WorldWideScience

Sample records for technology user network

  1. Usability and use reference in the social network facebook: a netnographic analysis of technological users

    Directory of Open Access Journals (Sweden)

    Naiara Silva Ferreira

    2015-10-01

    Full Text Available This article presents a study about the preference of use in virtual social networks, using Facebook as object of study, to identify the motivational factors for the usability of this technology platform. The social network Facebook has been chosen to present a technological scenario of high sociability and virtual interaction. The methodology used was the netnography, being made through the collection of discussions in North American sites of news and forums online, where there is a large critical user participation on the internet, about the gains and frustrations in this context. The content analysis was performed comparing the categories of users found in the literature about values that motivate consumer technology, describing the hedonic, social, utilitarian values and perceptions of risk in consumption when related to lack of privacy. The results show two main groups of users of this technology and 7 subgroups. Therefore, the contribution of the study is that the formation of these groups may reflect technological usability of user groups around the world. The study also brings to the discussion issues related to the behaviors of the users of virtual networks which can be useful for businesses and their relationships with consumers and also the development of new knowledge from such criticism and demands that digital consumers expose about the technologies.

  2. Semantic Technologies for User-Centric Home Network Management

    OpenAIRE

    Ibrahim Rana, Annie

    2015-01-01

    Home area network (HAN) management is problematic for ordinary home users. Lack of user expertise, potential complexity of administration tasks, extreme diversity of network devices, price pressures producing devices with minimal feature sets, and highly dynamic requirements of user applications are some of the main challenges in HANs. As networking becomes enabled in many more HAN devices, these problems are set to increase. A viable solution to address these challenges lie...

  3. User-centric networking future perspectives

    CERN Document Server

    Aldini, Alessandro

    2014-01-01

    This work represents a milestone for the? 'ULOOP User-centric Wireless Local Loop' project funded by the EU IST Seventh Framework Programme.ULOOP is focused on the robust, secure, and autonomic deployment of user-centric wireless networks. Contributions by ULOOP partners as well as invited tutorials by international experts in the field. The expected impact is to increase awareness to user-centric networking in terms, e.g., of business opportunities and quality of experience, and to present adequate technology to sustain the growth of user-friendly wireless architectures.Throughout the last 3

  4. SDN Based User-Centric Framework for Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Zhaoming Lu

    2016-01-01

    Full Text Available Due to the rapid growth of mobile data traffic, more and more basestations and access points (APs have been densely deployed to provide users with ubiquitous network access, which make current wireless network a complex heterogeneous network (HetNet. However, traditional wireless networks are designed with network-centric approaches where different networks have different quality of service (QoS strategies and cannot easily cooperate with each other to serve network users. Massive network infrastructures could not assure users perceived network and service quality, which is an indisputable fact. To address this issue, we design a new framework for heterogeneous wireless networks with the principle of user-centricity, refactoring the network from users’ perspective to suffice their requirements and preferences. Different from network-centric approaches, the proposed framework takes advantage of Software Defined Networking (SDN and virtualization technology, which will bring better perceived services quality for wireless network users. In the proposed user-centric framework, control plane and data plane are decoupled to manage the HetNets in a flexible and coadjutant way, and resource virtualization technology is introduced to abstract physical resources of HetNets into unified virtualized resources. Hence, ubiquitous and undifferentiated network connectivity and QoE (quality of experience driven fine-grained resource management could be achieved for wireless network users.

  5. User-Centric Secure Cross-Site Interaction Framework for Online Social Networking Services

    Science.gov (United States)

    Ko, Moo Nam

    2011-01-01

    Social networking service is one of major technological phenomena on Web 2.0. Hundreds of millions of users are posting message, photos, and videos on their profiles and interacting with other users, but the sharing and interaction are limited within the same social networking site. Although users can share some content on a social networking site…

  6. An Empirical Study Of User Acceptance Of Online Social Networks Marketing

    Directory of Open Access Journals (Sweden)

    Olumayowa Mulero

    2013-07-01

    Full Text Available The explosion of Internet usage has drawn the attention of researchers towards online Social Networks Marketing (SNM. Research has shown that a number of the Internet users are distrustful and indecisive, when it comes to the use of social networks marketing system. Therefore, there is a need for researchers to identify some of the factors that determine users’ acceptance of social networks marketing using Technology Acceptance Model (TAM. This study extended the Technology Acceptance Model theoretical framework to predict consumer acceptance of social networks marketing within Western Cape Province of South Africa. The research model was tested using data collected from 470 questionnaires and analysed using linear regression. The results showed that user intentions to use SNM are strongly and positively correlated with user acceptance of using SNM systems. Empirical results confirmed that perceived credibility and perceived usefulness are the strongest determinant in predicting user intentions to use SNM system.

  7. Space-based Networking Technology Developments in the Interplanetary Network Directorate Information Technology Program

    Science.gov (United States)

    Clare, Loren; Clement, B.; Gao, J.; Hutcherson, J.; Jennings, E.

    2006-01-01

    Described recent development of communications protocols, services, and associated tools targeted to reduce risk, reduce cost and increase efficiency of IND infrastructure and supported mission operations. Space-based networking technologies developed were: a) Provide differentiated quality of service (QoS) that will give precedence to traffic that users have selected as having the greatest importance and/or time-criticality; b) Improve the total value of information to users through the use of QoS prioritization techniques; c) Increase operational flexibility and improve command-response turnaround; d) Enable new class of networked and collaborative science missions; e) Simplify applications interfaces to communications services; and f) Reduce risk and cost from a common object model and automated scheduling and communications protocols. Technologies are described in three general areas: communications scheduling, middleware, and protocols. Additionally developed simulation environment, which provides comprehensive, quantitative understanding of the technologies performance within overall, evolving architecture, as well as ability to refine & optimize specific components.

  8. Recognizing Multi-user Activities using Body Sensor Networks

    DEFF Research Database (Denmark)

    Gu, Tao; Wang, Liang; Chen, Hanhua

    2011-01-01

    The advances of wireless networking and sensor technology open up an interesting opportunity to infer human activities in a smart home environment. Existing work in this paradigm focuses mainly on recognizing activities of a single user. In this work, we address the fundamental problem...... activity classes of data—for building activity models and design a scalable, noise-resistant, Emerging Pattern based Multi-user Activity Recognizer (epMAR) to recognize both single- and multi-user activities. We develop a multi-modal, wireless body sensor network for collecting real-world traces in a smart...... home environment, and conduct comprehensive empirical studies to evaluate our system. Results show that epMAR outperforms existing schemes in terms of accuracy, scalability and robustness....

  9. Trace saver: A tool for network service improvement and personalised analysis of user centric statistics

    Science.gov (United States)

    Bilal, Muhammad; Asfand-e-Yar, Mockford, Steve; Khan, Wasiq; Awan, Irfan

    2012-11-01

    Mobile technology is among the fastest growing technologies in today's world with low cost and highly effective benefits. Most important and entertaining areas in mobile technology development and usage are location based services, user friendly networked applications and gaming applications. However, concern towards network operator service provision and improvement has been very low. The portable applications available for a range of mobile operating systems which help improve the network operator services are desirable by the mobile operators. This paper proposes a state of the art mobile application Tracesaver, which provides a great achievement over the barriers in gathering device and network related information, for network operators to improve their network service provision. Tracesaver is available for a broad range of mobile devices with different mobile operating systems and computational capabilities. The availability of Tracesaver in market has proliferated over the last year since it was published. The survey and results show that Tracesaver is being used by millions of mobile users and provides novel ways of network service improvement with its highly user friendly interface.

  10. User-centric technology design for nonprofit and civic engagements

    CERN Document Server

    Saeed, Saqib

    2014-01-01

    Due to the increased global political importance of the nonprofit sector, its technological support and organizational characteristics have become important fields of research. In order to conduct effective work, nonprofits need to communicate and coordinate effectively. However, such settings are generally characterized by a lack of resources, an absence of formal hierarchical structures and differences in languages and culture among the activists. Modern technologies could help nonprofit networks in improving their working. In order to design appropriate technological support for such settings, it is important to understand their work practices, which widely differ from traditional business organizations. This book aims to strengthen the body of knowledge by providing user studies and concepts related to user centered technology design process for nonprofit settings. The examination of ethnographic studies and user centered evaluation of IT artifacts in practice will further the understanding of design requ...

  11. Information Filtering via Clustering Coefficients of User-Object Bipartite Networks

    Science.gov (United States)

    Guo, Qiang; Leng, Rui; Shi, Kerui; Liu, Jian-Guo

    The clustering coefficient of user-object bipartite networks is presented to evaluate the overlap percentage of neighbors rating lists, which could be used to measure interest correlations among neighbor sets. The collaborative filtering (CF) information filtering algorithm evaluates a given user's interests in terms of his/her friends' opinions, which has become one of the most successful technologies for recommender systems. In this paper, different from the object clustering coefficient, users' clustering coefficients of user-object bipartite networks are introduced to improve the user similarity measurement. Numerical results for MovieLens and Netflix data sets show that users' clustering effects could enhance the algorithm performance. For MovieLens data set, the algorithmic accuracy, measured by the average ranking score, can be improved by 12.0% and the diversity could be improved by 18.2% and reach 0.649 when the recommendation list equals to 50. For Netflix data set, the accuracy could be improved by 14.5% at the optimal case and the popularity could be reduced by 13.4% comparing with the standard CF algorithm. Finally, we investigate the sparsity effect on the performance. This work indicates the user clustering coefficients is an effective factor to measure the user similarity, meanwhile statistical properties of user-object bipartite networks should be investigated to estimate users' tastes.

  12. Identifying online user reputation of user-object bipartite networks

    Science.gov (United States)

    Liu, Xiao-Lu; Liu, Jian-Guo; Yang, Kai; Guo, Qiang; Han, Jing-Ti

    2017-02-01

    Identifying online user reputation based on the rating information of the user-object bipartite networks is important for understanding online user collective behaviors. Based on the Bayesian analysis, we present a parameter-free algorithm for ranking online user reputation, where the user reputation is calculated based on the probability that their ratings are consistent with the main part of all user opinions. The experimental results show that the AUC values of the presented algorithm could reach 0.8929 and 0.8483 for the MovieLens and Netflix data sets, respectively, which is better than the results generated by the CR and IARR methods. Furthermore, the experimental results for different user groups indicate that the presented algorithm outperforms the iterative ranking methods in both ranking accuracy and computation complexity. Moreover, the results for the synthetic networks show that the computation complexity of the presented algorithm is a linear function of the network size, which suggests that the presented algorithm is very effective and efficient for the large scale dynamic online systems.

  13. User Requirements for Technology to Assist Aging in Place: Qualitative Study of Older People and Their Informal Support Networks.

    Science.gov (United States)

    Elers, Phoebe; Hunter, Inga; Whiddett, Dick; Lockhart, Caroline; Guesgen, Hans; Singh, Amardeep

    2018-06-06

    Informal support is essential for enabling many older people to age in place. However, there is limited research examining the information needs of older adults' informal support networks and how these could be met through home monitoring and information and communication technologies. The purpose of this study was to investigate how technologies that connect older adults to their informal and formal support networks could assist aging in place and enhance older adults' health and well-being. Semistructured interviews were conducted with 10 older adults and a total of 31 members of their self-identified informal support networks. They were asked questions about their information needs and how technology could support the older adults to age in place. The interviews were transcribed and thematically analyzed. The analysis identified three overarching themes: (1) the social enablers theme, which outlined how timing, informal support networks, and safety concerns assist the older adults' uptake of technology, (2) the technology concerns theme, which outlined concerns about cost, usability, information security and privacy, and technology superseding face-to-face contact, and (3) the information desired theme, which outlined what information should be collected and transferred and who should make decisions about this. Older adults and their informal support networks may be receptive to technology that monitors older adults within the home if it enables aging in place for longer. However, cost, privacy, security, and usability barriers would need to be considered and the system should be individualizable to older adults' changing needs. The user requirements identified from this study and described in this paper have informed the development of a technology that is currently being prototyped. ©Phoebe Elers, Inga Hunter, Dick Whiddett, Caroline Lockhart, Hans Guesgen, Amardeep Singh. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 06.06.2018.

  14. Stimulant use among African American and Latino MSM social networking users.

    Science.gov (United States)

    Young, Sean D; Shoptaw, Steve

    2013-01-01

    High stimulant-using and at-risk HIV populations, such as African American and Latino men who have sex with men (MSM), are increasingly using social networking technologies. However, no known research has explored associations between stimulant use, sexual risk behaviors, and social networking among these populations. Participants were recruited using the Facebook Connect software application, which narrowed the sample to 118 (primarily African American and Latino MSM) active Facebook users. Participants completed demographic, Internet and social media use, and drug use survey items. Participants reported high rates of cocaine and methamphetamine use (both more than 15% within the past 12 months). More than 70% of participants reported using social networking technologies to meet people, and more than 30% used them to find sexual partners. A multivariate logistic regression showed that (1) participants using social networks to find sexual partners were more likely to have used methamphetamines within the past 12 months and (2) those who were more comfortable talking online compared to face-to-face had over 4 times the odds of methamphetamine use and over 6 times the odds of cocaine use within the past 12 months. Minority MSM who used social networks to meet men and find sexual partners had high risk for stimulant use. Understanding drug use among minority social networking users will provide insights to incorporate these technologies into drug prevention interventions.

  15. Resilient Disaster Network Based on Software Defined Cognitive Wireless Network Technology

    Directory of Open Access Journals (Sweden)

    Goshi Sato

    2015-01-01

    Full Text Available In order to temporally recover the information network infrastructure in disaster areas from the Great East Japan Earthquake in 2011, various wireless network technologies such as satellite IP network, 3G, and Wi-Fi were effectively used. However, since those wireless networks are individually introduced and installed but not totally integrated, some of networks were congested due to the sudden network traffic generation and unbalanced traffic distribution, and eventually the total network could not effectively function. In this paper, we propose a disaster resilient network which integrates various wireless networks into a cognitive wireless network that users can use as an access network to the Internet at the serious disaster occurrence. We designed and developed the disaster resilient network based on software defined network (SDN technology to automatically select the best network link and route among the possible access networks to the Internet by periodically monitoring their network states and evaluate those using extended AHP method. In order to verify the usefulness of our proposed system, a prototype system is constructed and its performance is evaluated.

  16. User Privacy in RFID Networks

    Science.gov (United States)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  17. The Role of Electronic Learning Technology in Networks Systems

    International Nuclear Information System (INIS)

    Abd ELhamid, A.; Ayad, N.M.A.; Fouad, Y.; Abdelkader, T.

    2016-01-01

    Recently, Electronic Learning Technology (ELT) has been widely spread as one of the new technologies in the world through using Information and Communication Technology (ICT). One of the strategies of ELT is Simulation, for instance Military and Medical simulations that are used to avoid risks and reduce Costs. A wireless communication network refers to any network not physically connected by cables, which enables the desired convenience and mobility for the user. Wireless communication networks have been useful in areas such as commerce, education and defense. According to the nature of a particular application, they can be used in home-based and industrial systems or in commercial and military environments. Historically, Mobile Ad-hoc Networks (MANET) have primarily been used for tactical military network related applications to improve battlefield communications/ survivability. MANET is a collection of wireless nodes that can dynamically be set up anywhere and anytime without using any pre-existing network infrastructure. Mobility in wireless networks basically refers to nodes changing its point of attachment to the network. Also, how the end terminals can move, there are many mobility models described the movement of nodes, many researchers use the Random Way point Mobility Model (RWPM). In this paper, a Graphical User Interface (GUI) for RWPM simulation is introduced as a proposal to be used through ELT Project. In the research area of computer and communications networks, simulation is a very useful technique for the behavior of networks

  18. RUASN: A Robust User Authentication Framework for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hoon-Jae Lee

    2011-05-01

    Full Text Available In recent years, wireless sensor networks (WSNs have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any loopholes in their security, which might open the door for an attacker and hence, endanger the application. User authentication is one of the most important security services to protect WSN data access from unauthorized users; it should provide both mutual authentication and session key establishment services. This paper proposes a robust user authentication framework for wireless sensor networks, based on a two-factor (password and smart card concept. This scheme facilitates many services to the users such as user anonymity, mutual authentication, secure session key establishment and it allows users to choose/update their password regularly, whenever needed. Furthermore, we have provided the formal verification using Rubin logic and compare RUASN with many existing schemes. As a result, we found that the proposed scheme possesses many advantages against popular attacks, and achieves better efficiency at low computation cost.

  19. An Overview of Computer Network security and Research Technology

    OpenAIRE

    Rathore, Vandana

    2016-01-01

    The rapid development in the field of computer networks and systems brings both convenience and security threats for users. Security threats include network security and data security. Network security refers to the reliability, confidentiality, integrity and availability of the information in the system. The main objective of network security is to maintain the authenticity, integrity, confidentiality, availability of the network. This paper introduces the details of the technologies used in...

  20. Mobile user forecast and power-law acceleration invariance of scale-free networks

    International Nuclear Information System (INIS)

    Guo Jin-Li; Guo Zhao-Hua; Liu Xue-Jiao

    2011-01-01

    This paper studies and predicts the number growth of China's mobile users by using the power-law regression. We find that the number growth of the mobile users follows a power law. Motivated by the data on the evolution of the mobile users, we consider scenarios of self-organization of accelerating growth networks into scale-free structures and propose a directed network model, in which the nodes grow following a power-law acceleration. The expressions for the transient and the stationary average degree distributions are obtained by using the Poisson process. This result shows that the model generates appropriate power-law connectivity distributions. Therefore, we find a power-law acceleration invariance of the scale-free networks. The numerical simulations of the models agree with the analytical results well. (interdisciplinary physics and related areas of science and technology)

  1. Performance of an opportunistic multi-user cognitive network with multiple primary users

    KAUST Repository

    Khan, Fahd Ahmed

    2014-04-01

    Consider a multi-user underlay cognitive network where multiple cognitive users, having limited peak transmit power, concurrently share the spectrum with a primary network with multiple users. The channel between the secondary network is assumed to have independent but not identical Nakagami-m fading. The interference channel between the secondary users and the primary users is assumed to have Rayleigh fading. The uplink scenario is considered where a single secondary user is selected for transmission. This opportunistic selection depends on the transmission channel power gain and the interference channel power gain as well as the power allocation policy adopted at the users. Exact closed form expressions for the momentgenerating function, outage performance and the symbol-error-rate performance are derived. The outage performance is also studied in the asymptotic regimes and the generalized diversity gain of this scheduling scheme is derived. Numerical results corroborate the derived analytical results.

  2. Algorithm research for user trajectory matching across social media networks based on paragraph2vec

    Science.gov (United States)

    Xu, Qian; Chen, Hongchang; Zhi, Hongxin; Wang, Yanchuan

    2018-04-01

    Identifying users across different social media networks (SMN) is to link accounts of the same user that belong to the same individual across SMNs. The problem is fundamental and important, and its results can benefit many applications such as cross SMN user modeling and recommendation. With the development of GPS technology and mobile communication, more and more social networks provide location services. This provides a new opportunity for cross SMN user identification. In this paper, we solve cross SMN user identification problem in an unsupervised manner by utilizing user trajectory data in SMNs. A paragraph2vec based algorithm is proposed in which location sequence feature of user trajectory is captured in temporal and spatial dimensions. Our experimental results validate the effectiveness and efficiency of our algorithm.

  3. Advancing MEMS Technology Usage through the MUMPS (Multi-User MEMS Processes) Program

    Science.gov (United States)

    Koester, D. A.; Markus, K. W.; Dhuler, V.; Mahadevan, R.; Cowen, A.

    1995-01-01

    In order to help provide access to advanced micro-electro-mechanical systems (MEMS) technologies and lower the barriers for both industry and academia, the Microelectronic Center of North Carolina (MCNC) and ARPA have developed a program which provides users with access to both MEMS processes and advanced electronic integration techniques. The four distinct aspects of this program, the multi-user MEMS processes (MUMP's), the consolidated micro-mechanical element library, smart MEMS, and the MEMS technology network are described in this paper. MUMP's is an ARPA-supported program created to provide inexpensive access to MEMS technology in a multi-user environment. It is both a proof-of-concept and educational tool that aids in the development of MEMS in the domestic community. MUMP's technologies currently include a 3-layer poly-silicon surface micromachining process and LIGA (lithography, electroforming, and injection molding) processes that provide reasonable design flexibility within set guidelines. The consolidated micromechanical element library (CaMEL) is a library of active and passive MEMS structures that can be downloaded by the MEMS community via the internet. Smart MEMS is the development of advanced electronics integration techniques for MEMS through the application of flip chip technology. The MEMS technology network (TechNet) is a menu of standard substrates and MEMS fabrication processes that can be purchased and combined to create unique process flows. TechNet provides the MEMS community greater flexibility and enhanced technology accessibility.

  4. An X window based graphics user interface for radiation information processing system developed with object-oriented programming technology

    International Nuclear Information System (INIS)

    Gao Wenhuan; Fu Changqing; Kang Kejun

    1993-01-01

    X Window is a network-oriented and network transparent windowing system, and now dominant in the Unix domain. The object-oriented programming technology can be used to change the extensibility of a software system remarkably. An introduction to graphics user interface is given. And how to develop a graphics user interface for radiation information processing system with object-oriented programming technology, which is based on X Window and independent of application is described briefly

  5. Connecting Mobile Users Through Mobile Social Networks

    Directory of Open Access Journals (Sweden)

    Faisal Alkhateeb

    2012-10-01

    Full Text Available Nowadays, social networks become popular with the emerging of web-based social networking services. Recently, several mobile services are developed to connect users to their favourite social networks such as Facebook, Twitter, Flickr, etc. However, these services depends upon the existing web-based social networks. In this paper, we present a mobile service for joining groups across communities. The originality of the work is that the framework of the service allows creating and joining social networks that are self-contained for mobile company servers. The service consists of several sub-services such as users invitation, group finding and others. Users, regardless of their disability, can use the service and its sub-services without the need to create their own accounts on social web sites and thus their own groups. We also propose a privacy control policy for mobile social networks.

  6. User-friendly establishment of trust in distributed home automation networks

    DEFF Research Database (Denmark)

    Hjorth, Theis Solberg; Madsen, Per Printz; Torbensen, Rune

    2012-01-01

    Current wireless technologies use a variety of methods to locally exchange and verify credentials between devices to establish trusted relationships. Scenarios in home automation networks also require this capability over the Internet, but the necessary involvement of non-expert users to setup...... these relationships can lead to misconfiguration or breaches of security. We outline a security system for Home Automation called Trusted Domain that can establish and maintain cryptographically secure relationships between devices connected via IP-based networks and the Internet. Trust establishment is presented...... of predefined pictograms. This method is designed to scale from smart-phones and tablets down to low-resource embedded systems. The presented approach is supported by an extensive literature study, and the ease of use and feasibility of the method has been indicated through a preliminary user study...

