implementation science. Policies are needed to help support primary care researchers in evaluating and implementing HIT into everyday practice, including expanded research funding, strengthened partnerships with vendors, open access to information systems, and support for the Primary Care Extension Program. Through these efforts, the goal of improved outcomes through HIT can be achieved. © Copyright 2015 by the American Board of Family Medicine.

  16. Research on the Application of Wireless Network in Collecting Road Traffic Information

    Institute of Scientific and Technical Information of China (English)

    DU Hui-jiang

    2015-01-01

    Due to the characteristics of variability and dispersion in traffic information, to get the reliable real-time traffic information has been a bottleneck in the development of intelligent transportation systems. However, with the development of wireless network technology and mobile Internet, the mobile phones are rapidly developed and more popular, so it is possible to get road traffic information by locating the mobile phones in vehicles. The system structure for the road traffic information collection is designed based on wireless network and mobile phones in vehicles, and the vehicle recognition and its information computation methods are given and discussed. Also the simulation is done for vehicle recognition and computation based on fuzzy cluster analysis method and the results are obtained and analyzed.

  17. Protecting information on local area networks

    CERN Document Server

    Schweitzer, James A

    1988-01-01

    Protecting Information on Local Area Networks presents the various types of networks and explains why they are being expanded at such a rapid pace. This book considers how management can gain control of the valuable network-services information resources generally available.Organized into three parts encompassing seven chapters, this book begins with an overview of the various networks and their operations. This text then discusses the appropriate management actions to ensure some control over the use of networks and the business information resource. Other chapters consider the management rat

  18. The local exchange network in the information age - The need for new policy

    Energy Technology Data Exchange (ETDEWEB)

    Fons, J.P. (Ausley, McMullen, McGehee, Carothers and Proctor, Tallahassee, FL (USA))

    1990-01-18

    This article is an analysis of a conventional belief that the local exchange telephone networks are bottleneck monopolies. It also examines the alleged bases for excluding the local exchange telephone companies from participating directly in existing and developing technologies and markets other than those of a telephone service, or dial-tone. The author concludes that adherence to the current policy in the face of a demand for information age technology and services, and the availability of competing systems, will condemn the local exchange networks to the technological junk heap - and at the same time deprive the public of some of its best opportunities for new and enhanced services.

  19. Shifts in the architecture of the Nationwide Health Information Network.

    Science.gov (United States)

    Lenert, Leslie; Sundwall, David; Lenert, Michael Edward

    2012-01-01

    In the midst of a US $30 billion USD investment in the Nationwide Health Information Network (NwHIN) and electronic health records systems, a significant change in the architecture of the NwHIN is taking place. Prior to 2010, the focus of information exchange in the NwHIN was the Regional Health Information Organization (RHIO). Since 2010, the Office of the National Coordinator (ONC) has been sponsoring policies that promote an internet-like architecture that encourages point to-point information exchange and private health information exchange networks. The net effect of these activities is to undercut the limited business model for RHIOs, decreasing the likelihood of their success, while making the NwHIN dependent on nascent technologies for community level functions such as record locator services. These changes may impact the health of patients and communities. Independent, scientifically focused debate is needed on the wisdom of ONC's proposed changes in its strategy for the NwHIN.

  20. Network Gateway Technology: The Issue of Redundancy towards ...

    African Journals Online (AJOL)

    Everyone connected to the Internet is concerned about two basic things: the availability of network services and the speed of the network. Network gateway redundancy technology falls within these categories and happens to be one of the newest technologies which only few companies, such as mobile companies and ...

  1. MODERN REALITIES AND TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES DEVELOPMENT IN EDUCATION

    Directory of Open Access Journals (Sweden)

    Viacheslav V. Osadchyi

    2015-09-01

    Full Text Available The article analyzes the documents of the World Summit regarding the information national support, investigation of education network Eurydice by determining the utilization degree of the use of computer informational technologies (CIT in teaching and learning in schools in Europe, Recommendations of the European Parliament and of the Council on key competences for lifelong learning, other publications and documents. The leading countries experience for the informational technologies implementation in the educational process is described: the adoption of CIT competence as a means of formation of other competencies. In addition implementation and financing of the state programs on informatization of education, the extensive use of cloud-based technologies, electronic and distance learning, repository of electronic resources establishment, and development of assessment models status of informatization of the institution. The basic tendencies of information technologies development in education are detailed.

  2. Integrating Records Management (RM) and Information Technology (IT)

    Energy Technology Data Exchange (ETDEWEB)

    NUSBAUM,ANNA W.; CUSIMANO,LINDA J.

    2000-03-02

    Records Managers are continually exploring ways to integrate their services with those offered by Information Technology-related professions to capitalize on the advantages of providing customers a total solution to managing their records and information. In this day and age, where technology abounds, there often exists a fear on the part of records management that this integration will result in a loss of identity and the focus of one's own mission - a fear that records management may become subordinated to the fast-paced technology fields. They need to remember there is strength in numbers and it benefits RM, IT, and the customer when they can bring together the unique offerings each possess to reach synergy for the benefit of all the corporations. Records Managers, need to continually strive to move ''outside the records management box'', network, expand their knowledge, and influence the IT disciplines to incorporate the concept of ''management'' into their customer solutions.

  3. Survey of Promising Technologies for 5G Networks

    OpenAIRE

    Le, Nam Tuan; Hossain, Mohammad Arif; Islam, Amirul; Kim, Do-yun; Choi, Young-June; Jang, Yeong Min

    2016-01-01

    As an enhancement of cellular networks, the future-generation 5G network can be considered an ultra-high-speed technology. The proposed 5G network might include all types of advanced dominant technologies to provide remarkable services. Consequently, new architectures and service management schemes for different applications of the emerging technologies need to be recommended to solve issues related to data traffic capacity, high data rate, and reliability for ensuring QoS. Cloud computing, I...

  4. Information Technology Resources Assessment

    Energy Technology Data Exchange (ETDEWEB)

    1993-04-01

    The Information Technology Resources Assessment (ITRA) is being published as a companion document to the Department of Energy (DOE) FY 1994--FY 1998 Information Resources Management Long-Range Plan. This document represents a collaborative effort between the Office of Information Resources Management and the Office of Energy Research that was undertaken to achieve, in part, the Technology Strategic Objective of IRM Vision 21. An integral part of this objective, technology forecasting provides an understanding of the information technology horizon and presents a perspective and focus on technologies of particular interest to DOE program activities. Specifically, this document provides site planners with an overview of the status and use of new information technology for their planning consideration.

  5. INFORMATION TECHNOLOGY, INTERNET, AND MARKETING

    OpenAIRE

    Mihane Berisha-Namani

    2013-01-01

    Information technology developed very fast, and today's marketing activities are not possible without the help of information technology. Furthermore, it is difficult to think of a policy domain not affected by usage of information technology. Information technology is making possible and creating connections between businesses and organizations. The implications of information technology usage in marketing activities are profound too. Using information technology, companies possess the poten...

  6. Future Information Technology

    CERN Document Server

    Stojmenovic, Ivan; Choi, Min; Xhafa, Fatos; FutureTech 2013

    2014-01-01

    Future technology information technology stands for all of continuously evolving and converging information technologies, including digital convergence, multimedia convergence, intelligent applications, embedded systems, mobile and wireless communications, bio-inspired computing, grid and cloud computing, semantic web, user experience and HCI, security and trust computing and so on, for satisfying our ever-changing needs. In past twenty five years or so, Information Technology (IT) influenced and changed every aspect of our lives and our cultures. These proceedings foster the dissemination of state-of-the-art research in all future IT areas, including their models, services, and novel applications associated with their utilization.

  7. Information cascade on networks

    Science.gov (United States)

    Hisakado, Masato; Mori, Shintaro

    2016-05-01

    In this paper, we discuss a voting model by considering three different kinds of networks: a random graph, the Barabási-Albert (BA) model, and a fitness model. A voting model represents the way in which public perceptions are conveyed to voters. Our voting model is constructed by using two types of voters-herders and independents-and two candidates. Independents conduct voting based on their fundamental values; on the other hand, herders base their voting on the number of previous votes. Hence, herders vote for the majority candidates and obtain information relating to previous votes from their networks. We discuss the difference between the phases on which the networks depend. Two kinds of phase transitions, an information cascade transition and a super-normal transition, were identified. The first of these is a transition between a state in which most voters make the correct choices and a state in which most of them are wrong. The second is a transition of convergence speed. The information cascade transition prevails when herder effects are stronger than the super-normal transition. In the BA and fitness models, the critical point of the information cascade transition is the same as that of the random network model. However, the critical point of the super-normal transition disappears when these two models are used. In conclusion, the influence of networks is shown to only affect the convergence speed and not the information cascade transition. We are therefore able to conclude that the influence of hubs on voters' perceptions is limited.

  8. Information Technology and the Experience of Disorder

    Directory of Open Access Journals (Sweden)

    Jonathan Paul Marshall

    2012-11-01

    Full Text Available Information and communication technology (ICT is a prime modality of ordering in the contemporary world. However, order creates and needs its own disorder, and ICT has a long record of failing to deliver on its promises and creating the experience of disorder. This paper looks at the myths of ordering around ICT and then looks at people's experiences of ICT disorder. In particular it looks at three factors: the informal networks that develop because of problems with ICT and with ICT help; the failure of management and communication in hierarchy and finally the failure of requirements engineering to live up to its promise. This focus on disorder may suggest a new way of approaching the so-called ‘Information Society’.

  9. A survey on the wireless sensor network technology

    International Nuclear Information System (INIS)

    Kim, Jae Hee; Jun, Hyeong Seop; Lee, Jae Cheol; Choi, Yoo Rak

    2007-12-01

    Wireless sensor technology is required in the safety inspection for safety-critical unit of nuclear power plant. This report describes wireless sensor technology related with the project named 'Development of a remote care system of NPP components based on the network and safety database'. This report includes contents of methodology and status of sensor network construction, status of zigbee sensor network, problem of security and sensor battery. Energy harvesting technology will be mentioned on the next report

  10. The construction of a public key infrastructure for healthcare information networks in Japan.

    Science.gov (United States)

    Sakamoto, N

    2001-01-01

    The digital signature is a key technology in the forthcoming Internet society for electronic healthcare as well as for electronic commerce. Efficient exchanges of authorized information with a digital signature in healthcare information networks require a construction of a public key infrastructure (PKI). In order to introduce a PKI to healthcare information networks in Japan, we proposed a development of a user authentication system based on a PKI for user management, user authentication and privilege management of healthcare information systems. In this paper, we describe the design of the user authentication system and its implementation. The user authentication system provides a certification authority service and a privilege management service while it is comprised of a user authentication client and user authentication serves. It is designed on a basis of an X.509 PKI and is implemented with using OpenSSL and OpenLDAP. It was incorporated into the financial information management system for the national university hospitals and has been successfully working for about one year. The hospitals plan to use it as a user authentication method for their whole healthcare information systems. One implementation of the system is free to the national university hospitals with permission of the Japanese Ministry of Education, Culture, Sports, Science and Technology. Another implementation is open to the other healthcare institutes by support of the Medical Information System Development Center (MEDIS-DC). We are moving forward to a nation-wide construction of a PKI for healthcare information networks based on it.

  11. Organizing for Networked Information Technologies - Cases in Process Integration and Transformation

    DEFF Research Database (Denmark)

    The book provides seven practical examples of how Danish companies implemented new information technology in order to transform their internal and external business processes. The purpose is to share some of the companies' concerns and hopes during this implementation process, with each case repo...

  12. Networks and informal contract law

    NARCIS (Netherlands)

    Tjong Tjin Tai, Eric; Brownsword, Roger; van Gestel, Rob A.J.; Micklitz, Hans-W.

    2017-01-01

    It is often argued that formal contract law cannot treat networks correctly. An analysis of networks in an informal contract law system shows that informal contract law is no panacea. Remaining problems require a different approach to legal regulation and contract practice.

  13. Autonomous vision networking: miniature wireless sensor networks with imaging technology

    Science.gov (United States)

    Messinger, Gioia; Goldberg, Giora

    2006-09-01

    The recent emergence of integrated PicoRadio technology, the rise of low power, low cost, System-On-Chip (SOC) CMOS imagers, coupled with the fast evolution of networking protocols and digital signal processing (DSP), created a unique opportunity to achieve the goal of deploying large-scale, low cost, intelligent, ultra-low power distributed wireless sensor networks for the visualization of the environment. Of all sensors, vision is the most desired, but its applications in distributed sensor networks have been elusive so far. Not any more. The practicality and viability of ultra-low power vision networking has been proven and its applications are countless, from security, and chemical analysis to industrial monitoring, asset tracking and visual recognition, vision networking represents a truly disruptive technology applicable to many industries. The presentation discusses some of the critical components and technologies necessary to make these networks and products affordable and ubiquitous - specifically PicoRadios, CMOS imagers, imaging DSP, networking and overall wireless sensor network (WSN) system concepts. The paradigm shift, from large, centralized and expensive sensor platforms, to small, low cost, distributed, sensor networks, is possible due to the emergence and convergence of a few innovative technologies. Avaak has developed a vision network that is aided by other sensors such as motion, acoustic and magnetic, and plans to deploy it for use in military and commercial applications. In comparison to other sensors, imagers produce large data files that require pre-processing and a certain level of compression before these are transmitted to a network server, in order to minimize the load on the network. Some of the most innovative chemical detectors currently in development are based on sensors that change color or pattern in the presence of the desired analytes. These changes are easily recorded and analyzed by a CMOS imager and an on-board DSP processor

  14. Network speech systems technology program

    Science.gov (United States)

    Weinstein, C. J.

    1981-09-01

    This report documents work performed during FY 1981 on the DCA-sponsored Network Speech Systems Technology Program. The two areas of work reported are: (1) communication system studies in support of the evolving Defense Switched Network (DSN) and (2) design and implementation of satellite/terrestrial interfaces for the Experimental Integrated Switched Network (EISN). The system studies focus on the development and evaluation of economical and endurable network routing procedures. Satellite/terrestrial interface development includes circuit-switched and packet-switched connections to the experimental wideband satellite network. Efforts in planning and coordination of EISN experiments are reported in detail in a separate EISN Experiment Plan.

  15. Report of 'Survey on Asian environmental information networks'; 'Asia kankyo joho network chosa' ni kansuru hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-03-01

    Information systems, mainly aided by computers, are becoming increasingly important, contributing to development of wide areas of societies and economics, to begin with. However, few developing countries have established sufficient information systems, in spite of their strong desires to do so, which will further widen the gap between them and advanced countries, where these systems are acceleratedly advancing. Given these situations, Center of International Cooperation for Computerization (CICC) has been implementing various projects for providing assistance to and cooperation with oversea countries which are trying to develop information systems. This report summarizes the project, which CICC has been commissioned by Optoelectronic Industry and Technology Development Association as part of the cooperation programs, for establishing the Asian environmental information networks. It outlines the research cooperation project for the environmental networks, results of the 4 on-the-spot surveys, 2 occasions for inviting researchers to Japan, and construction of the internet and Asian environmental information network systems. (NEDO)

  16. Information technology acceptance in health information management.

    Science.gov (United States)

    Abdekhoda, M; Ahmadi, M; Dehnad, A; Hosseini, A F

    2014-01-01

    User acceptance of information technology has been a significant area of research for more than two decades in the field of information technology. This study assessed the acceptance of information technology in the context of Health Information Management (HIM) by utilizing Technology Acceptance Model (TAM) which was modified and applied to assess user acceptance of health information technology as well as viability of TAM as a research construct in the context of HIM. This was a descriptive- analytical study in which a sample of 187 personnel from a population of 363 personnel, working in medical records departments of hospitals affiliated to Tehran University of Medical Sciences, was selected. Users' perception of applying information technology was studied by a researcher-developed questionnaire. Collected data were analyzed by SPSS software (version16) using descriptive statistics and regression analysis. The results suggest that TAM is a useful construct to assess user acceptance of information technology in the context of HIM. The findings also evidenced the perceived ease of use (PEOU) and perceived usefulness (PE) were positively associated with favorable users' attitudes towards HIM. PU was relatively more associated (r= 0.22, p = 0.05) than PEOU (r = 0.014, p = 0.05) with favorable user attitudes towards HIM. Users' perception of usefulness and ease of use are important determinants providing the incentive for users to accept information technologies when the application of a successful HIM system is attempted. The findings of the present study suggest that user acceptance is a key element and should subsequently be the major concern of health organizations and health policy makers.

  17. Information technology ethics

    DEFF Research Database (Denmark)

    Hongladarom, Soraj; Ess, Charles

    This book was the first publication to take a genuinely global approach to the diverse ethical issues evoked by Information and Communication Technologies and their possible resolutions. Readers will gain a greater appreciation for the problems and possibilities of genuinely global information...... ethics, which are urgently needed as information and communication technologies continue their exponential growth...

  18. European Conference on the Use of Modern Information and Communication Technologies

    CERN Document Server

    2014-01-01

    This proceeding present the outcome of the 6th. European Conference on the Use of Modern Information and Communication Technologies. The ECUMICT 2014 was hold in Gent in March 2014 and presented recent research, that has a close relationship with practical implementation of Security for mobile communications and data access Interface technology for mobile devices Application development for mobile devices Positioning and localization, asset tracking and tracing Design and applications of RFID systems Developments in the framework of IoT and M2M communications Design and applications of WSNs Embedded programming for WSNs New developments and applications of WPAN/WLAN standards Mobile multimedia systems Wireless telecommunication networks and mobile services Optimization techniques in wireless networks Developments in ad-hoc and mesh networks Applications of digital signal processing for mobile applications Applications of MEMs in WSNs

  19. Integrating neural network technology and noise analysis

    International Nuclear Information System (INIS)

    Uhrig, R.E.; Oak Ridge National Lab., TN

    1995-01-01

    The integrated use of neural network and noise analysis technologies offers advantages not available by the use of either technology alone. The application of neural network technology to noise analysis offers an opportunity to expand the scope of problems where noise analysis is useful and unique ways in which the integration of these technologies can be used productively. The two-sensor technique, in which the responses of two sensors to an unknown driving source are related, is used to demonstration such integration. The relationship between power spectral densities (PSDs) of accelerometer signals is derived theoretically using noise analysis to demonstrate its uniqueness. This relationship is modeled from experimental data using a neural network when the system is working properly, and the actual PSD of one sensor is compared with the PSD of that sensor predicted by the neural network using the PSD of the other sensor as an input. A significant deviation between the actual and predicted PSDs indicate that system is changing (i.e., failing). Experiments carried out on check values and bearings illustrate the usefulness of the methodology developed. (Author)

  20. Teaching Information Technology Law

    Science.gov (United States)

    Taylor, M. J.; Jones, R. P.; Haggerty, J.; Gresty, D.

    2009-01-01

    In this paper we discuss an approach to the teaching of information technology law to higher education computing students that attempts to prepare them for professional computing practice. As information technology has become ubiquitous its interactions with the law have become more numerous. Information technology practitioners, and in particular…

  1. Exploring the Use of information and communication technologies and social networks among university nursing faculty staff. An opinion survey

    Directory of Open Access Journals (Sweden)

    José Luis Fernández-Alemán

    2014-12-01

    Full Text Available Objective. This work sought to analyze the use of Information and Communication Technologies (ICTs and social networks among the university nursing faculty staff in Spain. Methodology. This was a descriptive, cross-sectional study using a questionnaire on ICT skills designed to comply with the research objective, which was evaluated by experts and which was subjected to exploratory analysis of principal components; the reliability of this instrument measured with Cronbach's alpha was 0.85. The information technology tool used to publish the questionnaire on line was Limesurvey. The sample comprised 165 professors from 25 Nursing Faculties and Schools from universities in Spain. Results. Seventy one percent of the total surveyed used internet services to look for information, 63% used the internet as a means for formation and learning, and 72% used it as a communication platform (e-mail and virtual platforms like Sakai and Moodle. Although 51% of the teaching staff surveyed had more than 120 students registered in their courses, hypothesis testing revealed that the number of students in class is not a determining factor for the teaching staff to have greater interest to update its knowledge in ICTs. Younger professors use new technologies more profusely and the most-valued advantage of using ICTs was quick access to information. Professors perceive that after the Bologna Declaration, which requires modifying their teaching-learning processes through the new teaching methodologies, a drop has been produced in their performance and that of their peers in their area of knowledge. Conclusion. The nursing teaching staff is making strong efforts to confront the new challenges posed by ICTs to train the professionals of the 21st century. It is fundamental to pay special attention to improving the university teaching staff's skills in managing ICTs, promoting the implementation of the knowledge acquired.

  2. Exploring the Use of information and communication technologies and social networks among university nursing faculty staff. An opinion survey.

    Science.gov (United States)

    Fernández-Alemán, José Luis; Sánchez García, Ana Belén; López Montesinos, María José; Marqués-Sánchez, Pilar; Bayón Darkistade, Enrique; Pérez Rivera, Francisco Javier

    2014-01-01

    This work sought to analyze the use of Information and Communication Technologies (ICTs) and social networks among the university nursing faculty staff in Spain. This was a descriptive, cross-sectional study using a questionnaire on ICT skills designed to comply with the research objective, which was evaluated by experts and which was subjected to exploratory analysis of principal components; the reliability of this instrument measured with Cronbach's alpha was 0.85. The information technology tool used to publish the questionnaire on line was Limesurvey. The sample comprised 165 professors from 25 Nursing Faculties and Schools from universities in Spain. Seventy one percent of the total surveyed used internet services to look for information, 63% used the internet as a means for formation and learning, and 72% used it as a communication platform (e-mail and virtual platforms like Sakai and Moodle). Although 51% of the teaching staff surveyed had more than 120 students registered in their courses, hypothesis testing revealed that the number of students in class is not a determining factor for the teaching staff to have greater interest to update its knowledge in ICTs. Younger professors use new technologies more profusely and the most-valued advantage of using ICTs was quick access to information. Professors perceive that after the Bologna Declaration, which requires modifying their teaching-learning processes through the new teaching methodologies, a drop has been produced in their performance and that of their peers in their area of knowledge. The nursing teaching staff is making strong efforts to confront the new challenges posed by ICTs to train the professionals of the 21st century. It is fundamental to pay special attention to improving the university teaching staff's skills in managing ICTs, promoting the implementation of the knowledge acquired.

  3. 2nd International Conference on Recent Advances in Information Technology

    CERN Document Server

    Mukhopadhyay, Sushanta

    2014-01-01

    The book is based on the research papers presented in Second International Conference on Recent Advances in Information Technology (RAIT 2014), held at Indian School of Mines, Dhanbad, India. It provides the latest developments in the area of information technology and covers a variety of topics, including Advanced Algorithm Design and Analysis, Algorithmic Graph Theory, Artificial Intelligence, Bioinformatics, Circuit Design Automation, Computational Biology, Computational Mathematics, Cryptology, Data Compression, Database Management System, Data Mining, E-Applications, Embedded System, Information and Network Security, Information Retrieval, Internet Computing, etc. The objective is to familiarize the reader with the latest scientific developments that are taking place in various fields and the latest sophisticated problem solving tools that are being developed to deal with the complex and intricate problems that are otherwise difficult to solve by the usual and traditional methods.

  4. Exploring network operations for data and information networks

    Science.gov (United States)

    Yao, Bing; Su, Jing; Ma, Fei; Wang, Xiaomin; Zhao, Xiyang; Yao, Ming

    2017-01-01

    Barabási and Albert, in 1999, formulated scale-free models based on some real networks: World-Wide Web, Internet, metabolic and protein networks, language or sexual networks. Scale-free networks not only appear around us, but also have high qualities in the world. As known, high quality information networks can transfer feasibly and efficiently data, clearly, their topological structures are very important for data safety. We build up network operations for constructing large scale of dynamic networks from smaller scale of network models having good property and high quality. We focus on the simplest operators to formulate complex operations, and are interesting on the closeness of operations to desired network properties.

  5. Networking Technologies for Future Home Networks Using 60 GHz Radio

    NARCIS (Netherlands)

    Wang, J.

    2010-01-01

    Networking technologies have been changing the life of people in their private residential space. With the arrival of high definition (HD) multimedia services and broadband communications into the living space, future home networks are expected to support high speed device-to-device connectivity

  6. A new information dimension of complex networks

    Energy Technology Data Exchange (ETDEWEB)

    Wei, Daijun [School of Computer and Information Science, Southwest University, Chongqing 400715 (China); School of Science, Hubei University for Nationalities, Enshi 445000 (China); Wei, Bo [School of Computer and Information Science, Southwest University, Chongqing 400715 (China); Hu, Yong [Institute of Business Intelligence and Knowledge Discovery, Guangdong University of Foreign Studies, Guangzhou 510006 (China); Zhang, Haixin [School of Computer and Information Science, Southwest University, Chongqing 400715 (China); Deng, Yong, E-mail: ydeng@swu.edu.cn [School of Computer and Information Science, Southwest University, Chongqing 400715 (China); School of Engineering, Vanderbilt University, TN 37235 (United States)

    2014-03-01

    Highlights: •The proposed measure is more practical than the classical information dimension. •The difference of information for box in the box-covering algorithm is considered. •Results indicate the measure can capture the fractal property of complex networks. -- Abstract: The fractal and self-similarity properties are revealed in many complex networks. The classical information dimension is an important method to study fractal and self-similarity properties of planar networks. However, it is not practical for real complex networks. In this Letter, a new information dimension of complex networks is proposed. The nodes number in each box is considered by using the box-covering algorithm of complex networks. The proposed method is applied to calculate the fractal dimensions of some real networks. Our results show that the proposed method is efficient when dealing with the fractal dimension problem of complex networks.

  7. A new information dimension of complex networks

    International Nuclear Information System (INIS)

    Wei, Daijun; Wei, Bo; Hu, Yong; Zhang, Haixin; Deng, Yong

    2014-01-01

    Highlights: •The proposed measure is more practical than the classical information dimension. •The difference of information for box in the box-covering algorithm is considered. •Results indicate the measure can capture the fractal property of complex networks. -- Abstract: The fractal and self-similarity properties are revealed in many complex networks. The classical information dimension is an important method to study fractal and self-similarity properties of planar networks. However, it is not practical for real complex networks. In this Letter, a new information dimension of complex networks is proposed. The nodes number in each box is considered by using the box-covering algorithm of complex networks. The proposed method is applied to calculate the fractal dimensions of some real networks. Our results show that the proposed method is efficient when dealing with the fractal dimension problem of complex networks.

  8. Network Centric Information Structure - Crisis Information Management

    National Research Council Canada - National Science Library

    Aarholt, Eldar; Berg, Olav

    2004-01-01

    This paper presents a generic Network Centric Information Structure (NCIS) that can be used by civilian, military and public sectors, and that supports information handling applied to crises management and emergency response...

  9. Network information provision to potential generators: Appendices

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    This Code of Practice (CoP) has been prepared to outline the standard of information that Distribution Network Operators (DNOs) should be required to produce in relation to the provision of network maps, schematic diagrams and specific network data. Network information from DNOs may be required by generators (and other customers) in order to assess the potential opportunities available for the connection of new generation plant. Seven Year Statements are published annually by the Transmission Licensees operating in Great Britain, i.e. The National Grid Company, Scottish Power and Scottish Hydro Electric, and contain all the network information relating to each transmission system, e.g. Generation Capacities, System Parameters and Plant Fault Levels. A similar arrangement for DNOs has been outlined in the Electricity Distribution Licence published by Ofgem. Under Condition 25 of the licence, 'The Long Term Development Statement', distribution licence holders are required to make available historic and planned network data. By providing sufficient network information, competition in generation will be improved. At the time of writing, any party interested in assessing distribution network information needs to make contact with the appropriate DNO, identifying the correct department and person. Written applications are then sent to that person, describing the type of network information that is required. Information required from embedded generators by DNOs is specified in detail in both of The Distribution Codes of England and Wales, and Scotland. However, there are no guidelines or details of network information to be provided by DNOs. This Code of Practise is designed to balance this situation and help DNOs, prospective generators and other applicants for information to achieve satisfaction by clarifying expectations. (Author)

  10. Fuzzy-rule-based Adaptive Resource Control for Information Sharing in P2P Networks

    Science.gov (United States)

    Wu, Zhengping; Wu, Hao

    With more and more peer-to-peer (P2P) technologies available for online collaboration and information sharing, people can launch more and more collaborative work in online social networks with friends, colleagues, and even strangers. Without face-to-face interactions, the question of who can be trusted and then share information with becomes a big concern of a user in these online social networks. This paper introduces an adaptive control service using fuzzy logic in preference definition for P2P information sharing control, and designs a novel decision-making mechanism using formal fuzzy rules and reasoning mechanisms adjusting P2P information sharing status following individual users' preferences. Applications of this adaptive control service into different information sharing environments show that this service can provide a convenient and accurate P2P information sharing control for individual users in P2P networks.

  11. Presenting a Framework for Evaluating and Prioritizing Risk of Information Technology Outsourcing: Perspective of Experts in Information Systems Design

    Directory of Open Access Journals (Sweden)

    abbas Keramati

    2012-06-01

    Full Text Available Information technology outsourcing projects have advantages including: reduced costs, improved service quality, creation of competitive advantage, etc. When these projects are being outsourced, lack of attention to their risks causes the lost of anticipated benefits and contributes to failure. As for the growing trend of information technology outsourcing projects in Iran, the purpose of this study is to identify the risks of information technology outsourcing projects, evaluate and prioritize them based on the perspective of experts in information systems design. For achieving these goals, key articles were reviewed and comprehensive list of 12 risk factors were identified. For prioritizing, a Fuzzy Analytical Network Process (F-ANP structure has been provided and the risk factors were laid in it. Then, by using a questionnaire, 13 experts' viewpoints were collected. The results show that the factor of "supplier" and the sub-factor of "Lack of skills of supplier in IT operations" are the most important factors for success and failure of information technology outsourcing projects in the perspective of experts in information systems design.

  12. Integration of Modern Information Technologies in the Field of Financial Accounting

    Directory of Open Access Journals (Sweden)

    Adrian LUPASC

    2011-11-01

    Full Text Available Financial accounting activities are currently influenced as many other important areas that characterize and surrounds the activities within each economic entity, the avalanche of modern information technologies, which are able to improve specific business processes and to ensure future business success. Approach analysis of the impact of new technologies on this field should be so as a starting point to identify the opportunities and the benefits they would bring to specific activities. Information and communication technologies are in use both at the individual level and at the organizational level with the flexibility of the increasingly high, using a huge volume of information that financial accounting with direct impact on all human activities. Basically, it has already made the passage to a new stage:the global network society, whose main features are digitizing and interconnectivity. In this sense, this paper has as its main objective of examining the impact of modern information technologies may have on the financial accounting domain and the identification and submission directions for their integration within organizations.