  7. User-friendly Establishment of Trust in Distributed Home Automation Networks

    DEFF Research Database (Denmark)

    Solberg Hjorth, Theis; Torbensen, Rune; Madsen, Per Printz

    2014-01-01

    Current wireless technologies use a variety of methods to locally exchange and verify credentials between devices to establish trusted relationships. Scenarios in home automation networks also require this capability over the Internet, but the necessary involvement of non-expert users to setup...... these relationships can lead to misconfiguration or breaches of security. We outline a security system for Home Automation called Trusted Domain that can establish and maintain cryptographically secure relationships between devices connected via IP-based networks and the Internet. Trust establishment is presented...

  8. Distributed Bayesian Networks for User Modeling

    DEFF Research Database (Denmark)

    Tedesco, Roberto; Dolog, Peter; Nejdl, Wolfgang

    2006-01-01

    The World Wide Web is a popular platform for providing eLearning applications to a wide spectrum of users. However – as users differ in their preferences, background, requirements, and goals – applications should provide personalization mechanisms. In the Web context, user models used by such ada......The World Wide Web is a popular platform for providing eLearning applications to a wide spectrum of users. However – as users differ in their preferences, background, requirements, and goals – applications should provide personalization mechanisms. In the Web context, user models used...... by such adaptive applications are often partial fragments of an overall user model. The fragments have then to be collected and merged into a global user profile. In this paper we investigate and present algorithms able to cope with distributed, fragmented user models – based on Bayesian Networks – in the context...... of Web-based eLearning platforms. The scenario we are tackling assumes learners who use several systems over time, which are able to create partial Bayesian Networks for user models based on the local system context. In particular, we focus on how to merge these partial user models. Our merge mechanism...

  9. Identifying influential user communities on the social network

    Science.gov (United States)

    Hu, Weishu; Gong, Zhiguo; Hou U, Leong; Guo, Jingzhi

    2015-10-01

    Nowadays social network services have been popularly used in electronic commerce systems. Users on the social network can develop different relationships based on their common interests and activities. In order to promote the business, it is interesting to explore hidden relationships among users developed on the social network. Such knowledge can be used to locate target users for different advertisements and to provide effective product recommendations. In this paper, we define and study a novel community detection problem that is to discover the hidden community structure in large social networks based on their common interests. We observe that the users typically pay more attention to those users who share similar interests, which enable a way to partition the users into different communities according to their common interests. We propose two algorithms to detect influential communities using common interests in large social networks efficiently and effectively. We conduct our experimental evaluation using a data set from Epinions, which demonstrates that our method achieves 4-11.8% accuracy improvement over the state-of-the-art method.

  10. How users matter : The co-construction of users and technologies

    NARCIS (Netherlands)

    Oudshoorn, Nelly E.J.; Pinch, Trevor

    2003-01-01

    Users have become an integral part of technology studies. The essays in this volume look at the creative capacity of users to shape technology in all phases, from design to implementation. Using a variety of theoretical approaches, including a feminist focus on users and use (in place of the

  11. Mobile infostation network technology

    Science.gov (United States)

    Rajappan, Gowri; Acharya, Joydeep; Liu, Hongbo; Mandayam, Narayan; Seskar, Ivan; Yates, Roy

    2006-05-01

    Inefficient use of network resources on the battlefield is a serious liability: if an asset communicates with the network command for data-a terrain map, for instance-it ties up the end-to-end network resources. When many such assets contend for data simultaneously, traffic is limited by the slowest link along the path from the network command to the asset. A better approach is for a local server, known as an infostation, to download data on an anticipated-need basis when the network load is low. The infostation can then dump data when needed to the assets over a high-speed wireless connection. The infostation serves the local assets over an OFDM-based wireless data link that has MIMO enhancements for high data rate and robustness. We aim for data rate in excess of 100 Mbps, spectral efficiency in excess of 5 bits/sec/Hz, and robustness to poor channel conditions and jammers. We propose an adaptive physical layer that determines power levels, modulation schemes, and the MIMO enhancements to use based on the channel state and the level of interference in the system. We also incorporate the idea of superuser: a user who is allowed preferential use of the high data rate link. We propose a MAC that allows for this priority-based bandwidth allocation scheme. The proposed infostation MAC is integrated tightly with the physical layer through a cross-layer design. We call the proposed infostation PHY, MAC, and network technology, collectively, as the Mobile Infostation Network Technology (MINT).

  12. User Identification Framework in Social Network Services Environment

    Directory of Open Access Journals (Sweden)

    Brijesh BAKARIYA

    2014-01-01

    Full Text Available Social Network Service is a one of the service where people may communicate with one an-other; and may also exchange messages even of any type of audio or video communication. Social Network Service as name suggests a type of network. Such type of web application plays a dominant role in internet technology. In such type of online community, people may share their common interest. Facebook LinkedIn, orkut and many more are the Social Network Service and it is good medium of making link with people having unique or common interest and goals. But the problem of privacy protection is a big issue in today’s world. As social networking sites allows anonymous users to share information of other stuffs. Due to which cybercrime is also increasing to a rapid extent. In this article we preprocessed the web log data of Social Network Services and assemble that data on the basis of image file format like jpg, jpeg, gif, png, bmp etc. and also propose a framework for victim’s identification.

  13. Study on Strengthening Plan of Safety Network CCTV Monitoring by Steganography and User Authentication

    Directory of Open Access Journals (Sweden)

    Jung-oh Park

    2015-01-01

    Full Text Available Recently, as the utilization of CCTV (closed circuit television is emerging as an issue, the studies on CCTV are receiving much attention. Accordingly, due to the development of CCTV, CCTV has IP addresses and is connected to network; it is exposed to many threats on the existing web environment. In this paper, steganography is utilized to confirm the Data Masquerading and Data Modification and, in addition, to strengthen the security; the user information is protected based on PKI (public key infrastructure, SN (serial number, and R value (random number attributed at the time of login and the user authentication protocol to block nonauthorized access of malicious user in network CCTV environment was proposed. This paper should be appropriate for utilization of user infringement-related CCTV where user information protection-related technology is not applied for CCTV in the future.

  14. Software Defined Networking Demands on Software Technologies

    DEFF Research Database (Denmark)

    Galinac Grbac, T.; Caba, Cosmin Marius; Soler, José

    2015-01-01

    Software Defined Networking (SDN) is a networking approach based on a centralized control plane architecture with standardised interfaces between control and data planes. SDN enables fast configuration and reconfiguration of the network to enhance resource utilization and service performances....... This new approach enables a more dynamic and flexible network, which may adapt to user needs and application requirements. To this end, systemized solutions must be implemented in network software, aiming to provide secure network services that meet the required service performance levels. In this paper......, we review this new approach to networking from an architectural point of view, and identify and discuss some critical quality issues that require new developments in software technologies. These issues we discuss along with use case scenarios. Here in this paper we aim to identify challenges...

  15. User-Location Aware Downlink Performance Analysis of LTE Networks

    OpenAIRE

    Olaifa, John Olorunfemi

    2016-01-01

    In order to evaluate the performance of Long Term Evolution (LTE) networks, system-level simulation with detailed focus on network related effects such as mobility, scheduling and interference management must be emphasized. Existing studies evaluate user throughput and dimension LTE networks usually assuming uniform distribution of users within the cell. These studies report average user throughputs over the cell and the 5th percentile throughputs as estimates of the performance of the users ...

  16. Enabling Wireless Cooperation in User Provided Networks

    OpenAIRE

    Rolla, Vitor Guerra

    2015-01-01

    Tese de doutoramento em Ciências e Tecnologias da Informação, apresentada ao Departamento de Engenharia Informática da Faculdade de Ciências e Tecnologia da Universidade de Coimbra This doctoral thesis investigates user provided networks. Such networks have become important research subjects in the field of informatics engineering due to the recent popularity of smart phones. User provided networks are independent from traditional Internet service providers. Communication and informati...

  17. Performance analysis of an opportunistic multi-user cognitive network with multiple primary users

    KAUST Repository

    Khan, Fahd Ahmed

    2014-03-01

    Consider a multi-user underlay cognitive network where multiple cognitive users concurrently share the spectrum with a primary network with multiple users. The channel between the secondary network is assumed to have independent but not identical Nakagami-m fading. The interference channel between the secondary users (SUs) and the primary users is assumed to have Rayleigh fading. A power allocation based on the instantaneous channel state information is derived when a peak interference power constraint is imposed on the secondary network in addition to the limited peak transmit power of each SU. The uplink scenario is considered where a single SU is selected for transmission. This opportunistic selection depends on the transmission channel power gain and the interference channel power gain as well as the power allocation policy adopted at the users. Exact closed form expressions for the moment-generating function, outage performance, symbol error rate performance, and the ergodic capacity are derived. Numerical results corroborate the derived analytical results. The performance is also studied in the asymptotic regimes, and the generalized diversity gain of this scheduling scheme is derived. It is shown that when the interference channel is deeply faded and the peak transmit power constraint is relaxed, the scheduling scheme achieves full diversity and that increasing the number of primary users does not impact the diversity order. © 2014 John Wiley & Sons, Ltd.

  18. Identification of influential users by neighbors in online social networks

    Science.gov (United States)

    Sheikhahmadi, Amir; Nematbakhsh, Mohammad Ali; Zareie, Ahmad

    2017-11-01

    Identification and ranking of influential users in social networks for the sake of news spreading and advertising has recently become an attractive field of research. Given the large number of users in social networks and also the various relations that exist among them, providing an effective method to identify influential users has been gradually considered as an essential factor. In most of the already-provided methods, those users who are located in an appropriate structural position of the network are regarded as influential users. These methods do not usually pay attention to the interactions among users, and also consider those relations as being binary in nature. This paper, therefore, proposes a new method to identify influential users in a social network by considering those interactions that exist among the users. Since users tend to act within the frame of communities, the network is initially divided into different communities. Then the amount of interaction among users is used as a parameter to set the weight of relations existing within the network. Afterward, by determining the neighbors' role for each user, a two-level method is proposed for both detecting users' influence and also ranking them. Simulation and experimental results on twitter data shows that those users who are selected by the proposed method, comparing to other existing ones, are distributed in a more appropriate distance. Moreover, the proposed method outperforms the other ones in terms of both the influential speed and capacity of the users it selects.

  19. Group colocation behavior in technological social networks.

    Directory of Open Access Journals (Sweden)

    Chloë Brown

    Full Text Available We analyze two large datasets from technological networks with location and social data: user location records from an online location-based social networking service, and anonymized telecommunications data from a European cellphone operator, in order to investigate the differences between individual and group behavior with respect to physical location. We discover agreements between the two datasets: firstly, that individuals are more likely to meet with one friend at a place they have not visited before, but tend to meet at familiar locations when with a larger group. We also find that groups of individuals are more likely to meet at places that their other friends have visited, and that the type of a place strongly affects the propensity for groups to meet there. These differences between group and solo mobility has potential technological applications, for example, in venue recommendation in location-based social networks.

  20. Policy gaps and technological deficiencies in social networking environments: Implications for information sharing

    Directory of Open Access Journals (Sweden)

    Stephen M. Mutula

    2013-06-01

    Objectives: The study sought to investigate the following research objectives to: (1 describe the types of social networks, (2 examine global penetration of the social networks, (3 outline the users’ legitimate rights that must be protected in the social networking sites (SNS, (4 determine the methods employed by SNS to protect the users’ legitimate rights and (5 identify the policy gaps and technological deficiencies in the protection of the users’ legitimate rights in the SNS. Method: A literature survey and content analysis of the SNS user policies were used to address objective four and objective five respectively. Results: The most actively used sites were Facebook and Twitter. Asian markets were leading in participation and in creating content than any other region. Business, education, politics and governance sectors were actively using social networking sites. Social networking sites relied upon user trust and internet security features which however, were inefficient and inadequate. Conclusion: Whilst SNS were impacting people of varying ages and of various professional persuasions, there were increased concerns about the violation and infringement of the users’ legitimate rights. Reliance on user trust and technological security features SNS to protect the users’ legitimate rights seemed ineffectual and inadequate.

  1. User-Adapted Recommendation of Content on Mobile Devices Using Bayesian Networks

    Science.gov (United States)

    Iwasaki, Hirotoshi; Mizuno, Nobuhiro; Hara, Kousuke; Motomura, Yoichi

    Mobile devices, such as cellular phones and car navigation systems, are essential to daily life. People acquire necessary information and preferred content over communication networks anywhere, anytime. However, usability issues arise from the simplicity of user interfaces themselves. Thus, a recommendation of content that is adapted to a user's preference and situation will help the user select content. In this paper, we describe a method to realize such a system using Bayesian networks. This user-adapted mobile system is based on a user model that provides recommendation of content (i.e., restaurants, shops, and music that are suitable to the user and situation) and that learns incrementally based on accumulated usage history data. However, sufficient samples are not always guaranteed, since a user model would require combined dependency among users, situations, and contents. Therefore, we propose the LK method for modeling, which complements incomplete and insufficient samples using knowledge data, and CPT incremental learning for adaptation based on a small number of samples. In order to evaluate the methods proposed, we applied them to restaurant recommendations made on car navigation systems. The evaluation results confirmed that our model based on the LK method can be expected to provide better generalization performance than that of the conventional method. Furthermore, our system would require much less operation than current car navigation systems from the beginning of use. Our evaluation results also indicate that learning a user's individual preference through CPT incremental learning would be beneficial to many users, even with only a few samples. As a result, we have developed the technology of a system that becomes more adapted to a user the more it is used.

  2. A social network perspective of lead users and creativity

    DEFF Research Database (Denmark)

    Kratzer, Jan; Lettl, Christopher

    2008-01-01

    closely correlates to individual creativity, and both, in turn, to the provision of information in social networks. This study, guided by lead user theory, creativity research and network theory, investigates 16 school-groups of children examining the relationship between the children's social networks...... and their resulting creativity and lead userness. In addition, the interplay between lead userness and creativity is discussed and empirically tested. The main result of this study is that children who are positioned as bridging links between different groups in social networks reveal both a high degree of lead...

  3. Binary Classification Method of Social Network Users

    Directory of Open Access Journals (Sweden)

    I. A. Poryadin

    2017-01-01

    Full Text Available The subject of research is a binary classification method of social network users based on the data analysis they have placed. Relevance of the task to gain information about a person by examining the content of his/her pages in social networks is exemplified. The most common approach to its solution is a visual browsing. The order of the regional authority in our country illustrates that its using in school education is needed. The article shows restrictions on the visual browsing of pupil’s pages in social networks as a tool for the teacher and the school psychologist and justifies that a process of social network users’ data analysis should be automated. Explores publications, which describe such data acquisition, processing, and analysis methods and considers their advantages and disadvantages. The article also gives arguments to support a proposal to study the classification method of social network users. One such method is credit scoring, which is used in banks and credit institutions to assess the solvency of clients. Based on the high efficiency of the method there is a proposal for significant expansion of its using in other areas of society. The possibility to use logistic regression as the mathematical apparatus of the proposed method of binary classification has been justified. Such an approach enables taking into account the different types of data extracted from social networks. Among them: the personal user data, information about hobbies, friends, graphic and text information, behaviour characteristics. The article describes a number of existing methods of data transformation that can be applied to solve the problem. An experiment of binary gender-based classification of social network users is described. A logistic model obtained for this example includes multiple logical variables obtained by transforming the user surnames. This experiment confirms the feasibility of the proposed method. Further work is to define a system

  4. Distributed Observer Network (DON), Version 3.0, User's Guide

    Science.gov (United States)

    Mazzone, Rebecca A.; Conroy, Michael P.

    2015-01-01

    The Distributed Observer Network (DON) is a data presentation tool developed by the National Aeronautics and Space Administration (NASA) to distribute and publish simulation results. Leveraging the display capabilities inherent in modern gaming technology, DON places users in a fully navigable 3-D environment containing graphical models and allows the users to observe how those models evolve and interact over time in a given scenario. Each scenario is driven with data that has been generated by authoritative NASA simulation tools and exported in accordance with a published data interface specification. This decoupling of the data from the source tool enables DON to faithfully display a simulator's results and ensure that every simulation stakeholder will view the exact same information every time.

  5. Privacy-preserving user clustering in a social network

    NARCIS (Netherlands)

    Erkin, Z.; Veugen, P.J.M.; Toft, T.; Lagendijk, R.L.

    2009-01-01

    In a ubiquitously connected world, social networks are playing an important role on the Internet by allowing users to find groups of people with similar interests. The data needed to construct such networks may be considered sensitive personal information by the users, which raises privacy concerns.

  6. User recommendation in healthcare social media by assessing user similarity in heterogeneous network.

    Science.gov (United States)

    Jiang, Ling; Yang, Christopher C

    2017-09-01

    The rapid growth of online health social websites has captured a vast amount of healthcare information and made the information easy to access for health consumers. E-patients often use these social websites for informational and emotional support. However, health consumers could be easily overwhelmed by the overloaded information. Healthcare information searching can be very difficult for consumers, not to mention most of them are not skilled information searcher. In this work, we investigate the approaches for measuring user similarity in online health social websites. By recommending similar users to consumers, we can help them to seek informational and emotional support in a more efficient way. We propose to represent the healthcare social media data as a heterogeneous healthcare information network and introduce the local and global structural approaches for measuring user similarity in a heterogeneous network. We compare the proposed structural approaches with the content-based approach. Experiments were conducted on a dataset collected from a popular online health social website, and the results showed that content-based approach performed better for inactive users, while structural approaches performed better for active users. Moreover, global structural approach outperformed local structural approach for all user groups. In addition, we conducted experiments on local and global structural approaches using different weight schemas for the edges in the network. Leverage performed the best for both local and global approaches. Finally, we integrated different approaches and demonstrated that hybrid method yielded better performance than the individual approach. The results indicate that content-based methods can effectively capture the similarity of inactive users who usually have focused interests, while structural methods can achieve better performance when rich structural information is available. Local structural approach only considers direct connections

  7. Social networking sites and older users - a systematic review

    OpenAIRE

    Nef, Tobias; Ganea, Raluca L.; Müri, René M.; Mosimann, Urs P.

    2017-01-01

    BACKGROUND Social networking sites can be beneficial for senior citizens to promote social participation and to enhance intergenerational communication. Particularly for older adults with impaired mobility, social networking sites can help them to connect with family members and other active social networking users. The aim of this systematic review is to give an overview of existing scientific literature on social networking in older users. METHODS Computerized databases were sea...

  8. The Role of Cultural and Identity Differences in Self-expression of Iranian Users of Social Networking Sites; A Case Study of Students of Tehran University, Amirkabir University, and Sharif University of Technology

    Directory of Open Access Journals (Sweden)

    H. Molaei

    2017-12-01

    Full Text Available Social media with their features such as interactivity, participatory, and user-generated content have provided a great opportunity for self-expression of the users. However, cultural differences affect the extent and modality of users’ self-expression. This study aims to investigate the modality of self-expression of Iranian users of the social networking sites. In doing so, an online survey was conducted among the students of three Iran universities: University of Tehran, Amirkabir University of Technology, and Sharif University of Technology. A total of 371 students participated in the study. Having conducted quantitative analysis, the study results showed that women and ethnic minorities are more inclined to support their cultural differences compared to men and ethnic majority group. Supporting cultural differences was observed more among Shia religious majority group. Religious minorities expressed less tendency to create content in social networking sites and as a result support their religious identity.

  9. Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.

    Science.gov (United States)

    Li, Xiong; Niu, Jianwei; Karuppiah, Marimuthu; Kumari, Saru; Wu, Fan

    2016-12-01

    Benefited from the development of network and communication technologies, E-health care systems and telemedicine have got the fast development. By using the E-health care systems, patient can enjoy the remote medical service provided by the medical server. Medical data are important privacy information for patient, so it is an important issue to ensure the secure of transmitted medical data through public network. Authentication scheme can thwart unauthorized users from accessing services via insecure network environments, so user authentication with privacy protection is an important mechanism for the security of E-health care systems. Recently, based on three factors (password, biometric and smart card), an user authentication scheme for E-health care systems was been proposed by Amin et al., and they claimed that their scheme can withstand most of common attacks. Unfortunate, we find that their scheme cannot achieve the untraceability feature of the patient. Besides, their scheme lacks a password check mechanism such that it is inefficient to find the unauthorized login by the mistake of input a wrong password. Due to the same reason, their scheme is vulnerable to Denial of Service (DoS) attack if the patient updates the password mistakenly by using a wrong password. In order improve the security level of authentication scheme for E-health care application, a robust user authentication scheme with privacy protection is proposed for E-health care systems. Then, security prove of our scheme are analysed. Security and performance analyses show that our scheme is more powerful and secure for E-health care systems when compared with other related schemes.

  10. Sensor Network-Based and User-Friendly User Location Discovery for Future Smart Homes.

    Science.gov (United States)

    Ahvar, Ehsan; Lee, Gyu Myoung; Han, Son N; Crespi, Noel; Khan, Imran

    2016-06-27

    User location is crucial context information for future smart homes where many location based services will be proposed. This location necessarily means that User Location Discovery (ULD) will play an important role in future smart homes. Concerns about privacy and the need to carry a mobile or a tag device within a smart home currently make conventional ULD systems uncomfortable for users. Future smart homes will need a ULD system to consider these challenges. This paper addresses the design of such a ULD system for context-aware services in future smart homes stressing the following challenges: (i) users' privacy; (ii) device-/tag-free; and (iii) fault tolerance and accuracy. On the other hand, emerging new technologies, such as the Internet of Things, embedded systems, intelligent devices and machine-to-machine communication, are penetrating into our daily life with more and more sensors available for use in our homes. Considering this opportunity, we propose a ULD system that is capitalizing on the prevalence of sensors for the home while satisfying the aforementioned challenges. The proposed sensor network-based and user-friendly ULD system relies on different types of inexpensive sensors, as well as a context broker with a fuzzy-based decision-maker. The context broker receives context information from different types of sensors and evaluates that data using the fuzzy set theory. We demonstrate the performance of the proposed system by illustrating a use case, utilizing both an analytical model and simulation.

  11. Policy gaps and technological deficiencies in social networking environments: Implications for information sharing

    Directory of Open Access Journals (Sweden)

    Stephen M. Mutula

    2013-06-01

    Full Text Available Background: With the growing adoption and acceptance of social networking, there are increased concerns about the violation of the users’ legitimate rights such as privacy, confidentiality, trust, security, safety, content ownership, content accuracy, integrity, access and accessibility to computer and digital networks amongst others.Objectives: The study sought to investigate the following research objectives to: (1 describe the types of social networks, (2 examine global penetration of the social networks, (3 outline the users’ legitimate rights that must be protected in the social networking sites (SNS, (4 determine the methods employed by SNS to protect the users’ legitimate rights and (5 identify the policy gaps and technological deficiencies in the protection of the users’ legitimate rights in the SNS.Method: A literature survey and content analysis of the SNS user policies were used to address objective four and objective five respectively.Results: The most actively used sites were Facebook and Twitter. Asian markets were leading in participation and in creating content than any other region. Business, education, politics and governance sectors were actively using social networking sites. Social networking sites relied upon user trust and internet security features which however, were inefficient and inadequate.Conclusion: Whilst SNS were impacting people of varying ages and of various professional persuasions, there were increased concerns about the violation and infringement of the users’ legitimate rights. Reliance on user trust and technological security features SNS to protect the users’ legitimate rights seemed ineffectual and inadequate.

  12. Technology for the Next-Generation-Mobile User Experience

    Science.gov (United States)

    Delagi, Greg

    specialized circuits, highly parallel architectures, and new packaging design. Another concern of the smart-mobile-companion user will be that their device is able to deliver an always-on, always-aware environment in a way that is completely seamless and transparent. These handsets will automatically determine the best and most appropriate modem link from the multiple choices on the device, including WiFi, LTE, 5G, and mmWave, based on which link will optimize performance, battery life, and network charges to deliver the best possible user experience. In the future, adaptive connectivity will require many different solutions, including the standard modem technologies of today, as well as new machine-machine interfaces and body-area-networks. All of the new and exciting applications and features of these mobile-companion devices are going to require additional energy due to added computational requirements. However, a gap in energy efficiency is quickly developing between the energy that can be delivered by today's battery technologies, and the energy needed to deliver all-day operation or 2-day always-on standby without a recharge. New innovations ranging from low-voltage digital and analog circuits, non-volatile memory, and adaptive power management, to energy harvesting, will be needed to further improve the battery life of these mobile companion devices. Increased bandwidth combined with decreased latency, higher power efficiency, energy harvesting, massive multimedia processing, and new interconnect technologies will all work together to revolutionize how we interact with our smart-companion devices. The implementation challenges in bringing these technologies to market may seem daunting and numerous at first, but with the strong collaboration in research and development from universities, government agencies, and corporations, the smart-mobile-companion devices of the future will likely become reality within 5 years!

  13. cisPath: an R/Bioconductor package for cloud users for visualization and management of functional protein interaction networks.

    Science.gov (United States)

    Wang, Likun; Yang, Luhe; Peng, Zuohan; Lu, Dan; Jin, Yan; McNutt, Michael; Yin, Yuxin

    2015-01-01

    With the burgeoning development of cloud technology and services, there are an increasing number of users who prefer cloud to run their applications. All software and associated data are hosted on the cloud, allowing users to access them via a web browser from any computer, anywhere. This paper presents cisPath, an R/Bioconductor package deployed on cloud servers for client users to visualize, manage, and share functional protein interaction networks. With this R package, users can easily integrate downloaded protein-protein interaction information from different online databases with private data to construct new and personalized interaction networks. Additional functions allow users to generate specific networks based on private databases. Since the results produced with the use of this package are in the form of web pages, cloud users can easily view and edit the network graphs via the browser, using a mouse or touch screen, without the need to download them to a local computer. This package can also be installed and run on a local desktop computer. Depending on user preference, results can be publicized or shared by uploading to a web server or cloud driver, allowing other users to directly access results via a web browser. This package can be installed and run on a variety of platforms. Since all network views are shown in web pages, such package is particularly useful for cloud users. The easy installation and operation is an attractive quality for R beginners and users with no previous experience with cloud services.

  14. Users structure and behavior on an online social network during a political protest

    Science.gov (United States)

    Morales, A. J.; Losada, J. C.; Benito, R. M.

    2012-11-01

    Over the past years, new technologies and specially online social networks have penetrated into the world’s population at an accelerated pace. In this paper we analyze collected data from the web application Twitter, in order to describe the structure and dynamics of the emergent social networks, based on complexity science. We focused on a Venezuelan protest that took place exclusively by Twitter during December, 2010. We found a community structure with highly connected hubs and three different kinds of user behavior that determine the information flow dynamics. We noticed that even though online social networks appear to be a pure social environment, traditional media still holds loads of influence inside the network.

  15. An Analysis of the Network Selection Problem for Heterogeneous Environments with User-Operator Joint Satisfaction and Multi-RAT Transmission

    Directory of Open Access Journals (Sweden)

    J. J. Escudero-Garzás

    2017-01-01

    Full Text Available The trend in wireless networks is that several wireless radio access technologies (RATs coexist in the same area, forming heterogeneous networks in which the users may connect to any of the available RATs. The problem of associating a user to the most suitable RAT, known as network selection problem (NSP, is of capital importance for the satisfaction of the users in these emerging environments. However, also the satisfaction of the operator is important in this scenario. In this work, we propose that a connection may be served by more than one RAT by using multi-RAT terminals. We formulate the NSP with multiple RAT association based on utility functions that take into consideration both user’s satisfaction and provider’s satisfaction. As users are characterized according to their expected quality of service, our results exhaustively analyze the influence of the user’s profile, along with the network topology and the type of applications served.

  16. Outage and ser performance of an opportunistic multi-user underlay cognitive network

    KAUST Repository

    Khan, Fahd Ahmed

    2012-10-01

    Consider a multi-user underlay cognitive network where multiple cognitive users concurrently share the spectrum with a primary network and a single secondary user is selected for transmission. The channel is assumed to have independent but not identical Nakagami-m fading. Closed form expressions for the outage performance and the symbol-error-rate performance of the opportunistic multi-user secondary network are derived when a peak interference power constraint is imposed on the secondary network in addition to the limited peak transmit power of each secondary user. © 2012 IEEE.

  17. A User-Customized Virtual Network Platform for NaaS Cloud

    Directory of Open Access Journals (Sweden)

    Lei Xiao

    2016-01-01

    Full Text Available Now all kinds of public cloud providers take computing and storage resources as the user’s main demand, making it difficult for users to deploy complex network in the public cloud. This paper proposes a virtual cloud platform with network as the core demand of the user, which can provide the user with the capacity of free network architecture as well as all kinds of virtual resources. The network is isolated by port groups of the virtual distributed switch and the data forwarding and access control between different network segments are implemented by virtual machines loading a soft-routing system. This paper also studies the management interface of network architecture and the uniform way to connect the remote desktop of virtual resources on the web, hoping to provide some new ideas for the Network as a Service model.

  18. A User Driven Dynamic Circuit Network Implementation

    Energy Technology Data Exchange (ETDEWEB)

    Guok, Chin; Robertson, David; Chaniotakis, Evangelos; Thompson, Mary; Johnston, William; Tierney, Brian

    2008-10-01

    The requirements for network predictability are becoming increasingly critical to the DoE science community where resources are widely distributed and collaborations are world-wide. To accommodate these emerging requirements, the Energy Sciences Network has established a Science Data Network to provide user driven guaranteed bandwidth allocations. In this paper we outline the design, implementation, and secure coordinated use of such a network, as well as some lessons learned.

  19. Report of the advisory group meeting on the establishment of regional ion accelerator centers and user networks

    International Nuclear Information System (INIS)

    1997-11-01

    In this report it is shown that ion accelerators have had a tremendous economic and technological impact on most developed countries, and are beginning to have a significant impact on developing countries. Through the formation of Accelerator Centers and User Networks (which may be national, regional or inter-regional) a mechanism will be outlined by which scientists and other users from developing countries can receive the necessary training and have available the necessary accelerator facilities to use these machines for economic improvement and technological development in their countries

  20. Sensor Network-Based and User-Friendly User Location Discovery for Future Smart Homes

    Directory of Open Access Journals (Sweden)

    Ehsan Ahvar

    2016-06-01

    Full Text Available User location is crucial context information for future smart homes where many location based services will be proposed. This location necessarily means that User Location Discovery (ULD will play an important role in future smart homes. Concerns about privacy and the need to carry a mobile or a tag device within a smart home currently make conventional ULD systems uncomfortable for users. Future smart homes will need a ULD system to consider these challenges. This paper addresses the design of such a ULD system for context-aware services in future smart homes stressing the following challenges: (i users’ privacy; (ii device-/tag-free; and (iii fault tolerance and accuracy. On the other hand, emerging new technologies, such as the Internet of Things, embedded systems, intelligent devices and machine-to-machine communication, are penetrating into our daily life with more and more sensors available for use in our homes. Considering this opportunity, we propose a ULD system that is capitalizing on the prevalence of sensors for the home while satisfying the aforementioned challenges. The proposed sensor network-based and user-friendly ULD system relies on different types of inexpensive sensors, as well as a context broker with a fuzzy-based decision-maker. The context broker receives context information from different types of sensors and evaluates that data using the fuzzy set theory. We demonstrate the performance of the proposed system by illustrating a use case, utilizing both an analytical model and simulation.

  1. Segmentation of users of social networking websites

    NARCIS (Netherlands)

    Lorenzo-Romero, C.; Alarcon-del-Amo, M.d.C.; Constantinides, Efthymios

    2012-01-01

    The typology of networked consumers in The Netherlands presented in this study, was based on an online survey and obtained using latent segmentation analysis. This approach is based on the frequency with which users perform different activities, their sociodemographic variables, social networking

  2. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  3. Persuasive Technology and Users Acceptance of E-commerce: Users Perceptions of Website Persuasiveness

    OpenAIRE

    Muna M. Alhammad; Stephen R. Gulliver

    2014-01-01

    Persuasive technologies have been extensively applied in the context of e-commerce for the purpose of marketing, enhancing system credibility, and motivating users to adopt the systems. Recognising that persuasion impacts on consumer behaviour to purchase online have not been investigated previously. This study reviews theories of technology acceptance, and identifies their limitation in not considering the effect of persuasive technologies when determining user online technology acceptance. ...

  4. Ethernet access network based on free-space optic deployment technology

    Science.gov (United States)

    Gebhart, Michael; Leitgeb, Erich; Birnbacher, Ulla; Schrotter, Peter

    2004-06-01

    The satisfaction of all communication needs from single households and business companies over a single access infrastructure is probably the most challenging topic in communications technology today. But even though the so-called "Last Mile Access Bottleneck" is well known since more than ten years and many distribution technologies have been tried out, the optimal solution has not yet been found and paying commercial access networks offering all service classes are still rare today. Conventional services like telephone, radio and TV, as well as new and emerging services like email, web browsing, online-gaming, video conferences, business data transfer or external data storage can all be transmitted over the well known and cost effective Ethernet networking protocol standard. Key requirements for the deployment technology driven by the different services are high data rates to the single customer, security, moderate deployment costs and good scalability to number and density of users, quick and flexible deployment without legal impediments and high availability, referring to the properties of optical and wireless communication. We demonstrate all elements of an Ethernet Access Network based on Free Space Optic distribution technology. Main physical parts are Central Office, Distribution Network and Customer Equipment. Transmission of different services, as well as configuration, service upgrades and remote control of the network are handled by networking features over one FSO connection. All parts of the network are proven, the latest commercially available technology. The set up is flexible and can be adapted to any more specific need if required.

  5. Online social networks that connect users to physical activity partners: a review and descriptive analysis.

    Science.gov (United States)

    Nakhasi, Atul; Shen, Album Xiaotian; Passarella, Ralph Joseph; Appel, Lawrence J; Anderson, Cheryl Am

    2014-06-16

    The US Centers for Disease Control and Prevention have identified a lack of encouragement, support, or companionship from family and friends as a major barrier to physical activity. To overcome this barrier, online social networks are now actively leveraging principles of companion social support in novel ways. The aim was to evaluate the functionality, features, and usability of existing online social networks which seek to increase physical activity and fitness among users by connecting them to physical activity partners, not just online, but also face-to-face. In September 2012, we used 3 major databases to identify the website addresses for relevant online social networks. We conducted a Google search using 8 unique keyword combinations: the common keyword "find" coupled with 1 of 4 prefix terms "health," "fitness," "workout," or "physical" coupled with 1 of 2 stem terms "activity partners" or "activity buddies." We also searched 2 prominent technology start-up news sites, TechCrunch and Y Combinator, using 2 unique keyword combinations: the common keyword "find" coupled with 1 of 2 stem terms "activity partners" and "activity buddies." Sites were defined as online social health activity networks if they had the ability to (1) actively find physical activity partners or activities for the user, (2) offer dynamic, real-time tracking or sharing of social activities, and (3) provide virtual profiles to users. We excluded from our analysis sites that were not Web-based, publicly available, in English, or free. Of the 360 initial search results, we identified 13 websites that met our complete criteria of an online social health activity network. Features such as physical activity creation (13/13, 100%) and private messaging (12/13, 92%) appeared almost universally among these websites. However, integration with Web 2.0 technologies such as Facebook and Twitter (9/13, 69%) and the option of direct event joining (8/13, 62%) were not as universally present. Largely

  6. Technologies for physical activity self-monitoring: a study of differences between users and non-users

    Directory of Open Access Journals (Sweden)

    Åkerberg A

    2017-02-01

    Full Text Available Anna Åkerberg,1,2 Anne Söderlund,2 Maria Lindén1 1School of Innovation, Design and Engineering, 2School of Health, Care and Social Welfare, Mälardalen University, Västerås, Sweden Background: Different kinds of physical activity (PA self-monitoring technologies are used today to monitor and motivate PA behavior change. The user focus is essential in the development process of this technology, including potential future users such as representatives from the group of non-users. There is also a need to study whether there are differences between the groups of users and non-users. The aims of this study were to investigate possible differences between users and non-users regarding their opinions about PA self-monitoring technologies and to investigate differences in demographic variables between the groups. Materials and methods: Participants were randomly selected from seven municipalities in central Sweden. In total, 107 adults responded to the Physical Activity Products Questionnaire, which consisted of 22 questions. Results: Significant differences between the users and non-users were shown for six of the 20 measurement-related items: measures accurately (p=0.007, measures with high precision (p=0.024, measures distance (p=0.020, measures speed (p=0.003, shows minutes of activity (p=0.004, and shows geographical position (p=0.000. Significant differences between the users and non-users were also found for two of the 29 encouragement items: measures accurately (p=0.001 and has long-term memory (p=0.019. Significant differences between the groups were also shown for level of education (p=0.030 and level of physical exercise (p=0.037. Conclusion: With a few exceptions, the users and the non-users in this study had similar opinions about PA self-monitoring technologies. Because this study showed significant differences regarding level of education and level of physical exercise, these demographic variables seemed more relevant to investigate

  7. E-Center: A Collaborative Platform for Wide Area Network Users

    Science.gov (United States)

    Grigoriev, M.; DeMar, P.; Tierney, B.; Lake, A.; Metzger, J.; Frey, M.; Calyam, P.

    2012-12-01

    The E-Center is a social collaborative web-based platform for assisting network users in understanding network conditions across network paths of interest to them. It is designed to give a user the necessary tools to isolate, identify, and resolve network performance-related problems. E-Center provides network path information on a link-by-link level, as well as from an end-to-end perspective. In addition to providing current and recent network path data, E-Center is intended to provide a social media environment for them to share issues, ideas, concerns, and problems. The product has a modular design that accommodates integration of other network services that make use of the same network path and performance data.

  8. E-center: A collaborative platform for wide area network users

    Energy Technology Data Exchange (ETDEWEB)

    Grigoriev, M. [Fermilab; DeMar, P. [Fermilab; Tierney, B. [LBL, Berkeley; Lake, A. [LBL, Berkeley; Metzger, J. [LBL, Berkeley; Frey, M. [Bucknell U.; Calyam, P. [Ohio State U.

    2012-01-01

    The E-Center is a social collaborative web-based platform for assisting network users in understanding network conditions across network paths of interest to them. It is designed to give a user the necessary tools to isolate, identify, and resolve network performance-related problems. E-Center provides network path information on a link-by-link level, as well as from an end-to-end perspective. In addition to providing current and recent network path data, E-Center is intended to provide a social media environment for them to share issues, ideas, concerns, and problems. The product has a modular design that accommodates integration of other network services that make use of the same network path and performance data.

  9. E-Center: A Collaborative Platform for Wide Area Network Users

    International Nuclear Information System (INIS)

    Grigoriev, M; DeMar, P; Tierney, B; Lake, A; Metzger, J; Frey, M; Calyam, P

    2012-01-01

    The E-Center is a social collaborative web-based platform for assisting network users in understanding network conditions across network paths of interest to them. It is designed to give a user the necessary tools to isolate, identify, and resolve network performance-related problems. E-Center provides network path information on a link-by-link level, as well as from an end-to-end perspective. In addition to providing current and recent network path data, E-Center is intended to provide a social media environment for them to share issues, ideas, concerns, and problems. The product has a modular design that accommodates integration of other network services that make use of the same network path and performance data.

  10. Bidirectional User Throughput Maximization Based on Feedback Reduction in LiFi Networks

    OpenAIRE

    Soltani, Mohammad Dehghani; Wu, Xiping; Safari, Majid; Haas, Harald

    2017-01-01

    Channel adaptive signalling, which is based on feedback, can result in almost any performance metric enhancement. Unlike the radio frequency (RF) channel, the optical wireless communications (OWCs) channel is fairly static. This feature enables a potential improvement of the bidirectional user throughput by reducing the amount of feedback. Light-Fidelity (LiFi) is a subset of OWCs, and it is a bidirectional, high-speed and fully networked wireless communication technology where visible light ...

  11. Social networking sites and older users - a systematic review.

    Science.gov (United States)

    Nef, Tobias; Ganea, Raluca L; Müri, René M; Mosimann, Urs P

    2013-07-01

    Social networking sites can be beneficial for senior citizens to promote social participation and to enhance intergenerational communication. Particularly for older adults with impaired mobility, social networking sites can help them to connect with family members and other active social networking users. The aim of this systematic review is to give an overview of existing scientific literature on social networking in older users. Computerized databases were searched and 105 articles were identified and screened using exclusion criteria. After exclusion of 87 articles, 18 articles were included, reviewed, classified, and the key findings were extracted. Common findings are identified and critically discussed and possible future research directions are outlined. The main benefit of using social networking sites for older adults is to enter in an intergenerational communication with younger family members (children and grandchildren) that is appreciated by both sides. Identified barriers are privacy concerns, technical difficulties and the fact that current Web design does not take the needs of older users into account. Under the conditions that these problems are carefully addressed, social networking sites have the potential to support today's and tomorrow's communication between older and younger family members.

  12. Evaluation of User Acceptance of Mixed Reality Technology

    Science.gov (United States)

    Yusoff, Rasimah Che Mohd; Zaman, Halimah Badioze; Ahmad, Azlina

    2011-01-01

    This study investigates users' perception and acceptance of mixed reality (MR) technology. Acceptance of new information technologies has been important research area since 1990s. It is important to understand the reasons why people accept information technologies, as this can help to improve design, evaluation and prediction how users will…

  13. Tracking mobile users in wireless networks via semi-supervised colocalization.

    Science.gov (United States)

    Pan, Jeffrey Junfeng; Pan, Sinno Jialin; Yin, Jie; Ni, Lionel M; Yang, Qiang

    2012-03-01

    Recent years have witnessed the growing popularity of sensor and sensor-network technologies, supporting important practical applications. One of the fundamental issues is how to accurately locate a user with few labeled data in a wireless sensor network, where a major difficulty arises from the need to label large quantities of user location data, which in turn requires knowledge about the locations of signal transmitters or access points. To solve this problem, we have developed a novel machine learning-based approach that combines collaborative filtering with graph-based semi-supervised learning to learn both mobile users' locations and the locations of access points. Our framework exploits both labeled and unlabeled data from mobile devices and access points. In our two-phase solution, we first build a manifold-based model from a batch of labeled and unlabeled data in an offline training phase and then use a weighted k-nearest-neighbor method to localize a mobile client in an online localization phase. We extend the two-phase colocalization to an online and incremental model that can deal with labeled and unlabeled data that come sequentially and adapt to environmental changes. Finally, we embed an action model to the framework such that additional kinds of sensor signals can be utilized to further boost the performance of mobile tracking. Compared to other state-of-the-art systems, our framework has been shown to be more accurate while requiring less calibration effort in our experiments performed on three different testbeds.

  14. Competitive diffusion in online social networks with heterogeneous users

    Science.gov (United States)

    Li, Pei; He, Su; Wang, Hui; Zhang, Xin

    2014-06-01

    Online social networks have attracted increasing attention since they provide various approaches for hundreds of millions of people to stay connected with their friends. However, most research on diffusion dynamics in epidemiology cannot be applied directly to characterize online social networks, where users are heterogeneous and may act differently according to their standpoints. In this paper, we propose models to characterize the competitive diffusion in online social networks with heterogeneous users. We classify messages into two types (i.e., positive and negative) and users into three types (i.e., positive, negative and neutral). We estimate the positive (negative) influence for a user generating a given type message, which is the number of times that positive (negative) messages are processed (i.e., read) incurred by this action. We then consider the diffusion threshold, above which the corresponding influence will approach infinity, and the effect threshold, above which the unexpected influence of generating a message will exceed the expected one. We verify all these results by simulations, which show the analysis results are perfectly consistent with the simulation results. These results are of importance in understanding the diffusion dynamics in online social networks, and also critical for advertisers in viral marketing where there are fans, haters and neutrals.

  15. Private Sharing of User Location over Online Social Networks

    OpenAIRE

    Freudiger, Julien; Neu, Raoul; Hubaux, Jean-Pierre

    2010-01-01

    Online social networks increasingly allow mobile users to share their location with their friends. Much to the detriment of users’ privacy, this also means that social network operators collect users’ lo- cation. Similarly, third parties can learn users’ location from localization and location visualization services. Ideally, third-parties should not be given complete access to users’ location. To protect location privacy, we design and implement a platform-independent solution for users to s...

  16. Research on NGN network control technology

    Science.gov (United States)

    Li, WenYao; Zhou, Fang; Wu, JianXue; Li, ZhiGuang

    2004-04-01

    Nowadays NGN (Next Generation Network) is the hotspot for discussion and research in IT section. The NGN core technology is the network control technology. The key goal of NGN is to realize the network convergence and evolution. Referring to overlay network model core on Softswitch technology, circuit switch network and IP network convergence realized. Referring to the optical transmission network core on ASTN/ASON, service layer (i.e. IP layer) and optical transmission convergence realized. Together with the distributing feature of NGN network control technology, on NGN platform, overview of combining Softswitch and ASTN/ASON control technology, the solution whether IP should be the NGN core carrier platform attracts general attention, and this is also a QoS problem on NGN end to end. This solution produces the significant practical meaning on equipment development, network deployment, network design and optimization, especially on realizing present network smooth evolving to the NGN. This is why this paper puts forward the research topic on the NGN network control technology. This paper introduces basics on NGN network control technology, then proposes NGN network control reference model, at the same time describes a realizable network structure of NGN. Based on above, from the view of function realization, NGN network control technology is discussed and its work mechanism is analyzed.