  13. Plans & Policies for Technology in Education: A Compendium. A Technology Leadership Network Special Report.

    Science.gov (United States)

    National School Boards Association, Alexandria, VA. Inst. for the Transfer of Technology to Education.

    This document shows how education leaders nationwide--many of them part of the National School Boards Association's 345-district Technology Leadership Network--have addressed technology-related policy issues such as copyright, purchasing, network/Internet use, and ethics as well as technology planning topics including staff development, classroom…

  14. Information networks and worker recruitment

    NARCIS (Netherlands)

    Schram, A.; Brandts, J.; Gërxhani, K.

    2007-01-01

    This paper studies experimentally how the existence of social information networks affects the ways in which firms recruit new personnel. Through such networks firms learn about prospective employees' performance in previous jobs. Assuming individualistic preferences social networks are predicted

  15. 2010 VA Information Technologies Agency (VITA)/VA Geographic Information Network (VGIN) Lidar: Eastern Shore, VA (Accomack and Northampton Counties)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Virginia Geographic Information Network (VGIN) contracted with Sanborn to provide LiDAR mapping services for Accomack and Northampton counties on the eastern...

  16. Prospective teachers information and communication technology metaphors

    Directory of Open Access Journals (Sweden)

    Ömür Akdemir

    2015-04-01

    Full Text Available Determination of the perceptions of the prospective teachers for the Information and Communications Technology (ICT terms have a remarkable potential to provide input for technology integration plans and ICT trainings. Within this context, the purpose of this study is to discover the metaphors constructed by prospective teachers for the ICT terms. Data were gathered from 180 prospective teachers through survey. 977 valid metaphors constructed by the participants were grouped into conceptual categories for the six ICT terms. The most common conceptual categories are “developing and changing” for technology, “making life easy” for computers and search engines, “limitless and endless” for the Internet, “means of communication” for social networks, and “addictive items” for video games. Future research should concentrate on investigating the match and mismatches between intended use of the ICT tools and the perception of the prospective teachers.

  17. The usefulness of information and communication technologies in crisis response.

    Science.gov (United States)

    Paul, Sharoda A; Reddy, Madhu; Abraham, Joanna; DeFlitch, Christopher; Deflitch, Christopher J

    2008-11-06

    Information and communication technologies (ICTs) play a vital role in coordinating crisis response between pre-hospital services and emergency departments of hospitals. In spite of the advances in these technologies, there remain a variety of challenges to their usage during a crisis. To identify these challenges, we conducted focus group interviews with emergency department (ED) and emergency medical services (EMS) personnel. We found that ED and EMS personnel have widely varying perceptions about the usefulness and ease-of-use of information tools and communication tools used in crisis management. We discuss the importance of bringing together communication and information tools into integrated networks of ICTs for effective crisis response. We also highlight design features of ICTs which can support seamless and effective communication and coordination between ED and EMS teams.

  18. The Usefulness of Information and Communication Technologies in Crisis Response

    Science.gov (United States)

    Paul, Sharoda A.; Reddy, Madhu; Abraham, Joanna; DeFlitch, Christopher

    2008-01-01

    Information and communication technologies (ICTs) play a vital role in coordinating crisis response between pre-hospital services and emergency departments of hospitals. In spite of the advances in these technologies, there remain a variety of challenges to their usage during a crisis. To identify these challenges, we conducted focus group interviews with emergency department (ED) and emergency medical services (EMS) personnel. We found that ED and EMS personnel have widely varying perceptions about the usefulness and ease-of-use of information tools and communication tools used in crisis management. We discuss the importance of bringing together communication and information tools into integrated networks of ICTs for effective crisis response. We also highlight design features of ICTs which can support seamless and effective communication and coordination between ED and EMS teams. PMID:18998898

  19. A Plane Target Detection Algorithm in Remote Sensing Images based on Deep Learning Network Technology

    Science.gov (United States)

    Shuxin, Li; Zhilong, Zhang; Biao, Li

    2018-01-01

    Plane is an important target category in remote sensing targets and it is of great value to detect the plane targets automatically. As remote imaging technology developing continuously, the resolution of the remote sensing image has been very high and we can get more detailed information for detecting the remote sensing targets automatically. Deep learning network technology is the most advanced technology in image target detection and recognition, which provided great performance improvement in the field of target detection and recognition in the everyday scenes. We combined the technology with the application in the remote sensing target detection and proposed an algorithm with end to end deep network, which can learn from the remote sensing images to detect the targets in the new images automatically and robustly. Our experiments shows that the algorithm can capture the feature information of the plane target and has better performance in target detection with the old methods.

  20. Optimal Information Processing in Biochemical Networks

    Science.gov (United States)

    Wiggins, Chris

    2012-02-01

    A variety of experimental results over the past decades provide examples of near-optimal information processing in biological networks, including in biochemical and transcriptional regulatory networks. Computing information-theoretic quantities requires first choosing or computing the joint probability distribution describing multiple nodes in such a network --- for example, representing the probability distribution of finding an integer copy number of each of two interacting reactants or gene products while respecting the `intrinsic' small copy number noise constraining information transmission at the scale of the cell. I'll given an overview of some recent analytic and numerical work facilitating calculation of such joint distributions and the associated information, which in turn makes possible numerical optimization of information flow in models of noisy regulatory and biochemical networks. Illustrating cases include quantification of form-function relations, ideal design of regulatory cascades, and response to oscillatory driving.

  1. Information technology in health promotion.

    Science.gov (United States)

    Lintonen, T P; Konu, A I; Seedhouse, D

    2008-06-01

    eHealth, the use of information technology to improve or enable health and health care, has recently been high on the health care development agenda. Given the vivid interest in eHealth, little reference has been made to the use of these technologies in the promotion of health. The aim of this present study was to conduct a review on recent uses of information technology in health promotion through looking at research articles published in peer-reviewed journals. Fifteen relevant journals with issues published between 2003 and June 2005 yielded altogether 1352 articles, 56 of which contained content related to the use of information technology in the context of health promotion. As reflected by this rather small proportion, research on the role of information technology is only starting to emerge. Four broad thematic application areas within health promotion were identified: use of information technology as an intervention medium, use of information technology as a research focus, use of information technology as a research instrument and use of information technology for professional development. In line with this rather instrumental focus, the concepts 'ePromotion of Health' or 'Health ePromotion' would come close to describing the role of information technology in health promotion.

  2. Toward a new information infrastructure in health technology assessment: communication, design, process, and results.

    Science.gov (United States)

    Neikter, Susanna Allgurin; Rehnqvist, Nina; Rosén, Måns; Dahlgren, Helena

    2009-12-01

    The aim of this study was to facilitate effective internal and external communication of an international network and to explore how to support communication and work processes in health technology assessment (HTA). STRUCTURE AND METHODS: European network for Health Technology Assessment (EUnetHTA) connected sixty-four HTA Partner organizations from thirty-three countries. User needs in the different steps of the HTA process were the starting point for developing an information system. A step-wise, interdisciplinary, creative approach was used in developing practical tools. An Information Platform facilitated the exchange of scientific information between Partners and with external target groups. More than 200 virtual meetings were set up during the project using an e-meeting tool. A Clearinghouse prototype was developed with the intent to offering a single point of access to HTA relevant information. This evolved into a next step not planned from the outset: Developing a running HTA Information System including several Web-based tools to support communication and daily HTA processes. A communication strategy guided the communication effort, focusing on practical tools, creating added value, involving stakeholders, and avoiding duplication of effort. Modern technology enables a new information infrastructure for HTA. The potential of information and communication technology was used as a strategic tool. Several target groups were represented among the Partners, which supported collaboration and made it easier to identify user needs. A distinctive visual identity made it easier to gain and maintain visibility on a limited budget.

  3. Inter-American Biodiversity Information Network (IABIN)

    Science.gov (United States)

    site. IABIN Inter-American Biodiversity Information Network (IABIN) OAS » SEDI » DSD » IABIN IABIN GEF Logo inbio natserve usgs polpar wcm The Inter-American Biodiversity Information Network (IABIN , and use of biodiversity information relevant to policy and decision-making on natural resources

  4. International Conference on Soft Computing in Information Communication Technology

    CERN Document Server

    Soft Computing in Information Communication Technology

    2012-01-01

      This is a collection of the accepted papers concerning soft computing in information communication technology. All accepted papers are subjected to strict peer-reviewing by 2 expert referees. The resultant dissemination of the latest research results, and the exchanges of views concerning the future research directions to be taken in this field makes the work of immense value to all those having an interest in the topics covered. The present book represents a cooperative effort to seek out the best strategies for effecting improvements in the quality and the reliability of Neural Networks, Swarm Intelligence, Evolutionary Computing, Image Processing Internet Security, Data Security, Data Mining, Network Security and Protection of data and Cyber laws. Our sincere appreciation and thanks go to these authors for their contributions to this conference. I hope you can gain lots of useful information from the book.

  5. A web-based information system for a regional public mental healthcare service network in Brazil.

    Science.gov (United States)

    Yoshiura, Vinicius Tohoru; de Azevedo-Marques, João Mazzoncini; Rzewuska, Magdalena; Vinci, André Luiz Teixeira; Sasso, Ariane Morassi; Miyoshi, Newton Shydeo Brandão; Furegato, Antonia Regina Ferreira; Rijo, Rui Pedro Charters Lopes; Del-Ben, Cristina Marta; Alves, Domingos

    2017-01-01

    Regional networking between services that provide mental health care in Brazil's decentralized public health system is challenging, partly due to the simultaneous existence of services managed by municipal and state authorities and a lack of efficient and transparent mechanisms for continuous and updated communication between them. Since 2011, the Ribeirao Preto Medical School and the XIII Regional Health Department of the Sao Paulo state, Brazil, have been developing and implementing a web-based information system to facilitate an integrated care throughout a public regional mental health care network. After a profound on-site analysis, the structure of the network was identified and a web-based information system for psychiatric admissions and discharges was developed and implemented using a socio-technical approach. An information technology team liaised with mental health professionals, health-service managers, municipal and state health secretariats and judicial authorities. Primary care, specialized community services, general emergency and psychiatric wards services, that comprise the regional mental healthcare network, were identified and the system flow was delineated. The web-based system overcame the fragmentation of the healthcare system and addressed service specific needs, enabling: detailed patient information sharing; active coordination of the processes of psychiatric admissions and discharges; real-time monitoring; the patients' status reports; the evaluation of the performance of each service and the whole network. During a 2-year period of operation, it registered 137 services, 480 health care professionals and 4271 patients, with a mean number of 2835 accesses per month. To date the system is successfully operating and further expanding. We have successfully developed and implemented an acceptable, useful and transparent web-based information system for a regional mental healthcare service network in a medium-income country with a decentralized

  6. Improving access to health information for older migrants by using grounded theory and social network analysis to understand their information behaviour and digital technology use.

    Science.gov (United States)

    Goodall, K T; Newman, L A; Ward, P R

    2014-11-01

    Migrant well-being can be strongly influenced by the migration experience and subsequent degree of mainstream language acquisition. There is little research on how older Culturally And Linguistically Diverse (CALD) migrants who have 'aged in place' find health information, and the role which digital technology plays in this. Although the research for this paper was not focused on cancer, we draw out implications for providing cancer-related information to this group. We interviewed 54 participants (14 men and 40 women) aged 63-94 years, who were born in Italy or Greece, and who migrated to Australia mostly as young adults after World War II. Constructivist grounded theory and social network analysis were used for data analysis. Participants identified doctors, adult children, local television, spouse, local newspaper and radio as the most important information sources. They did not generally use computers, the Internet or mobile phones to access information. Literacy in their birth language, and the degree of proficiency in understanding and using English, influenced the range of information sources accessed and the means used. The ways in which older CALD migrants seek and access information has important implications for how professionals and policymakers deliver relevant information to them about cancer prevention, screening, support and treatment, particularly as information and resources are moved online as part of e-health. © 2014 John Wiley & Sons Ltd.

  7. Information Networks in Biomedicine

    Science.gov (United States)

    Millard, William L.

    1975-01-01

    Describes current biomedical information networks, focusing on those with an educational function, and elaborates on the problems encountered in planning, implementing, utilizing and evaluating such networks. Journal of Biocommunication, T. Banks, Educ. TV-431N, U. of Calif., San Francisco 94143. Subscription Rates: individuals and libraries,…

  8. Networks dynamics in the case of emerging technologies

    Energy Technology Data Exchange (ETDEWEB)

    Rotolo, D

    2016-07-01

    This research in progress aims at increasing our understanding of how collaborative networks form, evolve and are configured in the case of emerging technologies. The architecture of the relationships among the variety of organisational actors involved in the emergence process exerts a significant influence in shaping technological change in certain directions rather than others, especially in the early stage of emergence. As a result, socially optimal or desirable technological trajectories may be ‘opportunistically’ rejected. Our empirical analysis is based on a case-study of an emerging medical technology, namely ‘microneedles’. On the basis of co-authorship data reported in 1,943 publications on the topic from 1990 to 2014, longitudinal collaboration (co-authorship) networks were built at two levels: affiliation and author. We examined the dynamics of co-authorship networks by building on recent methodological advancements in network analysis, i.e. Exponential Random Graph Models (ERGMs). These models enable us to make statistical inferences about on the extent to which a network configuration occurs more than could be expected by chance and to identify which social mechanisms may be shaping the network in certain configurations. The findings of the statistical analyses (currently in progress) combined with the qualitative understanding of the case will increase our understanding of which mechanisms are more likely to drive the network dynamics in the case of emerging technologies. These include evidence of the extent to which the likelihood of forming, maintaining, or terminating ties among actors (authors or affiliations) is affected by actors’ covariates such as types of organisations, diversity/specialisation of the research undertaken, and status. These findings have potential to provide important inputs for policymaking process in the case of emerging technologies. (Author)

  9. Networks dynamics in the case of emerging technologies

    International Nuclear Information System (INIS)

    Rotolo, D

    2016-01-01

    This research in progress aims at increasing our understanding of how collaborative networks form, evolve and are configured in the case of emerging technologies. The architecture of the relationships among the variety of organisational actors involved in the emergence process exerts a significant influence in shaping technological change in certain directions rather than others, especially in the early stage of emergence. As a result, socially optimal or desirable technological trajectories may be ‘opportunistically’ rejected. Our empirical analysis is based on a case-study of an emerging medical technology, namely ‘microneedles’. On the basis of co-authorship data reported in 1,943 publications on the topic from 1990 to 2014, longitudinal collaboration (co-authorship) networks were built at two levels: affiliation and author. We examined the dynamics of co-authorship networks by building on recent methodological advancements in network analysis, i.e. Exponential Random Graph Models (ERGMs). These models enable us to make statistical inferences about on the extent to which a network configuration occurs more than could be expected by chance and to identify which social mechanisms may be shaping the network in certain configurations. The findings of the statistical analyses (currently in progress) combined with the qualitative understanding of the case will increase our understanding of which mechanisms are more likely to drive the network dynamics in the case of emerging technologies. These include evidence of the extent to which the likelihood of forming, maintaining, or terminating ties among actors (authors or affiliations) is affected by actors’ covariates such as types of organisations, diversity/specialisation of the research undertaken, and status. These findings have potential to provide important inputs for policymaking process in the case of emerging technologies. (Author)

  10. Lewis Information Network (LINK): Background and overview

    Science.gov (United States)

    Schulte, Roger R.

    1987-01-01

    The NASA Lewis Research Center supports many research facilities with many isolated buildings, including wind tunnels, test cells, and research laboratories. These facilities are all located on a 350 acre campus adjacent to the Cleveland Hopkins Airport. The function of NASA-Lewis is to do basic and applied research in all areas of aeronautics, fluid mechanics, materials and structures, space propulsion, and energy systems. These functions require a great variety of remote high speed, high volume data communications for computing and interactive graphic capabilities. In addition, new requirements for local distribution of intercenter video teleconferencing and data communications via satellite have developed. To address these and future communications requirements for the next 15 yrs, a project team was organized to design and implement a new high speed communication system that would handle both data and video information in a common lab-wide Local Area Network. The project team selected cable television broadband coaxial cable technology as the communications medium and first installation of in-ground cable began in the summer of 1980. The Lewis Information Network (LINK) became operational in August 1982 and has become the backbone of all data communications and video.

  11. Teaching a Second Core Course in Information Technology: A West Point Experience

    Directory of Open Access Journals (Sweden)

    Douglas Wolfe

    2004-02-01

    Full Text Available The United States Military Academy (USMA at West Point has the mission to produce officers for the U.S. Army. As part of the curriculum, the Academy requires all non-ABET major cadets (students to take two courses on information technology (IT with both courses focused on problem solving with technology. The first course is an introductory course offered in the freshman year while the second course is a more detailed course offered in the junior year. The Electrical Engineering and Computer Science Department uses an expanded definition of information technology; that is, any technology that acquires, transmits, processes, or displays information. Information technology is becoming increasingly important in the Army with the development and use of sensors, command and control systems, and other technologies to achieve information dominance. The course is divided into six modules: acquisition of data and sensors, transmission of data and networks, processing of data into information, display of information, legal and ethical issues of IT, and information dominance and operations. Cadets use a four-step problem solving methodology to develop and implement the components of an Information System to solve a real-world problem. The short-term impact of the course on the cadets has been very positive, and we are confident that the long-term impact will be substantial on the cadets and the Army. Cadets are exposed to a number of different technologies, gaining an understanding of how these technologies are used to acquire data, transmit data, process data into information, and display information to support decision making. In addition, the course projects help enforce the problem solving methodology where cadets analyze, design, implement, and test their solutions.

  12. A federated information management system for the Deep Space Network. M.S. Thesis - Univ. of Southern California

    Science.gov (United States)

    Dobinson, E.

    1982-01-01

    General requirements for an information management system for the deep space network (DSN) are examined. A concise review of available database management system technology is presented. It is recommended that a federation of logically decentralized databases be implemented for the Network Information Management System of the DSN. Overall characteristics of the federation are specified, as well as reasons for adopting this approach.

  13. Information and control in networks

    CERN Document Server

    Bernhardsson, Bo; Rantzer, Anders

    2014-01-01

    Information and Control in Networks demonstrates the way in which system dynamics and information flows intertwine as they evolve, and the central role played by information in the control of complex networked systems. It is a milestone on the road to that convergence from traditionally independent development of control theory and information theory which has emerged strongly in the last fifteen years, and is now a very active research field. In addition to efforts in control and information theory, the text is witness to strong research in such diverse fields as computer science, mathematics, and statistics. Aspects that are given specialist treatment include: ·                 data-rate theorems; ·                 computation and control over communication networks; ·                 decentralized stochastic control; ·                 Gaussian networks and Gaussian–Markov random fields; and ·                 routability ...

  14. Research report of fiscal 1997. Survey on information networks for environment technology transfer; 1997 nendo hokokusho. Kankyo gijutsu iten joho network chosa

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-03-01

    ICETT is one of the member organizations of APEC environment technology virtual center which established in Osaka in 1996 for active environment technology exchange between APEC countries based on a survey result obtained in fiscal 1995. ICETT began its information service in April, 1997, and completed useful prototype home pages which include the database composed of practical useful information on environment preservation technology of domestic factories and offices, and training information and local governments` approach cases to pollution control. In fiscal 1997, further survey was made, and the simulation software of a model process was also developed for training. Clean technology and energy saving technology strongly demanded by developing countries were surveyed to prepare a database including useful information for developing countries. A basic design software for bio-treatment of waste water was also prepared. The total number of home page accesses exceeded a predicted number for the first half year. 5 refs., 25 figs.

  15. Information technology as tool for change.

    Science.gov (United States)

    Itkonen, P

    1999-12-01

    It looks that networking welfare thinking and implementations of network projects only follow the development of data transfer possibilities. It is a danger that seamless chain of care in health care is just a data transferring generator based on easy connections, only creating needs for new data transferring. This is an 'illusion of core skills' that does not extend to the development of the contents of services. Easy access to the system makes more contacts and need for more also clinical services. New needs for data transfer burden the personnel with unnecessary information and networking functional model does not emancipate them to use their substantial skills. It means more costs and it is also a danger that normal life will be medicated. Public sector cannot finance all these new possibilities and consequences of modern technology. Does all this create a new combination of public and private sector and push them to allocate responsibilities in developing work? If the public and private sectors do not find the balance in controlling this development, also actors outside health care get to influence the choices and health care loses its autonomy. It becomes a business means for companies producing data transfer and network services. From the prioritization point of view this is not a good vision for financing and delivery of health care services either in public or private sector.

  16. Design and value of service oriented technologies for smart business networking

    NARCIS (Netherlands)

    Alt, R.; Smits, M.T.; Beverungen, D.; Tuunanen, T.; Wijnhoven, F.

    2014-01-01

    Business networks that effectively use technologies and outperform competing networks are known as smart business networks. Theory hypothesizes that smart business networking requires a ‘Networked Business Operating System’ (NBOS), a technological architecture consisting of business logic, that

  17. Ethics of E-Commerce in Information and Communications Technologies

    OpenAIRE

    Santosh Kumar Das, Abhishek Kumar, Bappaditya Das, A.P.Burnwal

    2013-01-01

    Electronic Commerce is method of exploit businessthrough computer networks, internet and webapplication. It is possibly the most talentedapplication of information technology witnessed inrecent years.E-commerce helps to work as amediator between front end and back endwithin theInternetlike any client sitting on his computer as afront end for accessing all facilities of the internetlike selling, purchasing, on-line admission, on-lineform fill up etc and server processes theseinformation in bac...

  18. Status of DOE information network modifications

    International Nuclear Information System (INIS)

    Fuchs, R.

    1988-01-01

    This paper provides an update on changes that have been made or are taking place to the Department of Energy's (DOE) National Information Network. Areas of focus are as follows: data acquisition from commercial disposal site operators, specifically, the information delivery system called Manifest Information Management System; improved access methods to DOE Information Network; progress on personal computer interfaces, and availability of end user support

  19. Report of a Planning Conference for Solar Technology Information Transfer in Kentucky (Frankfort, September 11-12, 1978).

    Science.gov (United States)

    Capps, Randall, Ed.

    This summary of the deliberations of the Planning Conference for Solar Technology Information Transfer includes an outline of a functioning solar energy technology network for the State of Kentucky and a set of recommendations for future action. Four main types of information agents were identified: (1) the State Library System; (2) the State…

  20. Social Media and Networking Technologies: An Analysis of Collaborative Work and Team Communication

    Science.gov (United States)

    Okoro, Ephraim A.; Hausman, Angela; Washington, Melvin C.

    2012-01-01

    Digital communication increases students' learning outcomes in higher education. Web 2.0 technologies encourages students' active engagement, collaboration, and participation in class activities, facilitates group work, and encourages information sharing among students. Familiarity with organizational use and sharing in social networks aids…

  1. An open, component-based information infrastructure for integrated health information networks.

    Science.gov (United States)

    Tsiknakis, Manolis; Katehakis, Dimitrios G; Orphanoudakis, Stelios C

    2002-12-18

    A fundamental requirement for achieving continuity of care is the seamless sharing of multimedia clinical information. Different technological approaches can be adopted for enabling the communication and sharing of health record segments. In the context of the emerging global information society, the creation of and access to the integrated electronic health record (I-EHR) of a citizen has been assigned high priority in many countries. This requirement is complementary to an overall requirement for the creation of a health information infrastructure (HII) to support the provision of a variety of health telematics and e-health services. In developing a regional or national HII, the components or building blocks that make up the overall information system ought to be defined and an appropriate component architecture specified. This paper discusses current international priorities and trends in developing the HII. It presents technological challenges and alternative approaches towards the creation of an I-EHR, being the aggregation of health data created during all interactions of an individual with the healthcare system. It also presents results from an ongoing Research and Development (R&D) effort towards the implementation of the HII in HYGEIAnet, the regional health information network of Crete, Greece, using a component-based software engineering approach. Critical design decisions and related trade-offs, involved in the process of component specification and development, are also discussed and the current state of development of an I-EHR service is presented. Finally, Human Computer Interaction (HCI) and security issues, which are important for the deployment and use of any I-EHR service, are considered.

  2. An exploration of the impact of information technology on China’s hotel industry : A case study of Hanting Inn

    OpenAIRE

    Liu, Ying

    2013-01-01

    With the rapid development of information technology, digital technology and e-commerce are playing an important role in the tourism industry, and modern information systems represent a major future direction for tourism development. Given this situation, the hotel industry in the 21st century is likely to undergo great change in the face of a common trend. Based on this trend, network marketing has become an important marketing tool for the hotel industry. Network marketing uses the Int...

  3. Network Gateway Technology: The Issue of Redundancy towards ...

    African Journals Online (AJOL)

    The Internet has provided advancement in the areas of network and networking facilities. Everyone connected to the Internet is concerned about two basic things: the availability of network services and the speed of the network. Network gateway redundancy technology falls within these categories and happens to be one of ...

  4. Introduction to information and communication engineering

    International Nuclear Information System (INIS)

    Han, Seung Jo; Park, Jong An; Shin, Yeong Suk; Byun, Jae Yeong; Han, Jae Gyun; Lee, Sang Deok; Kim, Hyeong Jong; Lee, Jong Deuk

    2006-03-01

    This book introduces to information and communication engineering. It is divided into 13 chapters, which deals with Information - oriented society : meaning, specialty and function of the society, Elements of information and communication, Data transmit technology, Information and communication system, optical communication, Data communication network, local area network, wide area network and communications network, TCP/IP, Internet : Service, PGP, multimedia internet service and electronic commerce, Technology of data protection like DRM, Mobile Communication, and home network of summary and the direction of network technology of next generation.

  5. Introduction to information and communication engineering

    Energy Technology Data Exchange (ETDEWEB)

    Han, Seung Jo; Park, Jong An; Shin, Yeong Suk; Byun, Jae Yeong; Han, Jae Gyun; Lee, Sang Deok; Kim, Hyeong Jong; Lee, Jong Deuk

    2006-03-15

    This book introduces to information and communication engineering. It is divided into 13 chapters, which deals with Information - oriented society : meaning, specialty and function of the society, Elements of information and communication, Data transmit technology, Information and communication system, optical communication, Data communication network, local area network, wide area network and communications network, TCP/IP, Internet : Service, PGP, multimedia internet service and electronic commerce, Technology of data protection like DRM, Mobile Communication, and home network of summary and the direction of network technology of next generation.

  6. Technology and knowledge flow the power of networks

    CERN Document Server

    Trentin, Guglielmo

    2011-01-01

    This book outlines how network technology can support, foster and enhance the Knowledge Management, Sharing and Development (KMSD) processes in professional environments through the activation of both formal and informal knowledge flows. Understanding how ICT can be made available to such flows in the knowledge society is a factor that cannot be disregarded and is confirmed by the increasing interest of companies in new forms of software-mediated social interaction. The latter factor is in relation both to the possibility of accelerating internal communication and problem solving processes, an

  7. Information technology in formulation of transparency strategies for food chain and supply management in Poland

    OpenAIRE

    Wac?aw Szymanowski

    2009-01-01

    The key aim of this paper is the presentation of current trends in the development of food distri-bution systems in Poland and their likely remodelling towards supply chains and networks. The new circumstances on the emerging markets such as Poland, in particular after its accession to the Euro-pean Union, create new market challenges to be overcome with the use of information technology. The new technology will also support the remodelling of supply chains and networks based on the trans-par...

  8. Correlation Between Information Technology And Management Information Systems Quality

    Directory of Open Access Journals (Sweden)

    Annisa Fitri Anggraeni

    2015-08-01

    Full Text Available The aim of this research is to find out the correlation between Information Technology and Management Information System Quality. This research applies literature review from various theories and previously conducted research where controversies between Information Technology and Management Information Systems. The result of this research shows that Information Technology is a part of Management Information System and supports the performance of Management Information Systems.

  9. GPS Technology for the Development of Business Information Systems

    Directory of Open Access Journals (Sweden)

    Mihaela MURESAN

    2006-01-01

    Full Text Available The use of the GPS system opens the way for a new generation of information systems using geospatial information. The geoinformation provided by the GPS system could be used in various applications, such as: positioning and monitoring the behavior of the objects static or in movement, navigating, measuring the surfaces etc. These new approach introduces the concept of image handling for decision support which involves a better geoimage handling in order to make easier for decision makers to discover, access, and integrate geospatial information in decision-support scenarios. A very useful application is the risk management for the vehicles with direct benefits in terms of competitivity, for the transport organizations, and of road transport safety, for the society. The safety of the road transport is a priority in the light of the policy on trans-European networks for transport (TEN-T and according to the actual and future trend related to the freight on the road (75% of the freight goes by road according to the Third report on Economic and social Cohesion, February 2004. The implementation of a high technology solution based on GPS communication for the monitoring of transports along the whole itinerary and the immediate alert in case of various non-procedural behavior, increases the road transport security and avoids accidents and disasters. Minimizing the risk for the road transport is a general concern at the EU level, as well as at the national level. The design and the development of transport risk management information systems will contribute to stimulate the implementation of the new technologies in the current transport organizations' activity and to change the internal processes according to the philosophy introduced by the information society. The transport risk management system integrates detection and communication intelligent equipment, various communication technologies and networking solutions with powerful computers and

  10. A network-based distributed, media-rich computing and information environment

    Energy Technology Data Exchange (ETDEWEB)

    Phillips, R.L.

    1995-12-31

    Sunrise is a Los Alamos National Laboratory (LANL) project started in October 1993. It is intended to be a prototype National Information Infrastructure development project. A main focus of Sunrise is to tie together enabling technologies (networking, object-oriented distributed computing, graphical interfaces, security, multi-media technologies, and data-mining technologies) with several specific applications. A diverse set of application areas was chosen to ensure that the solutions developed in the project are as generic as possible. Some of the application areas are materials modeling, medical records and image analysis, transportation simulations, and K-12 education. This paper provides a description of Sunrise and a view of the architecture and objectives of this evolving project. The primary objectives of Sunrise are three-fold: (1) To develop common information-enabling tools for advanced scientific research and its applications to industry; (2) To enhance the capabilities of important research programs at the Laboratory; (3) To define a new way of collaboration between computer science and industrially-relevant research.

  11. 76 FR 28499 - Data Fortress Systems Group Ltd., Digital Youth Network Corp., Fantom Technologies, Inc., and KIK...

    Science.gov (United States)

    2011-05-17

    ... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Data Fortress Systems Group Ltd., Digital Youth Network Corp., Fantom Technologies, Inc., and KIK Technology International, Inc., Order of... of current and accurate information concerning the securities of Data Fortress Systems Group Ltd...

  12. Wisconsin’s Environmental Public Health Tracking Network: Information Systems Design for Childhood Cancer Surveillance

    Science.gov (United States)

    Hanrahan, Lawrence P.; Anderson, Henry A.; Busby, Brian; Bekkedal, Marni; Sieger, Thomas; Stephenson, Laura; Knobeloch, Lynda; Werner, Mark; Imm, Pamela; Olson, Joseph

    2004-01-01

    In this article we describe the development of an information system for environmental childhood cancer surveillance. The Wisconsin Cancer Registry annually receives more than 25,000 incident case reports. Approximately 269 cases per year involve children. Over time, there has been considerable community interest in understanding the role the environment plays as a cause of these cancer cases. Wisconsin’s Public Health Information Network (WI-PHIN) is a robust web portal integrating both Health Alert Network and National Electronic Disease Surveillance System components. WI-PHIN is the information technology platform for all public health surveillance programs. Functions include the secure, automated exchange of cancer case data between public health–based and hospital-based cancer registrars; web-based supplemental data entry for environmental exposure confirmation and hypothesis testing; automated data analysis, visualization, and exposure–outcome record linkage; directories of public health and clinical personnel for role-based access control of sensitive surveillance information; public health information dissemination and alerting; and information technology security and critical infrastructure protection. For hypothesis generation, cancer case data are sent electronically to WI-PHIN and populate the integrated data repository. Environmental data are linked and the exposure–disease relationships are explored using statistical tools for ecologic exposure risk assessment. For hypothesis testing, case–control interviews collect exposure histories, including parental employment and residential histories. This information technology approach can thus serve as the basis for building a comprehensive system to assess environmental cancer etiology. PMID:15471739

  13. Information, Technology, and Information Worker Productivity

    OpenAIRE

    Aral, Sinan; Brynjolfsson, Erik; Van Alstyne, Marshall

    2009-01-01

    We econometrically evaluate information worker productivity at a midsize executive recruiting firm and assess whether the knowledge that workers accessed through their electronic communication networks enabled them to multitask more productively. We estimate dynamic panel data models of multitasking, knowledge networks, and productivity using several types of micro-level data: (a) direct observation of more than 125,000 email messages over a period of 10 months; (b) detailed accounting data o...

  14. Appraisal of Information Technology Requirements in Quantity Surveying Firms in Northern Nigeria

    Directory of Open Access Journals (Sweden)

    Y. U. Datti

    2017-06-01

    Full Text Available A worrisome trend in the adoption of emerging technologies for competitive advantages and improved productivities by QSs have been observed in that there is overwhelming evidence that there is an increasing usage of IT in quantity surveying firms but little or no noticeable benefits on the practice. It however becomes pertinent to ask then, that despite the increases adoption of computing and telecommunication technologies, why isn’t there any noticeable change due to the impacts of IT in the Nigerian Construction Industry with particular reference to Quantity Surveying practices. The study appraised the requirement of IT in quantity surveying practice in Nigeria. It examined the position of IT in quantity surveying firms in terms of its requirement and analyzed IT requirements-based problem constraining quantity surveying firms. The study is a survey research designed to obtain information on information technology in QS firms. A self-administered questionnaire was employed to quantity surveyors in consulting firms for responses. Responses were returned and analyzed using severity index and later ranked in order of importance. The results indicate a high level of computerization of professional services among the firms with greater number of their computers being networked. However, despite high level of networking of available computers, sharing of printers and other scarce tools/technologies are not established. Compared to developed countries such as Canada, Australia, United Kingdom and USA, the position of IT requirements in QS firms in Nigeria can be said to be at basic level with organization possessing and applying basic IT tools and technologies (e.g. scanners, digital cameras, dvd/cd-rom, general purpose software, QS application software, chat programs etc. in their daily operation and processes. While most firms are progressing toward intermediate level by possessing intermediate IT tools and technologies (e.g. teleconferencing

  15. CERN: The Future of Information Technology

    CERN Multimedia

    CERN. Geneva; QEII Conference Centre

    2004-01-01

    Sell to CERN, partner with CERN and learn about its pivotal role in European Grids and e-business This afternoon event will highlight the key areas of distributed computing and enterprise applications to Information and Communication Technology companies. The meeting will be held as a joint forum with First Tuesday Geneva, a networking organisation for business and investors in the Geneva region. The CERN Openlab for DataGrid applications is a means by which companies may partner with CERN to testbed their hardware and software products for Grid applications. Grid technology developed at CERN is already being used for particle physics and healthcare applications, making the laboratory an ideal site for collaborative development. British companies are already participating in this initiative and the opportunity is now available to medium-sized IT companies. In addition, a number of enterprise applications will be described. This software has been developed to manage the unique engineering and administrative ch...

  16. Online network of subspecialty aortic disease experts: Impact of "cloud" technology on management of acute aortic emergencies.

    Science.gov (United States)

    Schoenhagen, Paul; Roselli, Eric E; Harris, C Martin; Eagleton, Matthew; Menon, Venu

    2016-07-01

    For the management of acute aortic syndromes, regional treatment networks have been established to coordinate diagnosis and treatment between local emergency rooms and central specialized centers. Triage of acute aortic syndromes requires definitive imaging, resulting in complex data files. Modern information technology network structures, specifically "cloud" technology, coupled with mobile communication, increasingly support sharing of these data in a network of experts using mobile, online access and communication. Although this network is technically complex, the potential benefit of online sharing of data files between professionals at multiple locations within a treatment network appear obvious; however, clinical experience is limited, and further evaluation is needed. Copyright © 2016 The American Association for Thoracic Surgery. Published by Elsevier Inc. All rights reserved.

  17. Finding quasi-optimal network topologies for information transmission in active networks.

    Science.gov (United States)

    Baptista, Murilo S; de Carvalho, Josué X; Hussein, Mahir S

    2008-01-01

    This work clarifies the relation between network circuit (topology) and behaviour (information transmission and synchronization) in active networks, e.g. neural networks. As an application, we show how one can find network topologies that are able to transmit a large amount of information, possess a large number of communication channels, and are robust under large variations of the network coupling configuration. This theoretical approach is general and does not depend on the particular dynamic of the elements forming the network, since the network topology can be determined by finding a Laplacian matrix (the matrix that describes the connections and the coupling strengths among the elements) whose eigenvalues satisfy some special conditions. To illustrate our ideas and theoretical approaches, we use neural networks of electrically connected chaotic Hindmarsh-Rose neurons.

  18. Finding quasi-optimal network topologies for information transmission in active networks.

    Directory of Open Access Journals (Sweden)

    Murilo S Baptista

    Full Text Available This work clarifies the relation between network circuit (topology and behaviour (information transmission and synchronization in active networks, e.g. neural networks. As an application, we show how one can find network topologies that are able to transmit a large amount of information, possess a large number of communication channels, and are robust under large variations of the network coupling configuration. This theoretical approach is general and does not depend on the particular dynamic of the elements forming the network, since the network topology can be determined by finding a Laplacian matrix (the matrix that describes the connections and the coupling strengths among the elements whose eigenvalues satisfy some special conditions. To illustrate our ideas and theoretical approaches, we use neural networks of electrically connected chaotic Hindmarsh-Rose neurons.

  19. US long distance fiber optic networks: Technology, evolution and advanced concepts. Volume 2: Fiber optic technology and long distance networks

    Science.gov (United States)

    1986-10-01

    The study projects until 2000 the evolution of long distance fiber optic networks in the U.S. Volume 1 is the Executive Summary. Volume 2 focuses on fiber optic components and systems that are directly related to the operation of long-haul networks. Optimistic, pessimistic and most likely scenarios of technology development are presented. The activities of national and regional companies implementing fiber long haul networks are also highlighted, along with an analysis of the market and regulatory forces affecting network evolution. Volume 3 presents advanced fiber optic network concept definitions. Inter-LATA traffic is quantified and forms the basis for the construction of 11-, 15-, 17-, and 23-node networks. Using the technology projections from Volume 2, a financial model identifies cost drivers and determines circuit mile costs between any two LATAs. A comparison of fiber optics with alternative transmission concludes the report.

  20. FY 2000 Blue Book: High Performance Computing and Communications: Information Technology Frontiers for a New Millennium

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — As we near the dawn of a new millennium, advances made possible by computing, information, and communications research and development R and D ? once barely...

  1. New information and communication technologies in agriculture - factors, drivers and application possibilities

    OpenAIRE

    Róbert Szilágyi

    2012-01-01

    The new ICT technologies are not only fast developed but, in addition, are giving birth to newer systems and tools. The Internet network have become essential communication tools in business processes recently. Using the Internet by means of mobile appliances increases the possibilities. The agriculture has some speciality in information technology. The ICT adoption in the agriculture and main drivers has been examined. For the successful application the key lessons have to understand. To get...

  2. Network Paradigm of Information Security

    Directory of Open Access Journals (Sweden)

    Alexandr Diomidovich Afanasyev

    2016-03-01

    Full Text Available An issue of topological analysis has been claimed as a key one while creating robust and secure network systems. Some examples of complex network applications in information security domain have been cited.

  3. Creation of a European network dedicated to technology transfer

    CERN Multimedia

    2008-01-01

    The CERN Council recently approved the creation of a technology transfer network, whose aim will be to improve European industry’s access to the technologies developed by the particle physics community in the Member States. The gas detectors for the TOTEM experiment (GEM) offer potential for fruitful collaboration within the framework of the TT network. Many other technologies are going down the same road.The desire to set up a technology transfer network follows on from the European Strategy for Particle Physics, approved by the CERN Council on 14 July 2006 in Lisbon. In this context, special emphasis was laid on European industry’s participation in the implementation of particle physics programmes and, in particular, its access to the new technologies developed by the scientific community. It was recognised that effort needs to be put into improving the efficiency of technology transfer...

  4. Mentoring Entrepreneurial Networks: mapping conceptions of participants in technological-based business incubators in Brazil.

    Directory of Open Access Journals (Sweden)

    Pontes Regis, Helder

    2007-12-01

    Full Text Available The recent entrepreneurship research agenda includes the analysis of cognitive structures of successful entrepreneurs, revealing an important tool for the examination of an entrepreneurial career. Using techniques of cognitive maps, this study explores the concepts of a successful career and the network itself, as a whole, for career development. Fifty-three entrepreneurs were studied, in seven technological incubators in the city of Recife, Pernambuco, Brazil. Specifically, this study aimed to map the shared meanings of the incubated entrepreneurs regarding informal support networks. Such networks support the entrepreneurial career and the present study explores the characteristics and the conceptual model that underlies the networks. The data collection was achieved through interviews through a free evocation technique. The shared meanings indicate the existence of inherent thought categories that support network context in the incubator environment, mainly the mentoring networks. The results endorse the interpretation of an informal mentoring model emerging from the dominant evocations concerning a successful career and of the network itself as promoter of career development.

  5. Information technology equipment cooling method

    Science.gov (United States)

    Schultz, Mark D.

    2015-10-20

    According to one embodiment, a system for removing heat from a rack of information technology equipment may include a sidecar indoor air to liquid heat exchanger that cools air utilized by the rack of information technology equipment to cool the rack of information technology equipment. The system may also include a liquid to liquid heat exchanger and an outdoor heat exchanger. The system may further include configurable pathways to connect and control fluid flow through the sidecar heat exchanger, the liquid to liquid heat exchanger, the rack of information technology equipment, and the outdoor heat exchanger based upon ambient temperature and/or ambient humidity to remove heat generated by the rack of information technology equipment.

  6. Progress report 1 January - 31 December 1988. Department of Information Technology

    International Nuclear Information System (INIS)

    1989-04-01

    This progress report describes the work carried out in the Department of Information Technology. The department comprises three sections. The Applied Laser Physics Section works in the areas of holographic optical elements, optical image processing, and the photorefractive effect. The Computer Section is primarily responsible for the central computer facilities and computer networks at Risoe. The Section for Information Processing and Cognitive Science, Sicos, is concerned with cognitive science, decision support, knowledge-based systems, and process simulation. Information given may be preliminary. (author) 1 tab., 9 ills., 46 refs

  7. Information technology made simple

    CERN Document Server

    Carter, Roger

    1991-01-01

    Information Technology: Made Simple covers the full range of information technology topics, including more traditional subjects such as programming languages, data processing, and systems analysis. The book discusses information revolution, including topics about microchips, information processing operations, analog and digital systems, information processing system, and systems analysis. The text also describes computers, computer hardware, microprocessors, and microcomputers. The peripheral devices connected to the central processing unit; the main types of system software; application soft

  8. Social Network Analysis and informal trade

    DEFF Research Database (Denmark)

    Walther, Olivier

    networks can be applied to better understand informal trade in developing countries, with a particular focus on Africa. The paper starts by discussing some of the fundamental concepts developed by social network analysis. Through a number of case studies, we show how social network analysis can...... illuminate the relevant causes of social patterns, the impact of social ties on economic performance, the diffusion of resources and information, and the exercise of power. The paper then examines some of the methodological challenges of social network analysis and how it can be combined with other...... approaches. The paper finally highlights some of the applications of social network analysis and their implications for trade policies....

  9. Computing handbook information systems and information technology

    CERN Document Server

    Topi, Heikki

    2014-01-01

    Disciplinary Foundations and Global ImpactEvolving Discipline of Information Systems Heikki TopiDiscipline of Information Technology Barry M. Lunt and Han ReichgeltInformation Systems as a Practical Discipline Juhani IivariInformation Technology Han Reichgelt, Joseph J. Ekstrom, Art Gowan, and Barry M. LuntSociotechnical Approaches to the Study of Information Systems Steve Sawyer and Mohammad Hossein JarrahiIT and Global Development Erkki SutinenUsing ICT for Development, Societal Transformation, and Beyond Sherif KamelTechnical Foundations of Data and Database ManagementData Models Avi Silber

  10. Information warfare technologies in political discourse

    Directory of Open Access Journals (Sweden)

    Karpova Anna Yu.

    2016-01-01

    Full Text Available We attempt to examine the technology of «information warfare» in this paper. The dominant theme of the paper is that the outcome of the information warfare is important not only for the future of a state itself but for the future of the world balance of forces. The main task of geopolitical actors in information warfare is to introduce ideas corresponding to their interests into mass consciousness. All participants of political conflicts have common features in technologies of Information warfare. The information anomie is the indicator of the great geopolitical actors’ personified interests on the stage of «information warfare» - the process resulted in destroying the communicative line: report-information understanding and disrupting the social order in society. In this paper authors describe the following Information Warfare technologies: "Political volcano" technology; "SPIN" technology; "Widening media resource" technology; "specific gravity" technology; "Cold War 2.0" technology and Information cleaningup technology. It is assumed that in the future there will be new instructions on applying technologies of information warfare. To impart perspective to the paper we consider examples, opinions and trends.

  11. Technology and Research Requirements for Combating Human Trafficking: Enhancing Communication, Analysis, Reporting, and Information Sharing

    Energy Technology Data Exchange (ETDEWEB)

    Kreyling, Sean J.; West, Curtis L.; Olson, Jarrod

    2011-03-17

    DHS’ Science & Technology Directorate directed PNNL to conduct an exploratory study on the domain of human trafficking in the Pacific Northwest in order to examine and identify technology and research requirements for enhancing communication, analysis, reporting, and information sharing – activities that directly support efforts to track, identify, deter, and prosecute human trafficking – including identification of potential national threats from smuggling and trafficking networks. This effort was conducted under the Knowledge Management Technologies Portfolio as part of the Integrated Federal, State, and Local/Regional Information Sharing (RISC) and Collaboration Program.

  12. An Exponential Increase in Regional Health Information Exchange With Collaborative Policies and Technologies.

    Science.gov (United States)

    Downing, N Lance; Lane, Steven; Eisenberg, Mathew; Sharp, Christopher; Palma, Jonathan; Longhurst, Christopher

    2015-01-01

    In the United States, the ability to securely exchange health information between organization has been limited by technical interoperability, patient identity matching, and variable institutional policies. Here, we examine the regional experience in a national health information exchange network by examining clinical data sharing between eleven Northern California organizations using the same health information exchange (HIE) platform between 2013-2014. We identify key policies and technologies that have led to a dramatic increase in health information exchange.

  13. Strategies Information and Communication Technology Managers Use to Build Employee Competencies

    Science.gov (United States)

    Rabogadi, Thulaganyo Arnold

    2017-01-01

    The World Economic Forum (WEF) found that Botswana's information and communication technology (ICT) networked readiness index (NRI) had declined from position 89 in 2012 to 104 in 2015. A decline in Botswana's ICT NRI resulted in a modest gross domestic product (GDP) growth increasing from 4.2% in 2012 to 5.0% in 2015. The purpose of this…

  14. Recent Developments on Wireless Sensor Networks Technology for Bridge Health Monitoring

    Directory of Open Access Journals (Sweden)

    Guang-Dong Zhou

    2013-01-01

    Full Text Available Structural health monitoring (SHM systems have shown great potential to sense the responses of a bridge system, diagnose the current structural conditions, predict the expected future performance, provide information for maintenance, and validate design hypotheses. Wireless sensor networks (WSNs that have the benefits of reducing implementation costs of SHM systems as well as improving data processing efficiency become an attractive alternative to traditional tethered sensor systems. This paper introduces recent technology developments in the field of bridge health monitoring using WSNs. As a special application of WSNs, the requirements and characteristics of WSNs when used for bridge health monitoring are firstly briefly discussed. Then, the state of the art in WSNs-based bridge health monitoring systems is reviewed including wireless sensor, network topology, data processing technology, power management, and time synchronization. Following that, the performance validations and applications of WSNs in bridge health monitoring through scale models and field deployment are presented. Finally, some existing problems and promising research efforts for promoting applications of WSNs technology in bridge health monitoring throughout the world are explored.

  15. Information communication on complex networks

    International Nuclear Information System (INIS)

    Igarashi, Akito; Kawamoto, Hiroki; Maruyama, Takahiro; Morioka, Atsushi; Naganuma, Yuki

    2013-01-01

    Since communication networks such as the Internet, which is regarded as a complex network, have recently become a huge scale and a lot of data pass through them, the improvement of packet routing strategies for transport is one of the most significant themes in the study of computer networks. It is especially important to find routing strategies which can bear as many traffic as possible without congestion in complex networks. First, using neural networks, we introduce a strategy for packet routing on complex networks, where path lengths and queue lengths in nodes are taken into account within a framework of statistical physics. Secondly, instead of using shortest paths, we propose efficient paths which avoid hubs, nodes with a great many degrees, on scale-free networks with a weight of each node. We improve the heuristic algorithm proposed by Danila et. al. which optimizes step by step routing properties on congestion by using the information of betweenness, the probability of paths passing through a node in all optimal paths which are defined according to a rule, and mitigates the congestion. We confirm the new heuristic algorithm which balances traffic on networks by achieving minimization of the maximum betweenness in much smaller number of iteration steps. Finally, We model virus spreading and data transfer on peer-to-peer (P2P) networks. Using mean-field approximation, we obtain an analytical formulation and emulate virus spreading on the network and compare the results with those of simulation. Moreover, we investigate the mitigation of information traffic congestion in the P2P networks.

  16. Semantic Technology Application for Collective Knowledge and Information Management: Prospective Consumer Needs Identification

    Directory of Open Access Journals (Sweden)

    Ilma Pranciulytė-Bagdziunienė

    2013-01-01

    , innovative organization development, to ensure efficient information and knowledge management. The success of such organizations and activities leads to experience, promotion of internal growth and cooperation needs. It can be assumed that the ST application, organizations can promote networking, cluster formation and the formation of other social networks. Extending the applicability of the ST segment of consumers is likely to increase demand for services, the supply range, and encourage the formation of complex service systems. Keywords: information and knowledge management, semantic technologies, ontologies, innovative products and services, insights of prospective technology markets.

  17. Information and Innovation Management within Information Technology Enterprises

    OpenAIRE

    Geoff D. Skinner

    2010-01-01

    Australia, while being a large and eager consumer of innovative and cutting edge Information and Communication Technologies (ICT), continues to struggle to remain a leader in Technological Innovation. This paper has two main contributions to address certain aspects of this complex issue. The first being the current findings of an ongoing research project on Information and Innovation Management in the Australian Information and Communication Technologies (ICT) sector. The...

  18. Mobile Computing and Ubiquitous Networking: Concepts, Technologies and Challenges.

    Science.gov (United States)

    Pierre, Samuel

    2001-01-01

    Analyzes concepts, technologies and challenges related to mobile computing and networking. Defines basic concepts of cellular systems. Describes the evolution of wireless technologies that constitute the foundations of mobile computing and ubiquitous networking. Presents characterization and issues of mobile computing. Analyzes economical and…

  19. The research on information security technology for the industrial control system of special equipment

    International Nuclear Information System (INIS)

    Chen Ligang; Liu Hongye; Zhang Wei; Sun Jianying; Lan Peng; Dai Sidan

    2014-01-01

    With the rapid development of information technology in enterprise application, industrial control network and management network is becoming more and more closely linked. Development and application of special equipment control system from the traditional industrial control system, not considered when designing communication security problem mainly, therefore, the industrial control system opened at the same time, isolation control system and the outside was weakened, the safety problems of industrial control system had become more and more serious. The practical application combined with the special equipment control system, analysis and elaboration in view of security problems for the control network, also, provide appropriate security solutions for professional characteristics of industrial control network, design on process control system specially, provide security partition protection scheme, in order to improve security ability of industrial control system information. (authors)

  20. Research and Design of Dynamic Migration Access Control Technology Based on Heterogeneous Network

    Directory of Open Access Journals (Sweden)

    Wang Feng

    2017-01-01

    Full Text Available With the continuous development of wireless networks, the amount of privacy services in heterogeneous mobile networks is increasing, such as information storage, user access, and so on. Access control security issues for heterogeneous mobile radio network, this paper proposes a dynamic migration access control technology based on heterogeneous network. Through the system architecture of the mutual trust system, we can understand the real-time mobile node failure or abnormal state. To make the service can be terminated for the node. And adopt the 802.1X authentication way to improve the security of the system. Finally, it by combining the actual running test data, the trust update algorithm of the system is optimized to reduce the actual security threats in the environment. Experiments show that the system’s anti-attack, the success rate of access, bit error rate is in line with the expected results. This system can effectively reduce the system authentication information is illegally obtained after the network security protection mechanism failure and reduce the risk of user data leakage.

  1. Automatic summary generating technology of vegetable traceability for information sharing

    Science.gov (United States)

    Zhenxuan, Zhang; Minjing, Peng

    2017-06-01

    In order to solve problems of excessive data entries and consequent high costs for data collection in vegetable traceablility for farmers in traceability applications, the automatic summary generating technology of vegetable traceability for information sharing was proposed. The proposed technology is an effective way for farmers to share real-time vegetable planting information in social networking platforms to enhance their brands and obtain more customers. In this research, the influencing factors in the vegetable traceablility for customers were analyzed to establish the sub-indicators and target indicators and propose a computing model based on the collected parameter values of the planted vegetables and standard legal systems on food safety. The proposed standard parameter model involves five steps: accessing database, establishing target indicators, establishing sub-indicators, establishing standard reference model and computing scores of indicators. On the basis of establishing and optimizing the standards of food safety and traceability system, this proposed technology could be accepted by more and more farmers and customers.

  2. Impact of bandwidth for various services in heterogeneous network and quality of service via communication technologies in Malaysian higher educational

    Directory of Open Access Journals (Sweden)

    Mohd Nazri ISMAIL

    2007-12-01

    Full Text Available This study focuses on heterogeneous services and communication technologies for retrieving and sending information between students and lecturers in Malaysian higher educational institutes. It intends to investigate pattern and significant level of various services implementation, convergence of communication technologies and bandwidth capacity for last mile users (students and lecturers. It is designed to determine which communication technologies, services, bandwidth capacity and QoS will achieve the highest level acceptance in Malaysian higher educational institutes. Heterogeneous environment can also generate mobility approaches. A survey method is used to collect data from respondents (System Network Administrator in Malaysian higher educational institutes. Statistical Analysis using t-test shows that implementation of high speed bandwidth for Internet (WAN achieved significant level. Frequency test are used to analyze the various services implementation via convergence of communication technologies in heterogeneous environment for retrieving information. The most apparent finding of this study is that various services implementation in higher educational institutes can affect convergence of communication technologies usage in accessing information over heterogeneous network environment between students and lecturers. The study or analysis confirms that Malaysia higher educational institutes have not achieved a maximum level of various services implementation via convergence of communication technologies between students and lecturers in heterogeneous network environment. Therefore, low convergence of communication technologies can produce a low mobility and ubiquitous interaction between students and lectures in Malaysian higher educational institutes.

  3. Knowledge network for medical technology management in Mexico.

    Science.gov (United States)

    Licona, Fabiola Martínez; Leehan, Joaquín Azpiroz; Méndez, Miguel Cadena; Yuriar, Salvador Duarte; Salazar, Raúl Molina; Gilmore, Amador Terán

    2009-10-01

    The role of biomedical engineers (BMEs) has changed widely over the years, from managing a group of technicians to the planning of large installations and the management of medical technology countrywide. As the technology has advanced, the competence of BMEs has been challenged because it is no longer possible to be an expert in every component of the technology involved in running a hospital. Our approach has been to form a network of professionals that are experts in different fields related to medical technology, where work is coordinated to provide high quality services at the planning and execution stages of projects related to medical technology. A study of the procedures involved in the procurement of medical technology has been carried out over the years. These experiences have been compared with several case studies where the approach to problem solving in this area has been multidisciplinary. Planning and execution phases of projects involving medical technology management have been identified. After several instances of collaboration among experts from different fields, a network for management of healthcare technology has been formed at our institution that incorporates the experience from different departments that were dealing separately with projects involving medical technology. This network has led us to propose this approach to solve medical technology management projects, where the strengths of each subgroup complement each other. This structure will lead to a more integrated approach to healthcare technology management and will ensure higher quality solutions.

  4. Renewable Energy Technology—Is It a Manufactured Technology or an Information Technology?

    Directory of Open Access Journals (Sweden)

    Kwok L. Shum

    2010-07-01

    Full Text Available Socio-technical or strategic approach to renewable energy deployment all suggests that the uptake of renewable energy technology such as solar photovoltaic is as much a social issue as a technical issue. Among social issues, one most direct and immediate component is the cost of the renewable energy technology. Because renewable electricity provides no new functionality—a clean electron does the same work as a dirty electron does—but is relatively expensive compared with fossil fuel based electricity, there is currently an under-supply of renewable electricity. Policy instruments based on economics approaches are therefore developed to encourage the production and consumption of renewable electricity, aiming to remediate the market inefficiencies that stem from the failure in internalizing the environmental or social costs of fossil fuels. In this vein, the most discussed instruments are renewable portfolio standard or quota based system and the general category of feed-in tariff. Feed-in tariff is to support output or generation of the renewable electricity by subsidizing revenues. The existing discussions have all concerned about the relative effectiveness of these two instruments in terms of cost, prices and implementation efficiency. This paper attempts a different basis of evaluation of these two instruments in terms of cost and (network externality effects. The cost effect is driven by deploying the renewable as a manufactured technology, and the network externality effect is driven by deploying the renewable as an information technology. The deployment instruments are studied in terms of how these two effects are leveraged in the deployment process. Our formulation lends itself to evolutionary policy interpretation. Future research directions associated with this new energy policy framework is then suggested.

  5. Generic, network schema agnostic sparse tensor factorization for single-pass clustering of heterogeneous information networks.

    Science.gov (United States)

    Wu, Jibing; Meng, Qinggang; Deng, Su; Huang, Hongbin; Wu, Yahui; Badii, Atta

    2017-01-01

    Heterogeneous information networks (e.g. bibliographic networks and social media networks) that consist of multiple interconnected objects are ubiquitous. Clustering analysis is an effective method to understand the semantic information and interpretable structure of the heterogeneous information networks, and it has attracted the attention of many researchers in recent years. However, most studies assume that heterogeneous information networks usually follow some simple schemas, such as bi-typed networks or star network schema, and they can only cluster one type of object in the network each time. In this paper, a novel clustering framework is proposed based on sparse tensor factorization for heterogeneous information networks, which can cluster multiple types of objects simultaneously in a single pass without any network schema information. The types of objects and the relations between them in the heterogeneous information networks are modeled as a sparse tensor. The clustering issue is modeled as an optimization problem, which is similar to the well-known Tucker decomposition. Then, an Alternating Least Squares (ALS) algorithm and a feasible initialization method are proposed to solve the optimization problem. Based on the tensor factorization, we simultaneously partition different types of objects into different clusters. The experimental results on both synthetic and real-world datasets have demonstrated that our proposed clustering framework, STFClus, can model heterogeneous information networks efficiently and can outperform state-of-the-art clustering algorithms as a generally applicable single-pass clustering method for heterogeneous network which is network schema agnostic.

  6. Secure, Mobile, Wireless Network Technology Designed, Developed, and Demonstrated

    Science.gov (United States)

    Ivancic, William D.; Paulsen, Phillip E.

    2004-01-01

    The inability to seamlessly disseminate data securely over a high-integrity, wireless broadband network has been identified as a primary technical barrier to providing an order-of-magnitude increase in aviation capacity and safety. Secure, autonomous communications to and from aircraft will enable advanced, automated, data-intensive air traffic management concepts, increase National Air Space (NAS) capacity, and potentially reduce the overall cost of air travel operations. For the first time ever, secure, mobile, network technology was designed, developed, and demonstrated with state-ofthe- art protocols and applications by a diverse, cooperative Government-industry team led by the NASA Glenn Research Center. This revolutionary technology solution will make fundamentally new airplane system capabilities possible by enabling secure, seamless network connections from platforms in motion (e.g., cars, ships, aircraft, and satellites) to existing terrestrial systems without the need for manual reconfiguration. Called Mobile Router, the new technology autonomously connects and configures networks as they traverse from one operating theater to another. The Mobile Router demonstration aboard the Neah Bay, a U.S. Coast Guard vessel stationed in Cleveland, Ohio, accomplished secure, seamless interoperability of mobile network systems across multiple domains without manual system reconfiguration. The Neah Bay was chosen because of its low cost and communications mission similarity to low-Earth-orbiting satellite platforms. This technology was successfully advanced from technology readiness level (TRL) 2 (concept and/or application formation) to TRL 6 (system model or prototype demonstration in a relevant environment). The secure, seamless interoperability offered by the Mobile Router and encryption device will enable several new, vehicle-specific and systemwide technologies to perform such things as remote, autonomous aircraft performance monitoring and early detection and

  7. Innovative information technologies and their impact on the performance of the entities which activate in the retail industry

    Directory of Open Access Journals (Sweden)

    Valentin-Florentin Dumitru

    2015-05-01

    Full Text Available The use of innovative information technologies can represent an advantage for the companies in the retail industry. This research is based on the results of an empirical study. The research was built under the auspices of the diffusion of innovations theory. Using the questionnaires collected we could establish correlations between the variables included into three categories (company’s size, the information technologies used for retail, the impact of information technologies on the company and we developed two original econometric models. The turnover is considered an endogenous variable (underlying the impact of the information technologies on its value as well as exogenous (the existence of a unique computers network within the company depending on the turnover as a development factor. The models show that there is a negative correlation between the total turnover and the percentage of the turnover obtained through online sales, respectively the existence of a unique computers network is influenced by the existence of the online retail within the company. The conclusions underline the research limits and the necessary future developments.