  17. Advanced Communication and Networking Technologies for Mars Exploration

    Science.gov (United States)

    Bhasin, Kul; Hayden, Jeff; Agre, Jonathan R.; Clare, Loren P.; Yan, Tsun-Yee

    2001-01-01

    Next-generation Mars communications networks will provide communications and navigation services to a wide variety of Mars science vehicles including: spacecraft that are arriving at Mars, spacecraft that are entering and descending in the Mars atmosphere, scientific orbiter spacecraft, spacecraft that return Mars samples to Earth, landers, rovers, aerobots, airplanes, and sensing pods. In the current architecture plans, the communication services will be provided using capabilities deployed on the science vehicles as well as dedicated communication satellites that will together make up the Mars network. This network will evolve as additional vehicles arrive, depart or end their useful missions. Cost savings and increased reliability will result from the ability to share communication services between missions. This paper discusses the basic architecture that is needed to support the Mars Communications Network part of NASA's Space Science Enterprise (SSE) communications architecture. The network may use various networking technologies such as those employed in the terrestrial Internet, as well as special purpose deep-space protocols to move data and commands autonomously between vehicles, at disparate Mars vicinity sites (on the surface or in near-Mars space) and between Mars vehicles and earthbound users. The architecture of the spacecraft on-board local communications is being reconsidered in light of these new networking requirements. The trend towards increasingly autonomous operation of the spacecraft is aimed at reducing the dependence on resource scheduling provided by Earth-based operators and increasing system fault tolerance. However, these benefits will result in increased communication and software development requirements. As a result, the envisioned Mars communications infrastructure requires both hardware and protocol technology advancements. This paper will describe a number of the critical technology needs and some of the ongoing research

  18. User-friendly matching protocol for online social networks

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    In this paper, we outline a privacy-preserving matching protocol for OSN (online social network) users to find their potential friends. With the proposed protocol, a logged-in user can match her profile with that of an off-line stranger, while both profiles are maximally protected. Our solution

  19. Green Mobile Clouds: Network Coding and User Cooperation for Improved Energy Efficiency

    DEFF Research Database (Denmark)

    Heide, Janus; Fitzek, Frank; Pedersen, Morten Videbæk

    2012-01-01

    This paper highlights the benefits of user cooperation and network coding for energy saving in cellular networks. It is shown that these techniques allow for reliable and efficient multicast services from both a user and network perspective. The working principles and advantages in terms of energy...

  20. Are the users of social networking sites homogeneous? A cross-cultural study

    Science.gov (United States)

    Alarcón-del-Amo, María-del-Carmen; Gómez-Borja, Miguel-Ángel; Lorenzo-Romero, Carlota

    2015-01-01

    The growing use of Social Networking Sites (SNS) around the world has made it necessary to understand individuals' behaviors within these sites according to different cultures. Based on a comparative study between two different European countries (The Netherlands versus Spain), a comparison of typologies of networked Internet users has been obtained through a latent segmentation approach. These typologies are based on the frequency with which users perform different activities, their socio-demographic variables, and experience in social networking and interaction patterns. The findings show new insights regarding international segmentation in order to analyse SNS user behaviors in both countries. These results are relevant for marketing strategists eager to use the communication potential of networked individuals and for marketers willing to explore the potential of online networking as a low cost and a highly efficient alternative to traditional networking approaches. For most businesses, expert users could be valuable opinion leaders and potential brand influencers. PMID:26321971

  1. Are the users of social networking sites homogeneous? A cross-cultural study.

    Science.gov (United States)

    Alarcón-Del-Amo, María-Del-Carmen; Gómez-Borja, Miguel-Ángel; Lorenzo-Romero, Carlota

    2015-01-01

    The growing use of Social Networking Sites (SNS) around the world has made it necessary to understand individuals' behaviors within these sites according to different cultures. Based on a comparative study between two different European countries (The Netherlands versus Spain), a comparison of typologies of networked Internet users has been obtained through a latent segmentation approach. These typologies are based on the frequency with which users perform different activities, their socio-demographic variables, and experience in social networking and interaction patterns. The findings show new insights regarding international segmentation in order to analyse SNS user behaviors in both countries. These results are relevant for marketing strategists eager to use the communication potential of networked individuals and for marketers willing to explore the potential of online networking as a low cost and a highly efficient alternative to traditional networking approaches. For most businesses, expert users could be valuable opinion leaders and potential brand influencers.

  2. Are the users of Social Networking Sites homogeneous? A cross-cultural study

    Directory of Open Access Journals (Sweden)

    MARÍA-DEL-CARMEN eALARCÓN-DEL-AMO

    2015-08-01

    Full Text Available The growing use of Social Networking Sites (SNS around the world has made it necessary to understand individuals’ behaviours within these sites according to different cultures. Based on a comparative study between two different European countries (The Netherlands versus Spain, a comparison of typologies of networked Internet users has been obtained through a latent segmentation approach. These typologies are based on the frequency with which users perform different activities, their socio-demographic variables, and experience in social networking and interaction patterns. The findings show new insights regarding international segmentation in order to analyse SNS user behaviours in both countries. These results are relevant for marketing strategists eager to use the communication potential of networked individuals and for marketers willing to explore the potential of online networking as a low cost and a highly efficient alternative to traditional networking approaches. For most businesses, expert users could be valuable opinion leaders and potential brand influencers.

  3. Function-Oriented Networking and On-Demand Routing System in Network Using Ant Colony Optimization Algorithm

    Directory of Open Access Journals (Sweden)

    Young-Bo Sim

    2017-11-01

    Full Text Available In this paper, we proposed and developed Function-Oriented Networking (FON, a platform for network users. It has a different philosophy as opposed to technologies for network managers of Software-Defined Networking technology, OpenFlow. It is a technology that can immediately reflect the demands of the network users in the network, unlike the existing OpenFlow and Network Functions Virtualization (NFV, which do not reflect directly the needs of the network users. It allows the network user to determine the policy of the direct network, so it can be applied more precisely than the policy applied by the network manager. This is expected to increase the satisfaction of the service users when the network users try to provide new services. We developed FON function that performs on-demand routing for Low-Delay Required service. We analyzed the characteristics of the Ant Colony Optimization (ACO algorithm and found that the algorithm is suitable for low-delay required services. It was also the first in the world to implement the routing software using ACO Algorithm in the real Ethernet network. In order to improve the routing performance, several algorithms of the ACO Algorithm have been developed to enable faster path search-routing and path recovery. The relationship between the network performance index and the ACO routing parameters is derived, and the results are compared and analyzed. Through this, it was possible to develop the ACO algorithm.

  4. The Third Annual NASA Science Internet User Working Group Conference

    Science.gov (United States)

    Lev, Brian S. (Editor); Gary, J. Patrick (Editor)

    1993-01-01

    The NASA Science Internet (NSI) User Support Office (USO) sponsored the Third Annual NSI User Working Group (NSIUWG) Conference March 30 through April 3, 1992, in Greenbelt, MD. Approximately 130 NSI users attended to learn more about the NSI, hear from projects which use NSI, and receive updates about new networking technologies and services. This report contains material relevant to the conference; copies of the agenda, meeting summaries, presentations, and descriptions of exhibitors. Plenary sessions featured a variety of speakers, including NSI project management, scientists, and NSI user project managers whose projects and applications effectively use NSI, and notable citizens of the larger Internet community. The conference also included exhibits of advanced networking applications; tutorials on internetworking, computer security, and networking technologies; and user subgroup meetings on the future direction of the conference, networking, and user services and applications.

  5. Virtualized Network Function Orchestration System and Experimental Network Based QR Recognition for a 5G Mobile Access Network

    Directory of Open Access Journals (Sweden)

    Misun Ahn

    2017-12-01

    Full Text Available This paper proposes a virtualized network function orchestration system based on Network Function Virtualization (NFV, one of the main technologies in 5G mobile networks. This system should provide connectivity between network devices and be able to create flexible network function and distribution. This system focuses more on access networks. By experimenting with various scenarios of user service established and activated in a network, we examine whether rapid adoption of new service is possible and whether network resources can be managed efficiently. The proposed method is based on Bluetooth transfer technology and mesh networking to provide automatic connections between network machines and on a Docker flat form, which is a container virtualization technology for setting and managing key functions. Additionally, the system includes a clustering and recovery measure regarding network function based on the Docker platform. We will briefly introduce the QR code perceived service as a user service to examine the proposal and based on this given service, we evaluate the function of the proposal and present analysis. Through the proposed approach, container relocation has been implemented according to a network device’s CPU usage and we confirm successful service through function evaluation on a real test bed. We estimate QR code recognition speed as the amount of network equipment is gradually increased, improving user service and confirm that the speed of recognition is increased as the assigned number of network devices is increased by the user service.

  6. User driven innovation in mobile technologies?

    DEFF Research Database (Denmark)

    Larsen, Casper Schultz; Koch, Christian

    2007-01-01

    by systems already in function. Stories of prior business successes can be an important tool to ensure further innovative investments since lack of enterprise strategies is often an obstacle for innovation, especially user driven. Both small and large software houses develops dedicated software for coupling...... technology systems relying on the concept of affordance. This paper examines how innovation processes mediate between user orientations and technology offers. There is a great potential for mobile handheld ICT-systems to support numerous work processes in the AEC-industry and this can be substantiated...... site practises, and headquarters - inspired by specific user needs for optimizing work processes. The most important mechanisms evoked for creating the mediating found in the paper are ‘hybrids’ where professionals from AEC establishes a software house, developing ICT-products for specific on...

  7. Making Wireless Networks Secure for NASA Mission Critical Applications Using Virtual Private Network (VPN) Technology

    Science.gov (United States)

    Nichols, Kelvin F.; Best, Susan; Schneider, Larry

    2004-01-01

    With so many security issues involved with wireless networks, the technology has not been fully utilized in the area of mission critical applications. These applications would include the areas of telemetry, commanding, voice and video. Wireless networking would allow payload operators the mobility to take computers outside of the control room to their off ices and anywhere else in the facility that the wireless network was extended. But the risk is too great of having someone sit just inside of your wireless network coverage and intercept enough of your network traffic to steal proprietary data from a payload experiment or worse yet hack back into your system and do even greater harm by issuing harmful commands. Wired Equivalent Privacy (WEP) is improving but has a ways to go before it can be trusted to protect mission critical data. Today s hackers are becoming more aggressive and innovative, and in order to take advantage of the benefits that wireless networking offer, appropriate security measures need to be in place that will thwart hackers. The Virtual Private Network (VPN) offers a solution to the security problems that have kept wireless networks from being used for mission critical applications. VPN provides a level of encryption that will ensure that data is protected while it is being transmitted over a wireless local area network (LAN). The VPN allows a user to authenticate to the site that the user needs to access. Once this authentication has taken place the network traffic between that site and the user is encapsulated in VPN packets with the Triple Data Encryption Standard (3DES). 3DES is an encryption standard that uses a single secret key to encrypt and decrypt data. The length of the encryption key is 168 bits as opposed to its predecessor DES that has a 56-bit encryption key. Even though 3DES is the common encryption standard for today, the Advance Encryption Standard (AES), which provides even better encryption at a lower cycle cost is growing

  8. Applicability of new radio technologies for advanced UMTS networks

    Directory of Open Access Journals (Sweden)

    A. Dekorsy

    2004-01-01

    Full Text Available An expanded effort is under the way to support the evolution of UMTS (Universal Mobile Telecommunication System. Apart from delivering high data rates, future UMTS releases will also require to provide high network performance in terms of system capacity, low radiated power, and high coverage. Well promising performance-enhancing technologies are smart antennas as well as multiuser detection. Although these new radio technologies have recently been subject to intense research, main UMTS network integration aspects with their specific constraints have been neglected in many cases. Especially the interaction with UMTS radio resource control being required to meet Quality of Service (QoS constraints has to be included to assess the applicability of these technologies for UMTS. In this paper, we study the interaction of beamforming concepts as well as multiuser detection with load and power control. We also work out UMTS specific constraints like signal-to-interference-plus-noise ratio (SINR operating points, pilot power pollution or channel estimation, all strongly limiting network performance. Results are shown for capacity gains and power reduction for all beamforming concepts of interest as well as linear multiuser detection schemes. The results show that fix as well as user-specific beamforming significantly improves network performance gains in downlink. In uplink multiuser detection indicates fairly modest system capacity gains, while it reduces tremendously mobile station power.

  9. Crossing the technology adoption chasm in the presence of network externalities implications for DoD

    OpenAIRE

    Schang, Suzanne L.

    2007-01-01

    This thesis explores factors inhibiting technologies from crossing the technology diffusion "chasm" in between early and wide-scale adoption. It focuses on cost and benefit uncertainty as well as network effects applied to end-users and their organizations. Specifically, it explores Department of Defense (DoD) acquisition programs bringing promising technologies to the field defines successful technology adoption as realizing its full potential return on investment by achieving the widest ...

  10. Cognitive Relay Networks: A Comprehensive Survey

    Directory of Open Access Journals (Sweden)

    Ayesha Naeem

    2015-07-01

    Full Text Available Cognitive radio is an emerging technology to deal with the scarcity and requirement of radio spectrum by dynamically assigning spectrum to unlicensed user . This revolutionary technology shifts the paradigm in the wireless system design by all owing unlicensed user the ability to sense, adapt and share the dynamic spectrum. Cognitive radio technology have been applied to different networks and applications ranging from wireless to public saf ety, smart grid, medical, rela y and cellular applications to increase the throughput and spectrum efficiency of the network. Among these applications, cognitive relay networks is one of the application where cognitive radio technology has been applied. Cognitiv e rela y network increases the network throughput by reducing the complete pa th loss and also by ensuring cooper ation among secondary users and cooperation among primary and secondary users. In this paper , our aim is to provide a survey on cognitive relay network. We also provide a detailed review on existing schemes in cognitive relay networks on the basis of relaying protocol, relay cooperation and channel model.

  11. Quantifying Users' Interconnectedness in Online Social Networks - An Indispensible Step for Economic Valuation

    Science.gov (United States)

    Gneiser, Martin; Heidemann, Julia; Klier, Mathias; Landherr, Andrea; Probst, Florian

    Online social networks have been gaining increasing economic importance in light of the rising number of their users. Numerous recent acquisitions priced at enormous amounts have illustrated this development and revealed the need for adequate business valuation models. The value of an online social network is largely determined by the value of its users, the relationships between these users, and the resulting network effects. Therefore, the interconnectedness of a user within the network has to be considered explicitly to get a reasonable estimate for the economic value. Established standard business valuation models, however, do not sufficiently take these aspects into account. Thus, we propose a measure based on the PageRank-algorithm to quantify users’ interconnectedness in an online social network. This is a first but indispensible step towards an adequate economic valuation of online social networks.

  12. Brand interactions and social media: enhancing user loyalty through social networking sites

    OpenAIRE

    Nisar, T.M.; Whitehead, C.

    2016-01-01

    This paper aims to investigate how user loyalty can be achieved and maintained through social networking sites. More specifically, we intend to test the relationships between brands, user loyalty and social media. The research thus provides insights into user-brand relationships through social media and argues how loyal customers can be through social networking websites. Although there are considerable numbers of studies about loyalty; there exists very limited work studying user loyalty thr...

  13. Effects of Network Performance on Smartphone User Behavior

    OpenAIRE

    Örblom, Markus

    2015-01-01

    While the relation between smartphone user behavior and contextual factors have been explored in previous research, the mobile networks’ influence on the smartphone user behavior is largely unknown. Through statistical analysis of a data set collected globally from ˜ 1000 users by an Android app called Ericsson Apps, this study investigates how the users’ app choices and app usage depend on the network performance. The results show, for instance, that the choice of app depends strongly on the...

  14. Social networks user: current research

    OpenAIRE

    Agadullina E.R.

    2015-01-01

    The purpose of this article is to review current research studies focusing on the users of Facebook and their behaviors in social networks. This review is organized into two sections: 1) social-demographic characteristics (Age, Gender, Nationality); 2) personality characteristics (Neuroticism, Extraversion, Openness-to-Experience, Agreeableness, Conscientiousness, Narcissism, Self-esteem). The results showed that the information in the personal profile and online behavior are strongly connect...

  15. User profiling and classification for fraud detection in mobile communications networks

    OpenAIRE

    Hollmén, Jaakko

    2000-01-01

    The topic of this thesis is fraud detection in mobile communications networks by means of user profiling and classification techniques. The goal is to first identify relevant user groups based on call data and then to assign a user to a relevant group. Fraud may be defined as a dishonest or illegal use of services, with the intention to avoid service charges. Fraud detection is an important application, since network operators lose a relevant portion of their revenue to fraud. Whereas the int...

  16. User-led innovations, participation processes and the use of energy technologies

    Energy Technology Data Exchange (ETDEWEB)

    Ornetzeder, Michael [Centre for Social Innovation, Vienna (Austria); Rohracher, Harald [Inter-Univ. Research Centre for Technology, Work and Culture, Graz (Austria)

    2003-07-01

    In this paper we will pose the question whether a higher level of user participation may improve the development and dissemination of energy-efficient technologies. We will especially focus on user-led innovation processes with a high involvement of individual end-users. In our argument we will draw on several case studies in the field of renewable energy technologies - in particular solar collectors and biomass heating systems - and sustainable building technologies. Users in these case studies were involved in the design or planning processes, sometimes in a very selective way and with limited influence, sometimes very active and for quite a long period of time. Especially in the case of renewable energy technologies self-building groups were highly successful and resulted in improved and widely disseminated technologies. Based on the empirical results of our case studies we will critically discuss the potential of user involvement for energy efficiency, and various forms of user participation and involvement as a strategy to change consumption patterns of end-users in general. Special emphasis will be put on technological and social pre-conditions which might allow the transfer of our examples from renewable energies to potentially energy efficient technologies.

  17. Personalized Recommendations Based on Users' Information-Centered Social Networks

    Science.gov (United States)

    Lee, Danielle

    2013-01-01

    The overwhelming amount of information available today makes it difficult for users to find useful information and as the solution to this information glut problem, recommendation technologies emerged. Among the several streams of related research, one important evolution in technology is to generate recommendations based on users' own social…

  18. A conceptual framework for technology-enabled and technology-dependent user behavior toward device mesh and mesh app

    Directory of Open Access Journals (Sweden)

    Ming-Hsiung Hsiao

    2018-06-01

    Full Text Available The device mesh and mesh app revealed by Gartner as the future strategic technology trend are able to predict people's need from their historic data, then provides the needed services or service innovation to support their activity engagement. However, many theories have identified that it is the motivation, rather than technology, that drives people to engage in activities or tasks. For this reason, this study builds a conceptual framework by integrating the extant logic and theories to explore how future technology would generate benefits for people. It integrates task-technology fit (TTF model and motivation theory (mainly expectancy-value theory to explain such technology user behavior. It also points out the difference between technology-enabled and technology-dependent user behavior and concludes that too much emphasis on the role of technology with too little attention on motivation would distort technology user behavior, and the role of technology as well. Keywords: Device mesh, Mesh app, Expectancy-value theory, Task-technology fit (TTF, Technology-enabled user, Technology-dependent user

  19. Research and Design of Dynamic Migration Access Control Technology Based on Heterogeneous Network

    Directory of Open Access Journals (Sweden)

    Wang Feng

    2017-01-01

    Full Text Available With the continuous development of wireless networks, the amount of privacy services in heterogeneous mobile networks is increasing, such as information storage, user access, and so on. Access control security issues for heterogeneous mobile radio network, this paper proposes a dynamic migration access control technology based on heterogeneous network. Through the system architecture of the mutual trust system, we can understand the real-time mobile node failure or abnormal state. To make the service can be terminated for the node. And adopt the 802.1X authentication way to improve the security of the system. Finally, it by combining the actual running test data, the trust update algorithm of the system is optimized to reduce the actual security threats in the environment. Experiments show that the system’s anti-attack, the success rate of access, bit error rate is in line with the expected results. This system can effectively reduce the system authentication information is illegally obtained after the network security protection mechanism failure and reduce the risk of user data leakage.

  20. Two types of well followed users in the followership networks of Twitter.

    Directory of Open Access Journals (Sweden)

    Kodai Saito

    Full Text Available In the Twitter blogosphere, the number of followers is probably the most basic and succinct quantity for measuring popularity of users. However, the number of followers can be manipulated in various ways; we can even buy follows. Therefore, alternative popularity measures for Twitter users on the basis of, for example, users' tweets and retweets, have been developed. In the present work, we take a purely network approach to this fundamental question. First, we find that two relatively distinct types of users possessing a large number of followers exist, in particular for Japanese, Russian, and Korean users among the seven language groups that we examined. A first type of user follows a small number of other users. A second type of user follows approximately the same number of other users as the number of follows that the user receives. Then, we compare local (i.e., egocentric followership networks around the two types of users with many followers. We show that the second type, which is presumably uninfluential users despite its large number of followers, is characterized by high link reciprocity, a large number of friends (i.e., those whom a user follows for the followers, followers' high link reciprocity, large clustering coefficient, large fraction of the second type of users among the followers, and a small PageRank. Our network-based results support that the number of followers used alone is a misleading measure of user's popularity. We propose that the number of friends, which is simple to measure, also helps us to assess the popularity of Twitter users.

  1. Profiles of social networking sites users in the Netherlands

    NARCIS (Netherlands)

    Constantinides, Efthymios; Alarcón del Amo, Maria del Carmen; Lorenzo Romero, Carlota

    2010-01-01

    Online social networking has become a reality and integral part of the daily personal, social and business life. The extraordinary increase of the user numbers of Social Networking Sites (SNS) and the rampant creation of online communities presents businesses with many challenges and opportunities.

  2. Social networks user: current research

    Directory of Open Access Journals (Sweden)

    Agadullina E.R.

    2015-12-01

    Full Text Available The purpose of this article is to review current research studies focusing on the users of Facebook and their behaviors in social networks. This review is organized into two sections: 1 social-demographic characteristics (Age, Gender, Nationality; 2 personality characteristics (Neuroticism, Extraversion, Openness-to-Experience, Agreeableness, Conscientiousness, Narcissism, Self-esteem. The results showed that the information in the personal profile and online behavior are strongly connected with socio-demographic and personality characteristics

  3. Effectively identifying user profiles in network and host metrics

    Science.gov (United States)

    Murphy, John P.; Berk, Vincent H.; Gregorio-de Souza, Ian

    2010-04-01

    This work presents a collection of methods that is used to effectively identify users of computers systems based on their particular usage of the software and the network. Not only are we able to identify individual computer users by their behavioral patterns, we are also able to detect significant deviations in their typical computer usage over time, or compared to a group of their peers. For instance, most people have a small, and relatively unique selection of regularly visited websites, certain email services, daily work hours, and typical preferred applications for mandated tasks. We argue that these habitual patterns are sufficiently specific to identify fully anonymized network users. We demonstrate that with only a modest data collection capability, profiles of individual computer users can be constructed so as to uniquely identify a profiled user from among their peers. As time progresses and habits or circumstances change, the methods presented update each profile so that changes in user behavior can be reliably detected over both abrupt and gradual time frames, without losing the ability to identify the profiled user. The primary benefit of our methodology allows one to efficiently detect deviant behaviors, such as subverted user accounts, or organizational policy violations. Thanks to the relative robustness, these techniques can be used in scenarios with very diverse data collection capabilities, and data privacy requirements. In addition to behavioral change detection, the generated profiles can also be compared against pre-defined examples of known adversarial patterns.