  8. A general framework for a collaborative water quality knowledge and information network.

    Science.gov (United States)

    Dalcanale, Fernanda; Fontane, Darrell; Csapo, Jorge

    2011-03-01

    Increasing knowledge about the environment has brought about a better understanding of the complexity of the issues, and more information publicly available has resulted into a steady shift from centralized decision making to increasing levels of participatory processes. The management of that information, in turn, is becoming more complex. One of the ways to deal with the complexity is the development of tools that would allow all players, including managers, researchers, educators, stakeholders and the civil society, to be able to contribute to the information system, in any level they are inclined to do so. In this project, a search for the available technology for collaboration, methods of community filtering, and community-based review was performed and the possible implementation of these tools to create a general framework for a collaborative "Water Quality Knowledge and Information Network" was evaluated. The main goals of the network are to advance water quality education and knowledge; encourage distribution and access to data; provide networking opportunities; allow public perceptions and concerns to be collected; promote exchange of ideas; and, give general, open, and free access to information. A reference implementation was made available online and received positive feedback from the community, which also suggested some possible improvements.

  9. Distance Education in Information Technology, a case study

    DEFF Research Database (Denmark)

    Helbo, Jan; Knudsen, Morten

    2002-01-01

    Project organized problem based learning is a successful concept for on-campus education at Aalborg University. The "Aalborg concept" has been used in networked distance education as well. This paper describes a project from the first year of our Master of Information Technology education organized......, and the designed solution should be implemented on a test rig. In spite of this, the group fulfilled the goals satisfactorily, and made an impressive project. The main conclusions are, that the project work is a strong learning motivator, enhancing peer collaboration, for off-campus students as well. However...

  10. Towards the systematic development of medical networking technology.

    Science.gov (United States)

    Faust, Oliver; Shetty, Ravindra; Sree, S Vinitha; Acharya, Sripathi; Acharya U, Rajendra; Ng, E Y K; Poo, Chua Kok; Suri, Jasjit

    2011-12-01

    Currently, there is a disparity in the availability of doctors between urban and rural areas of developing countries. Most experienced doctors and specialists, as well as advanced diagnostic technologies, are available in urban areas. People living in rural areas have less or sometimes even no access to affordable healthcare facilities. Increasing the number of doctors and charitable medical hospitals or deploying advanced medical technologies in these areas might not be economically feasible, especially in developing countries. We need to mobilize science and technology to master this complex, large scale problem in an objective, logical, and professional way. This can only be achieved with a collaborative effort where a team of experts works on both technical and non-technical aspects of this health care divide. In this paper we use a systems engineering framework to discuss hospital networks which might be solution for the problem. We argue that with the advancement in communication and networking technologies, economically middle class people and even some rural poor have access to internet and mobile communication systems. Thus, Hospital Digital Networking Technologies (HDNT), such as telemedicine, can be developed to utilize internet, mobile and satellite communication systems to connect primitive rural healthcare centers to well advanced modern urban setups and thereby provide better consultation and diagnostic care to the needy people. This paper describes requirements and limitations of the HDNTs. It also presents the features of telemedicine, the implementation issues and the application of wireless technologies in the field of medical networking.

  11. Router Agent Technology for Policy-Based Network Management

    Science.gov (United States)

    Chow, Edward T.; Sudhir, Gurusham; Chang, Hsin-Ping; James, Mark; Liu, Yih-Chiao J.; Chiang, Winston

    2011-01-01

    This innovation can be run as a standalone network application on any computer in a networked environment. This design can be configured to control one or more routers (one instance per router), and can also be configured to listen to a policy server over the network to receive new policies based on the policy- based network management technology. The Router Agent Technology transforms the received policies into suitable Access Control List syntax for the routers it is configured to control. It commits the newly generated access control lists to the routers and provides feedback regarding any errors that were faced. The innovation also automatically generates a time-stamped log file regarding all updates to the router it is configured to control. This technology, once installed on a local network computer and started, is autonomous because it has the capability to keep listening to new policies from the policy server, transforming those policies to router-compliant access lists, and committing those access lists to a specified interface on the specified router on the network with any error feedback regarding commitment process. The stand-alone application is named RouterAgent and is currently realized as a fully functional (version 1) implementation for the Windows operating system and for CISCO routers.

  12. Extracting information from multiplex networks

    Science.gov (United States)

    Iacovacci, Jacopo; Bianconi, Ginestra

    2016-06-01

    Multiplex networks are generalized network structures that are able to describe networks in which the same set of nodes are connected by links that have different connotations. Multiplex networks are ubiquitous since they describe social, financial, engineering, and biological networks as well. Extending our ability to analyze complex networks to multiplex network structures increases greatly the level of information that is possible to extract from big data. For these reasons, characterizing the centrality of nodes in multiplex networks and finding new ways to solve challenging inference problems defined on multiplex networks are fundamental questions of network science. In this paper, we discuss the relevance of the Multiplex PageRank algorithm for measuring the centrality of nodes in multilayer networks and we characterize the utility of the recently introduced indicator function Θ ˜ S for describing their mesoscale organization and community structure. As working examples for studying these measures, we consider three multiplex network datasets coming for social science.

  13. Information Technology Management

    OpenAIRE

    Patru Catalin; Petrache Alina

    2011-01-01

    Most of the Information technology management programs are designed to educate and develop managers who can effectively manage the planning, design, selection, implementation, use, and administration of emerging and converging information and communications technologies. The IT Manager and the Project Manager are not at odds. The Project Manager’s ability to focus knowledge, skills, tools and techniques on the temporary endeavor frees the IT Manager to focus on keeping the wheels of commerce ...

  14. Information and Communication Technology

    DEFF Research Database (Denmark)

    Kaila, Heidi Kristiina

    2017-01-01

    The emergence and development of the information and communication sector has been rapid in rural Viet Nam over 2006–14, and a true information and communication technology (ICT) revolution has taken place. This chapter examines household ownership and use of ICT. It studies the geographic and de...... wealthier and more educated than households with phones on average, the adoption patterns of these two technologies are very similar. ICT adoption is driven by education and income, as well as wealth and ownership of other technology.......The emergence and development of the information and communication sector has been rapid in rural Viet Nam over 2006–14, and a true information and communication technology (ICT) revolution has taken place. This chapter examines household ownership and use of ICT. It studies the geographic...... and demographic differences across ownership of technology, especially phones and the Internet, and the determinants of ICT adoption. First, it finds that expansion of telephones has been much more rapid than the expansion of the Internet. Second, it finds that even though in 2014 internet users were relatively...

  15. Proceedings of the international conference on nascent technologies in the engineering fields of mechanical, electrical, electronics and telecommunication and computer/information technology: souvenir

    International Nuclear Information System (INIS)

    2015-01-01

    This conference contains papers on grid computing, advanced networking, data mining, biometric technologies, social networks and social aspects of information technology, robotics and mechatronics, advances in manufacturing technology, modelling and simulation of mechanical systems, recent trends in refrigeration and air conditioning, energy conservation and alternative fuels and advances in vibration control and its techniques. It also addresses issues in the field of power generation transmission and distribution, energy management and energy efficiency, applications of power electronics and solid state devices, renewable energy technology, distributed generation and micro grid, drives, controls and automation and power quality. The electronics and telecommunication track received good response in the fields of wired and wireless communication, advanced communications, digital signal processing and its applications, optical and microwave communication, embedded and VLSI technology, micro electronics and nano-technology, antenna applications and solid state devices. Papers relevant to INIS are indexed separately

  16. Applying Trusted Network Technology To Process Control Systems

    Science.gov (United States)

    Okhravi, Hamed; Nicol, David

    Interconnections between process control networks and enterprise networks expose instrumentation and control systems and the critical infrastructure components they operate to a variety of cyber attacks. Several architectural standards and security best practices have been proposed for industrial control systems. However, they are based on older architectures and do not leverage the latest hardware and software technologies. This paper describes new technologies that can be applied to the design of next generation security architectures for industrial control systems. The technologies are discussed along with their security benefits and design trade-offs.

  17. The Network Information Management System (NIMS) in the Deep Space Network

    Science.gov (United States)

    Wales, K. J.

    1983-01-01

    In an effort to better manage enormous amounts of administrative, engineering, and management data that is distributed worldwide, a study was conducted which identified the need for a network support system. The Network Information Management System (NIMS) will provide the Deep Space Network with the tools to provide an easily accessible source of valid information to support management activities and provide a more cost-effective method of acquiring, maintaining, and retrieval data.

  18. Understanding access and use of technology among youth with first-episode psychosis to inform the development of technology-enabled therapeutic interventions.

    Science.gov (United States)

    Abdel-Baki, Amal; Lal, Shalini; D-Charron, Olivier; Stip, Emmanuel; Kara, Nadjia

    2017-02-01

    Computers, video games and technological devices are part of young people's everyday lives. However, their use in first-episode psychosis (FEP) treatment is rare. The purpose of this study was to better understand the access and use of technology among individuals with FEP, including gaming activities, to inform future development of technology-enabled therapeutic applications. Self-administered survey on use of technological tools in 71 FEP individuals. PCs/laptops were used by all participants; cellphones/smartphones by 92%, consoles by 83% (mainly male and younger participants). Women texted and used social networks more frequently; men played games (mainly action) more often. The younger individuals reported playing games frequently (32% daily) with less use of the Web and social networks (favourite: Facebook). These data will be useful for developing Web-based psychoeducation tools and cognitive remediation video games for youth with FEP. © 2015 Wiley Publishing Asia Pty Ltd.

  19. Standardising the Information Technology Environment at Telstra Corporation: a case study

    Directory of Open Access Journals (Sweden)

    Carey Butler

    1997-05-01

    Full Text Available Telstra is Australia's leading telecommunications carrier and largest single user of information technology (IT. In November 1990, the Australian federal government announced wide-ranging reforms and the introduction of competition within the telecommunications sector. Realising that it was essential for the corporation to leverage its use of technology on a firm-wide basis in order to remain a strong and flexible competitor, in 1991, Telstra embarked upon a major overhaul of its existing IT infrastructure. Central to this was the establishment of standardised operating environments (SOE for all computing resources used at Telstra. This paper traces the development of Telstra's data network and desktop SOEs. The paper examines the strategic drivers for the SOEs, the business benefits, and issues related to Telstra's computing environment prior to, and after the introduction of network and desktop SOEs.

  20. A flood-based information flow analysis and network minimization method for gene regulatory networks.

    Science.gov (United States)

    Pavlogiannis, Andreas; Mozhayskiy, Vadim; Tagkopoulos, Ilias

    2013-04-24

    Biological networks tend to have high interconnectivity, complex topologies and multiple types of interactions. This renders difficult the identification of sub-networks that are involved in condition- specific responses. In addition, we generally lack scalable methods that can reveal the information flow in gene regulatory and biochemical pathways. Doing so will help us to identify key participants and paths under specific environmental and cellular context. This paper introduces the theory of network flooding, which aims to address the problem of network minimization and regulatory information flow in gene regulatory networks. Given a regulatory biological network, a set of source (input) nodes and optionally a set of sink (output) nodes, our task is to find (a) the minimal sub-network that encodes the regulatory program involving all input and output nodes and (b) the information flow from the source to the sink nodes of the network. Here, we describe a novel, scalable, network traversal algorithm and we assess its potential to achieve significant network size reduction in both synthetic and E. coli networks. Scalability and sensitivity analysis show that the proposed method scales well with the size of the network, and is robust to noise and missing data. The method of network flooding proves to be a useful, practical approach towards information flow analysis in gene regulatory networks. Further extension of the proposed theory has the potential to lead in a unifying framework for the simultaneous network minimization and information flow analysis across various "omics" levels.

  1. A nested virtualization tool for information technology practical education.

    Science.gov (United States)

    Pérez, Carlos; Orduña, Juan M; Soriano, Francisco R

    2016-01-01

    A common problem of some information technology courses is the difficulty of providing practical exercises. Although different approaches have been followed to solve this problem, it is still an open issue, specially in security and computer network courses. This paper proposes NETinVM, a tool based on nested virtualization that includes a fully functional lab, comprising several computers and networks, in a single virtual machine. It also analyzes and evaluates how it has been used in different teaching environments. The results show that this tool makes it possible to perform demos, labs and practical exercises, greatly appreciated by the students, that would otherwise be unfeasible. Also, its portability allows to reproduce classroom activities, as well as the students' autonomous work.

  2. Spinal Cord Injury Model System Information Network

    Science.gov (United States)

    ... the UAB-SCIMS More The UAB-SCIMS Information Network The University of Alabama at Birmingham Spinal Cord Injury Model System (UAB-SCIMS) maintains this Information Network as a resource to promote knowledge in the ...

  3. Information technology investments must deliver value

    International Nuclear Information System (INIS)

    Schulz, Y.

    1998-01-01

    The value of information technology (IT) management for the petroleum industry was discussed. There are currently two points of view regarding the subject. Adherents of one view hold that the strategic uses of information technology are relevant to the oil and gas industry, while those opposed find no demonstrated connection between information technology investments and business results. This paper addresses the impact of the information paradox, but maintains that information technology is not only valuable but essential to the oil and gas industry. This paper maintains that whenever it is perceived as being of limited use and too expensive, it is usually because it is not well managed. Value management can and should lead to superior outcomes. Neither exploration, nor drilling nor production, nor marketing could exist without information technology as the value is imperative. To further make the case, the nature of information technology value management and the strategies required to achieve value from information technology are reviewed. figs

  4. Development of Information Technology for Smart Defense

    International Nuclear Information System (INIS)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun; Han, Sangcheol

    2014-01-01

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation

  5. Development of Information Technology for Smart Defense

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Kyoil; Lee, So Yeon; Park, Sangjoon; Park, Jonghyun [ETRI, Daejeon (Korea, Republic of); Han, Sangcheol [KEIT, Seoul (Korea, Republic of)

    2014-03-15

    Recently, there has been demand for the convergence of IT (Information and communication Technologies, ICT) with defense, as has already been achieved in civilian fields such as healthcare and construction. It is expected that completely new and common requirements would emerge from the civilian and military domains and that the shape of war field would change rapidly. Many military scientists forecast that future wars would be network-centric and be based on C4I(Command, Control, Communication and Computer, Intelligence), ISR(Intelligence, Surveillance and Reconnaissance), and PGM(Precision Guided Munitions). For realizing the smart defense concept, IT should act as a baseline technology even for simulating a real combat field using virtual reality. In this paper, we propose the concept of IT-based smart defense with a focus on accurate detection in real and cyber wars, effective data communication, automated and unmanned operation, and modeling and simulation.

  6. Students' Informal Peer Feedback Networks

    Science.gov (United States)

    Headington, Rita

    2018-01-01

    The nature and significance of students' informal peer feedback networks is an under-explored area. This paper offers the findings of a longitudinal investigation of the informal peer feedback networks of a cohort of student teachers [n = 105] across the three years of a UK primary education degree programme. It tracked the dynamic nature of these…

  7. Social Networks and Corporate Information Security

    Directory of Open Access Journals (Sweden)

    Ekaterina Gennadievna Kondratova

    2013-06-01

    Full Text Available It is defined in the article social networks as a tool in the hands of cyber-criminals to compromise the organization’s data. The author focuses on a list of threats to information security caused by social networks usage, which should be considered in the set up of information security management system of the company.

  8. Information and Communications Technologies (ICT): Problematic use of Internet, video games, mobile phones, instant messaging and social networks using MULTICAGE-TIC.

    Science.gov (United States)

    Pedrero Pérez, Eduardo J; Ruiz Sánchez de León, José María; Rojo Mota, Gloria; Llanero Luque, Marcos; Pedrero Aguilar, Jara; Morales Alonso, Sara; Puerta García, Carmen

    2018-01-01

    Use/abuse of Information and Communications Technologies (ICT) has in recent years become a topic of great interest. Current discussion addresses whether it must be considered addictive behaviour and if it is a problem that primarily affects adolescents and youth. This study aims to understand the problems that affect people of all ages in controlling the use of these ICTs and whether they are related to mental health problems, stress and difficulties in executive control of behaviour. A survey was administered through social networks and email, using the MULTICAGE-ICT, a questionnaire that explores problems in the use of Internet, mobile phones, video games, instant messaging and social networks. Additionally, the Prefrontal Symptom Inventory, General Health Questionnaire and Perceived Stress Scale were administered. The sample was comprised of 1,276 individuals of all ages from different Spanish-speaking countries. The results indicate that about 50% of the sample, regardless of age or other variables, presents significant problems with the use of these technologies, and that these problems are directly related to symptoms of poor prefrontal functioning, stress and mental health problems. The results reveal the need for reconsidering whether we are facing an addictive behaviour or a new problem demanding environmental, psychological, sociological and sociopolitical explanations; therefore, it is necessary to reformulate actions to be implemented to address and refocus our understanding of the problem.

  9. Optimal control of epidemic information dissemination over networks.

    Science.gov (United States)

    Chen, Pin-Yu; Cheng, Shin-Ming; Chen, Kwang-Cheng

    2014-12-01

    Information dissemination control is of crucial importance to facilitate reliable and efficient data delivery, especially in networks consisting of time-varying links or heterogeneous links. Since the abstraction of information dissemination much resembles the spread of epidemics, epidemic models are utilized to characterize the collective dynamics of information dissemination over networks. From a systematic point of view, we aim to explore the optimal control policy for information dissemination given that the control capability is a function of its distribution time, which is a more realistic model in many applications. The main contributions of this paper are to provide an analytically tractable model for information dissemination over networks, to solve the optimal control signal distribution time for minimizing the accumulated network cost via dynamic programming, and to establish a parametric plug-in model for information dissemination control. In particular, we evaluate its performance in mobile and generalized social networks as typical examples.

  10. Research on Network Defense Strategy Based on Honey Pot Technology

    Science.gov (United States)

    Hong, Jianchao; Hua, Ying

    2018-03-01

    As a new network security technology of active defense, The honeypot technology has become a very effective and practical method of decoy attackers. The thesis discusses the theory, structure, characteristic, design and implementation of Honeypot in detail. Aiming at the development of means of attack, put forward a kind of network defense technology based on honeypot technology, constructing a virtual Honeypot demonstrate the honeypot’s functions.

  11. INFORMATION TECHNOLOGIES IN ECONOMIC EDUCATION

    OpenAIRE

    I.A. Kinash

    2011-01-01

    In the article the basic aspects of the use of modern information technologies in an educational process are examined. Described directions of introduction of information technologies in economic education. Problems which are related to practice of professional preparation of specialists of economic specialities are examined. The role of information technologies in professional activity of specialists of economic type is underlined.

  12. INFORMATION TECHNOLOGIES IN ECONOMIC EDUCATION

    Directory of Open Access Journals (Sweden)

    I.A. Kinash

    2011-11-01

    Full Text Available In the article the basic aspects of the use of modern information technologies in an educational process are examined. Described directions of introduction of information technologies in economic education. Problems which are related to practice of professional preparation of specialists of economic specialities are examined. The role of information technologies in professional activity of specialists of economic type is underlined.

  13. The development of information technologies

    Directory of Open Access Journals (Sweden)

    Kostúr Karol

    2002-12-01

    Full Text Available The contribution analyses the tasks information technologies in industry. At present time is the problem of connecting mutual variously levels of management. Therefore, first priority is an integration of information technologies. The information technologies for enterprise management are analysed. The product SAP R/3 appears as suitable for top management. The SAP R/3 Enterprise has a new technology so call web-server. This server enables the integration with e-business. The development my SAP is based on application of Business information warehouse (BW and Strategic enterprise management (SEM. The cheaper products (SPIN + EVIS are characterized too. Whitness Miner is very interesting system. The contribution this technology is programming realization of method KDD – knowledge discovery in databases.

  14. Experimental resource pulses influence social-network dynamics and the potential for information flow in tool-using crows.

    Science.gov (United States)

    St Clair, James J H; Burns, Zackory T; Bettaney, Elaine M; Morrissey, Michael B; Otis, Brian; Ryder, Thomas B; Fleischer, Robert C; James, Richard; Rutz, Christian

    2015-11-03

    Social-network dynamics have profound consequences for biological processes such as information flow, but are notoriously difficult to measure in the wild. We used novel transceiver technology to chart association patterns across 19 days in a wild population of the New Caledonian crow--a tool-using species that may socially learn, and culturally accumulate, tool-related information. To examine the causes and consequences of changing network topology, we manipulated the environmental availability of the crows' preferred tool-extracted prey, and simulated, in silico, the diffusion of information across field-recorded time-ordered networks. Here we show that network structure responds quickly to environmental change and that novel information can potentially spread rapidly within multi-family communities, especially when tool-use opportunities are plentiful. At the same time, we report surprisingly limited social contact between neighbouring crow communities. Such scale dependence in information-flow dynamics is likely to influence the evolution and maintenance of material cultures.

  15. Essential elements of online information networks on invasive alien species

    Science.gov (United States)

    Simpson, A.; Sellers, E.; Grosse, A.; Xie, Y.

    2006-01-01

    In order to be effective, information must be placed in the proper context and organized in a manner that is logical and (preferably) standardized. Recently, invasive alien species (IAS) scientists have begun to create online networks to share their information concerning IAS prevention and control. At a special networking session at the Beijing International Symposium on Biological Invasions, an online Eastern Asia-North American IAS Information Network (EA-NA Network) was proposed. To prepare for the development of this network, and to provide models for other regional collaborations, we compare four examples of global, regional, and national online IAS information networks: the Global Invasive Species Information Network, the Invasives Information Network of the Inter-American Biodiversity Information Network, the Chinese Species Information System, and the Invasive Species Information Node of the US National Biological Information Infrastructure. We conclude that IAS networks require a common goal, dedicated leaders, effective communication, and broad endorsement, in order to obtain sustainable, long-term funding and long-term stability. They need to start small, use the experience of other networks, partner with others, and showcase benefits. Global integration and synergy among invasive species networks will succeed with contributions from both the top-down and the bottom-up. ?? 2006 Springer.

  16. Towards an Information Theory of Complex Networks

    CERN Document Server

    Dehmer, Matthias; Mehler, Alexander

    2011-01-01

    For over a decade, complex networks have steadily grown as an important tool across a broad array of academic disciplines, with applications ranging from physics to social media. A tightly organized collection of carefully-selected papers on the subject, Towards an Information Theory of Complex Networks: Statistical Methods and Applications presents theoretical and practical results about information-theoretic and statistical models of complex networks in the natural sciences and humanities. The book's major goal is to advocate and promote a combination of graph-theoretic, information-theoreti

  17. Visualising Actor Network for Cooperative Systems in Marine Technology

    DEFF Research Database (Denmark)

    Pan, Yushan; Finken, Sisse

    2016-01-01

    Awareness is a concept familiar to specialists within the field of Computer Supported Cooperative Work (CSCW). It is superior for analysing and describing some of the ad hoc work activities that unfold in cooperation. Such informal activities are outside the scope of engineers’ formal models, whi...... that shape computer systems. The aim, thus, is to portray cooperative work in a way that can be valuable for engineers implementing marine technology. We do so by way of presenting a transferring technique (2T) using insights from the CSCW field and Actor Network Theory (ANT)....

  18. Information theory perspective on network robustness

    International Nuclear Information System (INIS)

    Schieber, Tiago A.; Carpi, Laura; Frery, Alejandro C.; Rosso, Osvaldo A.; Pardalos, Panos M.; Ravetti, Martín G.

    2016-01-01

    A crucial challenge in network theory is the study of the robustness of a network when facing a sequence of failures. In this work, we propose a dynamical definition of network robustness based on Information Theory, that considers measurements of the structural changes caused by failures of the network's components. Failures are defined here as a temporal process defined in a sequence. Robustness is then evaluated by measuring dissimilarities between topologies after each time step of the sequence, providing a dynamical information about the topological damage. We thoroughly analyze the efficiency of the method in capturing small perturbations by considering different probability distributions on networks. In particular, we find that distributions based on distances are more consistent in capturing network structural deviations, as better reflect the consequences of the failures. Theoretical examples and real networks are used to study the performance of this methodology. - Highlights: • A novel methodology to measure the robustness of a network to component failure or targeted attacks is proposed. • The use of the network's distance PDF allows a precise analysis. • The method provides a dynamic robustness profile showing the response of the topology to each failure event. • The measure is capable to detect network's critical elements.

  19. [No exchange of information without technology : modern infrastructure in radiology].

    Science.gov (United States)

    Hupperts, H; Hermann, K-G A

    2014-01-01

    Modern radiology cannot accomplish the daily numbers of examinations without supportive technology. Even though technology seems to be becoming increasingly more indispensable, business continuity should be ensured at any time and if necessary even with a limited technical infrastructure by business continuity management. An efficient information security management system forms the basis. The early radiology information systems were islands of information processing. A modern radiology department must be able to be modularly integrated into an informational network of a bigger organization. The secondary use of stored data for clinical decision-making support poses new challenges for the integrity of the data or systems because medical knowledge is displayed and provided in a context of treatment. In terms of imaging the creation and distribution radiology services work in a fully digital manner which is often different for radiology reports. Legally secure electronic diagnostic reports require a complex technical infrastructure; therefore, diagnostic findings still need to be filed as a paper document. The internal exchange and an improved dose management can be simplified by systems which continuously and automatically record the doses and thus provide the possibility of permanent analysis and reporting. Communication between patient and radiologist will gain ongoing importance. Intelligent use of technology will convey this to the radiologist and it will facilitate the understanding of the information by the patient.

  20. Informal networks: the company behind the chart.

    Science.gov (United States)

    Krackhardt, D; Hanson, J R

    1993-01-01

    A glance at an organizational chart can show who's the boss and who reports to whom. But this formal chart won't reveal which people confer on technical matters or discuss office politics over lunch. Much of the real work in any company gets done through this informal organization with its complex networks of relationships that cross functions and divisions. According to consultants David Krackhardt and Jeffrey Hanson, managers can harness the true power in their companies by diagramming three types of networks: the advice network, which reveals the people to whom others turn to get work done; the trust network, which uncovers who shares delicate information; and the communication network, which shows who talks about work-related matters. Using employee questionnaires, managers can generate network maps that will get to the root of many organizational problems. When a task force in a computer company, for example, was not achieving its goals, the CEO turned to network maps to find out why. He discovered that the task force leader was central in the advice network but marginal in the trust network. Task force members did not believe he would look out for their interests, so the CEO used the trust map to find someone to share responsibility for the group. And when a bank manager saw in the network map that there was little communication between tellers and supervisors, he looked for ways to foster interaction among employees of all levels. As companies continue to flatten and rely on teams, managers must rely less on their authority and more on understanding these informal networks. Managers who can use maps to identify, leverage, and revamp informal networks will have the key to success.

  1. Estimating the Theoretical Value for LAN Network Throughput Based Power Line Communications Technology Under the Homeplug 1.0 Standard

    Directory of Open Access Journals (Sweden)

    Martha Fabiola Contreras Higuera

    2013-06-01

    Full Text Available Power Line Communications (PLC refers to a group of technologies that allow to establish communication processes under the use of the grid as a physical means of transmission. The use of the grid as a physical means of transmission of information is not a new idea. Until a few years ago, the use of PLC had been limited to the implementation of solutions of control, automation and monitoring of sensors; which did not require a high bandwidth for its operation.During the late 1990s due to the new technological developments and the need to implement new alternatives for transfer of information, it was possible to reach speeds on the order of the Mbps, establishing the possibility of making use of the electricity network as a network of access. The current state of technology PLC allows to reach speeds of up to 200Mbps, which has enabled the transformation of the grid in a true network of band wide, capable of supporting data, voice and video provided by a telecommunications operator. The use of PLC-based network adapters allow easily design LANs and broadband communications through the electrical network, making any outlet in a point of connection for the user, without the need for wiring additional to existing ones.  The electrical network is a structure which so far has been exclusively used for the transport of electrical energy. However, it is possible to make use of this network in processes of communication and transmission of information such as: voice, data and video; Bearing in mind that grid had not been designed for this purpose. The performance is without doubt one of the aspects of greatest interest in the global analysis in networks LAN, due to the effect it produces on the end user. Basically, the most common parameters for evaluating the performance of a network are: Throughput, use of the canal and various measures of retardation. In this article is presented a simple analysis of the HomePlug 1.0 standard applied to the

  2. Learning teams and networks: using information technology as a means of managing work process development in healthcare organizations.

    Science.gov (United States)

    Korhonen, Vesa; Paavilainen, Eija

    2002-01-01

    This article focuses on the introduction of team learning and shared knowledge creation using computer-based learning environments and teams as networks in the development of healthcare organizations. Using computer technology, care units can be considered learning teams and the hospital a network of those learning teams. Team learning requires that the healthcare workers' intellectual capital and personal competence be viewed as an important resource in developing the quality of action of the entire healthcare organization.

  3. Noise enhances information transfer in hierarchical networks.

    Science.gov (United States)

    Czaplicka, Agnieszka; Holyst, Janusz A; Sloot, Peter M A

    2013-01-01

    We study the influence of noise on information transmission in the form of packages shipped between nodes of hierarchical networks. Numerical simulations are performed for artificial tree networks, scale-free Ravasz-Barabási networks as well for a real network formed by email addresses of former Enron employees. Two types of noise are considered. One is related to packet dynamics and is responsible for a random part of packets paths. The second one originates from random changes in initial network topology. We find that the information transfer can be enhanced by the noise. The system possesses optimal performance when both kinds of noise are tuned to specific values, this corresponds to the Stochastic Resonance phenomenon. There is a non-trivial synergy present for both noisy components. We found also that hierarchical networks built of nodes of various degrees are more efficient in information transfer than trees with a fixed branching factor.

  4. Predicting Information Flows in Network Traffic.

    Science.gov (United States)

    Hinich, Melvin J.; Molyneux, Robert E.

    2003-01-01

    Discusses information flow in networks and predicting network traffic and describes a study that uses time series analysis on a day's worth of Internet log data. Examines nonlinearity and traffic invariants, and suggests that prediction of network traffic may not be possible with current techniques. (Author/LRW)

  5. The role of information technology as a complementary resource in healthcare integrated delivery systems.

    Science.gov (United States)

    Thrasher, Evelyn H; Revels, Mark A

    2012-01-01

    As in many industries, it is recognized that there is a need to increase the use of information technology (IT) in the healthcare industry. However, until now, this has not occurred. In fact, some say that IT in healthcare has consistently fallen far short of expectations. The purpose of this study was to illuminate the need for a more holistic view of healthcare network integration and demonstrate that simply applying the latest technology to the network is not adequate for improving overall effectiveness. The study results showed that the more holistic view has to include management commitment, of complementarity between IT integration and organizational integration, and continued investments.

  6. Information technology equipment cooling system

    Science.gov (United States)

    Schultz, Mark D.

    2014-06-10

    According to one embodiment, a system for removing heat from a rack of information technology equipment may include a sidecar indoor air to liquid heat exchanger that cools warm air generated by the rack of information technology equipment. The system may also include a liquid to liquid heat exchanger and an outdoor heat exchanger. The system may further include configurable pathways to connect and control fluid flow through the sidecar heat exchanger, the liquid to liquid heat exchanger, the rack of information technology equipment, and the outdoor heat exchanger based upon ambient temperature and/or ambient humidity to remove heat from the rack of information technology equipment.

  7. The Social Construction of the Urban Use of Information Technology: The Case of Tampere, Finland

    Science.gov (United States)

    Inkinen, Tommi

    2006-01-01

    This paper explores the social use of information and communication technologies (ICTs) in the city of Tampere, Finland. It focuses on two essential elements: the city (as the location with national context) and citizens (as members of the "local" information society). The paper also examines the question of building social networks via…

  8. FY 2000 report on the results of the research study of environmental information network; 2000 nendo kankyo joho network ni kansuru chosa kenkyu hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-03-01

    Described herein are the FY 2000 results of the research study on environmental information network formation. The Internet is experiencing an explosive increase in volume of information distributed therethrough. This is accompanied by increased problems related to information searches, information exchange security and information-reliability guarantees. First in demand are excellent portal sites, and second are sites that can be relied on to responsibly provide information. Cooperation with the real world off the Net is of particular importance, because the operating organizations, e.g., sites, will lose their raison deter, unless they clarify their unique abilities and characteristics under the tendencies towards broadened bands and ubiquity. The public sector, on the other hand, is highly reliable, accumulates a large volume of information, and has high network capacity. It has various functions, e.g., supporting the activities pertaining to ISO standards, and promoting the activities, e.g., those for educational programs, interdisciplinary exchanges by researchers, and matching of various organizations. The international cooperation for environmental information needs construction and operation of the networks, and construction of the infrastructures in the developing countries. If information becomes more ubiquitous, a chaotic sea of information will result. NEDO is strongly obliged to serve as the beacon, because it has established a huge volume of environment-related technologies, information, and networks. (NEDO)

  9. Nurses' perception and barriers to use of information communication technology in a teaching hospital in Nigeria.

    Science.gov (United States)

    Irinoye, Omolola O; Ayandiran, Emmanuel Olufemi; Fakunle, Imoleayo; Mtshali, Ntombifikile

    2013-08-01

    The impact of information technology on nursing has been a subject of discourse for the latter half of the 20th century and the early part of the 21st. Despite its obvious benefits, adapting information technology to healthcare has been relatively difficult, and rates of use have been limited especially in many developing countries. This quantitative study has shown a generally low usage of information technology among nurses in the study setting. Many of the nurses adjudged themselves as novice in information technology, with 37.8% stating that they had never had formal training in information technology and many rating themselves as possessing little or no skill in the use of spreadsheet, databases, and so on. Many (55.6%) stated that they do not have access to information technology despite the fairly widespread satisfactory perception established among them. Results further showed that unreliable network connections, high work demand, inadequate number of computers, poor access to computers consequent on wrong locations, and poor system design with associated failure to fit work demands are some of the major barriers to the use of information technology in the study setting. These factors therefore need to be taken into consideration in any intervention that seeks to improve the nurses' use of information technology in clinical setting.

  10. FY 1995 Blue Book: High Performance Computing and Communications: Technology for the National Information Infrastructure

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — The Federal High Performance Computing and Communications HPCC Program was created to accelerate the development of future generations of high performance computers...

  11. FY 1997 Blue Book: High Performance Computing and Communications: Advancing the Frontiers of Information Technology

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — The Federal High Performance Computing and Communications HPCC Program will celebrate its fifth anniversary in October 1996 with an impressive array of...

  12. Information Flows in Networked Engineering Design Projects

    DEFF Research Database (Denmark)

    Parraguez, Pedro; Maier, Anja

    Complex engineering design projects need to manage simultaneously multiple information flows across design activities associated with different areas of the design process. Previous research on this area has mostly focused on either analysing the “required information flows” through activity...... networks at the project level or in studying the social networks that deliver the “actual information flow”. In this paper we propose and empirically test a model and method that integrates both social and activity networks into one compact representation, allowing to compare actual and required...... information flows between design spaces, and to assess the influence that these misalignments could have on the performance of engineering design projects....

  13. 76 FR 78009 - Information Collection; Implementation of Information Technology Security Provision

    Science.gov (United States)

    2011-12-15

    ...] Information Collection; Implementation of Information Technology Security Provision AGENCY: General Services... collection requirement regarding Implementation of Information Technology Security Provision. Public comments... Information Collection 3090- 0294, Implementation of Information Technology Security Provision, by any of the...

  14. The Asian Network for Education in Nuclear Technology (ANENT)

    International Nuclear Information System (INIS)

    Amin, F.; Grover, R.B.; Han, K.W.

    2004-01-01

    The per capita electricity availability in the Asian region is below the world average. Nuclear energy is considered by several countries in the region as a potential source to meet their growing energy demand. Thus, there is likely to be an expansion of nuclear power programme in the Asian region. Additionally, as the economies in the region expand, there will be an increasing role for isotope and radiation technologies in the health care, agriculture, and industrial sectors. The growing demand for power and non-power applications of nuclear technologies would require a sustainable supply of well-qualified nuclear workforce. The Asian Network for Education in Nuclear Technology, ANENT in short, was established in February 2004 in response to this need. The state of nuclear education in the region is at different levels in different countries. This diversity provides an opportunity for sharing of knowledge and resources. ANENT will facilitate cooperation in education, related research and training through: (i) sharing of information and materials on nuclear education and training; (ii) exchange of students, teachers and researchers; (iii) establishment of reference curricula and facilitating mutual recognition of degrees; and (iv) facilitating communication between ANENT member institutions and other regional and global networks. By focusing on education, ANENT complements existing activities undertaken by the International Atomic Energy Agency (IAEA) and supports IAEA activities for the preservation of nuclear knowledge. ANENT is a comprehensive initiative in education and training in that it will give equal importance to power and non-power technologies, thus meeting the diverse needs of the countries in the Asian region. (author)

  15. APPLICATION OF INFORMATION TECHNOLOGY IN SPORT

    Directory of Open Access Journals (Sweden)

    Šemsudin Plojović

    2006-06-01

    Full Text Available Information technology (IT is conception which integrates modern techniques integrated with modern computer systems and communications. The basic conception of IT makes: knowledge, intelligent system, communication and softer. Conception of IT is wader then conception of equipment (hardware. Information technology was made joining together three basic technologies: microelectronics, communications and PC equipment. Integration of those technologies starts somewhere around fifties – together with commercial computers and after that brings development of several new technologies but most important are: • sensor technologies (industrial sensor, keyboards, mousses, digital cameras, • biotechnology and genetic engineering technology, • robotic (industrial robots • artificial intelligence (for us very important part of experts systems • images technologies (modern monitors and printers, LCD displays, high resolution TV monitors In this paper we compare sports club which is using information technologies and club which is organized in more traditional way. Compeering those two clubs we’re getting data which are showing to us that appliance of information technology is absolutely necessary if our aim are better sports results and investing in information technology is absolutely justified.

  16. End-to-end Information Flow Security Model for Software-Defined Networks

    Directory of Open Access Journals (Sweden)

    D. Ju. Chaly

    2015-01-01

    Full Text Available Software-defined networks (SDN are a novel paradigm of networking which became an enabler technology for many modern applications such as network virtualization, policy-based access control and many others. Software can provide flexibility and fast-paced innovations in the networking; however, it has a complex nature. In this connection there is an increasing necessity of means for assuring its correctness and security. Abstract models for SDN can tackle these challenges. This paper addresses to confidentiality and some integrity properties of SDNs. These are critical properties for multi-tenant SDN environments, since the network management software must ensure that no confidential data of one tenant are leaked to other tenants in spite of using the same physical infrastructure. We define a notion of end-to-end security in context of software-defined networks and propose a semantic model where the reasoning is possible about confidentiality, and we can check that confidential information flows do not interfere with non-confidential ones. We show that the model can be extended in order to reason about networks with secure and insecure links which can arise, for example, in wireless environments.The article is published in the authors’ wording.

  17. An X window based graphics user interface for radiation information processing system developed with object-oriented programming technology

    International Nuclear Information System (INIS)

    Gao Wenhuan; Fu Changqing; Kang Kejun

    1993-01-01

    X Window is a network-oriented and network transparent windowing system, and now dominant in the Unix domain. The object-oriented programming technology can be used to change the extensibility of a software system remarkably. An introduction to graphics user interface is given. And how to develop a graphics user interface for radiation information processing system with object-oriented programming technology, which is based on X Window and independent of application is described briefly

  18. The Holistic Perception of Information Technology and The Importance on the Supply Chain Management

    Directory of Open Access Journals (Sweden)

    Aysenur Erdi̇l

    2017-10-01

    Full Text Available Supply Chain Management (SCM includes management of materials, products, services, information and financial flows which network of consisting suppliers, manufacturers, logistics service companies and clients. The individual elements of this chain with coordination and integration of each element to perform themselves ensure successful of SCM. Information technology has a very important role in activities for coordination and integration of supply chain. Acceleration of sharing information, simplification and increasing of reliability provide effective use of time in logistics companies, cost savings like effective management ways. In this prepared study which taking into account the positive impact on supply chain of information technologies, it was investigated on the effectiveness of sharing information of supply chain by examining infrastructure of the information technology, ranging from the production of raw materials to the end user in SCM. The results of the analyses by using the structural equation model indicate that the use of information technology in supply chain management enhances the relationship between buyer supplier; the enhancement of such relationship improves the quality, safety, and flexibility of products and reduces the cost of products; as a result, it increases firm performance.

  19. Networking Technologies for Future Home Networks Using 60 GHz Radio

    OpenAIRE

    Wang, J.

    2010-01-01

    Networking technologies have been changing the life of people in their private residential space. With the arrival of high definition (HD) multimedia services and broadband communications into the living space, future home networks are expected to support high speed device-to-device connectivity with Quality-of-Service (QoS) provisioning. There is no prize for guessing that it has to be wireless communication which creates maximal freedom. Nevertheless, it is doubtful that today's home networ...

  20. Report of a Planning Conference for Solar Technology Information Transfer (Nashville, Tennessee, September 28-29, 1977).

    Science.gov (United States)

    Gleaves, Edwin S., Ed.

    A summary of the deliberations of the Planning Conference for Solar Technology Information Transfer--to discuss and outline a functioning solar energy technology network in the State of Tennessee--and a set of recommendations for future action are presented in this report. Topic areas include: (1) the Tennessee Regional Library Service; (2) the…

  1. XD Metrics on Demand Value Analytics: Visualizing the Impact of Internal Information Technology Investments on External Funding, Publications, and Collaboration Networks

    Directory of Open Access Journals (Sweden)

    Olga Scrivner

    2018-01-01

    Full Text Available Many universities invest substantial resources in the design, deployment, and maintenance of campus-based cyberinfrastructure (CI. To justify the expense, it is important that university administrators and others understand and communicate the value of these internal investments in terms of scholarly impact. This paper introduces two visualizations and their usage in the Value Analytics (VA module for Open XD metrics on demand (XDMoD, which enable analysis of external grant funding income, scholarly publications, and collaboration networks. The VA module was developed by Indiana University’s (IU Research Technologies division, Pervasive Technology Institute, and the CI for Network Science Center (CNS, in conjunction with the University at Buffalo’s Center for Computational Research. It provides diverse visualizations of measures of information technology (IT usage, external funding, and publications in support of IT strategic decision-making. This paper details the data, analysis workflows, and visual mappings used in two VA visualizations that aim to communicate the value of different IT usage in terms of NSF and NIH funding, resulting publications, and associated research collaborations. To illustrate the feasibility of measuring IT values on research, we measured its financial and academic impact from the period between 2012 and 2017 for IU. The financial return on investment (ROI is measured in terms of IU funding, totaling $339,013,365 for 885 NIH and NSF projects associated with IT usage, and the academic ROI constitutes 968 publications associated with 83 of these NSF and NIH awards. In addition, the results show that Medical Specialties, Brain Research, and Infectious Diseases are the top three scientific disciplines ranked by the number of publications during the given time period.

  2. Effects of Multimedia Information Technology Integrated Multi-Sensory Instruction on Students' Learning Motivation and Outcome

    Science.gov (United States)

    Wu, Tung-Ju; Tai, Yu-Nan

    2016-01-01

    Under the waves of the Internet and the trend of era, information technology is a door connecting to the world to generate the multiplier effect of learning. Students' learning should not be regarded as the tool to cope with school examinations. The frequent contact with computers, networks, and relevant information allow students enjoying the…

  3. THE INFORMATION TECHNOLOGY AND COMMUNICATION USED BY LOGISTICS SERVICE PROVIDERS: LITERATURE REVIEW

    Directory of Open Access Journals (Sweden)

    Carolina Luisa dos Santos Vieira

    2012-10-01

    Full Text Available With the growth in the supply of logistics services, and the increase of competition, the use of information and communication technologies (ICT is now considered by logistics service providers (LSP, a source of competitive advantage. Through a literature review, this paper seeks to identify which technologies have been used by the PSL. Analyzing 47 articles on the subject, published in international journal that has the largest number of works on PSL, applications of technologies by PSL were analyzed according to a taxonomy suggested based on literature - software, hardware and networks. Among the results highlight the technologies cited by categories and greater scientific interest, such as EDI, RFID, TTS, WMS and Internet.

  4. Innovation Value of Information Technology: Impact of Information Technology--Intensity on Innovation Capability and Firm Performance

    Science.gov (United States)

    Ramamani, Mahesh Kumar

    2010-01-01

    Though information technology adoptions have been always referred to as innovations in firms, much of the business value literature has concentrated on the tangible and immediately measurable impacts of information technology (IT) adoptions. This study aims to explore the impact of information technology investments on the innovativeness of a…

  5. [Overview of the US policies for health information technology and lessons learned for Israel].

    Science.gov (United States)

    Topaz, Maxim; Ash, Nachman

    2013-05-01

    The heaLthcare system in the United States (U.S.) faces a number of significant changes aimed at improving the quality and availability of medical services and reducing costs. Implementation of health information technologies, especiaLly ELectronic Health Records (EHR), is central to achieving these goals. Several recent Legislative efforts in the U.S. aim at defining standards and promoting wide scale "Meaningful Use" of the novel technologies. In Israel, the majority of heaLthcare providers adopted EHR throughout the Last decade. Unlike the U.S., the process of EHR adoption occurred spontaneously, without governmental control or the definition of standards. In this article, we review the U.S. health information technology policies and standards and suggest potential lessons Learned for Israel. First, we present the three-staged Meaningful Use regulations that require eligible healthcare practitioners to use EHR in their practice. We also describe the standards for EHR certification and national efforts to create interoperable health information technology networks. Finally, we provide a brief overview of the IsraeLi regulation in the field of EHR. Although the adoption of health information technology is wider in Israel, the Lack of technology standards and governmental control has Led to Large technology gaps between providers. The example of the U.S. Legislation urges the adoption of several critical steps to further enhance the quality and efficiency of the Israeli healthcare system, in particular: strengthening health information technology regulation; developing Licensure criteria for health information technology; bridging the digital gap between healthcare organizations; defining quality measures; and improving the accessibility of health information for patients.

  6. Modeling the reemergence of information diffusion in social network

    Science.gov (United States)

    Yang, Dingda; Liao, Xiangwen; Shen, Huawei; Cheng, Xueqi; Chen, Guolong

    2018-01-01

    Information diffusion in networks is an important research topic in various fields. Existing studies either focus on modeling the process of information diffusion, e.g., independent cascade model and linear threshold model, or investigate information diffusion in networks with certain structural characteristics such as scale-free networks and small world networks. However, there are still several phenomena that have not been captured by existing information diffusion models. One of the prominent phenomena is the reemergence of information diffusion, i.e., a piece of information reemerges after the completion of its initial diffusion process. In this paper, we propose an optimized information diffusion model by introducing a new informed state into traditional susceptible-infected-removed model. We verify the proposed model via simulations in real-world social networks, and the results indicate that the model can reproduce the reemergence of information during the diffusion process.

  7. Ubiquitous Information Technologies and Applications CUTE 2012

    CERN Document Server

    Park, Doo-Soon; Jia, Weijia; Yeo, Sang-Soo

    2013-01-01

    This book is for The 7th International Conference on Ubiquitous Information Technologies and Applications (CUTE 2012). Ubiquitous computing will require a new approach to fitting technology to our lives. The advent of new computing devices, and the seamless connectivity between these devices, thanks to diverse wired and wireless networks, are enabling new opportunities for a user to perform his/her operation all the time and everywhere. These seamlessly connected devices are ranging from mobile handset to wearable computers. Also, it is expected that these devices will become so pervasive that they will be embedded in the surrounding physical environment, and transparent and invisible to a user. Such devices, whether carried on by people or embedded into other systems, will constitute a global internetworking infrastructure and likely to provide a new level of openness and dynamics. Ubiquitous computing has as its goal the enhancing computer use by pushing computational services out of conventional desktop in...

  8. Social Demand of New Generation Information Network: Introduction to High Spectral Density Optical Communication Technology

    Science.gov (United States)

    Kamiya, Takeshi; Miyazaki, Tetsuya; Kubota, Fumito

    In this section, first, current situation of traffic growth and penetration of broadband services are described. Then social demand, technical issues, and research trend for future information network in the United States, Europe, and Japan are described. Finally, a detailed construction of this book is introduced.

  9. Information technology resources assessment

    Energy Technology Data Exchange (ETDEWEB)

    Stevens, D.F. [ed.

    1992-01-01

    This year`s Information Technology Resources Assessment (ITRA) is something of a departure from traditional practice. Past assessments have concentrated on developments in fundamental technology, particularly with respect to hardware. They form an impressive chronicle of decreasing cycle times, increasing densities, decreasing costs (or, equivalently, increasing capacity and capability per dollar spent), and new system architectures, with a leavening of operating systems and languages. Past assessments have aimed -- and succeeded -- at putting information technology squarely in the spotlight; by contrast, in the first part of this assessment, we would like to move it to the background, and encourage the reader to reflect less on the continuing technological miracles of miniaturization in space and time and more on the second- and third-order implications of some possible workplace applications of these miracles. This Information Technology Resources Assessment is intended to provide a sense of technological direction for planners in projecting the hardware, software, and human resources necessary to support the diverse IT requirements of the various components of the DOE community. It is also intended to provide a sense of our new understanding of the place of IT in our organizations.

  10. Information technology resources assessment

    Energy Technology Data Exchange (ETDEWEB)

    Stevens, D.F. (ed.)

    1992-01-01

    This year's Information Technology Resources Assessment (ITRA) is something of a departure from traditional practice. Past assessments have concentrated on developments in fundamental technology, particularly with respect to hardware. They form an impressive chronicle of decreasing cycle times, increasing densities, decreasing costs (or, equivalently, increasing capacity and capability per dollar spent), and new system architectures, with a leavening of operating systems and languages. Past assessments have aimed -- and succeeded -- at putting information technology squarely in the spotlight; by contrast, in the first part of this assessment, we would like to move it to the background, and encourage the reader to reflect less on the continuing technological miracles of miniaturization in space and time and more on the second- and third-order implications of some possible workplace applications of these miracles. This Information Technology Resources Assessment is intended to provide a sense of technological direction for planners in projecting the hardware, software, and human resources necessary to support the diverse IT requirements of the various components of the DOE community. It is also intended to provide a sense of our new understanding of the place of IT in our organizations.

  11. 76 FR 67750 - Homeland Security Information Network Advisory Committee

    Science.gov (United States)

    2011-11-02

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0107] Homeland Security Information Network... Information Network Advisory Committee. SUMMARY: The Secretary of Homeland Security has determined that the renewal of the Homeland Security Information Network Advisory Committee (HSINAC) is necessary and in the...

  12. Information transmission in genetic regulatory networks: a review

    International Nuclear Information System (INIS)

    Tkacik, Gasper; Walczak, Aleksandra M

    2011-01-01

    Genetic regulatory networks enable cells to respond to changes in internal and external conditions by dynamically coordinating their gene expression profiles. Our ability to make quantitative measurements in these biochemical circuits has deepened our understanding of what kinds of computations genetic regulatory networks can perform, and with what reliability. These advances have motivated researchers to look for connections between the architecture and function of genetic regulatory networks. Transmitting information between a network's inputs and outputs has been proposed as one such possible measure of function, relevant in certain biological contexts. Here we summarize recent developments in the application of information theory to gene regulatory networks. We first review basic concepts in information theory necessary for understanding recent work. We then discuss the functional complexity of gene regulation, which arises from the molecular nature of the regulatory interactions. We end by reviewing some experiments that support the view that genetic networks responsible for early development of multicellular organisms might be maximizing transmitted 'positional information'. (topical review)

  13. Characterizing the Networks of Digital Information that Support Collaborative Adaptive Forest Management in Sierra Nevada Forests

    Science.gov (United States)

    Lei, Shufei; Iles, Alastair; Kelly, Maggi

    2015-07-01

    Some of the factors that can contribute to the success of collaborative adaptive management—such as social learning, open communication, and trust—are built upon a foundation of the open exchange of information about science and management between participants and the public. Despite the importance of information transparency, the use and flow of information in collaborative adaptive management has not been characterized in detail in the literature, and currently there exist opportunities to develop strategies for increasing the exchange of information, as well as to track information flow in such contexts. As digital information channels and networks have been increased over the last decade, powerful new information monitoring tools have also been evolved allowing for the complete characterization of information products through their production, transport, use, and monitoring. This study uses these tools to investigate the use of various science and management information products in a case study—the Sierra Nevada Adaptive Management Project—using a mixed method (citation analysis, web analytics, and content analysis) research approach borrowed from the information processing and management field. The results from our case study show that information technologies greatly facilitate the flow and use of digital information, leading to multiparty collaborations such as knowledge transfer and public participation in science research. We conclude with recommendations for expanding information exchange in collaborative adaptive management by taking advantage of available information technologies and networks.

  14. Characterizing the Networks of Digital Information that Support Collaborative Adaptive Forest Management in Sierra Nevada Forests.

    Science.gov (United States)

    Lei, Shufei; Iles, Alastair; Kelly, Maggi

    2015-07-01

    Some of the factors that can contribute to the success of collaborative adaptive management--such as social learning, open communication, and trust--are built upon a foundation of the open exchange of information about science and management between participants and the public. Despite the importance of information transparency, the use and flow of information in collaborative adaptive management has not been characterized in detail in the literature, and currently there exist opportunities to develop strategies for increasing the exchange of information, as well as to track information flow in such contexts. As digital information channels and networks have been increased over the last decade, powerful new information monitoring tools have also been evolved allowing for the complete characterization of information products through their production, transport, use, and monitoring. This study uses these tools to investigate the use of various science and management information products in a case study--the Sierra Nevada Adaptive Management Project--using a mixed method (citation analysis, web analytics, and content analysis) research approach borrowed from the information processing and management field. The results from our case study show that information technologies greatly facilitate the flow and use of digital information, leading to multiparty collaborations such as knowledge transfer and public participation in science research. We conclude with recommendations for expanding information exchange in collaborative adaptive management by taking advantage of available information technologies and networks.

  15. Information Network on Rural Development (INRD), Bangladesh.

    Science.gov (United States)

    Wanasundra, Leelangi

    1994-01-01

    Discusses information networking in Bangladesh and describes the formation of the Information Network on Rural Development (INRD) which was initiated by the Center on Integrated Rural Development for Asia and the Pacific (CIRDAP). Organization, membership, activities, participation, and finance are examined. (four references) (LRW)

  16. An information spreading model based on online social networks

    Science.gov (United States)

    Wang, Tao; He, Juanjuan; Wang, Xiaoxia

    2018-01-01

    Online social platforms are very popular in recent years. In addition to spreading information, users could review or collect information on online social platforms. According to the information spreading rules of online social network, a new information spreading model, namely IRCSS model, is proposed in this paper. It includes sharing mechanism, reviewing mechanism, collecting mechanism and stifling mechanism. Mean-field equations are derived to describe the dynamics of the IRCSS model. Moreover, the steady states of reviewers, collectors and stiflers and the effects of parameters on the peak values of reviewers, collectors and sharers are analyzed. Finally, numerical simulations are performed on different networks. Results show that collecting mechanism and reviewing mechanism, as well as the connectivity of the network, make information travel wider and faster, and compared to WS network and ER network, the speed of reviewing, sharing and collecting information is fastest on BA network.

  17. Perspectives on Advanced Learning Technologies and Learning Networks and Future Aerospace Workforce Environments

    Science.gov (United States)

    Noor, Ahmed K. (Compiler)

    2003-01-01

    An overview of the advanced learning technologies is given in this presentation along with a brief description of their impact on future aerospace workforce development. The presentation is divided into five parts (see Figure 1). In the first part, a brief historical account of the evolution of learning technologies is given. The second part describes the current learning activities. The third part describes some of the future aerospace systems, as examples of high-tech engineering systems, and lists their enabling technologies. The fourth part focuses on future aerospace research, learning and design environments. The fifth part lists the objectives of the workshop and some of the sources of information on learning technologies and learning networks.

  18. Implementation of Technology-based Patient Engagement Strategies within Practice-based Research Networks.

    Science.gov (United States)

    Careyva, Beth; Shaak, Kyle; Mills, Geoffrey; Johnson, Melanie; Goodrich, Samantha; Stello, Brian; Wallace, Lorraine S

    2016-01-01

    Technology-based patient engagement strategies (such as patient portals) are increasingly available, yet little is known about current use and barriers within practice-based research networks (PBRNs). PBRN directors have unique opportunities to inform the implementation of patient-facing technology and to translate these findings into practice. PBRN directors were queried regarding technology-based patient engagement strategies as part of the 2015 CAFM Educational Research Alliance (CERA) survey of PBRN directors. A total of 102 PBRN directors were identified via the Agency for Healthcare Research and Quality's registry; 54 of 96 eligible PBRN directors completed the survey, for a response rate of 56%. Use of technology-based patient engagement strategies within PBRNs was limited, with less than half of respondents reporting experience with the most frequently named tools (risk assessments/decision aids). Information technology (IT) support was the top barrier, followed by low rates of portal enrollment. For engaging participant practices, workload and practice leadership were cited as most important, with fewer respondents noting concerns about patient privacy. Given limited use of patient-facing technologies, PBRNs have an opportunity to clarify the optimal use of these strategies. Providing IT support and addressing clinician concerns regarding workload may facilitate the inclusion of innovative technologies in PBRNs. © Copyright 2016 by the American Board of Family Medicine.

  19. Parameter-free Network Sparsification and Data Reduction by Minimal Algorithmic Information Loss

    KAUST Repository

    Zenil, Hector

    2018-02-16

    The study of large and complex datasets, or big data, organized as networks has emerged as one of the central challenges in most areas of science and technology. Cellular and molecular networks in biology is one of the prime examples. Henceforth, a number of techniques for data dimensionality reduction, especially in the context of networks, have been developed. Yet, current techniques require a predefined metric upon which to minimize the data size. Here we introduce a family of parameter-free algorithms based on (algorithmic) information theory that are designed to minimize the loss of any (enumerable computable) property contributing to the object\\'s algorithmic content and thus important to preserve in a process of data dimension reduction when forcing the algorithm to delete first the least important features. Being independent of any particular criterion, they are universal in a fundamental mathematical sense. Using suboptimal approximations of efficient (polynomial) estimations we demonstrate how to preserve network properties outperforming other (leading) algorithms for network dimension reduction. Our method preserves all graph-theoretic indices measured, ranging from degree distribution, clustering-coefficient, edge betweenness, and degree and eigenvector centralities. We conclude and demonstrate numerically that our parameter-free, Minimal Information Loss Sparsification (MILS) method is robust, has the potential to maximize the preservation of all recursively enumerable features in data and networks, and achieves equal to significantly better results than other data reduction and network sparsification methods.

  20. Lessons learned in building a global information network on chemicals (GINC)

    International Nuclear Information System (INIS)

    Kaminuma, Tsuguchika

    2005-01-01

    The Global Information Network on Chemicals (GINC) was a project to construct a worldwide information network linking international, national, and other organizations working for the safe management of chemicals. Proposed in 1993, the project started the next year and lasted almost 10 years. It was begun as a joint project of World Health Organization (WHO), International Labor Organization (ILO), and United Nations Environment Program (UNEP), and later endorsed by the Intergovernmental Forum on Chemical Safety (IFCS). Asia, particularly East Asia and the Pacific islands, was chosen as the feasibility study region. The author's group then at the National Institute of Health Sciences (NIHS) of Japan led this initiative and hosted numerous meetings. At these meetings, tutorial sessions for communicating chemical safety expertise and emerging new information technologies relevant to the safe management of chemicals were offered. Our experience with this project, particularly the Web-based system and the tutorial sessions, may be of use to others involved with Web-based instruction and the training of chemical safety specialists from both developed and developing countries

  1. Wireless Cognitive Networks Technologies and Protocols

    OpenAIRE

    Loscri , Valeria; Maskooki , Arash; Mitton , Nathalie; Vegni , Anna Maria

    2015-01-01

    International audience; Software Defined Radio and Cognitive Radio applied to Wireless Sensor Networks and Body Area Networks represent an intriguing and really recent paradigm, which represents an objective of study of several researchers. In order to make this technology effective, it is necessary to consider an analytical model of communication capacity, energy consumption and congestion, to effectively exploit the Software Defined Radio and Cognitive Radio in this type of systems. This ch...

  2. Integrated multimedia information system on interactive CATV network

    Science.gov (United States)

    Lee, Meng-Huang; Chang, Shin-Hung

    1998-10-01

    In the current CATV system architectures, they provide one- way delivery of a common menu of entertainment to all the homes through the cable network. Through the technologies evolution, the interactive services (or two-way services) can be provided in the cable TV systems. They can supply customers with individualized programming and support real- time two-way communications. With a view to the service type changed from the one-way delivery systems to the two-way interactive systems, `on demand services' is a distinct feature of multimedia systems. In this paper, we present our work of building up an integrated multimedia system on interactive CATV network in Shih Chien University. Besides providing the traditional analog TV programming from the cable operator, we filter some channels to reserve them as our campus information channels. In addition to the analog broadcasting channel, the system also provides the interactive digital multimedia services, e.g. Video-On- Demand (VOD), Virtual Reality, BBS, World-Wide-Web, and Internet Radio Station. These two kinds of services are integrated in a CATV network by the separation of frequency allocation for the analog broadcasting service and the digital interactive services. Our ongoing work is to port our previous work of building up a VOD system conformed to DAVIC standard (for inter-operability concern) on Ethernet network into the current system.