  4. State criminal justice telecommunications (STACOM). Volume 4: Network design software user's guide

    Science.gov (United States)

    Lee, J. J.

    1977-01-01

    A user's guide to the network design program is presented. The program is written in FORTRAN V and implemented on a UNIVAC 1108 computer under the EXEC-8 operating system which enables the user to construct least-cost network topologies for criminal justice digital telecommunications networks. A complete description of program features, inputs, processing logic, and outputs is presented, and a sample run and a program listing are included.

  5. User-Centered Design and Interactive Health Technologies for Patients

    Science.gov (United States)

    De Vito Dabbs, Annette; Myers, Brad A.; Mc Curry, Kenneth R.; Dunbar-Jacob, Jacqueline; Hawkins, Robert P.; Begey, Alex; Dew, Mary Amanda

    2010-01-01

    Despite recommendations that patients be involved in the design and testing of health technologies, few reports describe how to involve patients in systematic and meaningful ways to ensure that applications are customized to meet their needs. User-centered design (UCD) is an approach that involves end-users throughout the development process so that technology support tasks, are easy to operate, and are of value to users. In this paper we provide an overview of UCD and use the development of Pocket Personal Assistant for Tracking Health (Pocket PATH), to illustrate how these principles and techniques were applied to involve patients in the development of this interactive health technology. Involving patient-users in the design and testing ensured functionality and usability, therefore increasing the likelihood of promoting the intended health outcomes. PMID:19411947

  6. What value do users derive from social networking applications?

    OpenAIRE

    Neale, Larry; Russell-Bennett, Rebekah

    2009-01-01

    Why do users of social networking sites recommend some applications to their friends while rejecting others? What value do they obtain from applications? This exploratory study investigates the value users derive from ‘cool’ Facebook applications, and explores the features that either encourage or discourage users to recommend applications to their friends. Our qualitative data reveal consumers derive a combination of functional value along with either social or emotional value from the app...

  7. A User Centered Approach to Developing Emergent Technology Products

    DEFF Research Database (Denmark)

    Restrepo-Giraldo, John Dairo; McAloone, Timothy Charles; Schlegel, Tanja

    2008-01-01

    be used too early in the design process, given that users respond best to issues they know or can relate to. This paper presents a case study where a user-centred approach was used to determine when and how to involve users in the design of a TV-enabled mobile telephone. The aim of the study......Current participatory design methods do not allow designers to gain the insight required to develop products with emerging technologies, that is, products that do not have any precedents in the users’ knowledge base and experience. This poses challenges to the designers, as input from users cannot...... methodological issues related to user involvement in the implementation of emerging technologies in the consumer electronics industry....

  8. Graphical user interface for wireless sensor networks simulator

    Science.gov (United States)

    Paczesny, Tomasz; Paczesny, Daniel; Weremczuk, Jerzy

    2008-01-01

    Wireless Sensor Networks (WSN) are currently very popular area of development. It can be suited in many applications form military through environment monitoring, healthcare, home automation and others. Those networks, when working in dynamic, ad-hoc model, need effective protocols which must differ from common computer networks algorithms. Research on those protocols would be difficult without simulation tool, because real applications often use many nodes and tests on such a big networks take much effort and costs. The paper presents Graphical User Interface (GUI) for simulator which is dedicated for WSN studies, especially in routing and data link protocols evaluation.

  9. Future networks and technologies supporting innovative communications

    DEFF Research Database (Denmark)

    Prasad, Ramjee

    2012-01-01

    -communications (WISDOM) that combines the aspects of personal- and cognitive radio- networks to let seamlessly bridge the virtual and physical worlds offering a constant level of all-senses, context-based, rich communication experience over fixed and wireless networks for the end users while realizing a new generation......Within a fully interconnected world, the distinct relationship between end users, consumers and providers rapidly changes towards a scenario of collaboration and competition of multiple parties within one system. ‘Convergence’, ‘ubiquitous’ and ‘smart’ are key words describing future networks...

  10. Exploring the Relationship Between Online Social Network Site Usage and the Impact on Quality of Life for Older and Younger Users: An Interaction Analysis.

    Science.gov (United States)

    Quinn, Darren; Chen, Liming; Mulvenna, Maurice D; Bond, Raymond

    2016-09-29

    Analyzing content generated by users of social network sites has been shown to be beneficial across a number of disciplines. Such analysis has revealed the precise behavior of users that details their distinct patterns of engagement. An issue is evident whereby without direct engagement with end users, the reasoning for anomalies can only be the subject of conjecture. Furthermore, the impact of engaging in social network sites on quality of life is an area which has received little attention. Of particular interest is the impact of online social networking on older users, which is a demographic that is specifically vulnerable to social isolation. A review of the literature reveals a lack of knowledge concerning the impact of these technologies on such users and even less is known regarding how this impact varies across different demographics. The objective of our study was to analyze user interactions and to survey the attitudes of social network users directly, capturing data in four key areas: (1) functional usage, (2) behavioral patterns, (3) technology, and (4) quality of life. An online survey was constructed, comprising 32 questions. Each question directly related to a research question. Respondents were recruited through a variety of methods including email campaigns, Facebook advertisements, and promotion from related organizations. In total, data was collected from 919 users containing 446 younger and 473 older users. In comparison to younger users, a greater proportion of older users (289/473, 61.1% older vs 218/446, 48.9% younger) (PFacebook had either a positive or huge impact on their quality of life. Furthermore, a greater percentage of older users strongly agreed that Facebook strengthened their relationship with other people (64/473, 13.5% older vs 40/446, 9.0%younger) (P=.02). In comparison to younger users, a greater proportion of older users had more positive emotions-classified as slightly better or very good-during their engagement with

  11. Key Technologies in the Context of Future Networks: Operational and Management Requirements

    Directory of Open Access Journals (Sweden)

    Lorena Isabel Barona López

    2016-12-01

    Full Text Available The concept of Future Networks is based on the premise that current infrastructures require enhanced control, service customization, self-organization and self-management capabilities to meet the new needs in a connected society, especially of mobile users. In order to provide a high-performance mobile system, three main fields must be improved: radio, network, and operation and management. In particular, operation and management capabilities are intended to enable business agility and operational sustainability, where the addition of new services does not imply an excessive increase in capital or operational expenditures. In this context, a set of key-enabled technologies have emerged in order to aid in this field. Concepts such as Software Defined Network (SDN, Network Function Virtualization (NFV and Self-Organized Networks (SON are pushing traditional systems towards the next 5G network generation.This paper presents an overview of the current status of these promising technologies and ongoing works to fulfill the operational and management requirements of mobile infrastructures. This work also details the use cases and the challenges, taking into account not only SDN, NFV, cloud computing and SON but also other paradigms.

  12. The internet of things and the development of network technology in China

    Science.gov (United States)

    Wang, Ruxin; Zhao, Jianzhen; Ma, Hangtong

    2018-04-01

    The English name of the Internet of Things the Internet of Things, referred to as: the IOT. Internet of Things through the pass, radio frequency identification technology, global positioning system technology, real-time acquisition of any monitoring, connectivity, interactive objects or processes, collecting their sound, light, heat, electricity, mechanics, chemistry, biology, the location of a variety of the information you need network access through a variety of possible things and things, objects and people in the Pan-link intelligent perception of items and processes, identification and management. The Internet of Things IntelliSense recognition technology and pervasive computing, ubiquitous network integration application, known as the third wave of the world's information industry development following the computer, the Internet. Not so much the Internet of Things is a network, as Internet of Things services and applications, Internet of Things is also seen as Internet application development. Therefore, the application of innovation is the core of the development of Internet of Things, and 2.0 of the user experience as the core innovation is the soul of Things.

  13. Effect of the social influence on topological properties of user-object bipartite networks

    Science.gov (United States)

    Liu, Jian-Guo; Hu, Zhaolong; Guo, Qiang

    2013-11-01

    Social influence plays an important role in analyzing online users' collective behaviors [Salganik et al., Science 311, 854 (2006)]. However, the effect of the social influence from the viewpoint of theoretical model is missing. In this paper, by taking into account the social influence and users' preferences, we develop a theoretical model to analyze the topological properties of user-object bipartite networks, including the degree distribution, average nearest neighbor degree and the bipartite clustering coefficient, as well as topological properties of the original user-object networks and their unipartite projections. According to the users' preferences and the global ranking effect, we analyze the theoretical results for two benchmark data sets, Amazon and Bookcrossing, which are approximately consistent with the empirical results. This work suggests that this model is feasible to analyze topological properties of bipartite networks in terms of the social influence and the users' preferences.

  14. User-led innovations and participation processes: lessons from sustainable energy technologies

    Energy Technology Data Exchange (ETDEWEB)

    Ornetzeder, Michael [ZSI - Centre for Social Innovation, Linke Wienzeile 246, A-1150 Vienna (Austria); Rohracher, Harald [IFF/IFZ - Inter-University Research Centre for Technology, Work and Culture, Schloegelgasse 2, A-8010 Graz (Austria)

    2006-01-01

    In this paper we will pose the question whether a higher level of user participation could be used as a strategy to improve the development and dissemination of sustainable energy technologies. We will especially focus on user-led innovation processes with a high involvement of individual end-users. In our argument we will draw on several case studies in the field of renewable energy technologies-in particular solar collectors and biomass heating systems-and sustainable building technologies. Users in these case studies were involved in the design or planning processes, sometimes in a very selective way and with limited influence, sometimes very active and for quite a long period of time. Especially in the case of renewable energy technologies self-building groups were highly successful and resulted in improved and widely disseminated technologies. Based on the empirical results of our case studies we will critically discuss the potential of user involvement (especially in self-building groups) for the development and promotion of sustainable energy technologies and outline technological and social pre-conditions for the success of such approaches. (author)

  15. User-led innovations and participation processes: lessons from sustainable energy technologies

    International Nuclear Information System (INIS)

    Ornetzeder, Michael; Rohracher, Harald

    2006-01-01

    In this paper we will pose the question whether a higher level of user participation could be used as a strategy to improve the development and dissemination of sustainable energy technologies. We will especially focus on user-led innovation processes with a high involvement of individual end-users. In our argument we will draw on several case studies in the field of renewable energy technologies-in particular solar collectors and biomass heating systems-and sustainable building technologies. Users in these case studies were involved in the design or planning processes, sometimes in a very selective way and with limited influence, sometimes very active and for quite a long period of time. Especially in the case of renewable energy technologies self-building groups were highly successful and resulted in improved and widely disseminated technologies. Based on the empirical results of our case studies we will critically discuss the potential of user involvement (especially in self-building groups) for the development and promotion of sustainable energy technologies and outline technological and social pre-conditions for the success of such approaches

  16. Technologies for Home Networking

    DEFF Research Database (Denmark)

    A broad overview of the home networking field, ranging from wireless technologies to practical applications. In the future, it is expected that private networks (e.g. home networks) will become part of the global network ecosystem, participating in sharing their own content, running IP...

  17. Bitcoin Generation using Blockchain Technology

    Directory of Open Access Journals (Sweden)

    Balajee Maram

    2018-04-01

    Full Text Available There are limitations in client-server model of communication. Distributed architecture provides good accessibility to all the nodes in the network. A blockchain technology is follows distributed model. In the digital era, all the transactions are available in the digital form is called a ledger. This ledger belongs to all the users in the network are shared by all the users in the network. Every transaction is monitored and verified by every user in the network. The blockchain is a chain of blocks that contains a collection of transactions. Bitcoin is a cryptocurrency, depends on blockchain technology. The Bitcoins are generated from the mining of a block for the miner. Every user knows about each and every Bitcoin transaction in the blockchain network. The block is immutable, because every block is verified by each customer in the blockchain network. This is the initiation for new trend for security to the digital transactions in the world. This paper presents the logic in the blockchain and Bitcoin generation process using blockchain technology.

  18. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    -domain scenarios is supported by a set of security engines that represent the core of the Federated Identities Management Server, which is also an extension of the Domain Security Server. The Federated Identity Management server allows users to federate their identities or terminate the federation between the service provider and the identity provider. At the service provider web site, the users are offered a list of identity providers to which they can choose to federate their identities. After users federate their identity, they can perform Single Sign-On protocol in an environment of federated domains. The group security system consists of a number of security technologies under a unified architecture, which supports creation of secure groups and execution of secure group transactions and applications in an open networking environment. The system is based on extensions of the GSAKMP standard for group key distribution and management. The Top layer is the Security Infrastructure with the Security Management and Administration System components and protocols that provide security functions common to all secure network applications The Middle layer is the Secure Group Protocols and Applications layer, consisting of the Policy and Group Key Distribution Server and Web-based (thin) Client. The Bottom layer is the supporting Middleware Security Platform, the cryptographic platform already described above. The group security system is designed to perform the functions necessary to create secure groups and enable secure group applications. Specifically, the system can manage group roles, create and disseminate a group security policy, perform authentication and authorization of users using PKI certificates and Web services security, generate group keys, and recover from compromises. In accordance with the GSAKMP standard, the group security system must perform all the required group life-cycle functions: group definition, group establishment, group maintenance, and group removal. The

  19. Creating Profiles from User Network Behavior

    Science.gov (United States)

    2013-09-01

    We varied the m-estimate in Naïve Bayes, m for pruning in Learning Tree, and how many k nearest neighbors to select from in KNN, before settling on the...N. Taft, “The cubicle vs. the coffee shop: behavioral modes in enterprise end-users,” in Proc. of the 9th Int. Conf. on Passive and Active Network

  20. Detection of mobile user location on next generation wireless networks

    DEFF Research Database (Denmark)

    Schou, Saowanee; Olesen, Henning

    2005-01-01

    This paper proposes a novel conceptual mechanism for detecting the location of a mobile user on next generation wireless networks. This mechanism can provide location information of a mobile user at different levels of accuracy, by applying the movement detection mechanism of Mobile IPv6 at both...... macro- and micromobility level. In this scheme, an intradomain mobility management protocol (IDMP) is applied to manage the location of the mobile terminal. The mobile terminal needs two care-of addresses, a global care-of address (GCoA) and a local care-of address (LCoA). The current location...... of a Mobile IPv6 device can be determined by mapping the geographical location information with the two care-of-addresses and the physical address of the access point where the user is connected. Such a mechanism makes location services for mobile entities available on a global IP network. The end-users can...

  1. The embodied user : corporeal awareness & media technology

    NARCIS (Netherlands)

    Haans, A.

    2010-01-01

    Human beings are proficient users of tools and technology. At times, our interactions with a technological artifact appear so effortless, that the distinction between the artifact and the body starts to fade. When operating anthropomorphically designed teleoperation systems, for example, some people

  2. Social Networks as Enablers of Enterprise Creativity: Evidence from Portuguese Firms and Users

    OpenAIRE

    Fernandes, Silvia; Belo, Ana

    2016-01-01

    The present work analyzes the profiles of social networks' users, individuais and enterprises in Algarve (Portugal), having accomplished online questionnaires. Samples of 230 users and 70 firms were collected. According to data obtained there are different behaviors. Users' results highlight the need of harnessing the potential of recruitment and business projects through social networks, as searching for knowledge, communication and professional relations are expressive. Firms' results revea...

  3. The dark side of technologies: technostress among users of information and communication technologies.

    Science.gov (United States)

    Salanova, Marisa; Llorens, Susana; Cifre, Eva

    2013-01-01

    This paper tests the structure and the predictors of two psychological experiences of technostress associated with the use of information and communication technologies (ICT), i.e., technostrain (users report feelings of anxiety, fatigue, scepticism and inefficacy beliefs related to the use of technologies) and technoaddiction (users feel bad due to an excessive and compulsive use of these technologies). The study included a sample of 1072 ICT users (N = 675 nonintensive ICT users and N = 397 intensive ICT users). Results from multigroup confirmatory factor analyses among non-intensive and intensive ICT users showed, as expected, the four-factor structure of technostrain in both samples. Secondly, and also as expected, confirmatory factorial analyses revealed that technostress experiences are characterized not only by technostrain but also by an excessive and compulsive use of ICT. Moreover, multiple analyses of variance showed significant differences between non-intensive and intensive ICT users (1) in the dimensions of technostress and (2) in specific job demands and job/personal resources. Finally, linear multiple regression analyses revealed that technostrain is positively predicted by work overload, role ambiguity, emotional overload, mobbing and obstacles hindering ICT use, as well as by lack of autonomy, transformational leadership, social support, ICT use facilitators and mental competences. Work overload, role ambiguity and mobbing, as well as the lack of emotional competences, positively predict technoaddiction. Theoretical and practical implications, in addition to future research, are discussed.

  4. High-throughput and low-latency 60GHz small-cell network architectures over radio-over-fiber technologies

    Science.gov (United States)

    Pleros, N.; Kalfas, G.; Mitsolidou, C.; Vagionas, C.; Tsiokos, D.; Miliou, A.

    2017-01-01

    Future broadband access networks in the 5G framework will need to be bilateral, exploiting both optical and wireless technologies. This paper deals with new approaches and synergies on radio-over-fiber (RoF) technologies and how those can be leveraged to seamlessly converge wireless technology for agility and mobility with passive optical networks (PON)-based backhauling. The proposed convergence paradigm is based upon a holistic network architecture mixing mm-wave wireless access with photonic integration, dynamic capacity allocation and network coding schemes to enable high bandwidth and low-latency fixed and 60GHz wireless personal area communications for gigabit rate per user, proposing and deploying on top a Medium-Transparent MAC (MT-MAC) protocol as a low-latency bandwidth allocation mechanism. We have evaluated alternative network topologies between the central office (CO) and the access point module (APM) for data rates up to 2.5 Gb/s and SC frequencies up to 60 GHz. Optical network coding is demonstrated for SCM-based signaling to enhance bandwidth utilization and facilitate optical-wireless convergence in 5G applications, reporting medium-transparent network coding directly at the physical layer between end-users communicating over a RoF infrastructure. Towards equipping the physical layer with the appropriate agility to support MT-MAC protocols, a monolithic InP-based Remote Antenna Unit optoelectronic PIC interface is shown that ensures control over the optical resource allocation assisting at the same time broadband wireless service. Finally, the MT-MAC protocol is analysed and simulation and analytical theoretical results are presented that are found to be in good agreement confirming latency values lower than 1msec for small- to mid-load conditions.

  5. End-User Evaluations of Semantic Web Technologies

    Energy Technology Data Exchange (ETDEWEB)

    McCool, Rob; Cowell, Andrew J.; Thurman, David A.

    2005-11-07

    Stanford University's Knowledge Systems Laboratory (KSL) is working in partnership with Battelle Memorial Institute and IBM Watson Research Center to develop a suite of technologies for information extraction, knowledge representation & reasoning, and human-information interaction, in unison entitled 'Knowledge Associates for Novel Intelligence' (KANI). We have developed an integrated analytic environment composed of a collection of analyst associates, software components that aid the user at different stages of the information analysis process. An important part of our participatory design process has been to ensure our technologies and designs are tightly integrate with the needs and requirements of our end users, To this end, we perform a sequence of evaluations towards the end of the development process that ensure the technologies are both functional and usable. This paper reports on that process.

  6. Using home networks to create atmospheres in the home: Technology push or (latent) user need?

    NARCIS (Netherlands)

    Kuiper-Hoyng, L.L.M.L.; Beusmans, J.W.F.

    2004-01-01

    The Atmosphere Controller is an implementation of home networking technology that could make life at home a totally new experience. An atmosphere is created by combining light (intensity and colour), music and wallpaper projection. To find out if is this type of experience fits into everyday life of

  7. Impact of Entertainment Motivational Drivers on User Acceptance of Online Social Network Banner Advertising: A Gratification Perspective

    Directory of Open Access Journals (Sweden)

    Mir Imran Anwar

    2017-05-01

    Full Text Available Social media has phenomenally changed the communication landscape. Particularly social network sites have received enormous popularity and user acceptance globally. The business model of many social network sites is based on advertising. The survival of these social network sites depends on the user acceptance of advertising appearing on these websites. Users usually accept the advertising which is consistent with their motivations for using social network sites. The current study examines the underlying dimensions of entertainment motivation for using social network sites and their impact on user acceptance of social network advertising. Analysis of data from 450 university students show entertainment motivation for using social network sites a multidimensional (SNSs construct consisting of enjoyment, social escapism, relaxation and pass time factors. Furthermore, the results exhibit that SNSs entertainment motivation partially impacts user acceptance of social network advertising.

  8. Involving users in the development of embedded technology in construction

    DEFF Research Database (Denmark)

    Storgaard, Kresten; Buch-Hansen, Thomas Cornelius; Ærenlund, Lærke

    2011-01-01

    Based on a project about user driven innovation and embedded technology in construction (BIIB), the paper discusses methodological issues on user involvement. In the paper especially focus is on the experiences on involving users in collaborative development of scenarios, in the validation...... of scenarios and in developing innovative solutions on a conceptual level. The project discusses 1) concepts of users and 2) methods for collaborative involvement. The first discussion involves presentation of an extended user concept and a discussion of differences between lead users and need-advanced users....... The second discussion on collaborative involvement, discuss experiences with methods for communication across cultural and professional competences with reference to boundary objects, tangible systems and visualization. In the project four segments of situations for use of embedded technology in construction...

  9. Does Sentiment Among Users in Online Social Networks Polarize or Balance Out?

    DEFF Research Database (Denmark)

    Trier, Matthias; Hillmann, Robert

    2017-01-01

    Users express and share sentiments electronically when they communicate within online social network applications. One way to analyze such interdependent data is focusing on the inter-user relationships by applying a sociological perspective based on social network analysis. Existing studies exam...... examined the existence or distribution of sentiments in online communication at a general level or in small observed groups....

  10. Adoption Of Social Networks In Business: Study Of Users And Potential Users In Oman

    OpenAIRE

    Ali H. Al-Badi; Wafa S. Al-Qayoudhi

    2014-01-01

    Web 2.0 technologies have become effective tools in recent years, being used by people everywhere for everything. One of the most effective types of Web 2.0 technology is online social networks. Social networks, like Facebook and Twitter, are being used in communication and for building social capital between people. However, they have become important tools in the business world, and business people have realized that social networks are applicable tools in their daily business tasks. There ...

  11. A Novel User Classification Method for Femtocell Network by Using Affinity Propagation Algorithm and Artificial Neural Network

    Directory of Open Access Journals (Sweden)

    Afaz Uddin Ahmed

    2014-01-01

    Full Text Available An artificial neural network (ANN and affinity propagation (AP algorithm based user categorization technique is presented. The proposed algorithm is designed for closed access femtocell network. ANN is used for user classification process and AP algorithm is used to optimize the ANN training process. AP selects the best possible training samples for faster ANN training cycle. The users are distinguished by using the difference of received signal strength in a multielement femtocell device. A previously developed directive microstrip antenna is used to configure the femtocell device. Simulation results show that, for a particular house pattern, the categorization technique without AP algorithm takes 5 indoor users and 10 outdoor users to attain an error-free operation. While integrating AP algorithm with ANN, the system takes 60% less training samples reducing the training time up to 50%. This procedure makes the femtocell more effective for closed access operation.

  12. A Novel User Classification Method for Femtocell Network by Using Affinity Propagation Algorithm and Artificial Neural Network

    Science.gov (United States)

    Ahmed, Afaz Uddin; Tariqul Islam, Mohammad; Ismail, Mahamod; Kibria, Salehin; Arshad, Haslina

    2014-01-01

    An artificial neural network (ANN) and affinity propagation (AP) algorithm based user categorization technique is presented. The proposed algorithm is designed for closed access femtocell network. ANN is used for user classification process and AP algorithm is used to optimize the ANN training process. AP selects the best possible training samples for faster ANN training cycle. The users are distinguished by using the difference of received signal strength in a multielement femtocell device. A previously developed directive microstrip antenna is used to configure the femtocell device. Simulation results show that, for a particular house pattern, the categorization technique without AP algorithm takes 5 indoor users and 10 outdoor users to attain an error-free operation. While integrating AP algorithm with ANN, the system takes 60% less training samples reducing the training time up to 50%. This procedure makes the femtocell more effective for closed access operation. PMID:25133214

  13. USER PERCEPTION TOWARDS SOCIAL NETWORKING SITES - AN ANALYTICAL APPROACH

    OpenAIRE

    Dr. S. Shanmugapriya; A. Kokila

    2017-01-01

    A social networking site (SNS) or social media is an online platform that people use to build social networks or social relations with other people who share similar personal or career interests, activities, backgrounds or real-life connections. The advent of Social Networking sites and its resources have revolutionized the communication and social relation world. This paper aims to assess the user perception towards SNS like Facebook, Twitter and LinkedIn. In the study data was obtained thro...

  14. Developing a Framework and Implementing User-Driven Innovation in Supply and Value Network

    DEFF Research Database (Denmark)

    Jacobsen, Alexia; Lassen, Astrid Heidemann; Wandahl, Søren

    2011-01-01

    This paper serves to create a framework for and, subsequently, implementing user-driven innovation in a construction material industry network. The research has its outset in Project InnoDoors that consists of a Danish university and a construction material network. The framework and the implemen......This paper serves to create a framework for and, subsequently, implementing user-driven innovation in a construction material industry network. The research has its outset in Project InnoDoors that consists of a Danish university and a construction material network. The framework...

  15. Low-Feedback Opportunistic Scheduling Schemes for Wireless Networks with Heterogenous Users

    KAUST Repository

    Rashid, Faraan

    2012-07-01

    Efficient implementation of resource sharing strategies in a multi-user wireless environment can improve the performance of a network significantly. In this thesis we study various scheduling strategies for wireless networks and handle the problem of opportunistically scheduling transmissions using channel aware schemes. First we propose a scheme that can handle users with asymmetric channel conditions and is opportunistic in the sense that it exploits the multi-user diversity of the network. The scheme requires the users to have a priori knowledge of their channel distributions. The associated overhead is limited meaning it offers reduced feedback load, that does not scale with the increasing number of users. The main technique used to shrink the feedback load is the contention based distributed implementation of a splitting algorithm that does not require explicit feedback to the scheduler from every user. The users find the best among themselves, in a distributed manner, while requiring just a ternary broadcast feedback from the scheduler at the end of each mini-slot. In addition, it can also handle fairness constraints in time and throughput to various degrees. Next we propose another opportunistic scheduler that offers most of the benefits of the previously proposed scheme but is more practical because it can also handle heterogenous users whose channel distributions are unknown. This new scheme actually reduces the complexity and is also more robust for changing traffic patterns. Finally we extend both these schemes to the scenario where there are fixed thresholds, this enables us to handle opportunistic scheduling in practical systems that can only transmit over finite number of discrete rates with the additional benefit that full feedback session, even from the selected user, is never required.

  16. Numerical Representations and User Behaviour in Social Networking Sites

    DEFF Research Database (Denmark)

    Sjöklint, Mimmi; Constantiou, Ioanna; Trier, Matthias

    2013-01-01

    The new technological enhancements and the accessibility to varieties of online applications, enable users to collect personal data and perform self-evaluation through test, comparison and experimentation. The sparked interest in numbers and numbers as self-representative visualisations is promin......The new technological enhancements and the accessibility to varieties of online applications, enable users to collect personal data and perform self-evaluation through test, comparison and experimentation. The sparked interest in numbers and numbers as self-representative visualisations...... theoretical pillars: self-determination theory, heuristic decision making and behavioural economics. A discussion departs from these convictions to investigate user reactions and behaviour when faced with numerical representations in the SNS....

  17. FaceMashup: An End-User Development Tool for Social Network Data

    Directory of Open Access Journals (Sweden)

    Daniele Massa

    2016-03-01

    Full Text Available Every day, each active social network user produces and shares texts, images and videos. While developers can access such data through application programming interfaces (APIs for creating games, visualizations and routines, end users have less control on such information. Their access is mediated by the social application features, which limits them in combining sources, filtering results and performing actions on groups of elements. In order to fill this gap, we introduce FaceMashup, an end user development (EUD environment supporting the manipulation of the Facebook graph. We describe the tool interface, documenting the choices we made during the design iterations. Data types are represented through widgets containing user interface (UI elements similar to those used in the social network application. Widgets can be connected with each other with the drag and drop of their inner fields, and the application updates their content. Finally, we report the results of a user-test on the FaceMashup prototype, which shows a good acceptance of the environment by end-users.

  18. Mobility-Aware User Association in Uplink Cellular Networks

    KAUST Repository

    Arshad, Rabe; Elsawy, Hesham; Sorour, Sameh; Alouini, Mohamed-Slim; Al-Naffouri, Tareq Y.

    2017-01-01

    This letter studies the mobility aware user-to-BS association policies, within a stochastic geometry framework, in two tier uplink cellular networks with fractional channel inversion power control. Particularly, we model the base stations’ locations using the widely accepted poisson point process and obtain the coverage probability and handover cost expressions for the coupled and decoupled uplink and downlink associations. To this end, we compute the average throughput for the mobile users and study the merits and demerits of each association strategy.

  19. Mobility-Aware User Association in Uplink Cellular Networks

    KAUST Repository

    Arshad, Rabe

    2017-07-20

    This letter studies the mobility aware user-to-BS association policies, within a stochastic geometry framework, in two tier uplink cellular networks with fractional channel inversion power control. Particularly, we model the base stations’ locations using the widely accepted poisson point process and obtain the coverage probability and handover cost expressions for the coupled and decoupled uplink and downlink associations. To this end, we compute the average throughput for the mobile users and study the merits and demerits of each association strategy.

  20. User Characteristics、User Involvement and Technology Acceptance in Library Automation System Usage

    Directory of Open Access Journals (Sweden)

    Piching Chu

    2002-12-01

    Full Text Available This paper looks into the relationship of user characteristics, user involvement and technology acceptance, also try to find the relationship of the above three variables and library automation system usage. By interview and questionnaire study, the results are described, according to the analysis of the relative literature and the main conclusions, the researcher offers some suggestions for improving the system usage.[Article content in Chinese

  1. Network Characteristics and the Value of Collaborative User-Generated Content

    OpenAIRE

    Sam Ransbotham; Gerald C. Kane; Nicholas H. Lurie

    2012-01-01

    User-generated content is increasingly created through the collaborative efforts of multiple individuals. In this paper, we argue that the value of collaborative user-generated content is a function both of the direct efforts of its contributors and of its embeddedness in the content-contributor network that creates it. An analysis of Wikipedia's WikiProject Medicine reveals a curvilinear relationship between the number of distinct contributors to user-generated content and viewership. A two-...

  2. An overview of 5G network slicing architecture

    Science.gov (United States)

    Chen, Qiang; Wang, Xiaolei; Lv, Yingying

    2018-05-01

    With the development of mobile communication technology, the traditional single network model has been unable to meet the needs of users, and the demand for differentiated services is increasing. In order to solve this problem, the fifth generation of mobile communication technology came into being, and as one of the key technologies of 5G, network slice is the core technology of network virtualization and software defined network, enabling network slices to flexibly provide one or more network services according to users' needs[1]. Each slice can independently tailor the network functions according to the requirements of the business scene and the traffic model and manage the layout of the corresponding network resources, to improve the flexibility of network services and the utilization of resources, and enhance the robustness and reliability of the whole network [2].

  3. LNS users primer for accessing government sites on the ARPA network. [MIT. -->. ANL, BNL, LBL, and New York Univ. Courant Inst

    Energy Technology Data Exchange (ETDEWEB)

    Kannel, M.

    1979-06-01

    This primer was developed as part of the study conducted by the Laboratory for Nuclear Science (LNS) on the feasibility of networks for computer resource sharing. The primer is an instructinal guide for the LNS user who would like to access and use computers at other government sites on the ARPA network. The format is a series of scenarios of actual recorded on-line terminal sessions' showing the novice user how to access the foreign site, obtain help documentation, run a simple program, and transfer files to and from the foreign site. Access to the ARPA network in these scenarios is via Multics or the Massachusetts Institute of Technology Terminal Interface Processor. The foreign government sites accessed are the computing facilities at Argonne National Laboratory, Brookhaven National Laboratory, Lawrence Livermore Laboratory, and New York University Courant Institute. This technique of auditing actual terminal sessions as a teaching aid can be extended to include other computing facilities as well as other networks.

  4. Discovering the influential users oriented to viral marketing based on online social networks

    Science.gov (United States)

    Zhu, Zhiguo

    2013-08-01

    The target of viral marketing on the platform of popular online social networks is to rapidly propagate marketing information at lower cost and increase sales, in which a key problem is how to precisely discover the most influential users in the process of information diffusion. A novel method is proposed in this paper for helping companies to identify such users as seeds to maximize information diffusion in the viral marketing. Firstly, the user trust network oriented to viral marketing and users’ combined interest degree in the network including isolated users are extensively defined. Next, we construct a model considering the time factor to simulate the process of information diffusion in viral marketing and propose a dynamic algorithm description. Finally, experiments are conducted with a real dataset extracted from the famous SNS website Epinions. The experimental results indicate that the proposed algorithm has better scalability and is less time-consuming. Compared with the classical model, the proposed algorithm achieved a better performance than does the classical method on the two aspects of network coverage rate and time-consumption in our four sub-datasets.

  5. Securing Collaborative Spectrum Sensing against Untrustworthy Secondary Users in Cognitive Radio Networks

    Science.gov (United States)

    Wang, Wenkai; Li, Husheng; Sun, Yan(Lindsay); Han, Zhu

    2009-12-01

    Cognitive radio is a revolutionary paradigm to migrate the spectrum scarcity problem in wireless networks. In cognitive radio networks, collaborative spectrum sensing is considered as an effective method to improve the performance of primary user detection. For current collaborative spectrum sensing schemes, secondary users are usually assumed to report their sensing information honestly. However, compromised nodes can send false sensing information to mislead the system. In this paper, we study the detection of untrustworthy secondary users in cognitive radio networks. We first analyze the case when there is only one compromised node in collaborative spectrum sensing schemes. Then we investigate the scenario that there are multiple compromised nodes. Defense schemes are proposed to detect malicious nodes according to their reporting histories. We calculate the suspicious level of all nodes based on their reports. The reports from nodes with high suspicious levels will be excluded in decision-making. Compared with existing defense methods, the proposed scheme can effectively differentiate malicious nodes and honest nodes. As a result, it can significantly improve the performance of collaborative sensing. For example, when there are 10 secondary users, with the primary user detection rate being equal to 0.99, one malicious user can make the false alarm rate [InlineEquation not available: see fulltext.] increase to 72%. The proposed scheme can reduce it to 5%. Two malicious users can make [InlineEquation not available: see fulltext.] increase to 85% and the proposed scheme reduces it to 8%.

  6. Impaired emotional empathy and related social network deficits in cocaine users.

    Science.gov (United States)

    Preller, Katrin H; Hulka, Lea M; Vonmoos, Matthias; Jenni, Daniela; Baumgartner, Markus R; Seifritz, Erich; Dziobek, Isabel; Quednow, Boris B

    2014-05-01

    Chronic cocaine users consistently display neurochemical and functional alterations in brain areas involved in social cognition (e.g. medial and orbitofrontal cortex). Although social functioning plays a crucial role in the development and treatment of drug dependence, studies investigating social cognition in cocaine users are lacking. Therefore, we investigated mental perspective taking ('theory of mind') and emotional and cognitive empathy in recreational (RCU) and dependent (DCU) cocaine users. Furthermore, we related these measures to real-life indicators of social functioning. One-hundred cocaine users (69 RCU, 31 DCU) and 68 stimulant-naïve healthy controls were tested with the Multifaceted Empathy Test (MET), Movie for the Assessment of Social Cognition (MASC) and Reading the Mind in the Eyes Test (RMET). The Social Network Questionnaire was conducted to assess social network size. Furthermore, participants provided information on committed criminal offenses. RCU and DCU showed less emotional empathy compared to controls (MET), whereas cognitive empathy was not impaired (MET, RMET). Additionally, DCU made more errors in mental perspective taking (MASC). Notably, cocaine users committed more criminal offenses and displayed a smaller social network and higher cocaine use was correlated with less social contacts. Diminished mental perspective taking was tentatively correlated with more intense cocaine use as well. Finally, younger age of onset of cocaine use was associated with more pronounced empathy impairment. In conclusion, social cognition impairments in cocaine users were related to real-life social functioning and should therefore be considered in therapy and prevention strategies. © 2013 Society for the Study of Addiction.

  7. Enhancing the Gaming Experience Using 3D Spatial User Interface Technologies.

    Science.gov (United States)

    Kulshreshth, Arun; Pfeil, Kevin; LaViola, Joseph J

    2017-01-01

    Three-dimensional (3D) spatial user interface technologies have the potential to make games more immersive and engaging and thus provide a better user experience. Although technologies such as stereoscopic 3D display, head tracking, and gesture-based control are available for games, it is still unclear how their use affects gameplay and if there are any user performance benefits. The authors have conducted several experiments on these technologies in game environments to understand how they affect gameplay and how we can use them to optimize the gameplay experience.

  8. Tweeting badges: user motivations for displaying achievement in publicly networked environments.

    Science.gov (United States)

    Kwon, K Hazel; Halavais, Alexander; Havener, Shannon

    2015-02-01

    Badge systems, a common mechanism for gamification on social media platforms, provide a way for users to present their knowledge or experience to others. This study aims to contribute to the understanding of why social media users publicize their achievements in the form of online badges. Five motivational factors for badge display in public networked environments are distinguished-self-efficacy, social incentives, networked support, passing time, and inattentive sharing-and it is suggested that different badge types are associated with different motivations. System developers are advised to consider these components in their designs, applying the elements most appropriate to the communities they serve. Comparing user motivations associated with badges shared across boundaries provides a better understanding of how online badges relate to the larger social media ecosystem.

  9. Insecure Network, Unknown Connection: Understanding Wi-Fi Privacy Assumptions of Mobile Device Users

    OpenAIRE

    Bonné, Bram; Rovelo Ruiz, Gustavo; Quax, Peter; Lamotte, Wim

    2017-01-01

    Smartphones and other mobile devices have proliferated in the past five years. The expectation of mobile device users to always be online has led to Wi-Fi networks being offered by a variety of providers. Using these networks introduces multiple security risks. In this work, we assess to what extent the privacy stance of mobile device users corresponds with their actual behavior by conducting a study with 108 participants. Our methodology consists of monitoring Wi-Fi networks that the partici...

  10. Social networking services: technologies and applications

    OpenAIRE

    Puzyrnyy, Oleksandr

    2011-01-01

    Puzyrnyy, Oleksandr. 2011. Social networking services: technologies and applications. Bachelor's Thesis. Kemi-Tornio University of Applied Sciences. Business and Culture. Pages 52. The aim of this thesis is to describe the concept of social networking, its technological base, business opportunities and future perspectives. The study discovers how social networks are made and which different purposes they might have. In addition, social networking is viewed as a part of business strategy o...

  11. Research information network survey of innovative technology for the earth. 2; Chikyu kankyo taisaku gijutsu no kenkyu joho network chosa. 2

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    In order to construct the information network system for a research of innovative technology for the earth, a prototype has been made. To draw necessary functions for the information network system, an information flow in a general research work is analyzed to classify it based on the functions. The information collecting function, information accumulating and sharing function, special information system for research, information providing function, and communication function of the net work correspond to the collecting information, accumulating information, being engaged in research, providing information, and communication of researcher`s actions, respectively. The services on network system supposed from these functions are the homepage search mailing list, intranet service, special information system for research, WWW Internet broadcasting, and BBS/news/conference tool, respectively. It was found that latest Internet technology enabled to construct easily controlled system environment for users and WWW would develop as a standard communication tool. 2 refs., 26 figs., 27 tabs.

  12. Technological Developments in Networking, Education and Automation

    CERN Document Server

    Elleithy, Khaled; Iskander, Magued; Kapila, Vikram; Karim, Mohammad A; Mahmood, Ausif

    2010-01-01

    "Technological Developments in Networking, Education and Automation" includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the following areas: Computer Networks: Access Technologies, Medium Access Control, Network architectures and Equipment, Optical Networks and Switching, Telecommunication Technology, and Ultra Wideband Communications. Engineering Education and Online Learning: including development of courses and systems for engineering, technical and liberal studies programs; online laboratories; intelligent

  13. Internet user behaviour

    Directory of Open Access Journals (Sweden)

    Radbâță, A.

    2011-01-01

    Full Text Available Internet is a useful tool for everybody in a technologically advanced world. As Internet appears and develops, it creates a totally new network environment. The development of commerce on the Internet based on virtual communities has become one of the most successful business models in the world. After analyzing the concept of internet, the e-commerce market and its marketing mix and the benefits and limitations of the Internet, we have presented a few studies on Internet user behaviour. Furthermore, the paper looks at a representative sample of Romanian internet users. The results reveal that the Romanians are using the Internet especially for information gathering, e-mail, entertainment and social networking.

  14. Full-diversity partial interference cancellation for multi-user wireless relaying networks

    KAUST Repository

    El Astal, M. T O

    2013-12-01

    We focus on the uplink channel of multi-user wireless relaying networks in a coverage extension scenario. The network consists of two users, a single half duplex (HD) relay and a destination, all equipped with multiple antennas. Perfect channel state information (CSI) is assumed to be available exclusively at the receiving nodes (i.e., the relay and the destination) while the users are assumed to be completely blind. The communication through the considered network takes place over two phases. During the first phase, both users send their information concurrently to the relay. The second phase consists of decoding the received data and forwarding it simultaneously to the destination. A transmission scheme that achieves full-diversity under partial interference cancellation (PIC) group decoding is proposed. Unlike many existing schemes, it allows the concurrent transmission in both phases while achieving the full-diversity gain of full time division multiple access (TDMA) transmission regardless of the number of antennas at each node. Numerical comparison with existing schemes in the literature is provided to corroborate our theoretical claims. It is found that our interference cancellation (IC) scheme clearly outperforms existing schemes at the expense of an affordable increase in decoding complexity at both of the relay and destination. © 2013 IEEE.

  15. Full-diversity partial interference cancellation for multi-user wireless relaying networks

    KAUST Repository

    El Astal, M. T O; Ismail, Amr; Alouini, Mohamed-Slim; Olivier, Jan Corné

    2013-01-01

    We focus on the uplink channel of multi-user wireless relaying networks in a coverage extension scenario. The network consists of two users, a single half duplex (HD) relay and a destination, all equipped with multiple antennas. Perfect channel state information (CSI) is assumed to be available exclusively at the receiving nodes (i.e., the relay and the destination) while the users are assumed to be completely blind. The communication through the considered network takes place over two phases. During the first phase, both users send their information concurrently to the relay. The second phase consists of decoding the received data and forwarding it simultaneously to the destination. A transmission scheme that achieves full-diversity under partial interference cancellation (PIC) group decoding is proposed. Unlike many existing schemes, it allows the concurrent transmission in both phases while achieving the full-diversity gain of full time division multiple access (TDMA) transmission regardless of the number of antennas at each node. Numerical comparison with existing schemes in the literature is provided to corroborate our theoretical claims. It is found that our interference cancellation (IC) scheme clearly outperforms existing schemes at the expense of an affordable increase in decoding complexity at both of the relay and destination. © 2013 IEEE.

  16. Gigabit Satellite Network for NASA's Advanced Communication Technology Satellite (ACTS)

    Science.gov (United States)

    Hoder, Douglas; Bergamo, Marcos

    1996-01-01

    The advanced communication technology satellite (ACTS) gigabit satellite network provides long-haul point-to-point and point-to-multipoint full-duplex SONET services over NASA's ACTS. at rates up to 622 Mbit/s (SONET OC-12), with signal quality comparable to that obtained with terrestrial fiber networks. Data multiplexing over the satellite is accomplished using time-division multiple access (TDMA) techniques coordinated with the switching and beam hopping facilities provided by ACTS. Transmissions through the satellite are protected with Reed-Solomon encoding. providing virtually error-free transmission under most weather conditions. Unique to the system are a TDMA frame structure and satellite synchronization mechanism that allow: (a) very efficient utilization of the satellite capacity: (b) over-the-satellite dosed-loop synchronization of the network in configurations with up to 64 ground stations: and (c) ground station initial acquisition without collisions with existing signalling or data traffic. The user interfaces are compatible with SONET standards, performing the function of conventional SONET multiplexers and. as such. can be: readily integrated with standard SONET fiber-based terrestrial networks. Management of the network is based upon the simple network management protocol (SNMP). and includes an over-the-satellite signalling network and backup terrestrial internet (IP-based) connectivity. A description of the ground stations is also included.