  3. Software Defined Networking Demands on Software Technologies

    DEFF Research Database (Denmark)

    Galinac Grbac, T.; Caba, Cosmin Marius; Soler, José

    2015-01-01

    Software Defined Networking (SDN) is a networking approach based on a centralized control plane architecture with standardised interfaces between control and data planes. SDN enables fast configuration and reconfiguration of the network to enhance resource utilization and service performances....... This new approach enables a more dynamic and flexible network, which may adapt to user needs and application requirements. To this end, systemized solutions must be implemented in network software, aiming to provide secure network services that meet the required service performance levels. In this paper......, we review this new approach to networking from an architectural point of view, and identify and discuss some critical quality issues that require new developments in software technologies. These issues we discuss along with use case scenarios. Here in this paper we aim to identify challenges...

  4. NIDDK Information Network (DKnet)

    Data.gov (United States)

    U.S. Department of Health & Human Services — The NIDDK Information Network serves the needs of basic and clinical investigators by providing seamless access to large pools of data relevant to the mission of...

  5. 48 CFR 39.104 - Information technology services.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Information technology... SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.104 Information technology services. When acquiring information technology services, solicitations must not describe any...

  6. Improving information filtering via network manipulation

    Science.gov (United States)

    Zhang, Fuguo; Zeng, An

    2012-12-01

    The recommender system is a very promising way to address the problem of overabundant information for online users. Although the information filtering for the online commercial systems has received much attention recently, almost all of the previous works are dedicated to design new algorithms and consider the user-item bipartite networks as given and constant information. However, many problems for recommender systems such as the cold-start problem (i.e., low recommendation accuracy for the small-degree items) are actually due to the limitation of the underlying user-item bipartite networks. In this letter, we propose a strategy to enhance the performance of the already existing recommendation algorithms by directly manipulating the user-item bipartite networks, namely adding some virtual connections to the networks. Numerical analyses on two benchmark data sets, MovieLens and Netflix, show that our method can remarkably improves the recommendation performance. Specifically, it not only improves the recommendations accuracy (especially for the small-degree items), but also helps the recommender systems generate more diverse and novel recommendations.

  7. Ethernet access network based on free-space optic deployment technology

    Science.gov (United States)

    Gebhart, Michael; Leitgeb, Erich; Birnbacher, Ulla; Schrotter, Peter

    2004-06-01

    The satisfaction of all communication needs from single households and business companies over a single access infrastructure is probably the most challenging topic in communications technology today. But even though the so-called "Last Mile Access Bottleneck" is well known since more than ten years and many distribution technologies have been tried out, the optimal solution has not yet been found and paying commercial access networks offering all service classes are still rare today. Conventional services like telephone, radio and TV, as well as new and emerging services like email, web browsing, online-gaming, video conferences, business data transfer or external data storage can all be transmitted over the well known and cost effective Ethernet networking protocol standard. Key requirements for the deployment technology driven by the different services are high data rates to the single customer, security, moderate deployment costs and good scalability to number and density of users, quick and flexible deployment without legal impediments and high availability, referring to the properties of optical and wireless communication. We demonstrate all elements of an Ethernet Access Network based on Free Space Optic distribution technology. Main physical parts are Central Office, Distribution Network and Customer Equipment. Transmission of different services, as well as configuration, service upgrades and remote control of the network are handled by networking features over one FSO connection. All parts of the network are proven, the latest commercially available technology. The set up is flexible and can be adapted to any more specific need if required.

  8. Architecture academic by information technologies utilization ...

    African Journals Online (AJOL)

    This research aims at studying teaching modern architecture with information technology approach. Today, information technology is used to transmit knowledge in many universities of the world. Information technology tools are potentially capable of providing engineering students with a broad continuum of curriculum in ...

  9. Cultivation of personality awareness - The starting point of thinking and politics in colleges and universities in the current network information

    Science.gov (United States)

    Shen, Jie

    2018-03-01

    With the continuous development of network technology, the development of network information age has promoted the orderly development of ideological and political education in colleges and universities. It can effectively improve students' political accomplishments and continuously broaden the ways of thinking and education in colleges and universities. Ideological and political work to provide more information platform and education. This article will elaborate on the cultivation of personality consciousness in college ideological and political work under the network age and put forward corresponding measures.

  10. Social-Driven Information Dissemination for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Basim MAHMOOD

    2015-06-01

    Full Text Available As we move into the so-called Internet of Things (IoT, the boundary between sensor networks and social networks is likely to disappear. Moreover, previous works argue that mobility in sensor networks may become a consequence of human movement making the understanding of human mobility crucial to the design of sensor networks. When people carry sensors, they become able to use concepts from social networks in the design of sensor network infrastructures. However, to this date, the utilization of social networks in designing protocols for wireless sensor networks has not received much attention. In this paper, we focus on the concept of information dissemination in a framework where sensors are carried by people who, like most of us, are part of a social network. We propose two social-based forwarding approaches for what has been called Social Network of Sensors (SNoS. To this end, we exploit two important characteristics of ties in social networks, namely strong ties and weak ties. The former is used to achieve rapid dissemination to nearby sensors while the latter aims at dissemination to faraway sensors. We compared our results against two well-known approaches in the literature: Epidemic and PRoPHET protocols. We evaluate our approaches according to four criteria: information-dissemination distance, information-dissemination coverage area, the number of messages exchanged, and information delivery time. We believe this is the first work that investigates the issues of information-dissemination distance and information-dissemination coverage area using an approach inspired on social network concepts.

  11. Survey of current technologies of security management for distributed information systems; Bunsangata joho system no security iji kanri hoshiki no genjo

    Energy Technology Data Exchange (ETDEWEB)

    Matsui, S [Central Research Institute of Electric Power Industry, Tokyo (Japan)

    1997-05-01

    The latest situation of the security management for a distributed information system was examined and systematically summarized to indicate the management design in future. This paper describes the threat of the distributed information system to security, the risk for confidentiality, integrity, and availability due to the threat, and the measures to be taken. The basic technology of security management is classified into the `user certification to prevent an incorrect access` and the `encipherment to prevent data from being used incorrectly.` The technology for certification has been almost completed. It can be securely done using an expendable password or IC card system. In Internet, multiple enciphering technologies for constructing a virtual private network that can secure the almost the same security as for a private network can be used. In an electronic mail, the enciphering technology can also be used easily. The tool that manages the security of very many servers, clients, and networks is in the initial stage. 16 refs., 1 fig., 5 tabs.

  12. CCTV networking and digital technology

    CERN Document Server

    Damjanovski, Vlado

    2005-01-01

    Closed circuit television (CCTV) is experiencing a leap in technology using digital techniques, networking and the Internet. The new edition of this high-level professional reference retains the particulars that made the first edition a success, including the details of CCD cameras, lenses, coaxial cables, fiber-optics, and system design, but it is expanded to cover all video compression techniques used in the ever increasing assortment of digital video recorders (DVRs) available on the market today. This new edition of the book CCTV demystifies DVR technology. It also serves to clarify the te

  13. A Network Analysis Model for Selecting Sustainable Technology

    Directory of Open Access Journals (Sweden)

    Sangsung Park

    2015-09-01

    Full Text Available Most companies develop technologies to improve their competitiveness in the marketplace. Typically, they then patent these technologies around the world in order to protect their intellectual property. Other companies may use patented technologies to develop new products, but must pay royalties to the patent holders or owners. Should they fail to do so, this can result in legal disputes in the form of patent infringement actions between companies. To avoid such situations, companies attempt to research and develop necessary technologies before their competitors do so. An important part of this process is analyzing existing patent documents in order to identify emerging technologies. In such analyses, extracting sustainable technology from patent data is important, because sustainable technology drives technological competition among companies and, thus, the development of new technologies. In addition, selecting sustainable technologies makes it possible to plan their R&D (research and development efficiently. In this study, we propose a network model that can be used to select the sustainable technology from patent documents, based on the centrality and degree of a social network analysis. To verify the performance of the proposed model, we carry out a case study using actual patent data from patent databases.

  14. Nuclear education and information technology in the 21 st century

    International Nuclear Information System (INIS)

    Constantin, Marin; Hristea, Viorel

    2008-01-01

    In the last two decades extensive changes in the information technology occurred. Nuclear education is characterized by a long time formation consisting of graduate background and a period of 4-6 years of direct and specialized formation by community of practice, or other knowledge transfer methods. The paper is intended to analyse the influence of the technology and globalization on the teaching techniques and pedagogy with a focus on Romanian aspects. Some aspects of teaching research connected with the actual changes will be discussed. Also, the networking methods and the sustainable partnership creation in the Romanian context taking into account the harmonization of the universities, research institutes, nuclear industry and other nuclear organizations will be analysed. (authors)

  15. Group colocation behavior in technological social networks.

    Directory of Open Access Journals (Sweden)

    Chloë Brown

    Full Text Available We analyze two large datasets from technological networks with location and social data: user location records from an online location-based social networking service, and anonymized telecommunications data from a European cellphone operator, in order to investigate the differences between individual and group behavior with respect to physical location. We discover agreements between the two datasets: firstly, that individuals are more likely to meet with one friend at a place they have not visited before, but tend to meet at familiar locations when with a larger group. We also find that groups of individuals are more likely to meet at places that their other friends have visited, and that the type of a place strongly affects the propensity for groups to meet there. These differences between group and solo mobility has potential technological applications, for example, in venue recommendation in location-based social networks.

  16. IMNN: Information Maximizing Neural Networks

    Science.gov (United States)

    Charnock, Tom; Lavaux, Guilhem; Wandelt, Benjamin D.

    2018-04-01

    This software trains artificial neural networks to find non-linear functionals of data that maximize Fisher information: information maximizing neural networks (IMNNs). As compressing large data sets vastly simplifies both frequentist and Bayesian inference, important information may be inadvertently missed. Likelihood-free inference based on automatically derived IMNN summaries produces summaries that are good approximations to sufficient statistics. IMNNs are robustly capable of automatically finding optimal, non-linear summaries of the data even in cases where linear compression fails: inferring the variance of Gaussian signal in the presence of noise, inferring cosmological parameters from mock simulations of the Lyman-α forest in quasar spectra, and inferring frequency-domain parameters from LISA-like detections of gravitational waveforms. In this final case, the IMNN summary outperforms linear data compression by avoiding the introduction of spurious likelihood maxima.

  17. Network support, technology use, depression, and ART adherence among HIV-positive MSM of color.

    Science.gov (United States)

    Holloway, I W; Tan, D; Dunlap, S L; Palmer, L; Beougher, S; Cederbaum, J A

    2017-09-01

    Depression is associated with poor antiretroviral therapy (ART) adherence among people living with HIV/AIDS. This relationship may be moderated by an individual's social network characteristics. Our study sought to examine social network correlates of treatment adherence among HIV-positive men recruited from social service agencies throughout Los Angeles County (N = 150) to inform technology-driven social support interventions for this population. We administered egocentric social network and computer-assisted survey interviews focused on demographic characteristics, health history, depressive symptoms, and ART adherence, where adherence was assessed by the number of reasons participants missed taking their medication, if ever. Significant univariate correlates of adherence were included in a multivariable regression analysis, where the moderating effect of having a network member who reminds participants to take their HIV medication on the relationship between depression and adherence was tested. Over 60% of participants reported clinically significant depressive symptoms; this was significantly associated with lower adherence among those without someone in their social network to remind them about taking their HIV medication, even after adjusting for covariates in an ordinary least squares regression (adjusted mean difference b = -1.61, SE = 0.42, p = 0.0003). Having a network member who reminds participants to take their ART medication significantly ameliorated the negative association between depression and treatment adherence, especially for those reporting greater depressive symptoms (p = 0.0394). Additionally, participants demonstrated high rates of technology use to communicate with social network members. In order to achieve the aims of the National HIV/AIDS Strategy, innovative interventions addressing mental health to improve ART adherence are needed. Network strategies that leverage technology may be helpful for improving ART

  18. Research on network information security model and system construction

    OpenAIRE

    Wang Haijun

    2016-01-01

    It briefly describes the impact of large data era on China’s network policy, but also brings more opportunities and challenges to the network information security. This paper reviews for the internationally accepted basic model and characteristics of network information security, and analyses the characteristics of network information security and their relationship. On the basis of the NIST security model, this paper describes three security control schemes in safety management model and the...

  19. The Use Of Information And Communication Technology And Social Networking Sites In Political Governance Of East African Legislative Assembly Parliament

    Directory of Open Access Journals (Sweden)

    Ainebyona Robert

    2015-06-01

    Full Text Available Abstract This research project was carried out to ascertain the use of Information and Communication Technologies and Social Networking Sites in political governance of East African Legislative Assembly Parliament. The research project was based on the conviction that in this era of globalization use of ICTs and SNSs are fundamentally important and will have tremendous impact on governance leadership and legislation now and in the near future. The specific objective of this study was intended a To evaluate the use of Social Networking Sites in enhancing the political governance of East African Legislative assembly Parliament. The findings from the research showed that that all the respondents 100 were subscribed to social networking sites and used them from time to time. Additionally the EALA parliamentarians had a disparity when it came to use of SNSs to interact with constituents 73.3 of the respondents indicated that they have used SNSs to interact with constituents on matters affecting the community from time to time however 26.7 showed that they did not use Social Networking sites to interact with constituents. Lastly the use of ICTs and SNSs by EALA has also made it possible for citizens to view Assembly proceedings in real time and hence where able to view their representatives in the course of carrying out their duties in the political arena.Lastly the world is changing in a dynamic fashion SNSs are among the tools leading the transformation and it is about time Parliamentarians in Africa embrace SNSs as major tools in changing how leaders interact and remain accountable to their constituents a practice thats been a myth in Africa.

  20. An analysis of communications and networking technologies for the smart grid

    Energy Technology Data Exchange (ETDEWEB)

    Garcia Hernandez, Joaquin [Instituto de Investigaciones Electricas, Cuernavaca, Morelos (Mexico)

    2013-03-01

    The Smart Grid concept has been foreseen as the integration of the electrical generation, transmission and distribution network and the data communications network. Although, traditional communications interfaces, protocols and standards has been used in the electrical grid in an isolated manner, modern communications network is considered as the fundamental enabling technology within the future Smart Grid. Modern communications technologies, protocol architectures and standards can help to build a common communications network infrastructure for data transport between customer premises, power substations, and power distribution systems, utility control centers and utility data centers. The Smart Grid will support traditional applications such as SCADA, distribution automation (DA), energy management systems (EMS), demand site management (DSM) and automatic meter reading (AMR), etc., as well as new applications like advanced metering infrastructure (AMI), substation automation (SA), microgrids, distributed generation, grid monitoring and control, data storage and analysis, among others. To make this possible, the Smart Grid requires a two-way wide area communications network between different dispersed areas, from generation, to distribution to consumer premises. In fact, it will consist of many different types of communications networks such as wide area networks, local area network, home area networks, etc. This requires a new architectural approach to implement a common communications infrastructure that provides the reliability, scalability, security and interoperability to support multiple applications. In addition, open standards addressing interoperability, are key for the development and deployment of the Smart Grid as a true integrated network. A communications backbone is necessary to provide interoperability. To achieve the level of networking, interoperability and security that meets the technical requirements of the Smart Grid, its data communications

  1. Information and communication technology in disease surveillance, India: a case study

    Directory of Open Access Journals (Sweden)

    Krishnan Sampath K

    2010-12-01

    Full Text Available Abstract India has made appreciable progress and continues to demonstrate a strong commitment for establishing and operating a disease surveillance programme responsive to the requirements of the International Health Regulations (IHR[2005]. Within five years of its launch, India has effectively used modern information and communication technology for collection, storage, transmission and management of data related to disease surveillance and effective response. Terrestrial and/or satellite based linkages are being established within all states, districts, state-run medical colleges, infectious disease hospitals, and public health laboratories. This network enables speedy data transfer, video conferencing, training and e-learning for outbreaks and programme monitoring. A 24x7 call centre is in operation to receive disease alerts. To complement these efforts, a media scanning and verification cell functions to receive reports of early warning signals. During the 2009 H1N1 outbreak, the usefulness of the information and communication technology (ICT network was well appreciated. India is using ICT as part of its Integrated Disease Surveillance Project (IDSP to help overcome the challenges in further expansion in hard-to-reach populations, to increase the involvement of the private sector, and to increase the use of other modes of communication like e-mail and voicemail.

  2. Information and communication technology in disease surveillance, India: a case study.

    Science.gov (United States)

    Kant, Lalit; Krishnan, Sampath K

    2010-12-03

    India has made appreciable progress and continues to demonstrate a strong commitment for establishing and operating a disease surveillance programme responsive to the requirements of the International Health Regulations (IHR[2005]). Within five years of its launch, India has effectively used modern information and communication technology for collection, storage, transmission and management of data related to disease surveillance and effective response. Terrestrial and/or satellite based linkages are being established within all states, districts, state-run medical colleges, infectious disease hospitals, and public health laboratories. This network enables speedy data transfer, video conferencing, training and e-learning for outbreaks and programme monitoring. A 24x7 call centre is in operation to receive disease alerts. To complement these efforts, a media scanning and verification cell functions to receive reports of early warning signals. During the 2009 H1N1 outbreak, the usefulness of the information and communication technology (ICT) network was well appreciated. India is using ICT as part of its Integrated Disease Surveillance Project (IDSP) to help overcome the challenges in further expansion in hard-to-reach populations, to increase the involvement of the private sector, and to increase the use of other modes of communication like e-mail and voicemail.

  3. Collection, transfer and processing of information in systems of monitoring of objects based on wireless sensor networks

    Directory of Open Access Journals (Sweden)

    Sergievskiy Maxim

    2016-01-01

    Full Text Available Monitoring of the aircraft structures’ during the pre-fiight testing is a critical task of the aerospace industry. One of the most promising solutions, not yet widely applied, is continuous monitoring of aircraft structures using wireless sensor network technology. The brief summary of the proposed system is the following: special sensors send signals to the local motes (autonomous computing device equipped with a wireless transmitter. Information from motes is gathered by routers which then transfer the aggregated information to the datacenter. Applications of corporate network control and define flexible patterns for processing of the information received from sensors. This network structure allows to centralize data collection modes in the process of testing; implement continuous data collection at a defined frequency; process and display data in real-time.

  4. Hodge Decomposition of Information Flow on Small-World Networks.

    Science.gov (United States)

    Haruna, Taichi; Fujiki, Yuuya

    2016-01-01

    We investigate the influence of the small-world topology on the composition of information flow on networks. By appealing to the combinatorial Hodge theory, we decompose information flow generated by random threshold networks on the Watts-Strogatz model into three components: gradient, harmonic and curl flows. The harmonic and curl flows represent globally circular and locally circular components, respectively. The Watts-Strogatz model bridges the two extreme network topologies, a lattice network and a random network, by a single parameter that is the probability of random rewiring. The small-world topology is realized within a certain range between them. By numerical simulation we found that as networks become more random the ratio of harmonic flow to the total magnitude of information flow increases whereas the ratio of curl flow decreases. Furthermore, both quantities are significantly enhanced from the level when only network structure is considered for the network close to a random network and a lattice network, respectively. Finally, the sum of these two ratios takes its maximum value within the small-world region. These findings suggest that the dynamical information counterpart of global integration and that of local segregation are the harmonic flow and the curl flow, respectively, and that a part of the small-world region is dominated by internal circulation of information flow.

  5. Hodge decomposition of information flow on small-world networks

    Directory of Open Access Journals (Sweden)

    Taichi Haruna

    2016-09-01

    Full Text Available We investigate the influence of the small-world topology on the composition of information flow on networks. By appealing to the combinatorial Hodge theory, we decompose information flow generated by random threshold networks on the Watts-Strogatz model into three components: gradient, harmonic and curl flows. The harmonic and curl flows represent globally circular and locally circular components, respectively. The Watts-Strogatz model bridges the two extreme network topologies, a lattice network and a random network, by a single parameter that is the probability of random rewiring. The small-world topology is realized within a certain range between them. By numerical simulation we found that as networks become more random the ratio of harmonic flow to the total magnitude of information flow increases whereas the ratio of curl flow decreases. Furthermore, both quantities are significantly enhanced from the level when only network structure is considered for the network close to a random network and a lattice network, respectively. Finally, the sum of these two ratios takes its maximum value within the small-world region. These findings suggest that the dynamical information counterpart of global integration and that of local segregation are the harmonic flow and the curl flow, respectively, and that a part of the small-world region is dominated by internal circulation of information flow.

  6. Wireless local area network. A new technology of network

    International Nuclear Information System (INIS)

    Wu Yunjun; Zhao Zongtao

    2003-01-01

    This paper introduces Wireless Local Area Network (WLAN), including the concept, history, characters and the foreground of its development, it also narrates in detail the several key techniques used to implement IEEE802.11 WLAN, and ideas on key technology of future progress in wireless LAN field have also been presented. (authors)

  7. 77 FR 55217 - Health Information Technology Implementation

    Science.gov (United States)

    2012-09-07

    ... Information Technology Implementation AGENCY: Health Resources and Services Administration (HRSA), Department... effective use of Health Information Technology (HIT). SUPPLEMENTARY INFORMATION: Former Grantee of Record... advance information technology resources of Virginia's medically underserved communities, HCHC has...

  8. Developing Visualization Techniques for Semantics-based Information Networks

    Science.gov (United States)

    Keller, Richard M.; Hall, David R.

    2003-01-01

    Information systems incorporating complex network structured information spaces with a semantic underpinning - such as hypermedia networks, semantic networks, topic maps, and concept maps - are being deployed to solve some of NASA s critical information management problems. This paper describes some of the human interaction and navigation problems associated with complex semantic information spaces and describes a set of new visual interface approaches to address these problems. A key strategy is to leverage semantic knowledge represented within these information spaces to construct abstractions and views that will be meaningful to the human user. Human-computer interaction methodologies will guide the development and evaluation of these approaches, which will benefit deployed NASA systems and also apply to information systems based on the emerging Semantic Web.

  9. Heterogeneous Wireless Mesh Network Technology Evaluation for Space Proximity and Surface Applications

    Science.gov (United States)

    DeCristofaro, Michael A.; Lansdowne, Chatwin A.; Schlesinger, Adam M.

    2014-01-01

    NASA has identified standardized wireless mesh networking as a key technology for future human and robotic space exploration. Wireless mesh networks enable rapid deployment, provide coverage in undeveloped regions. Mesh networks are also self-healing, resilient, and extensible, qualities not found in traditional infrastructure-based networks. Mesh networks can offer lower size, weight, and power (SWaP) than overlapped infrastructure-perapplication. To better understand the maturity, characteristics and capability of the technology, we developed an 802.11 mesh network consisting of a combination of heterogeneous commercial off-the-shelf devices and opensource firmware and software packages. Various streaming applications were operated over the mesh network, including voice and video, and performance measurements were made under different operating scenarios. During the testing several issues with the currently implemented mesh network technology were identified and outlined for future work.

  10. Software defined wireless sensor networks application opportunities for efficient network management: a survey

    CSIR Research Space (South Africa)

    Modieginyane, KM

    2017-03-01

    Full Text Available Wireless Sensor Networks (WSNs) are commonly used information technologies of modern networking and computing platforms. Today's network computing applications are faced with a high demand of powerful network functionalities. Functional network...

  11. Network models for solving the problem of multicriterial adaptive optimization of investment projects control with several acceptable technologies

    Science.gov (United States)

    Shorikov, A. F.; Butsenko, E. V.

    2017-10-01

    This paper discusses the problem of multicriterial adaptive optimization the control of investment projects in the presence of several technologies. On the basis of network modeling proposed a new economic and mathematical model and a method for solving the problem of multicriterial adaptive optimization the control of investment projects in the presence of several technologies. Network economic and mathematical modeling allows you to determine the optimal time and calendar schedule for the implementation of the investment project and serves as an instrument to increase the economic potential and competitiveness of the enterprise. On a meaningful practical example, the processes of forming network models are shown, including the definition of the sequence of actions of a particular investment projecting process, the network-based work schedules are constructed. The calculation of the parameters of network models is carried out. Optimal (critical) paths have been formed and the optimal time for implementing the chosen technologies of the investment project has been calculated. It also shows the selection of the optimal technology from a set of possible technologies for project implementation, taking into account the time and cost of the work. The proposed model and method for solving the problem of managing investment projects can serve as a basis for the development, creation and application of appropriate computer information systems to support the adoption of managerial decisions by business people.

  12. Network function virtualization concepts and applicability in 5G networks

    CERN Document Server

    Zhang, Ying

    2018-01-01

    A horizontal view of newly emerged technologies in the field of network function virtualization (NFV), introducing the open source implementation efforts that bring NFV from design to reality This book explores the newly emerged technique of network function virtualization (NFV) through use cases, architecture, and challenges, as well as standardization and open source implementations. It is the first systematic source of information about cloud technologies' usage in the cellular network, covering the interplay of different technologies, the discussion of different design choices, and its impact on our future cellular network. Network Function Virtualization: Concepts and Applicability in 5G Networks reviews new technologies that enable NFV, such as Software Defined Networks (SDN), network virtualization, and cloud computing. It also provides an in-depth investigation of the most advanced open source initiatives in this area, including OPNFV, Openstack, and Opendaylight. Finally, this book goes beyond li...

  13. Impact of Information and Communication Technology on Information Seeking Behavior of Users in Astronomy and Astrophysics Centers of India: A Survey

    Science.gov (United States)

    Sahu, H. K.; Singh, S. N.

    2010-10-01

    This study is based on a survey designed to determine the Information Seeking Behavior (ISB) of Astronomy and Astrophysics users in India. The main objective of the study is to determine the sources consulted and the general pattern of the information-gathering system of users and the impact of Information and Communication Technology (ICT) on the Astronomy and Astrophysics user's Information Seeking Behavior. It examines various Information and Communication Technology-based resources and methods of access and use. A descriptive sample stratified method has been used and data was collected using a questionnaire as the main tool. The response rate was 72%. Descriptive statistics were also employed and data have been presented in tables and graphs. The study is supported by earlier studies. It shows that Astronomy and Astrophysics users have developed a unique Information Seeking Behavior to carry out their education and research. The vast majority of respondents reported that more information is available from a variety of e-resources. Consequently, they are able to devote more time to seek out relevant information in the current Information and Communication Technology scenario. The study also indicates that respondents use a variety of information resources including e-resources for teaching and research. Books and online databases such as the NASA Astrophysics Data System (ADS) were considered more important as formal sources of information. E-mail and face-to-face communications are used extensively by users as informal sources of information. It also reveals that despite the presence of electronic sources, Astronomy and Astrophysics users are still using printed materials. This study should to help to improve various Information and Communication Technology-based services. It also suggests that GOI should adopt Information and Communication Technology-based Information Centers and Libraries services and recommends a network-based model for Astronomy and

  14. Report: Information Meeting / Awareness of Actors on the Chemical Information Exchange Network (CIEN)

    International Nuclear Information System (INIS)

    Senghor, Cheikh

    2015-01-01

    As part of the implementation of the Stockholm Convention, Senegal has established a Chemical Information Exchange Network. The overall objective of this meeting was to identify the various actors involved in the management of chemicals information and to study the modalities for the implementation of the chemical information exchange network in Senegal.

  15. Information Technology and Literacy Assessment.

    Science.gov (United States)

    Balajthy, Ernest

    2002-01-01

    Compares technology predictions from around 1989 with the technology of 2002. Discusses the place of computer-based assessment today, computer-scored testing, computer-administered formal assessment, Internet-based formal assessment, computerized adaptive tests, placement tests, informal assessment, electronic portfolios, information management,…

  16. Social Network Analysis and Mining to Monitor and Identify Problems with Large-Scale Information and Communication Technology Interventions.

    Science.gov (United States)

    da Silva, Aleksandra do Socorro; de Brito, Silvana Rossy; Vijaykumar, Nandamudi Lankalapalli; da Rocha, Cláudio Alex Jorge; Monteiro, Maurílio de Abreu; Costa, João Crisóstomo Weyl Albuquerque; Francês, Carlos Renato Lisboa

    2016-01-01

    The published literature reveals several arguments concerning the strategic importance of information and communication technology (ICT) interventions for developing countries where the digital divide is a challenge. Large-scale ICT interventions can be an option for countries whose regions, both urban and rural, present a high number of digitally excluded people. Our goal was to monitor and identify problems in interventions aimed at certification for a large number of participants in different geographical regions. Our case study is the training at the Telecentros.BR, a program created in Brazil to install telecenters and certify individuals to use ICT resources. We propose an approach that applies social network analysis and mining techniques to data collected from Telecentros.BR dataset and from the socioeconomics and telecommunications infrastructure indicators of the participants' municipalities. We found that (i) the analysis of interactions in different time periods reflects the objectives of each phase of training, highlighting the increased density in the phase in which participants develop and disseminate their projects; (ii) analysis according to the roles of participants (i.e., tutors or community members) reveals that the interactions were influenced by the center (or region) to which the participant belongs (that is, a community contained mainly members of the same region and always with the presence of tutors, contradicting expectations of the training project, which aimed for intense collaboration of the participants, regardless of the geographic region); (iii) the social network of participants influences the success of the training: that is, given evidence that the degree of the community member is in the highest range, the probability of this individual concluding the training is 0.689; (iv) the North region presented the lowest probability of participant certification, whereas the Northeast, which served municipalities with similar

  17. From troglodytes to information managers: information management and technology needs to achieve the primary care NHS modernization agenda--the views of three GPs.

    Science.gov (United States)

    Rooney, I; Hornby, S

    2000-09-01

    In response to the information management and technology changes proposed by the Government's NHS modernization initiative this article examines the issues that GPs feel to be of major significance to their work. Although information and communications technology is widely used in general practice there is no one agreed standard system. The level of technology and the manner in which it is used is also diverse throughout the profession, as are the attitudes that exist amongst GPs regarding the value of information management and technology, and the benefits efficient information management offers to them and to their patients. The views of three local GPs from practices with varying levels of information technology were obtained through semi-structured interviews and the findings developed in the light of current discussions in the published literature. The GPs chosen reflect the disparity within general practice and, perhaps, other units of the NHS in the use and understanding of information management. The main conclusions were that there is ambivalence and scepticism about what NHSnet currently has to offer; that local electronic records benefit patient care, but when networked more widely problems of confidentiality and security result. Practitioners were also mindful of the financial costs of changes and concerned, given the impact of PCGs and clinical governance, as to who will be responsible for ensuring a common level of electronic records, IT provision, and financial and technological support.

  18. Advanced Communication and Networking Technologies for Mars Exploration

    Science.gov (United States)

    Bhasin, Kul; Hayden, Jeff; Agre, Jonathan R.; Clare, Loren P.; Yan, Tsun-Yee

    2001-01-01

    Next-generation Mars communications networks will provide communications and navigation services to a wide variety of Mars science vehicles including: spacecraft that are arriving at Mars, spacecraft that are entering and descending in the Mars atmosphere, scientific orbiter spacecraft, spacecraft that return Mars samples to Earth, landers, rovers, aerobots, airplanes, and sensing pods. In the current architecture plans, the communication services will be provided using capabilities deployed on the science vehicles as well as dedicated communication satellites that will together make up the Mars network. This network will evolve as additional vehicles arrive, depart or end their useful missions. Cost savings and increased reliability will result from the ability to share communication services between missions. This paper discusses the basic architecture that is needed to support the Mars Communications Network part of NASA's Space Science Enterprise (SSE) communications architecture. The network may use various networking technologies such as those employed in the terrestrial Internet, as well as special purpose deep-space protocols to move data and commands autonomously between vehicles, at disparate Mars vicinity sites (on the surface or in near-Mars space) and between Mars vehicles and earthbound users. The architecture of the spacecraft on-board local communications is being reconsidered in light of these new networking requirements. The trend towards increasingly autonomous operation of the spacecraft is aimed at reducing the dependence on resource scheduling provided by Earth-based operators and increasing system fault tolerance. However, these benefits will result in increased communication and software development requirements. As a result, the envisioned Mars communications infrastructure requires both hardware and protocol technology advancements. This paper will describe a number of the critical technology needs and some of the ongoing research

  19. Information and Networks

    International Development Research Centre (IDRC) Digital Library (Canada)

    arashid

    Information and Communication Technologies for Development .... costs of digital media reproduction – combined with rampant piracy – are fundamentally .... namely those related to reputation, resources, time, and ethics - all challenges that ...

  20. Brief: Information technology outsourcing -- one company's experience

    International Nuclear Information System (INIS)

    Klochko, J.W.; Bester, L.W.

    1994-01-01

    To address the pressures of the 1990's business climate, Amoco Canada Petroleum Co. Ltd. went through an aggressive evaluation and restructuring of its business operations. This precipitated a critical review of its information technology (IT) strategy with a goal of maintaining effectiveness while reducing overall costs. To meet the challenge of substantially reducing expenses while continuing to maintain effective service levels, the company entered a 5-year agreement to outsource its data center and network operations. this paper discusses the business forces that brought Amoco Canada to consider outsourcing, the processes surrounding the outsourcing decision, and the results to date. The authors demonstrate that by understanding the role of IT in its business plans, the company successfully met its outsourcing objectives

  1. Device-to-Device Underlay Cellular Networks with Uncertain Channel State Information

    KAUST Repository

    Memmi, Amen

    2016-01-06

    Device-to-Device (D2D) communications underlying the cellular infrastructure is a technology that has recently been proposed as a promising solution to enhance cellular network capabilities: It improves spectrum utilization, overall throughput and energy efficiency while enabling new peer-to-peer and location-based applications and services. However, interference is the major challenge since the same resources are shared by both systems. Therefore, interference management techniques are required to keep the interference under control. In this work, in order to mitigate interference, we consider centralized and distributed power control algorithms in a one-cell random network model. Differently from previous works, we are assuming that the channel state information (CSI) may be imperfect and include estimation errors. We evaluate how this uncertainty impacts performances.

  2. Sustainable Technology Analysis of Artificial Intelligence Using Bayesian and Social Network Models

    Directory of Open Access Journals (Sweden)

    Juhwan Kim

    2018-01-01

    Full Text Available Recent developments in artificial intelligence (AI have led to a significant increase in the use of AI technologies. Many experts are researching and developing AI technologies in their respective fields, often submitting papers and patent applications as a result. In particular, owing to the characteristics of the patent system that is used to protect the exclusive rights to registered technology, patent documents contain detailed information on the developed technology. Therefore, in this study, we propose a statistical method for analyzing patent data on AI technology to improve our understanding of sustainable technology in the field of AI. We collect patent documents that are related to AI technology, and then analyze the patent data to identify sustainable AI technology. In our analysis, we develop a statistical method that combines social network analysis and Bayesian modeling. Based on the results of the proposed method, we provide a technological structure that can be applied to understand the sustainability of AI technology. To show how the proposed method can be applied to a practical problem, we apply the technological structure to a case study in order to analyze sustainable AI technology.

  3. The NASA Integrated Information Technology Architecture

    Science.gov (United States)

    Baldridge, Tim

    1997-01-01

    This document defines an Information Technology Architecture for the National Aeronautics and Space Administration (NASA), where Information Technology (IT) refers to the hardware, software, standards, protocols and processes that enable the creation, manipulation, storage, organization and sharing of information. An architecture provides an itemization and definition of these IT structures, a view of the relationship of the structures to each other and, most importantly, an accessible view of the whole. It is a fundamental assumption of this document that a useful, interoperable and affordable IT environment is key to the execution of the core NASA scientific and project competencies and business practices. This Architecture represents the highest level system design and guideline for NASA IT related activities and has been created on the authority of the NASA Chief Information Officer (CIO) and will be maintained under the auspices of that office. It addresses all aspects of general purpose, research, administrative and scientific computing and networking throughout the NASA Agency and is applicable to all NASA administrative offices, projects, field centers and remote sites. Through the establishment of five Objectives and six Principles this Architecture provides a blueprint for all NASA IT service providers: civil service, contractor and outsourcer. The most significant of the Objectives and Principles are the commitment to customer-driven IT implementations and the commitment to a simpler, cost-efficient, standards-based, modular IT infrastructure. In order to ensure that the Architecture is presented and defined in the context of the mission, project and business goals of NASA, this Architecture consists of four layers in which each subsequent layer builds on the previous layer. They are: 1) the Business Architecture: the operational functions of the business, or Enterprise, 2) the Systems Architecture: the specific Enterprise activities within the context

  4. Research on the model of home networking

    Science.gov (United States)

    Yun, Xiang; Feng, Xiancheng

    2007-11-01

    It is the research hotspot of current broadband network to combine voice service, data service and broadband audio-video service by IP protocol to transport various real time and mutual services to terminal users (home). Home Networking is a new kind of network and application technology which can provide various services. Home networking is called as Digital Home Network. It means that PC, home entertainment equipment, home appliances, Home wirings, security, illumination system were communicated with each other by some composing network technology, constitute a networking internal home, and connect with WAN by home gateway. It is a new network technology and application technology, and can provide many kinds of services inside home or between homes. Currently, home networking can be divided into three kinds: Information equipment, Home appliances, Communication equipment. Equipment inside home networking can exchange information with outer networking by home gateway, this information communication is bidirectional, user can get information and service which provided by public networking by using home networking internal equipment through home gateway connecting public network, meantime, also can get information and resource to control the internal equipment which provided by home networking internal equipment. Based on the general network model of home networking, there are four functional entities inside home networking: HA, HB, HC, and HD. (1) HA (Home Access) - home networking connects function entity; (2) HB (Home Bridge) Home networking bridge connects function entity; (3) HC (Home Client) - Home networking client function entity; (4) HD (Home Device) - decoder function entity. There are many physical ways to implement four function entities. Based on theses four functional entities, there are reference model of physical layer, reference model of link layer, reference model of IP layer and application reference model of high layer. In the future home network

  5. Global information network on chemicals (GINC) and its Asian component

    International Nuclear Information System (INIS)

    Kaminuma, Tsuguchika; Nakata, Kotoko

    2003-01-01

    The Global Information Network on Chemicals (GINC) is an effort to build a global information network that links international, national, and other organizations working for the safe management of chemicals in order to exchange information and improve communications. The project was originally proposed in 1993 by one of the authors then at the National Institute of Health Sciences (NIHS) of Japan to the International Program on Chemical Safety (IPCS), which is a joint project of World Health Organization (WHO), International Labor Organization (ILO), and United Nations Environment Program (UNEP). The base support system was first implemented at NIHS using the Internet/World Wide Web (WWW) technology in 1995. The project was then endorsed by the Intergovernmental Forum on Chemical Safety (IFCS) and was adopted by the Inter-Organization Program for the Sound Management of Chemicals (IOMC). However, the base system (http://www.nihs.go.jp/GINC/index.html) has been developed and maintained solely by the NIHS group under the support of the Ministry of Health and Welfare (MHW), Japan. Asia, particularly East Asia and the Pacific region, was chosen as the feasibility study region for this project. During the period from December 1994 to July 2002, NIHS hosted eight meetings on this project held in Tokyo

  6. 78 FR 7797 - Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-02-04

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0005] Homeland Security Information Network... Committee Meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSIN AC) will meet... received by the (Homeland Security Information Network Advisory Committee), go to http://www.regulations...

  7. Technologies for information skills in web

    Directory of Open Access Journals (Sweden)

    Isa Maria Freire

    2012-12-01

    Full Text Available It presents and discusses the results of Information Project Skills – Tutorials for Intellectual Technology for dissemination of information in Web developed in Intellectuals Laboratory Technology at Department of Information Science, University Federal of Paraíba. Discusses proposed extension action, in partnership with university education areas in Library and Archival, to develop skills to search, organization, production and dissemination of information in the Web. Reports the development of tutorials to transfer intellectual technology in Web technology for community interested as well experience with face workshops held during the I- International Book Exhibition of Paraíba, in 2010. Discusses results and activities for information skills, from reflection on the experience in this first year the Project.

  8. Information Communication Technology and Politics: A Synthesized Analysis of the Impacts of Information Technology on Voter Participation in Kenya

    Science.gov (United States)

    Tsuma, Clive Katiba

    2011-01-01

    The availability of political information throughout society made possible by the evolution of contemporary information communication technology has precipitated conflicting debate regarding the effects of technology use on real life political participation. Proponents of technology argue that the use of new information technology stimulates…

  9. Information transfer in community structured multiplex networks

    Science.gov (United States)

    Solé Ribalta, Albert; Granell, Clara; Gómez, Sergio; Arenas, Alex

    2015-08-01

    The study of complex networks that account for different types of interactions has become a subject of interest in the last few years, specially because its representational power in the description of users interactions in diverse online social platforms (Facebook, Twitter, Instagram, etc.). The mathematical description of these interacting networks has been coined under the name of multilayer networks, where each layer accounts for a type of interaction. It has been shown that diffusive processes on top of these networks present a phenomenology that cannot be explained by the naive superposition of single layer diffusive phenomena but require the whole structure of interconnected layers. Nevertheless, the description of diffusive phenomena on multilayer networks has obviated the fact that social networks have strong mesoscopic structure represented by different communities of individuals driven by common interests, or any other social aspect. In this work, we study the transfer of information in multilayer networks with community structure. The final goal is to understand and quantify, if the existence of well-defined community structure at the level of individual layers, together with the multilayer structure of the whole network, enhances or deteriorates the diffusion of packets of information.

  10. Information transfer in community structured multiplex networks

    Directory of Open Access Journals (Sweden)

    Albert eSolé Ribalta

    2015-08-01

    Full Text Available The study of complex networks that account for different types of interactions has become a subject of interest in the last few years, specially because its representational power in the description of users interactions in diverse online social platforms (Facebook, Twitter, Instagram, etc.. The mathematical description of these interacting networks has been coined under the name of multilayer networks, where each layer accounts for a type of interaction. It has been shown that diffusive processes on top of these networks present a phenomenology that cannot be explained by the naive superposition of single layer diffusive phenomena but require the whole structure of interconnected layers. Nevertheless, the description of diffusive phenomena on multilayer networks has obviated the fact that social networks have strong mesoscopic structure represented by different communities of individuals driven by common interests, or any other social aspect. In this work, we study the transfer of information in multilayer networks with community structure. The final goal is to understand and quantify, if the existence of well-defined community structure at the level of individual layers, together with the multilayer structure of the whole network, enhances or deteriorates the diffusion of packets of information.

  11. INFORMATION TECHNOLOGIES IN TOURISM

    Directory of Open Access Journals (Sweden)

    Radka Tosheva

    2016-12-01

    Full Text Available In this article the focus is on the role of information technology in tourism, tourism business, electronic payments, software used by tourist companies, new technologies for online advertising and shopping, software for mobile devices.

  12. Ad hoc laser networks component technology for modular spacecraft

    Science.gov (United States)

    Huang, Xiujun; Shi, Dele; Shen, Jingshi

    2017-10-01

    Distributed reconfigurable satellite is a new kind of spacecraft system, which is based on a flexible platform of modularization and standardization. Based on the module data flow analysis of the spacecraft, this paper proposes a network component of ad hoc Laser networks architecture. Low speed control network with high speed load network of Microwave-Laser communication mode, no mesh network mode, to improve the flexibility of the network. Ad hoc Laser networks component technology was developed, and carried out the related performance testing and experiment. The results showed that ad hoc Laser networks components can meet the demand of future networking between the module of spacecraft.

  13. Information Technology Budgets and Costs: Do You Know What Your Information Technology Costs Each Year?

    Science.gov (United States)

    Dugan, Robert E.

    2002-01-01

    Discusses yearly information technology costs for academic libraries. Topics include transformation and modernization activities that affect prices and budgeting; a cost model for information technologies; life cycle costs, including initial costs and recurring costs; cost benchmarks; and examples of pressures concerning cost accountability. (LRW)

  14. International earth science information network for global change decision making

    Energy Technology Data Exchange (ETDEWEB)

    Autrey-Hunley, C.; Kuhn, W.R.; Kasischke, E.; Trichel, M.T.; Coppola, R.

    1991-01-01

    Effective environmental decision making depends upon the ability to predict physical changes in the environment, societal responses to these changes, and how both the physical changes and societal responses will be affected by changes in government regulations, public perceptions and the environment. Technological advances in remote sensing have provided a wealth of earth science data necessary to study global change problems; the Earth Observatory System will provide an unprecedented data source in the late 1990's. The Consortium for an International Earth Science Information Network (CIESIN) will combine earth science data (both satellite and ground-based) with data on the social sciences (e.g., economics, demographics, public health) to support informed policy decisions and to transfer knowledge on global change and its causes to the public.

  15. Network Technologies for Networked Terrorists: Assessing the Value of Information and Communication Technologies to Modern Terrorist Organizations

    National Research Council Canada - National Science Library

    Don, Bruce; Frelinger, Dave; Gerwehr, Scott; Landree, Eric; Jackson, Brian

    2007-01-01

    .... This book explores the role that these communications and computer technologies play and the net effect of their use, the purpose and manner in which the technology is used, the operational actions...

  16. Maximizing information exchange between complex networks

    International Nuclear Information System (INIS)

    West, Bruce J.; Geneston, Elvis L.; Grigolini, Paolo

    2008-01-01

    Science is not merely the smooth progressive interaction of hypothesis, experiment and theory, although it sometimes has that form. More realistically the scientific study of any given complex phenomenon generates a number of explanations, from a variety of perspectives, that eventually requires synthesis to achieve a deep level of insight and understanding. One such synthesis has created the field of out-of-equilibrium statistical physics as applied to the understanding of complex dynamic networks. Over the past forty years the concept of complexity has undergone a metamorphosis. Complexity was originally seen as a consequence of memory in individual particle trajectories, in full agreement with a Hamiltonian picture of microscopic dynamics and, in principle, macroscopic dynamics could be derived from the microscopic Hamiltonian picture. The main difficulty in deriving macroscopic dynamics from microscopic dynamics is the need to take into account the actions of a very large number of components. The existence of events such as abrupt jumps, considered by the conventional continuous time random walk approach to describing complexity was never perceived as conflicting with the Hamiltonian view. Herein we review many of the reasons why this traditional Hamiltonian view of complexity is unsatisfactory. We show that as a result of technological advances, which make the observation of single elementary events possible, the definition of complexity has shifted from the conventional memory concept towards the action of non-Poisson renewal events. We show that the observation of crucial processes, such as the intermittent fluorescence of blinking quantum dots as well as the brain's response to music, as monitored by a set of electrodes attached to the scalp, has forced investigators to go beyond the traditional concept of complexity and to establish closer contact with the nascent field of complex networks. Complex networks form one of the most challenging areas of modern

  17. Maximizing information exchange between complex networks

    Science.gov (United States)

    West, Bruce J.; Geneston, Elvis L.; Grigolini, Paolo

    2008-10-01

    Science is not merely the smooth progressive interaction of hypothesis, experiment and theory, although it sometimes has that form. More realistically the scientific study of any given complex phenomenon generates a number of explanations, from a variety of perspectives, that eventually requires synthesis to achieve a deep level of insight and understanding. One such synthesis has created the field of out-of-equilibrium statistical physics as applied to the understanding of complex dynamic networks. Over the past forty years the concept of complexity has undergone a metamorphosis. Complexity was originally seen as a consequence of memory in individual particle trajectories, in full agreement with a Hamiltonian picture of microscopic dynamics and, in principle, macroscopic dynamics could be derived from the microscopic Hamiltonian picture. The main difficulty in deriving macroscopic dynamics from microscopic dynamics is the need to take into account the actions of a very large number of components. The existence of events such as abrupt jumps, considered by the conventional continuous time random walk approach to describing complexity was never perceived as conflicting with the Hamiltonian view. Herein we review many of the reasons why this traditional Hamiltonian view of complexity is unsatisfactory. We show that as a result of technological advances, which make the observation of single elementary events possible, the definition of complexity has shifted from the conventional memory concept towards the action of non-Poisson renewal events. We show that the observation of crucial processes, such as the intermittent fluorescence of blinking quantum dots as well as the brain’s response to music, as monitored by a set of electrodes attached to the scalp, has forced investigators to go beyond the traditional concept of complexity and to establish closer contact with the nascent field of complex networks. Complex networks form one of the most challenging areas of

  18. Maximizing information exchange between complex networks

    Energy Technology Data Exchange (ETDEWEB)

    West, Bruce J. [Mathematical and Information Science, Army Research Office, Research Triangle Park, NC 27708 (United States); Physics Department, Duke University, Durham, NC 27709 (United States)], E-mail: bwest@nc.rr.com; Geneston, Elvis L. [Center for Nonlinear Science, University of North Texas, P.O. Box 311427, Denton, TX 76203-1427 (United States); Physics Department, La Sierra University, 4500 Riverwalk Parkway, Riverside, CA 92515 (United States); Grigolini, Paolo [Center for Nonlinear Science, University of North Texas, P.O. Box 311427, Denton, TX 76203-1427 (United States); Istituto di Processi Chimico Fisici del CNR, Area della Ricerca di Pisa, Via G. Moruzzi, 56124, Pisa (Italy); Dipartimento di Fisica ' E. Fermi' Universita' di Pisa, Largo Pontecorvo 3, 56127 Pisa (Italy)

    2008-10-15

    Science is not merely the smooth progressive interaction of hypothesis, experiment and theory, although it sometimes has that form. More realistically the scientific study of any given complex phenomenon generates a number of explanations, from a variety of perspectives, that eventually requires synthesis to achieve a deep level of insight and understanding. One such synthesis has created the field of out-of-equilibrium statistical physics as applied to the understanding of complex dynamic networks. Over the past forty years the concept of complexity has undergone a metamorphosis. Complexity was originally seen as a consequence of memory in individual particle trajectories, in full agreement with a Hamiltonian picture of microscopic dynamics and, in principle, macroscopic dynamics could be derived from the microscopic Hamiltonian picture. The main difficulty in deriving macroscopic dynamics from microscopic dynamics is the need to take into account the actions of a very large number of components. The existence of events such as abrupt jumps, considered by the conventional continuous time random walk approach to describing complexity was never perceived as conflicting with the Hamiltonian view. Herein we review many of the reasons why this traditional Hamiltonian view of complexity is unsatisfactory. We show that as a result of technological advances, which make the observation of single elementary events possible, the definition of complexity has shifted from the conventional memory concept towards the action of non-Poisson renewal events. We show that the observation of crucial processes, such as the intermittent fluorescence of blinking quantum dots as well as the brain's response to music, as monitored by a set of electrodes attached to the scalp, has forced investigators to go beyond the traditional concept of complexity and to establish closer contact with the nascent field of complex networks. Complex networks form one of the most challenging areas of

  19. Visualization maps for the evolution of research hotspots in the field of regional health information networks.

    Science.gov (United States)

    Wang, Yanjun; Zheng, Jianzhong; Zhang, Ailian; Zhou, Wei; Dong, Haiyuan

    2018-03-01

    The aim of this study was to reveal research hotspots in the field of regional health information networks (RHINs) and use visualization techniques to explore their evolution over time and differences between countries. We conducted a literature review for a 50-year period and compared the prevalence of certain index terms during the periods 1963-1993 and 1994-2014 and in six countries. We applied keyword frequency analysis, keyword co-occurrence analysis, multidimensional scaling analysis, and network visualization technology. The total number of keywords was found to increase with time. From 1994 to 2014, the research priorities shifted from hospital planning to community health planning. The number of keywords reflecting information-based research increased. The density of the knowledge network increased significantly, and partial keywords condensed into knowledge groups. All six countries focus on keywords including Information Systems; Telemedicine; Information Service; Medical Records Systems, Computerized; Internet; etc.; however, the level of development and some research priorities are different. RHIN research has generally increased in popularity over the past 50 years. The research hotspots are evolving and are at different levels of development in different countries. Knowledge network mapping and perceptual maps provide useful information for scholars, managers, and policy-makers.

  20. Report on Asian Environment Information Network; 'Asia kankyo joho network' ni kansuru hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    The goal is the construction of Asian Environment Information Network (AEInet) in accordance with a contract signed between Indonesia's LIPI (Indonesian Institute of Science) and NEDO under NEDO's Research Cooperation Project Concerning the Development of Environment Measuring Laser Radar (LR). The network is so designed and constituted as to operate on a private line between Indonesia and Japan via IP (Internet protocol) and to enable the exchange on the Internet network of the data collected/analyzed by the Indonesian LR system and of articles of e-mail between scientists of the two countries. The AEInet will be utilized for the collection/analysis of LR-collected data; exchange of observed data and the result of processing; provision of support to environment information scientists in exchanging e-mail and information; and the search of databases for the implementation of the project. In this paper, the outline and functions of the system, network system design, WWW server construction, network operating status, joint researches with Indonesia, etc., are described. (NEDO)

  1. Evaluation of high-performance network technologies for ITER

    International Nuclear Information System (INIS)

    Zagar, K.; Hunt, S.; Kolaric, P.; Sabjan, R.; Zagar, A.; Dedic, J.

    2010-01-01

    For the fast feedback plasma controllers, ITER's Control, Data Access and Communication system (CODAC) will need to provide a mechanism for hard real-time communication between its distributed nodes. In particular, the ITER CODAC team identified four types of high-performance communication applications. Synchronous Databus Network (SDN) is to provide an ability to distribute parameters of plasma (estimated to about 5000 double-valued signals) across the system to allow for 1 ms control cycles. Event Distribution Network (EDN) and Time Communication Network (TCN) are to allow synchronization of node I/O operations to 10 ns. Finally, the Audio-Video Network (AVN) is to provide sufficient bandwidth for streaming of surveillance and diagnostics video at a high resolution (1024 x 1024) and frame rate (30 Hz). In this article, we present some combinations of common-off-the-shelf (COTS) technologies that allow the above requirements to be met. Also, we present the performances achieved in a practical (though small scale) technology demonstrator, which involved a real-time Linux operating running on National Instruments' PXI platform, UDP communication implemented directly atop the Ethernet network adapter, CISCO switches, Micro Research Finland's timing and event solution, and GigE audio-video streaming.

  2. A research on the application of software defined networking in satellite network architecture

    Science.gov (United States)

    Song, Huan; Chen, Jinqiang; Cao, Suzhi; Cui, Dandan; Li, Tong; Su, Yuxing

    2017-10-01

    Software defined network is a new type of network architecture, which decouples control plane and data plane of traditional network, has the feature of flexible configurations and is a direction of the next generation terrestrial Internet development. Satellite network is an important part of the space-ground integrated information network, while the traditional satellite network has the disadvantages of difficult network topology maintenance and slow configuration. The application of SDN technology in satellite network can solve these problems that traditional satellite network faces. At present, the research on the application of SDN technology in satellite network is still in the stage of preliminary study. In this paper, we start with introducing the SDN technology and satellite network architecture. Then we mainly introduce software defined satellite network architecture, as well as the comparison of different software defined satellite network architecture and satellite network virtualization. Finally, the present research status and development trend of SDN technology in satellite network are analyzed.

  3. Information Security of PHY Layer in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Weidong Fang

    2016-01-01

    Full Text Available Since the characteristics of wireless channel are open and broadcasting, wireless networks are very vulnerable to be attacked via eavesdropping, jamming, and interference. As traditional secure technologies are not suitable for PHY layer of wireless networks, physical-layer security issues become a focus of attention. In this paper, we firstly identify and summarize the threats and vulnerabilities in PHY layer of wireless networks. Then, we give a holistic overview of PHY layer secure schemes, which are divided into three categories: spatial domain-based, time domain-based, and frequency domain-based. Along the way, we analyze the pros and cons of current secure technologies in each category. In addition, we also conclude the techniques and methods used in these categories and point out the open research issues and directions in this area.

  4. 77 FR 2734 - Health Information Technology Implementation

    Science.gov (United States)

    2012-01-19

    ... Information Technology Implementation AGENCY: Health Resources and Services Administration, HHS. ACTION... advance information technology resources of the Tennessee's medically underserved communities, TPCA has... advancement and effective use of Health Information Technology. These advancements will result in measurable...

  5. Informatics technology mimics ecology: dense, mutualistic collaboration networks are associated with higher publication rates.

    Directory of Open Access Journals (Sweden)

    Marco D Sorani

    Full Text Available Information technology (IT adoption enables biomedical research. Publications are an accepted measure of research output, and network models can describe the collaborative nature of publication. In particular, ecological networks can serve as analogies for publication and technology adoption. We constructed network models of adoption of bioinformatics programming languages and health IT (HIT from the literature.We selected seven programming languages and four types of HIT. We performed PubMed searches to identify publications since 2001. We calculated summary statistics and analyzed spatiotemporal relationships. Then, we assessed ecological models of specialization, cooperativity, competition, evolution, biodiversity, and stability associated with publications.Adoption of HIT has been variable, while scripting languages have experienced rapid adoption. Hospital systems had the largest HIT research corpus, while Perl had the largest language corpus. Scripting languages represented the largest connected network components. The relationship between edges and nodes was linear, though Bioconductor had more edges than expected and Perl had fewer. Spatiotemporal relationships were weak. Most languages shared a bioinformatics specialization and appeared mutualistic or competitive. HIT specializations varied. Specialization was highest for Bioconductor and radiology systems. Specialization and cooperativity were positively correlated among languages but negatively correlated among HIT. Rates of language evolution were similar. Biodiversity among languages grew in the first half of the decade and stabilized, while diversity among HIT was variable but flat. Compared with publications in 2001, correlation with publications one year later was positive while correlation after ten years was weak and negative.Adoption of new technologies can be unpredictable. Spatiotemporal relationships facilitate adoption but are not sufficient. As with ecosystems, dense

  6. Informatics technology mimics ecology: dense, mutualistic collaboration networks are associated with higher publication rates.

    Science.gov (United States)

    Sorani, Marco D

    2012-01-01

    Information technology (IT) adoption enables biomedical research. Publications are an accepted measure of research output, and network models can describe the collaborative nature of publication. In particular, ecological networks can serve as analogies for publication and technology adoption. We constructed network models of adoption of bioinformatics programming languages and health IT (HIT) from the literature.We selected seven programming languages and four types of HIT. We performed PubMed searches to identify publications since 2001. We calculated summary statistics and analyzed spatiotemporal relationships. Then, we assessed ecological models of specialization, cooperativity, competition, evolution, biodiversity, and stability associated with publications.Adoption of HIT has been variable, while scripting languages have experienced rapid adoption. Hospital systems had the largest HIT research corpus, while Perl had the largest language corpus. Scripting languages represented the largest connected network components. The relationship between edges and nodes was linear, though Bioconductor had more edges than expected and Perl had fewer. Spatiotemporal relationships were weak. Most languages shared a bioinformatics specialization and appeared mutualistic or competitive. HIT specializations varied. Specialization was highest for Bioconductor and radiology systems. Specialization and cooperativity were positively correlated among languages but negatively correlated among HIT. Rates of language evolution were similar. Biodiversity among languages grew in the first half of the decade and stabilized, while diversity among HIT was variable but flat. Compared with publications in 2001, correlation with publications one year later was positive while correlation after ten years was weak and negative.Adoption of new technologies can be unpredictable. Spatiotemporal relationships facilitate adoption but are not sufficient. As with ecosystems, dense, mutualistic

  7. TECHNOLOGY TRANSFER NETWORKS ON PAPAYA PRODUCTION WITH TRANSITIONAL GROWERS

    Directory of Open Access Journals (Sweden)

    Octavio Cano-Reyes

    2012-11-01

    Full Text Available Social networks analysis applied to rural innovation processes becomes a very useful technology transfer tool, since it helps to understand the complexity of social relationships among people and/or institutions in their environment, and it also defines those innovation networks given in specific working groups or regions. This study was conducted from April to May 2011 to determine those networks and key players present in the group of growers associated as “Productora y Comercializadora de Papaya de Cotaxtla S.P.R. de R.L.”, that influence the technology transfer process in Cotaxtla, Veracruz, Mexico. Data were analyzed using UCINET 6 software. Three centrality measures were obtained: range, degree of mediation and closeness. Of 32 network players, 27 actively diffuse innovations according to their interests; alliances must be established with them to transfer technology. Four growers stand out as central actors, which along with the Instituto Nacional de Investigaciones Forestales Agricolas y Pecuarias, the Colegio de Postgraduados and the growers’ organization itself, could be the most appropriate actors to establish a technology transfer program to accelerate the diffusion and adoption of innovations. Wholesalers, middlemen and credit institutions do not participate in this process, but having capital they could be incorporated in the innovation diffusion process.

  8. Multiagent Based Information Dissemination in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    S.S. Manvi

    2009-01-01

    Full Text Available Vehicular Ad hoc Networks (VANETs are a compelling application of ad hoc networks, because of the potential to access specific context information (e.g. traffic conditions, service updates, route planning and deliver multimedia services (Voice over IP, in-car entertainment, instant messaging, etc.. This paper proposes an agent based information dissemination model for VANETs. A two-tier agent architecture is employed comprising of the following: 1 'lightweight', network-facing, mobile agents; 2 'heavyweight', application-facing, norm-aware agents. The limitations of VANETs lead us to consider a hybrid wireless network architecture that includes Wireless LAN/Cellular and ad hoc networking for analyzing the proposed model. The proposed model provides flexibility, adaptability and maintainability for traffic information dissemination in VANETs as well as supports robust and agile network management. The proposed model has been simulated in various network scenarios to evaluate the effectiveness of the approach.