  17. Networking Technologies and the Rate of Technological Change

    Directory of Open Access Journals (Sweden)

    Charles Mitchell

    2005-12-01

    Full Text Available Network technology is changing rapidly and those adept at ICT analysis need resolve rate of change issues. Developments in networking now are in the direction of heuristic intelligence. Since about 1980, networking techniques have encouraged combining bits of information with imagination cognitively to improve ideas about reality. ICT enterprise projects utilize networking to sustain requisite imagination. Assumptions and misassuptions of project builders are rationally comprehended as networking sustains creative processes. The monopolization of valuable network techniques influences in the direction of esoteric networking. Data presents that substantial knowledge and networking is now occurring globally. As a netaphor, networking

  18. Friend suggestion in social network based on user log

    Science.gov (United States)

    Kaviya, R.; Vanitha, M.; Sumaiya Thaseen, I.; Mangaiyarkarasi, R.

    2017-11-01

    Simple friend recommendation algorithms such as similarity, popularity and social aspects is the basic requirement to be explored to methodically form high-performance social friend recommendation. Suggestion of friends is followed. No tags of character were followed. In the proposed system, we use an algorithm for network correlation-based social friend recommendation (NC-based SFR).It includes user activities like where one lives and works. A new friend recommendation method, based on network correlation, by considering the effect of different social roles. To model the correlation between different networks, we develop a method that aligns these networks through important feature selection. We consider by preserving the network structure for a more better recommendations so that it significantly improves the accuracy for better friend-recommendation.

  19. User-generated content curation with deep convolutional neural networks

    OpenAIRE

    Tous Liesa, Rubén; Wust, Otto; Gómez, Mauro; Poveda, Jonatan; Elena, Marc; Torres Viñals, Jordi; Makni, Mouna; Ayguadé Parra, Eduard

    2016-01-01

    In this paper, we report a work consisting in using deep convolutional neural networks (CNNs) for curating and filtering photos posted by social media users (Instagram and Twitter). The final goal is to facilitate searching and discovering user-generated content (UGC) with potential value for digital marketing tasks. The images are captured in real time and automatically annotated with multiple CNNs. Some of the CNNs perform generic object recognition tasks while others perform what we call v...

  20. CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks.

    Directory of Open Access Journals (Sweden)

    Weirong Cui

    Full Text Available Privacy-preserving profile matching, a challenging task in mobile social networks, is getting more attention in recent years. In this paper, we propose a novel scheme that is based on ciphertext-policy attribute-based encryption to tackle this problem. In our scheme, a user can submit a preference-profile and search for users with matching-profile in decentralized mobile social networks. In this process, no participant's profile and the submitted preference-profile is exposed. Meanwhile, a secure communication channel can be established between the pair of successfully matched users. In contrast to existing related schemes which are mainly based on the secure multi-party computation, our scheme can provide verifiability (both the initiator and any unmatched user cannot cheat each other to pretend to be matched, and requires few interactions among users. We provide thorough security analysis and performance evaluation on our scheme, and show its advantages in terms of security, efficiency and usability over state-of-the-art schemes.

  1. CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks.

    Science.gov (United States)

    Cui, Weirong; Du, Chenglie; Chen, Jinchao

    2016-01-01

    Privacy-preserving profile matching, a challenging task in mobile social networks, is getting more attention in recent years. In this paper, we propose a novel scheme that is based on ciphertext-policy attribute-based encryption to tackle this problem. In our scheme, a user can submit a preference-profile and search for users with matching-profile in decentralized mobile social networks. In this process, no participant's profile and the submitted preference-profile is exposed. Meanwhile, a secure communication channel can be established between the pair of successfully matched users. In contrast to existing related schemes which are mainly based on the secure multi-party computation, our scheme can provide verifiability (both the initiator and any unmatched user cannot cheat each other to pretend to be matched), and requires few interactions among users. We provide thorough security analysis and performance evaluation on our scheme, and show its advantages in terms of security, efficiency and usability over state-of-the-art schemes.

  2. User perceptions regarding sanitation technologies in South Africa

    CSIR Research Space (South Africa)

    Duncker, Louiza C

    2014-09-01

    Full Text Available , misuse/non-use and lack of proper maintenance, therefore placing the sustainability of these sanitation systems in question. Even if the technology was designed and built well, the use of the technology and its acceptance by the user proved to be the most...

  3. Synapse:neural network for predict power consumption: users guide

    Energy Technology Data Exchange (ETDEWEB)

    Muller, C; Mangeas, M; Perrot, N

    1994-08-01

    SYNAPSE is forecasting tool designed to predict power consumption in metropolitan France on the half hour time scale. Some characteristics distinguish this forecasting model from those which already exist. In particular, it is composed of numerous neural networks. The idea for using many neural networks arises from past tests. These tests showed us that a single neural network is not able to solve the problem correctly. From this result, we decided to perform unsupervised classification of the 24 consumption curves. From this classification, six classes appeared, linked with the weekdays: Mondays, Tuesdays, Wednesdays, Thursdays, Fridays, Saturdays, Sundays, holidays and bridge days. For each class and for each half hour, two multilayer perceptrons are built. The two of them forecast the power for one particular half hour, and for a day including one of the determined class. The input of these two network are different: the first one (short time forecasting) includes the powers for the most recent half hour and relative power of the previous day; the second (medium time forecasting) includes only the relative power of the previous day. A process connects the results of every networks and allows one to forecast more than one half-hour in advance. In this process, short time forecasting networks and medium time forecasting networks are used differently. The first kind of neural networks gives good results on the scale of one day. The second one gives good forecasts for the next predicted powers. In this note, the organization of the SYNAPSE program is detailed, and the user`s menu is described. This first version of synapse works and should allow the APC group to evaluate its utility. (authors). 6 refs., 2 appends.

  4. A bridge network maintenance framework for Pareto optimization of stakeholders/users costs

    International Nuclear Information System (INIS)

    Orcesi, Andre D.; Cremona, Christian F.

    2010-01-01

    For managing highway bridges, stakeholders require efficient and practical decision making techniques. In a context of limited bridge management budget, it is crucial to determine the most effective breakdown of financial resources over the different structures of a bridge network. Bridge management systems (BMSs) have been developed for such a purpose. However, they generally rely on an individual approach. The influence of the position of bridges in the transportation network, the consequences of inadequate service for the network users, due to maintenance actions or bridge failure, are not taken into consideration. Therefore, maintenance strategies obtained with current BMSs do not necessarily lead to an optimal level of service (LOS) of the bridge network for the users of the transportation network. Besides, the assessment of the structural performance of highway bridges usually requires the access to the geometrical and mechanical properties of its components. Such information might not be available for all structures in a bridge network for which managers try to schedule and prioritize maintenance strategies. On the contrary, visual inspections are performed regularly and information is generally available for all structures of the bridge network. The objective of this paper is threefold (i) propose an advanced network-level bridge management system considering the position of each bridge in the transportation network, (ii) use information obtained at visual inspections to assess the performance of bridges, and (iii) compare optimal maintenance strategies, obtained with a genetic algorithm, when considering interests of users and bridge owner either separately as conflicting criteria, or simultaneously as a common interest for the whole community. In each case, safety and serviceability aspects are taken into account in the model when determining optimal strategies. The theoretical and numerical developments are applied on a French bridge network.

  5. Walking on a user similarity network towards personalized recommendations.

    Directory of Open Access Journals (Sweden)

    Mingxin Gan

    Full Text Available Personalized recommender systems have been receiving more and more attention in addressing the serious problem of information overload accompanying the rapid evolution of the world-wide-web. Although traditional collaborative filtering approaches based on similarities between users have achieved remarkable success, it has been shown that the existence of popular objects may adversely influence the correct scoring of candidate objects, which lead to unreasonable recommendation results. Meanwhile, recent advances have demonstrated that approaches based on diffusion and random walk processes exhibit superior performance over collaborative filtering methods in both the recommendation accuracy and diversity. Building on these results, we adopt three strategies (power-law adjustment, nearest neighbor, and threshold filtration to adjust a user similarity network from user similarity scores calculated on historical data, and then propose a random walk with restart model on the constructed network to achieve personalized recommendations. We perform cross-validation experiments on two real data sets (MovieLens and Netflix and compare the performance of our method against the existing state-of-the-art methods. Results show that our method outperforms existing methods in not only recommendation accuracy and diversity, but also retrieval performance.

  6. Walking on a user similarity network towards personalized recommendations.

    Science.gov (United States)

    Gan, Mingxin

    2014-01-01

    Personalized recommender systems have been receiving more and more attention in addressing the serious problem of information overload accompanying the rapid evolution of the world-wide-web. Although traditional collaborative filtering approaches based on similarities between users have achieved remarkable success, it has been shown that the existence of popular objects may adversely influence the correct scoring of candidate objects, which lead to unreasonable recommendation results. Meanwhile, recent advances have demonstrated that approaches based on diffusion and random walk processes exhibit superior performance over collaborative filtering methods in both the recommendation accuracy and diversity. Building on these results, we adopt three strategies (power-law adjustment, nearest neighbor, and threshold filtration) to adjust a user similarity network from user similarity scores calculated on historical data, and then propose a random walk with restart model on the constructed network to achieve personalized recommendations. We perform cross-validation experiments on two real data sets (MovieLens and Netflix) and compare the performance of our method against the existing state-of-the-art methods. Results show that our method outperforms existing methods in not only recommendation accuracy and diversity, but also retrieval performance.

  7. Users' attitude towards science and technology database system : INIS user needs survey

    International Nuclear Information System (INIS)

    Fukazawa, Takeyasu; Takahashi, Satoko; Yonezawa, Minoru; Kajiro, Tadashi; Mineo, Yukinobu; Habara, Takako; Komatsubara, Yasutoshi; Hiramatsu, Nobuaki; Habara, Tadashi.

    1995-01-01

    The International Nuclear Information System (INIS) is the world's leading information system on the peaceful use of nuclear energy which is being operated by the International Atomic Energy Agency (IAEA) in collaboration with its member-states and other international organizations. After more than 20 years of the operation of INIS, a user needs survey was conducted with the aim of assisting the INIS Secretariat to decide which way INIS should go. This report describes users' attitude towards that system on the basis of the conclusions drawn from the questionnaires sent out to the users by the Japan Atomic Energy Research Institute, the INIS national center in Japan, in close collaboration with the Japan Information Center of Science and Technology. (author)

  8. Impact of Information and Communication Technology on Information Seeking Behavior of Users in Astronomy and Astrophysics Centers of India: A Survey

    Science.gov (United States)

    Sahu, H. K.; Singh, S. N.

    2010-10-01

    This study is based on a survey designed to determine the Information Seeking Behavior (ISB) of Astronomy and Astrophysics users in India. The main objective of the study is to determine the sources consulted and the general pattern of the information-gathering system of users and the impact of Information and Communication Technology (ICT) on the Astronomy and Astrophysics user's Information Seeking Behavior. It examines various Information and Communication Technology-based resources and methods of access and use. A descriptive sample stratified method has been used and data was collected using a questionnaire as the main tool. The response rate was 72%. Descriptive statistics were also employed and data have been presented in tables and graphs. The study is supported by earlier studies. It shows that Astronomy and Astrophysics users have developed a unique Information Seeking Behavior to carry out their education and research. The vast majority of respondents reported that more information is available from a variety of e-resources. Consequently, they are able to devote more time to seek out relevant information in the current Information and Communication Technology scenario. The study also indicates that respondents use a variety of information resources including e-resources for teaching and research. Books and online databases such as the NASA Astrophysics Data System (ADS) were considered more important as formal sources of information. E-mail and face-to-face communications are used extensively by users as informal sources of information. It also reveals that despite the presence of electronic sources, Astronomy and Astrophysics users are still using printed materials. This study should to help to improve various Information and Communication Technology-based services. It also suggests that GOI should adopt Information and Communication Technology-based Information Centers and Libraries services and recommends a network-based model for Astronomy and

  9. Delay Tolerant Networking with Data Triage Method based on Emergent User Policies for Disaster Information Network System

    Directory of Open Access Journals (Sweden)

    Noriki Uchida

    2014-01-01

    Full Text Available When Disaster Information Network System is considered in local areas that were heavy damaged by the East Japan Great Earthquake in 2011, the resiliency of the network system is one of significant subjects for the restoration of the areas. DTN (Delay Tolerant Network has been focused for the effective methods for such inoperable network circumstances. However, when DTN is applied for the local areas, there are some problems such as message delivery rate and latency because there are fewer roads, cars, and pedestrians than in urban areas. In this paper, we propose the Enhanced Media Coordinate System for its architecture, and Data Triage method by emergent user policies is introduced to improve the QoS in Disaster Information Network System in local areas. In the proposed method, every message is tagged with the priority levels by data types with considering emergent user policies, and the high priority messages are firstly duplicated to transmittable nodes. Then, the experimental results by the GIS map of a Japanese coastal town and the future studies are discussed.

  10. An Optimal Joint User Association and Power Allocation Algorithm for Secrecy Information Transmission in Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Rong Chai

    2017-01-01

    Full Text Available In recent years, heterogeneous radio access technologies have experienced rapid development and gradually achieved effective coordination and integration, resulting in heterogeneous networks (HetNets. In this paper, we consider the downlink secure transmission of HetNets where the information transmission from base stations (BSs to legitimate users is subject to the interception of eavesdroppers. In particular, we stress the problem of joint user association and power allocation of the BSs. To achieve data transmission in a secure and energy efficient manner, we introduce the concept of secrecy energy efficiency which is defined as the ratio of the secrecy transmission rate and power consumption of the BSs and formulate the problem of joint user association and power allocation as an optimization problem which maximizes the joint secrecy energy efficiency of all the BSs under the power constraint of the BSs and the minimum data rate constraint of user equipment (UE. By equivalently transforming the optimization problem into two subproblems, that is, power allocation subproblem and user association subproblem of the BSs, and applying iterative method and Kuhn-Munkres (K-M algorithm to solve the two subproblems, respectively, the optimal user association and power allocation strategies can be obtained. Numerical results demonstrate that the proposed algorithm outperforms previously proposed algorithms.

  11. Insecure Network, Unknown Connection: Understanding Wi-Fi Privacy Assumptions of Mobile Device Users

    Directory of Open Access Journals (Sweden)

    Bram Bonné

    2017-07-01

    Full Text Available Smartphones and other mobile devices have proliferated in the past five years. The expectation of mobile device users to always be online has led to Wi-Fi networks being offered by a variety of providers. Using these networks introduces multiple security risks. In this work, we assess to what extent the privacy stance of mobile device users corresponds with their actual behavior by conducting a study with 108 participants. Our methodology consists of monitoring Wi-Fi networks that the participants’ devices connect to and the connections made by apps on these devices, for a period of 30 days. Afterwards, participants are surveyed about their awareness and privacy sensitiveness. We show that while a higher expertise in computer networks corresponds to more awareness about the connections made by apps, neither this expertise nor the actual privacy stance of the participant translates to better security habits. Moreover, participants in general were unaware about a significant part of connections made by apps on their devices, a matter that is worsened by the fact that one third of Wi-Fi networks that participants connect to do not have any security enabled. Based on our results, we provide recommendations to network providers, developers and users on how to improve Wi-Fi security for mobile devices.

  12. Development of IT-based data communication network technology

    International Nuclear Information System (INIS)

    Hong, Seok Boong; Jeong, K. I.; Yoo, Y. R.

    2010-10-01

    - Developing broadband high-reliability real-time communications technology for NPP - Developing reliability and performance validation technology for communications network - Developing security technology for NPP communications network - Developing field communications network for harsh environment of NPP - International standard registration(Oct. 28, 2009, IEC 61500

  13. User Interface Technology for Formal Specification Development

    Science.gov (United States)

    Lowry, Michael; Philpot, Andrew; Pressburger, Thomas; Underwood, Ian; Lum, Henry, Jr. (Technical Monitor)

    1994-01-01

    Formal specification development and modification are an essential component of the knowledge-based software life cycle. User interface technology is needed to empower end-users to create their own formal specifications. This paper describes the advanced user interface for AMPHION1 a knowledge-based software engineering system that targets scientific subroutine libraries. AMPHION is a generic, domain-independent architecture that is specialized to an application domain through a declarative domain theory. Formal specification development and reuse is made accessible to end-users through an intuitive graphical interface that provides semantic guidance in creating diagrams denoting formal specifications in an application domain. The diagrams also serve to document the specifications. Automatic deductive program synthesis ensures that end-user specifications are correctly implemented. The tables that drive AMPHION's user interface are automatically compiled from a domain theory; portions of the interface can be customized by the end-user. The user interface facilitates formal specification development by hiding syntactic details, such as logical notation. It also turns some of the barriers for end-user specification development associated with strongly typed formal languages into active sources of guidance, without restricting advanced users. The interface is especially suited for specification modification. AMPHION has been applied to the domain of solar system kinematics through the development of a declarative domain theory. Testing over six months with planetary scientists indicates that AMPHION's interactive specification acquisition paradigm enables users to develop, modify, and reuse specifications at least an order of magnitude more rapidly than manual program development.

  14. Visionary network 2030. Technology vision for future distribution network

    International Nuclear Information System (INIS)

    Kumpulainen, L.; Laaksonen, H.; Komulainen, R.

    2006-11-01

    Objective of this research was to create the long term vision of a distribution network technology to be used for the near future rebuild and necessary R and D efforts. Present status of the grid was briefly handled and created scenarios for the operational environment changes and available technology International view was used for getting familiar with the present solutions and future expectations in other countries. Centralised power generation is supposed to form the majority, but also the distributed generation will play more and more important role, which is hard to predict due to the uncertainty of the development of the regulation. Higher reliability and safety in major faults are expected from the future network with the reasonable costs. Impact of the climate change and impregnant using restrictions cause difficulties especially for the overhead lines in the forests. In the rural network also the ageing is the problem. For the urban networks the land usage and environmental issues get more challenging and the network reinforcement is necessary due to the increased use of electricity. As a result several technical solutions are available. Additions to the technology today, several new solutions were introduced. Important solutions in the future network are supposed to be the wide range of underground cable, high degree utilisation of the communication and network automation solutions, considerable shorter protection zones and new layout solution. In a long run the islanding enabled by the distributed energy systems and totally new network structures and solutions based on power electronics are supposed to improve the power quality and profitability. Separate quality classes in network design principally are also supposed to be approved. Getting into the vision needs also the Roadmap project, which coordinates and focuses the development of the industry. So the limited national development resources can be effectively utilised. A coordinated national

  15. Software-Defined Networks as a Stage of the Network Technology Evolution

    Directory of Open Access Journals (Sweden)

    A. A. Krasotin

    2013-01-01

    Full Text Available The authors of the article focus on the concept of a software defined network. In the beginning, the brief historical account is given concerning software defined networks as a scientific concept, its formation and technological and scientific meaning. The software defined network concept is treated in the article not as the final state-of-the-art in networking, but rather as a possible step and direction in the development of a networking paradigm. The article touches on pros and cons as well of the software defined networking and gives an account of possible stages of development of this technology in the context of other technologies, considering its hybrid with MPLS, as an example. OpenFlow protocol constitutes the main part of the article. The authors further discuss various kinds of existing libraries realizing programmable management routines for a software defined network using OpenFlow. All of these libraries provide API for building modular applications for software defined network management. Touching on practical side of implementation the results of comparative tests of throughput and latency, achieved with these libraries are shown.

  16. The Comparison of Attitudes Toward Infidelity and Religious Orientation in Facebook Social Network users and non-users

    Directory of Open Access Journals (Sweden)

    سیدهادی سیدعلی تبار

    2015-12-01

    Full Text Available This study aimed to compare attitudes towards infidelity and religious orientation in users and non-users of Facebook social network. This research was basic in terms of purpose and casual-comparative in terms of data collection. The study population included all married men and women referring to consulting centers of Tehran. A sample of 280 people (109 users an-d 171 non-users were selected through convenience sampling. Attitude toward Infidelity Scale and Religious Orientation Scale were used to collect the data and analyzed with Multivariate Analysis of Variance (MANOVA. Results showed that internal religious orientation (P0.05. This study suggests that using Facebook does not have any impact on attitude toward infidelity singly, but it can cause differences in internal and external religious orientation among Facebook users.

  17. Fiber in access technologies and network convergence: an opportunity for optical integration

    Science.gov (United States)

    Ghiggino, Pierpaolo C.

    2008-11-01

    Broadband networks are among the fastest growing segment in telecom. The initial and still very significant push originated with xDSL technologies and indeed a significant amount of research and development is still occurring in this field with impressive results and allowing for a remarkable use of the installed copper infrastructure way beyond its originally planned bandwidth capabilities. However it is clear that ultimately a more suitable fiber based infrastructure will be needed in order to reduce both operational and network technology costs. Such cost reduction in inevitable as the added value to end users is only related to services and these cannot be priced outside a sensible window, whilst the related bandwidth increase is much more dramatic and its huge variability must be met with little or no cost impact by the network and its operation. Fiber in access has indeed the potential to cope with a huge bandwidth demand for many years to come as its inherent bandwidth capabilities are only just tapped by current service requirements. However the whole technology supply chain must follow in line. In particular optical technology must brace itself to cope with the required much larger deployment and greater cost effectiveness, whilst at the same time deliver performance suitable to the bandwidth increase offered in the longer term by the fiber medium. This paper looks at this issues and debates the opportunities for a new class of optical devices making use of the progress in optical integration

  18. Survey of Promising Technologies for 5G Networks

    Directory of Open Access Journals (Sweden)

    Nam Tuan Le

    2016-01-01

    Full Text Available As an enhancement of cellular networks, the future-generation 5G network can be considered an ultra-high-speed technology. The proposed 5G network might include all types of advanced dominant technologies to provide remarkable services. Consequently, new architectures and service management schemes for different applications of the emerging technologies need to be recommended to solve issues related to data traffic capacity, high data rate, and reliability for ensuring QoS. Cloud computing, Internet of things (IoT, and software-defined networking (SDN have become some of the core technologies for the 5G network. Cloud-based services provide flexible and efficient solutions for information and communications technology by reducing the cost of investing in and managing information technology infrastructure. In terms of functionality, SDN is a promising architecture that decouples control planes and data planes to support programmability, adaptability, and flexibility in ever-changing network architectures. However, IoT combines cloud computing and SDN to achieve greater productivity for evolving technologies in 5G by facilitating interaction between the physical and human world. The major objective of this study provides a lawless vision on comprehensive works related to enabling technologies for the next generation of mobile systems and networks, mainly focusing on 5G mobile communications.