  9. Strategic information technology alliances for effective health-care supply chain management.

    Science.gov (United States)

    Shih, Stephen C; Rivers, Patrick A; Hsu, H Y Sonya

    2009-08-01

    To gain and sustain competitive advantage, health-care providers have to continuously review and renovate their operational and information technology (IT) strategies through collaborative and cooperative endeavour with their supply chain channel members. This paper explores new ways of enhancing a health-care organization's responsiveness to changes and increasing its competitiveness through implementing strategic information technology alliances among channel members in a health-care supply chain network. An overview of issues and problems (e.g. bullwhip effect, negative externalities and free-riding phenomenon in multichannel supply chains) presented in the health-care supply chains is first delineated. This paper further goes over the issues of health-care supply chain coordination and integration for strategic IT alliances, followed by the discussion of the spillover effect of IT investments. A number of viable IT practices (such as information sharing and Internet-enabled supply chain portal) for effective health-care supply chain collaboration and coordination are then examined in this research. Finally, the paper discusses how strategic IT alliances can help improve the effectiveness of health-care supply chain management.

  10. Information technologies in environmental engineering. Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    Athanasiadis, Ioannis N.; Rizzoli, Andrea E. [Istituto dalle Molle di Studi sull' Intelligenza Artificiale (IDSIA), Manno (Switzerland); Mitkas, Pericles A. [Aristotle Univ. of Thessaloniki (Greece); Marx Gomez, Jorge (eds.) [Oldenburg Univ. (Germany). Abt. Wirtschaftsinformatik

    2009-07-01

    Information technologies have evolved to an enabling science for natural resource management and conservation, environmental engineering, scientific simulation and integrated assessment studies. Computing plays a significant role in every day practices of environmental engineers, natural scientists, economists, and social scientists. The complexity of natural phenomena requires interdisciplinary approaches, where computing science offers the infrastructure for environmental data collection and management, scientific simulations, decision support documentation and reporting. Ecology, environmental engineering and natural resource management comprise an excellent real-world testbed for IT system demonstration, while raising new challenges for computer science. Complexity, uncertainty and scaling issues of natural systems form a demanding application domain for sensor networks and earth observation systems; modelling, simulation and scientific workflows, data management and reporting, decision support and intelligent systems, distributed computing environments, geographical information systems, heterogeneous systems integration, software engineering, accounting systems and control systems. This books offers a collection of papers presented at the 4th International Symposium on Environmental Engineering, held in May 2009, in Thessaloniki, Greece. Recent success stories in ecoinformatics, promising ideas and new challenges are discussed among computer scientists, environmental engineers, economists and social scientists, demonstrating new paradigms for problem solving and decision making. (orig.)

  11. Tools to Use in an Information Technology Class--and Best of All They Are FREE!

    Science.gov (United States)

    Swanson, Dewey; Gusev, Dmitri A.

    2016-01-01

    Purdue Polytechnic has several locations in the state of Indiana offering students a chance to get a Purdue degree. The Computer and Information Technology (CIT) department offers the CIT degree at three sites in Indiana: Anderson, Columbus and Kokomo. CIT offers several potential majors including Cybersecurity, Network Engineering, Systems…

  12. Qualia could arise from information processing in local cortical networks.

    Science.gov (United States)

    Orpwood, Roger

    2013-01-01

    Re-entrant feedback, either within sensory cortex or arising from prefrontal areas, has been strongly linked to the emergence of consciousness, both in theoretical and experimental work. This idea, together with evidence for local micro-consciousness, suggests the generation of qualia could in some way result from local network activity under re-entrant activation. This paper explores the possibility by examining the processing of information by local cortical networks. It highlights the difference between the information structure (how the information is physically embodied), and the information message (what the information is about). It focuses on the network's ability to recognize information structures amongst its inputs under conditions of extensive local feedback, and to then assign information messages to those structures. It is shown that if the re-entrant feedback enables the network to achieve an attractor state, then the message assigned in any given pass of information through the network is a representation of the message assigned in the previous pass-through of information. Based on this ability the paper argues that as information is repeatedly cycled through the network, the information message that is assigned evolves from a recognition of what the input structure is, to what it is like, to how it appears, to how it seems. It could enable individual networks to be the site of qualia generation. The paper goes on to show networks in cortical layers 2/3 and 5a have the connectivity required for the behavior proposed, and reviews some evidence for a link between such local cortical cyclic activity and conscious percepts. It concludes with some predictions based on the theory discussed.

  13. The study and implementation of the wireless network data security model

    Science.gov (United States)

    Lin, Haifeng

    2013-03-01

    In recent years, the rapid development of Internet technology and the advent of information age, people are increasing the strong demand for the information products and the market for information technology. Particularly, the network security requirements have become more sophisticated. This paper analyzes the wireless network in the data security vulnerabilities. And a list of wireless networks in the framework is the serious defects with the related problems. It has proposed the virtual private network technology and wireless network security defense structure; and it also given the wireless networks and related network intrusion detection model for the detection strategies.

  14. Report on the results of `the R and D of industrial technology information base arrangement`; `Sangyo gijutsu joho kiban seibi kenkyu kaihatsu` seika hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-03-01

    In relation to information processing in the open type research information networking, R and D were conducted to establish basic technologies such as grading-up, acceleration, enhancement of efficiency, diversification of application, promotion of usable data accumulation, etc. As to the R and D of software to promote sharing of research information, software was developed which can easily modify and renew management objects for users at research sites, etc., and the target was almost achieved. Concerning the R and D of information supply technology, an approach was presented whereby clients submit bids for each stream of the data requested and the admission decision is made so as to maximize gain of the session under network capacity constraints. Additionally, the R and D were made of software to construct an international information sharing system, a system for multi-lingual I/O, text manipulation and communication, and software for remote use of network based information for scientific computing. 138 refs., 125 figs., 33 tabs.

  15. Creating Communications, Computing, and Networking Technology Development Road Maps for Future NASA Human and Robotic Missions

    Science.gov (United States)

    Bhasin, Kul; Hayden, Jeffrey L.

    2005-01-01

    For human and robotic exploration missions in the Vision for Exploration, roadmaps are needed for capability development and investments based on advanced technology developments. A roadmap development process was undertaken for the needed communications, and networking capabilities and technologies for the future human and robotics missions. The underlying processes are derived from work carried out during development of the future space communications architecture, an d NASA's Space Architect Office (SAO) defined formats and structures for accumulating data. Interrelationships were established among emerging requirements, the capability analysis and technology status, and performance data. After developing an architectural communications and networking framework structured around the assumed needs for human and robotic exploration, in the vicinity of Earth, Moon, along the path to Mars, and in the vicinity of Mars, information was gathered from expert participants. This information was used to identify the capabilities expected from the new infrastructure and the technological gaps in the way of obtaining them. We define realistic, long-term space communication architectures based on emerging needs and translate the needs into interfaces, functions, and computer processing that will be required. In developing our roadmapping process, we defined requirements for achieving end-to-end activities that will be carried out by future NASA human and robotic missions. This paper describes: 10 the architectural framework developed for analysis; 2) our approach to gathering and analyzing data from NASA, industry, and academia; 3) an outline of the technology research to be done, including milestones for technology research and demonstrations with timelines; and 4) the technology roadmaps themselves.

  16. Running a network on a shoestring: the Global Invasive Species Information Network

    Science.gov (United States)

    Jarnevich, Catherine S.; Simpson, Annie; Graham, James J; Newman, Gregory J.; Bargeron, Chuck T.

    2015-01-01

    The Global Invasive Species Information Network (GISIN) was conceptualized in 2004 to aggregate and disseminate invasive species data in a standardized way. A decade later the GISIN community has implemented a data portal and three of six GISIN data aggregation models in the GISIN data exchange Protocol, including invasive species status information, resource URLs, and occurrence data. The portal is based on a protocol developed by representatives from 15 countries and 27 organizations of the global invasive species information management community. The GISIN has 19 data providers sharing 34,343 species status records, 1,693,073 occurrences, and 15,601 resource URLs. While the GISIN's goal is to be global, much of its data and funding are provided by the United States. Several initiatives use the GISIN as their information backbone, such as the Great Lakes Early Detection Network (GLEDN) and the North American Invasive Species Network (NAISN). Here we share several success stories and organizational challenges that remain.

  17. Analytical review of modern information education technologies

    OpenAIRE

    Светлана Викторовна Зенкина; О П Панкратова

    2014-01-01

    This article discusses and analyzes the modern information education technologies, which are seen as the priority to use in the modern information educational environment (Internet-based educational technologies, distance education, media education, e-Learning technologies, smart-education technologies).

  18. From biological neural networks to thinking machines: Transitioning biological organizational principles to computer technology

    Science.gov (United States)

    Ross, Muriel D.

    1991-01-01

    The three-dimensional organization of the vestibular macula is under study by computer assisted reconstruction and simulation methods as a model for more complex neural systems. One goal of this research is to transition knowledge of biological neural network architecture and functioning to computer technology, to contribute to the development of thinking computers. Maculas are organized as weighted neural networks for parallel distributed processing of information. The network is characterized by non-linearity of its terminal/receptive fields. Wiring appears to develop through constrained randomness. A further property is the presence of two main circuits, highly channeled and distributed modifying, that are connected through feedforward-feedback collaterals and biasing subcircuit. Computer simulations demonstrate that differences in geometry of the feedback (afferent) collaterals affects the timing and the magnitude of voltage changes delivered to the spike initiation zone. Feedforward (efferent) collaterals act as voltage followers and likely inhibit neurons of the distributed modifying circuit. These results illustrate the importance of feedforward-feedback loops, of timing, and of inhibition in refining neural network output. They also suggest that it is the distributed modifying network that is most involved in adaptation, memory, and learning. Tests of macular adaptation, through hyper- and microgravitational studies, support this hypothesis since synapses in the distributed modifying circuit, but not the channeled circuit, are altered. Transitioning knowledge of biological systems to computer technology, however, remains problematical.

  19. Educational commitment and social networking: The power of informal networks

    Science.gov (United States)

    Zwolak, Justyna P.; Zwolak, Michael; Brewe, Eric

    2018-06-01

    The lack of an engaging pedagogy and the highly competitive atmosphere in introductory science courses tend to discourage students from pursuing science, technology, engineering, and mathematics (STEM) majors. Once in a STEM field, academic and social integration has been long thought to be important for students' persistence. Yet, it is rarely investigated. In particular, the relative impact of in-class and out-of-class interactions remains an open issue. Here, we demonstrate that, surprisingly, for students whose grades fall in the "middle of the pack," the out-of-class network is the most significant predictor of persistence. To do so, we use logistic regression combined with Akaike's information criterion to assess in- and out-of-class networks, grades, and other factors. For students with grades at the very top (and bottom), final grade, unsurprisingly, is the best predictor of persistence—these students are likely already committed (or simply restricted from continuing) so they persist (or drop out). For intermediate grades, though, only out-of-class closeness—a measure of one's immersion in the network—helps predict persistence. This does not negate the need for in-class ties. However, it suggests that, in this cohort, only students that get past the convenient in-class interactions and start forming strong bonds outside of class are or become committed to their studies. Since many students are lost through attrition, our results suggest practical routes for increasing students' persistence in STEM majors.

  20. PHYSICAL RESOURCES OF INFORMATION PROCESSES AND TECHNOLOGIES

    Directory of Open Access Journals (Sweden)

    Mikhail O. Kolbanev

    2014-11-01

    Full Text Available Subject of study. The paper describes basic information technologies for automating of information processes of data storage, distribution and processing in terms of required physical resources. It is shown that the study of these processes with such traditional objectives of modern computer science, as the ability to transfer knowledge, degree of automation, information security, coding, reliability, and others, is not enough. The reasons are: on the one hand, the increase in the volume and intensity of information exchange in the subject of human activity and, on the other hand, drawing near to the limit of information systems efficiency based on semiconductor technologies. Creation of such technologies, which not only provide support for information interaction, but also consume a rational amount of physical resources, has become an actual problem of modern engineering development. Thus, basic information technologies for storage, distribution and processing of information to support the interaction between people are the object of study, and physical temporal, spatial and energy resources required for implementation of these technologies are the subject of study. Approaches. An attempt is made to enlarge the possibilities of traditional cybernetics methodology, which replaces the consideration of material information component by states search for information objects. It is done by taking explicitly into account the amount of physical resources required for changes in the states of information media. Purpose of study. The paper deals with working out of a common approach to the comparison and subsequent selection of basic information technologies for storage, distribution and processing of data, taking into account not only the requirements for the quality of information exchange in particular subject area and the degree of technology application, but also the amounts of consumed physical resources. Main findings. Classification of resources

  1. Obtaining informedness in collaborative networks through automated information provisioning

    DEFF Research Database (Denmark)

    Thimm, Heiko; Rasmussen, Karsten Boye

    2013-01-01

    Successful collaboration in business networks calls for well-informed network participants. Members who know about the many aspects of the network are an effective vehicle to successfully resolve conflicts, build a prospering collaboration climate and promote trust within the network. The importa......Successful collaboration in business networks calls for well-informed network participants. Members who know about the many aspects of the network are an effective vehicle to successfully resolve conflicts, build a prospering collaboration climate and promote trust within the network...... provisioning service. This article presents a corresponding modelling framework and a rule-based approach for the active system capabilities required. Details of a prototype implementation building on concepts of the research area of active databases are also reported....

  2. Research of the self-healing technologies in the optical communication network of distribution automation

    Science.gov (United States)

    Wang, Hao; Zhong, Guoxin

    2018-03-01

    Optical communication network is the mainstream technique of the communication networks for distribution automation, and self-healing technologies can improve the in reliability of the optical communication networks significantly. This paper discussed the technical characteristics and application scenarios of several network self-healing technologies in the access layer, the backbone layer and the core layer of the optical communication networks for distribution automation. On the base of the contrastive analysis, this paper gives an application suggestion of these self-healing technologies.

  3. Research and application of ARP protocol vulnerability attack and defense technology based on trusted network

    Science.gov (United States)

    Xi, Huixing

    2017-03-01

    With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.

  4. METHODS FOR EVALUATION OF COMPANIES’ INFORMATION SYSTEMS AND TECHNOLOGIES EFFICIENCY AND CONTROL IN TEACHING COURSE "INFORMATION TECHNOLOGY GOVERNANCE"

    Directory of Open Access Journals (Sweden)

    Samchynska Yaroslava

    2014-10-01

    Full Text Available The use of the information systems and technologies in economic activity is called to represent companies’ corporate principles, aims, traditions, to help in realization of the planned strategies, thanks to that the management efficiency and the cost of enterprise increases. Teaching for educational discipline «IT Governance» is directed on a study and research of these intercommunications by students of the 5th course on specialties «Computer Science», «Software Engineering» for educational level Specialist (Past Bachelor Degree, Master degree. The auditing services belong to the actual methods for evaluation of the information systems and technologies efficiency and control, which are studied according to the course «IT Governance». The article deals with the methodological basis of providing auditing services for evaluation of efficiency and control of information systems (technologies for the purpose of satisfaction of growing informational needs of companies and functional activation in their information resources. The main task of auditing services for control of information systems (information communication technologies efficiency is to evaluate independently and objectively if the information technologies provide the necessary services. The basic criteria, data ware, subject and object of audit necessary for drawing up an audit report and assurance declaring are established. The program and a detailed list of auditing procedures for evaluation of efficiency of information systems and technologies have been presented

  5. Integrating Information & Communications Technologies into the Classroom

    Science.gov (United States)

    Tomei, Lawrence, Ed.

    2007-01-01

    "Integrating Information & Communications Technologies Into the Classroom" examines topics critical to business, computer science, and information technology education, such as: school improvement and reform, standards-based technology education programs, data-driven decision making, and strategic technology education planning. This book also…

  6. Using information and communication technologies to consult with patients in Victorian primary care: the views of general practitioners.

    Science.gov (United States)

    Hanna, Lisa; Fairhurst, Karen

    2013-01-01

    Information and communication technologies such as email, text messaging and video messaging are commonly used by the general population. However, international research has shown that they are not used routinely by GPs to communicate or consult with patients. Investigating Victorian GPs' perceptions of doing so is timely given Australia's new National Broadband Network, which may facilitate web-based modes of doctor-patient interaction. This study therefore aimed to explore Victorian GPs' experiences of, and attitudes toward, using information and communication technologies to consult with patients. Qualitative telephone interviews were carried out with a maximum variation sample of 36GPs from across Victoria. GPs reported a range of perspectives on using new consultation technologies within their practice. Common concerns included medico-legal and remuneration issues and perceived patient information technology literacy. Policy makers should incorporate GPs' perspectives into primary care service delivery planning to promote the effective use of information and communication technologies in improving accessibility and quality of general practice care.

  7. Design and Management of Networked Information Systems

    DEFF Research Database (Denmark)

    Havn, Erling; Bansler, Jørgen P.

    1996-01-01

    In this paper, we present a newly started research project at the Center for Tele-Information at the Technical University of Denmark. The project focuses on the design and management of networked information systems, that is computer-based IS linked by a wide area network and supporting...... research questions:1. What is the essence of the new managerial theories and models and how do they define the role of telecommunications and IT in organizations?2. How are these organizational theories and models implemented in practice?3. How is the design and implementation of information systems...... and networks actually organized and carried out?4. What are the consequences for work content, skills, working conditions, etc.? The research project consists of a theoretical analysis of contemporary management theories as well as a number of in-depth case studies of firms engaged in the design...

  8. Multimedia information processing in the SWAN mobile networked computing system

    Science.gov (United States)

    Agrawal, Prathima; Hyden, Eoin; Krzyzanowsji, Paul; Srivastava, Mani B.; Trotter, John

    1996-03-01

    Anytime anywhere wireless access to databases, such as medical and inventory records, can simplify workflow management in a business, and reduce or even eliminate the cost of moving paper documents. Moreover, continual progress in wireless access technology promises to provide per-user bandwidths of the order of a few Mbps, at least in indoor environments. When combined with the emerging high-speed integrated service wired networks, it enables ubiquitous and tetherless access to and processing of multimedia information by mobile users. To leverage on this synergy an indoor wireless network based on room-sized cells and multimedia mobile end-points is being developed at AT&T Bell Laboratories. This research network, called SWAN (Seamless Wireless ATM Networking), allows users carrying multimedia end-points such as PDAs, laptops, and portable multimedia terminals, to seamlessly roam while accessing multimedia data streams from the wired backbone network. A distinguishing feature of the SWAN network is its use of end-to-end ATM connectivity as opposed to the connectionless mobile-IP connectivity used by present day wireless data LANs. This choice allows the wireless resource in a cell to be intelligently allocated amongst various ATM virtual circuits according to their quality of service requirements. But an efficient implementation of ATM in a wireless environment requires a proper mobile network architecture. In particular, the wireless link and medium-access layers need to be cognizant of the ATM traffic, while the ATM layers need to be cognizant of the mobility enabled by the wireless layers. This paper presents an overview of SWAN's network architecture, briefly discusses the issues in making ATM mobile and wireless, and describes initial multimedia applications for SWAN.

  9. Integrated system technologies for water and sewage works. Information system technologies for rainwater drainage. Jogesuido sogo system gijutsu. Kou joho system

    Energy Technology Data Exchange (ETDEWEB)

    Shinohara, T; Nakada, M; Kondo, S [Toshiba Corp., Tokyo (Japan)

    1994-05-01

    The present report introduces the technological trend of rainwater drainage information system mainly with radar rain gauges. The information network must be strengthened as measures against the urban flood from the rainwater drainage. A radar rain gauge-based combination is needed of synthetic and organic processing technologies covering the traveling prediction of rainfall, data communication and rainwater drainage/flooding prediction. The correction method and data communication/display technology are explained for the measurement with radar rain gauges. In both correlation function method and rainfall area pursuit method, the traveling of rainfall is predicted by utilizing the radar information for the sewerage system. For the drainage analysis, it is necessary to quantitatively estimate the rainwater drained into both main and branch sewerage lines. It is made by preparing a rainwater drainage model. The quantitative estimation of rainwater drained into the branch sewerage lines calls for a revised Road Research Laboratory guidance by the Ministry of Construction. Supplemented with knowledge by veteran operators, the displayed image of pump operation support system is simulated for its verification. 2 refs., 3 figs.

  10. Evaluation of High-Performance Network Technologies for ITER

    Energy Technology Data Exchange (ETDEWEB)

    Zagar, K.; Kolaric, P.; Sabjan, R.; Zagar, A. [Cosylab d.d., Ljubljana (Slovenia); Hunt, S. [Alceli Hunt Beratung, Meisterschwanden (Switzerland)

    2009-07-01

    To facilitate fast feedback control of plasma, ITER's Control, Data Access and Communication system (CODAC) will need to provide a mechanism for hard real-time communication between its distributed nodes. In particular, four types of high-performance communication have been identified. Synchronous Databus Network (SDN) is to provide an ability to distribute parameters of plasma (estimated to about 5000 double-valued signals) across the system to allow for 1 ms control cycles. Event Distribution Network (EDN) and Time Communication Network (TCN) are to allow synchronization of node I/O operations to 10 ns. Finally, the Audio Video Network (AVN) is to provide sufficient bandwidth for streaming of surveillance and diagnostics video at a high resolution (1024*1024) and frame rate (30 Hz). In this article, we present some combinations of common off-the-shelf (COTS) technologies that allow the above requirements to be met. Also, we present the performances achieved in a practical (though small scale) technology demonstrator, which involved a real-time LINUS operating running on National Instruments' PXI platform, UDP communication implemented directly atop the Ethernet network adapter, CISCO switches, Micro Research Finland's timing and event solution, and GigE audio-video streaming. This document is composed of an abstract followed by the presentation transparencies. (authors)

  11. Evaluation of high-performance network technologies for ITER

    Energy Technology Data Exchange (ETDEWEB)

    Zagar, K., E-mail: klemen.zagar@cosylab.co [Cosylab d.d., 1000 Ljubljana (Slovenia); Hunt, S. [Alceli Hunt Beratung, 5616 Meisterschwanden (Switzerland); Kolaric, P.; Sabjan, R.; Zagar, A.; Dedic, J. [Cosylab d.d., 1000 Ljubljana (Slovenia)

    2010-07-15

    For the fast feedback plasma controllers, ITER's Control, Data Access and Communication system (CODAC) will need to provide a mechanism for hard real-time communication between its distributed nodes. In particular, the ITER CODAC team identified four types of high-performance communication applications. Synchronous Databus Network (SDN) is to provide an ability to distribute parameters of plasma (estimated to about 5000 double-valued signals) across the system to allow for 1 ms control cycles. Event Distribution Network (EDN) and Time Communication Network (TCN) are to allow synchronization of node I/O operations to 10 ns. Finally, the Audio-Video Network (AVN) is to provide sufficient bandwidth for streaming of surveillance and diagnostics video at a high resolution (1024 x 1024) and frame rate (30 Hz). In this article, we present some combinations of common-off-the-shelf (COTS) technologies that allow the above requirements to be met. Also, we present the performances achieved in a practical (though small scale) technology demonstrator, which involved a real-time Linux operating running on National Instruments' PXI platform, UDP communication implemented directly atop the Ethernet network adapter, CISCO switches, Micro Research Finland's timing and event solution, and GigE audio-video streaming.

  12. Cooperation and Coordination in an International Intervention: The Use of Information and Communication Technologies in Kosovo

    Directory of Open Access Journals (Sweden)

    Anne Holohan

    2003-01-01

    Full Text Available In international interventions that encompass peacekeeping, democratic transition, and institution building, oneorganization cannot do it all. In Kosovo several organizations—the United Nations (UN, nongovernmentalorganizations (NGOs, the Organization for Security and Cooperation in Europe (OSCE, the militaries (KFOR, andan international police force—formed a temporary network organization, the United Nations Mission in Kosovo(UNMIK, in which they worked together cooperatively at every level to pursue the goals of the mission. Thisresearch, based on ªeldwork in Kosovo with all the organizations in UNMIK, investigates how well the use ofinformation and communications technologies (ICTs reºected the organizational structure and design of themission. What does this experience tell us about the use of ICTs in an interorganizational setting? What does it tellus about information transfer and knowledge sharing in a temporary network organization that comprisesorganizations of diverse structure and culture? The information and communication infrastructure of UNMIK isexamined to discover how well it met the organizational requirements of both the participating hierarchies in themission and the emerging network organization. The question in Kosovo was whether the introduction and use ofnew technologies helped the organizations move from a hierarchical structure and culture to a more collaborativeone.

  13. Realizing the Potential of Information Resources: Information, Technology, and Services. Proceedings of the CAUSE Annual Conference (New Orleans, Louisiana, November 28-December 3, 1995).

    Science.gov (United States)

    CAUSE, Boulder, CO.

    This document presents the proceedings of a conference on managing and using information technology in higher education in regard to client/server computing, network delivery, process reengineering, leveraging of resources, and professional development. Eight tracks, with eight papers in each track, addressed the themes of: (1) strategic planning;…

  14. Development of Korea telecommunication technology

    International Nuclear Information System (INIS)

    1992-06-01

    It concentrates on development of Korea telecommunication technology, which is made up seven chapters. It gives description of manual central telephone exchange or private automatic telephone exchange, transmission technology on wire line and cable line technology and optical transmission, radio communication technology on mobile and natural satellite communication, network technology with intelligent network, broadband ISDN and packet switched Data Network, terminal technology with telephone and data communication terminal and development of Information Technology in Korea. It has an appendix about development of military communication system.

  15. Consumer Attitudes Regarding Information Technology Usage

    Directory of Open Access Journals (Sweden)

    Durmus YORUK

    2010-08-01

    Full Text Available This paper intends to formulate the hypotheses for the factors that influence individuals to adopt Information Technology as a mean to conduct the traditional services. The hypotheses are developed based on previous works utilizing the theories on technology acceptance and on related findings from empirical studies on information technologies,e-commerce and e-banking.

  16. Enabling Technologies for Cognitive Optical Networks

    DEFF Research Database (Denmark)

    Borkowski, Robert

    Cognition is a new paradigm for optical networking, in which the network has capabilities to observe, plan, decide, and act autonomously in order to optimize the end-to-end performance and minimize the need for human supervision. This PhD thesis expands the state of the art on cognitive optical......, and machine learning algorithms that make cognition possible. Secondly, advanced optical performance monitoring (OPM) capabilities performed via digital signal processing (DSP) that provide CONs with necessary feedback information allowing for autonomous network optimization. The research results presented...... in this thesis were carried out in the framework of the EU project Cognitive Heterogeneous Reconfigurable Optical Network (CHRON), whose aim was to develop an architecture and implement a testbed of a cognitive network able to self-configure and self-optimize to efficiently use available resources. In order...

  17. INFORMATION TECHNOLOGY AS A MEANS TO CAPTURE THE STUDENTS OF THE COURSE "METHODS OF "MATHEMATICS" EDUCATIONAL TEACHING FIELD"

    Directory of Open Access Journals (Sweden)

    Skvortsova S.

    2014-11-01

    Full Text Available The paper presents an analysis of the concepts of "information technology", "Information Technologies in Education", "Information technology education", "computer technology", "New Information Technologies", "New Information Technologies in Education". Found that the most common concept in this list is the concept of "information technology" as a set of methods and technical means for collecting, processing, storing, processing, transmission and presentation of data. Slightly narrower in this context, the concept of "new information technologies," which mandates the involvement of computer and other technical means to work with data. The emphasis on the learning process of information technology requires detailed terms "Information Technologies in Education" and "New Information Technologies in Education", which are defined as involvement of information technology and accordingly, including the technical means to create new perceptions and knowledge transfer, evaluation studies and all-round development of the individual in the educational process. Along with these terms also used such as "information technology training," which denotes a set of training and educational materials, and technical tools for educational purposes, as well as the system of scientific knowledge about their role and place in the educational process. Meanwhile, the term "information technology" encompasses all these concepts, so in a broad sense can be used to denote any signified concepts. As an extension of the term "information technology", the term information and communication technologies (ICT, and "information technology education", understood as educational technology using special methods, software and hardware to work with information and "ICT training "- as IT training focused on the use of computer communications networks for solving instructional problems or their fragments. Taking into account tasks, such as creating methodical maintenance of discipline

  18. Application of information technology in agricultural extension ...

    African Journals Online (AJOL)

    ... particularly with the impact of Information Communication Technology. Information technologies have the potential to support the agri-food sector in coping ... as the drive towards globalization builds on modern communication technology.

  19. Ever-present threats from information technology: the Cyber-Paranoia and Fear Scale

    Directory of Open Access Journals (Sweden)

    Oliver John Mason

    2014-11-01

    Full Text Available Delusions involving technology, and specifically the internet, are increasingly common, and fear-reality statistics suggest computer-related fears are very widespread. These fears form a continuum from the widely understandable and realistic to the unrealistic, and frankly paranoid. The present study investigated the validity of this construct in a non-clinical population by constructing a novel self-report measure. The new Cyber-Paranoia and Fear Scale aims to measure the perception of information technology-related threats originating from or enabled by computers, smartphones, social networks and digital surveillance. Psychometric properties of the new Cyber-Paranoia and Fear Scale are reported alongside an established measure of suspiciousness and paranoia in 181 participants including a sub-group of fifty information technology professionals. Exploratory factor analysis suggested the presence of two, related, dimensions that we term Cyber-Fear and Cyber-Paranoia. Both sub-scales were internally consistent and produced a normal distribution of scores. The relationships of the sub-scales with age, gender, trait paranoia, digital literacy and digital inclusion are supportive of construct validity. The distinctiveness of ‘cyber-paranoia’ from general trait paranoia appears to mirror the clinical distinctiveness of ‘internet’ and other technology fuelled delusions. Knowledge provision to increase technological proficiency and awareness may bring about a reduction in cyber-paranoia.

  20. Ever-present threats from information technology: the Cyber-Paranoia and Fear Scale.

    Science.gov (United States)

    Mason, Oliver J; Stevenson, Caroline; Freedman, Fleur

    2014-01-01

    Delusions involving technology, and specifically the internet, are increasingly common, and fear-reality statistics suggest computer-related fears are very widespread. These fears form a continuum from the widely understandable and realistic to the unrealistic, and frankly paranoid. The present study investigated the validity of this construct in a non-clinical population by constructing a novel self-report measure. The new Cyber-Paranoia and Fear Scale aims to measure the perception of information technology-related threats originating from or enabled by computers, smartphones, social networks, and digital surveillance. Psychometric properties of the new Cyber-Paranoia and Fear Scale are reported alongside an established measure of suspiciousness and paranoia in 181 participants including a sub-group of fifty information technology professionals. Exploratory factor analysis suggested the presence of two, related, dimensions that we term cyber-paranoia and cyber-fear. Both sub-scales were internally consistent and produced a normal distribution of scores. The relationships of the sub-scales with age, gender, trait paranoia, digital literacy, and digital inclusion are supportive of construct validity. The distinctiveness of 'cyber-paranoia' from general trait paranoia appears to mirror the clinical distinctiveness of 'internet' and other technology-fuelled delusions. Knowledge provision to increase technological proficiency and awareness may bring about a reduction in cyber-paranoia.