  19. Development of Beam Utilization Technologies and Support for Users

    International Nuclear Information System (INIS)

    Kim, Kyeryung; Jung, Myunghwan; Noh, Yongoh; Lee, Sooyeon; Kim, Hyukwook; Kil, Jaekeun; Lee, Nayoung; Ra, Sekin; Lee, Miejeen; Kim, Sora

    2013-02-01

    The Final goals are to achieve the 2nd goals of the Proton Engineering Frontier Project, development of proton beam utilization technologies, to incubate the potential users, and to develop fundamental technologies. Based on these achievements, we are going to enhance the accelerator utilization and maximize contribution to the local society after accelerator construction completion. For the these goals, we were operating user program reflecting the results of 3rd step planning. We support 38 small projects during 2 years. As results of activation of beam utilization, we acquired 768 users at the end of 2012. We survey proton beam technology proposals, individuals and institutions participation letter of intent through the research of 'Planning of a support program for both basic research by using accelerator and manpower cultivation'. And inaugurated KOPUA (Korea Proton Accelerator User Association) on March 28, 2012 with 152 members. We secured experimental conditions at TR23 and TR103 and reflected in the target room design and operation scenarios via investigate the requirements. Through these requirements, we make a remote sample transfer system, beam regulating system, hot cell and sample transport container. Moreover, we develop proton beam technologies such as in-vivo proton beam irradiation system, comparison of the biological effects for pulse beam and continuous beam, basic experiments for the metal nanopaticle synthesis, research for radioactivatied samples and devices, conceptual design and calculation for neutron source target and calculation of the isotope production yield. Proton accelerator can be utilized in a variety of field, including NT, BT, IT, ST, ET, Nuclear, medical, and some of the user facilities required were constructed through this project, Experience for the construction and operation of these facilities can be reflected to the construction of the rest 8 target room of proton accelerator center

  20. Space Mobile Network: A Near Earth Communication and Navigation Architecture

    Science.gov (United States)

    Israel, Dave J.; Heckler, Greg; Menrad, Robert J.

    2016-01-01

    This paper describes a Space Mobile Network architecture, the result of a recently completed NASA study exploring architectural concepts to produce a vision for the future Near Earth communications and navigation systems. The Space Mobile Network (SMN) incorporates technologies, such as Disruption Tolerant Networking (DTN) and optical communications, and new operations concepts, such as User Initiated Services, to provide user services analogous to a terrestrial smartphone user. The paper will describe the SMN Architecture, envisioned future operations concepts, opportunities for industry and international collaboration and interoperability, and technology development areas and goals.

  1. Modelling Users` Trust in Online Social Networks

    Directory of Open Access Journals (Sweden)

    Iacob Cătoiu

    2014-02-01

    Full Text Available Previous studies (McKnight, Lankton and Tripp, 2011; Liao, Lui and Chen, 2011 have shown the crucial role of trust when choosing to disclose sensitive information online. This is the case of online social networks users, who must disclose a certain amount of personal data in order to gain access to these online services. Taking into account privacy calculus model and the risk/benefit ratio, we propose a model of users’ trust in online social networks with four variables. We have adapted metrics for the purpose of our study and we have assessed their reliability and validity. We use a Partial Least Squares (PLS based structural equation modelling analysis, which validated all our initial assumptions, indicating that our three predictors (privacy concerns, perceived benefits and perceived risks explain 48% of the variation of users’ trust in online social networks, the resulting variable of our study. We also discuss the implications and further research opportunities of our study.

  2. Social Networks and Technology Adoption

    OpenAIRE

    Hogset, Heidi

    2005-01-01

    This study analyzes social network effects on Kenyan smallholders' decision to adopt improved natural resource management techniques. These effects are decomposed into effects from social influence and learning through networks (strong ties), group effects, weak ties effects, informal finance, and conflicts arising from technological externalities, controlling for non-network effects.

  3. A Distributed User Information System

    Science.gov (United States)

    1990-03-01

    NOE08 Department of Computer Science NOVO 8 1990 University of Maryland S College Park, MD 20742 D Abstract Current user information database technology ...Transactions on Computer Systems, May 1988. [So189] K. Sollins. A plan for internet directory services. Technical report, DDN Network Information Center...2424 A Distributed User Information System DTiC Steven D. Miller, Scott Carson, and Leo Mark DELECTE Institute for Advanced Computer Studies and

  4. User research & technology, pt.2

    CERN Document Server

    Greifeneder, Elke

    2011-01-01

    This e-book is Part 2 on the theme "User Research and Technology". The research covers the testing of online digital library resources using various methods. Library and information science as a field is changing and the requirements for top quality research are growing more stringent. This is typical of the experience of other professional fields as they have moved from practitioners advising practitioners to researchers building on past results. This e-book contains 12 papers on this theme.

  5. Building secure network by integrated technology

    International Nuclear Information System (INIS)

    An Dehai; Xu Rongsheng; Liu Baoxu

    2000-01-01

    The author introduces a method which can realize the most powerful network security prevention by the network security integrated technologies such as firewall, realtime monitor, network scanner, Web detection and security, etc

  6. Survey of network and information security technology

    International Nuclear Information System (INIS)

    Liu Baoxu; Wang Xiaozhen

    2007-01-01

    With the rapidly development of the computer network technology and informationize working of our Country, Network and Information Security issues becomes the focal point problem that people shows solicitude for. On the basis analysing security threat and challenge of network information and their developing trend. This paper briefly analyses and discusses the main relatively study direction and content about the theory, technology and practice of Network and Information Security. (authors)

  7. Imagining value, imagining users: academic technology transfer for health innovation.

    Science.gov (United States)

    Miller, Fiona Alice; Sanders, Carrie B; Lehoux, Pascale

    2009-04-01

    Governments have invested heavily in the clinical and economic promise of health innovation and express increasing concern with the efficacy and efficiency of the health innovation system. In considering strategies for 'better' health innovation, policy makers and researchers have taken a particular interest in the work of universities and related public research organizations: How do these organizations identify and transfer promising innovations to market, and do these efforts make best use of public sector investments? We conducted an ethnographic study of technology transfer offices (TTOs) in Ontario and British Columbia, Canada, to consider the place of health and health system imperatives in judgments of value in early-stage health innovation. Our analysis suggests that the valuation process is poorly specified as a set of task-specific judgments. Instead, we argue that technology transfer professionals are active participants in the construction of the innovation and assign value by 'imagining' the end product in its 'context of use'. Oriented as they are to the commercialization of health technology, TTOs understand users primarily as market players. The immediate users of TTOs' efforts are commercial partners (i.e., licensees, investors) who are capable of translating current discoveries into future commodities. The ultimate end users - patients, clinicians, health systems - are the future consumers of the products to be sold. Attention to these proximate and more distal users in the valuation process is a complex and constitutive feature of the work of health technology transfer. At the same time, judgements about individual technologies are made in relation to a broader imperative through which TTOs seek to imagine and construct sustainable innovation systems. Judgments of value are rendered sensible in relation to the logic of valuation for systems of innovation that, in turn, configure users of health innovation in systemic ways.

  8. Efficiency Loss of Mixed Equilibrium Associated with Altruistic Users and Logit-based Stochastic Users in Transportation Network

    Directory of Open Access Journals (Sweden)

    Xiao-Jun Yu

    2014-02-01

    Full Text Available The efficiency loss of mixed equilibrium associated with two categories of users is investigated in this paper. The first category of users are altruistic users (AU who have the same altruism coefficient and try to minimize their own perceived cost that assumed to be a linear combination of selfish com­ponent and altruistic component. The second category of us­ers are Logit-based stochastic users (LSU who choose the route according to the Logit-based stochastic user equilib­rium (SUE principle. The variational inequality (VI model is used to formulate the mixed route choice behaviours associ­ated with AU and LSU. The efficiency loss caused by the two categories of users is analytically derived and the relations to some network parameters are discussed. The numerical tests validate our analytical results. Our result takes the re­sults in the existing literature as its special cases.

  9. Sentiment Polarization and Balance among Users in Online Social Networks

    DEFF Research Database (Denmark)

    Hillmann, Robert; Trier, Matthias

    2012-01-01

    Communication within online social network applications enables users to express and share sentiments electronically. Existing studies examined the existence or distribution of sentiments in online communication at a general level or in small-observed groups. Our paper extends this research...... by analyzing sentiment exchange within social networks from an ego-network perspective. We draw from research on social influence and social attachment to develop theories of node polarization, balance effects and sentiment mirroring within communication dyads. Our empirical analysis covers a multitude...... of social networks in which the sentiment valence of all messages was determined. Subsequently we studied ego-networks of focal actors (ego) and their immediate contacts. Results support our theories and indicate that actors develop polarized sentiments towards individual peers but keep sentiment in balance...

  10. Socio-contextual Network Mining for User Assistance in Web-based Knowledge Gathering Tasks

    Science.gov (United States)

    Rajendran, Balaji; Kombiah, Iyakutti

    Web-based Knowledge Gathering (WKG) is a specialized and complex information seeking task carried out by many users on the web, for their various learning, and decision-making requirements. We construct a contextual semantic structure by observing the actions of the users involved in WKG task, in order to gain an understanding of their task and requirement. We also build a knowledge warehouse in the form of a master Semantic Link Network (SLX) that accommodates and assimilates all the contextual semantic structures. This master SLX, which is a socio-contextual network, is then mined to provide contextual inputs to the current users through their agents. We validated our approach through experiments and analyzed the benefits to the users in terms of resource explorations and the time saved. The results are positive enough to motivate us to implement in a larger scale.

  11. U-Net/SLE: A Java-Based User-Customizable Virtual Network Interface

    Directory of Open Access Journals (Sweden)

    Matt Welsh

    1999-01-01

    Full Text Available We describe U‐Net/SLE (Safe Language Extensions, a user‐level network interface architecture which enables per‐application customization of communication semantics through downloading of user extension applets, implemented as Java classfiles, to the network interface. This architecture permits applications to safely specify code to be executed within the NI on message transmission and reception. By leveraging the existing U‐Net model, applications may implement protocol code at the user level, within the NI, or using some combination of the two. Our current implementation, using the Myricom Myrinet interface and a small Java Virtual Machine subset, allows host communication overhead to be reduced and improves the overlap of communication and computation during protocol processing.

  12. Networking and Information Technology Workforce Study: Final Report

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — This report presents the results of a study of the global Networking and Information Technology NIT workforce undertaken for the Networking and Information...

  13. User-driven Innovation in a Supply and Value Network

    DEFF Research Database (Denmark)

    Cankaya, Alev; Lassen, Astrid Heidemann; Wandahl, Søren

    This article serves to conduct a systematic literary review upon the subject of user driven innovation in a supply and value network. The methodology behind the review is strict, organised, and controlled by peers in order to ensure that most of the relevant theory behind the subject is covered...

  14. A Survey of Key Technology of Network Public Opinion Analysis

    Directory of Open Access Journals (Sweden)

    Li Su Ying

    2016-01-01

    Full Text Available The internet has become an important base for internet users to make comments because of its interactivity and fast dissemination. The outbreak of internet public opinion has become a major risk for network information security. Domestic and foreign researchers had carried out extensive and in-depth study on public opinion. Fruitful results have achieved in the basic theory research and emergency handling and other aspects of public opinion. But research on the public opinion in China is still in the initial stage, the key technology of the public opinion analysis is still as a starting point for in-depth study and discussion.

  15. WHAT ARE USER PERSPECTIVES OF EXOSKELETON TECHNOLOGY? A LITERATURE REVIEW.

    Science.gov (United States)

    Hill, Deborah; Holloway, Catherine Sarah; Morgado Ramirez, Dafne Zuleima; Smitham, Peter; Pappas, Yannis

    2017-01-01

    Exoskeletons are electromechanical devices that are worn by a human operator to increase their physical performance. Several exoskeletons have been developed to restore functional movements, such as walking, for those with paralysis due to neurological impairment. However, existing exoskeletons have limitations with respect to affordability, size, weight, speed, and efficiency, which may reduce their functional application. Therefore, the aim of this scoping review is to collect and narratively synthesize the perspectives of users of exoskeleton technology. A systematic literature search was conducted across several healthcare related online databases. A total of 4,619 articles were identified, of which 51 were selected for full review. Only three studies were identified that met the inclusion criteria. Of these, one showed an incongruence between users' expectations and experiences of device use; another reported perspectives on potential rather than actual device use, ranking design features in order of perceived importance; and the other reported ratings of ease of device use in training. The heterogeneity of studies included within this review, leave the authors unable to suggest consensus as to user perspectives of exoskeleton technology. However, it is apparent that users are able to suggest priorities for exoskeleton design and that users' perspectives of exoskeleton technology might change in response to experience of use. The authors, therefore, suggest that exoskeleton design should be an iterative process, whereby user perspectives are sought, incorporated and refined by tangible experience, to ensure that devices developed are acceptable to and usable by the populations they seek to re-enable.

  16. Extensible router for a quantum key distribution network

    International Nuclear Information System (INIS)

    Zhang Tao; Mo Xiaofan; Han Zhengfu; Guo Guangcan

    2008-01-01

    Building a quantum key distribution network is crucial for practical quantum cryptography. We present a scheme to build a star topology quantum key distribution network based on wavelength division multiplexing which, with current technology, can connect at least a hundred users. With the scheme, a 4-user demonstration network was built up and key exchanges were performed

  17. The Space Mobile Network

    Science.gov (United States)

    Israel, David

    2017-01-01

    The definition and development of the next generation space communications and navigation architecture is underway. The primary goals are to remove communications and navigations constraints from missions and to enable increased autonomy. The Space Mobile Network (SMN) is an architectural concept that includes new technology and operations that will provide flight systems with an similar user experience to terrestrial wireless mobile networks. This talk will describe the SMN and its proposed new features, such as Disruption Tolerant Networking (DTN), optical communications, and User Initiated Services (UIS).

  18. Customizing graphical user interface technology for spacecraft control centers

    Science.gov (United States)

    Beach, Edward; Giancola, Peter; Gibson, Steven; Mahmot, Ronald

    1993-01-01

    The Transportable Payload Operations Control Center (TPOCC) project is applying the latest in graphical user interface technology to the spacecraft control center environment. This project of the Mission Operations Division's (MOD) Control Center Systems Branch (CCSB) at NASA Goddard Space Flight Center (GSFC) has developed an architecture for control centers which makes use of a distributed processing approach and the latest in Unix workstation technology. The TPOCC project is committed to following industry standards and using commercial off-the-shelf (COTS) hardware and software components wherever possible to reduce development costs and to improve operational support. TPOCC's most successful use of commercial software products and standards has been in the development of its graphical user interface. This paper describes TPOCC's successful use and customization of four separate layers of commercial software products to create a flexible and powerful user interface that is uniquely suited to spacecraft monitoring and control.

  19. Distance Learning For Mobile Internet Users

    Directory of Open Access Journals (Sweden)

    Beran NECAT

    2007-04-01

    Full Text Available This paper provides an overview on the current state of art in the field of Distance learning for mobile users. It mentions a large range of technologies, services and approaches that may be used to bring distance learning to mobile internet users. These technologies are supposed to considerably increase innovative e-learning solutions for the next generation. While this definitely appears to be true, I think what is not so clear are the implications for students, and lecturers etc. In this article I first evaluate distributed e-learning technologies. With some of the most vital topics, focusing on adaptive distributed e-learning for Mobile Internet Users (MIUs. I also provide a brief analysis of Broadband Network Services, Collaborative e-Learning Tools and Distributed Virtual Environments, Internet-Based Adaptive Learning Technologies and Personalised Distance Learning. I continue my discussion on to Internet Development Tools (IDTs for Distance Learning Solutions, Learning Technologies for MIUs, Semantic and Web-Based Services for Enriching Learning Interactivity, and Evaluations of Distributed Learning Technologies (DLTs.

  20. Intelligent Multi-Agent Middleware for Ubiquitous Home Networking Environments

    OpenAIRE

    Minwoo Son; Seung-Hun Lee; Dongkyoo Shin; Dongil Shin

    2008-01-01

    The next stage of the home networking environment is supposed to be ubiquitous, where each piece of material is equipped with an RFID (Radio Frequency Identification) tag. To fully support the ubiquitous environment, home networking middleware should be able to recommend home services based on a user-s interests and efficiently manage information on service usage profiles for the users. Therefore, USN (Ubiquitous Sensor Network) technology, which recognizes and manages a ...

  1. Methods and tools in user-centred design for information technology

    CERN Document Server

    Galer, Margaret; Ziegler, J; Galer, Mark

    1992-01-01

    This book is concerned with the development of human factorsinputs to software design. The aim is to create products whichmatch the requirements and characteristics of users and whichoffer usable user interfaces. The HUFIT project - Human Factorsin Information Technology - was carried out within the EuropeanStrategic Programme for Research and Development in InformationTechnology (ESPRIT) with the objective of enhancing the qualityof software design within the European Community. The variety ofactivities undertaken to achieve this goal are reflected in thisbook. It describes human factors know

  2. Combination of Bayesian Network and Overlay Model in User Modeling

    Directory of Open Access Journals (Sweden)

    Loc Nguyen

    2009-12-01

    Full Text Available The core of adaptive system is user model containing personal information such as knowledge, learning styles, goals… which is requisite for learning personalized process. There are many modeling approaches, for example: stereotype, overlay, plan recognition… but they don’t bring out the solid method for reasoning from user model. This paper introduces the statistical method that combines Bayesian network and overlay modeling so that it is able to infer user’s knowledge from evidences collected during user’s learning process.

  3. The Influence of Social Networking Technologies on Female Religious Veil-Wearing Behavior in Iran

    Science.gov (United States)

    Shakiba, Abbas; Kwok, Justin; Montazeri, Mohammad Sadegh

    2014-01-01

    Abstract Social networking technologies can influence attitudes, behaviors, and social norms. Research on this topic has been conducted primarily among early adopters of technology and within the United States. However, it is important to evaluate how social media might affect people's behaviors in international settings, especially among countries with longstanding, government recommended, cultural and religious traditions and behaviors, such as Iran. This study seeks to assess whether Iranian women who have been using social networking technologies for a longer time (compared to those who have recently joined) would be less likely to cover themselves with a veil and be more comfortable publicly displaying pictures of this behavior on Facebook. Iranian females (N=253) were selected through snowball sampling from nongovernmental organizations in November 2011 and asked to complete a survey assessing their use of Facebook, concerns about not wearing a veil in Facebook pictures, and their actual likelihood of wearing a veil. Items were combined to measure lack of interest in wearing a veil. Length of time as a Facebook user was significantly associated with not wearing a veil (b=0.16, pbehavior of wearing a veil (b=−0.45, pSocial networking technologies can affect attitudes and behaviors internationally. We discuss methods of using social media for self-presentation and expression, as well as the difficulties (and importance) of studying use of technologies, such as social media, internationally. PMID:24611768

  4. Examining Engineering & Technology Students' Acceptance of Network Virtualization Technology Using the Technology Acceptance Model

    Science.gov (United States)

    Yousif, Wael K.

    2010-01-01

    This causal and correlational study was designed to extend the Technology Acceptance Model (TAM) and to test its applicability to Valencia Community College (VCC) Engineering and Technology students as the target user group when investigating the factors influencing their decision to adopt and to utilize VMware as the target technology. In…

  5. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.

    Science.gov (United States)

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-07-14

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.

  6. Enabling Communication and Navigation Technologies for Future Near Earth Science Missions

    Science.gov (United States)

    Israel, David J.; Heckler, Gregory; Menrad, Robert; Hudiburg, John; Boroson, Don; Robinson, Bryan; Cornwell, Donald

    2016-01-01

    In 2015, the Earth Regimes Network Evolution Study (ERNESt) proposed an architectural concept and technologies that evolve to enable space science and exploration missions out to the 2040 timeframe. The architectural concept evolves the current instantiations of the Near Earth Network and Space Network with new technologies to provide a global communication and navigation network that provides communication and navigation services to a wide range of space users in the near Earth domain. The technologies included High Rate Optical Communications, Optical Multiple Access (OMA), Delay Tolerant Networking (DTN), User Initiated Services (UIS), and advanced Position, Navigation, and Timing technology. This paper describes the key technologies and their current technology readiness levels. Examples of science missions that could be enabled by the technologies and the projected operational benefits of the architecture concept to missions are also described.

  7. Handbook of social network technologies and applications

    CERN Document Server

    Furht, Borko

    2010-01-01

    Social networking is a concept that has existed for a long time; however, with the explosion of the Internet, social networking has become a tool for people to connect and communicate in ways that were impossible in the past. The recent development of Web 2.0 has provided many new applications, such as Myspace, Facebook, and LinkedIn. The purpose of ""Handbook of Social Networks: Technologies and Applications"" is to provide comprehensive guidelines on the current and future trends in social network technologies and applications in the field of Web-based Social Networks. This handbook includes

  8. An Improved Digital Signature Protocol to Multi-User Broadcast Authentication Based on Elliptic Curve Cryptography in Wireless Sensor Networks (WSNs

    Directory of Open Access Journals (Sweden)

    Hamed Bashirpour

    2018-03-01

    Full Text Available In wireless sensor networks (WSNs, users can use broadcast authentication mechanisms to connect to the target network and disseminate their messages within the network. Since data transfer for sensor networks is wireless, as a result, attackers can easily eavesdrop deployed sensor nodes and the data sent between them or modify the content of eavesdropped data and inject false data into the sensor network. Hence, the implementation of the message authentication mechanisms (in order to avoid changes and injecting messages into the network of wireless sensor networks is essential. In this paper, we present an improved protocol based on elliptic curve cryptography (ECC to accelerate authentication of multi-user message broadcasting. In comparison with previous ECC-based schemes, complexity and computational overhead of proposed scheme is significantly decreased. Also, the proposed scheme supports user anonymity, which is an important property in broadcast authentication schemes for WSNs to preserve user privacy and user untracking.

  9. Investigation of user behavior on social networking sites.

    Science.gov (United States)

    Waheed, Hajra; Anjum, Maria; Rehman, Mariam; Khawaja, Amina

    2017-01-01

    Social networking sites (SNS) are used for social and professional interaction with people. SNS popularity has encouraged researchers to analyze the relationship of activities performed on SNS with user behavior. In doing so, the term "user behavior" is rather used ambiguously with different interpretations, which makes it difficult to identify studies on user behavior in relation to SNS. This phenomenon has encouraged this thorough research on the characteristics of user behavior being discussed in the literature. Therefore, in this study, we aim to identify, analyze, and classify the characteristics associated with user behavior to answer the research questions designed to conduct this research. A mapping study (also called scoping study), which is a type of systematic literature review, is employed to identify potential studies from digital databases through a developed protocol. Thematic analysis is carried out for the classification of user behavior. We identified 116 primary studies for full analysis. This study found seven characteristics associated with behavior that have direct influence on SNS use and nine factors that have an indirect effect. All studies were conducted largely under seven areas that set the context of these studies. Findings show that the research on SNS is still in its early stage. The range of topics covered in the analyzed studies is quite expansive, although the depth in terms of number of studies under each topic is quite limited. This study reports that activities performed on SNS are either associated with user behavior or reflect personality characteristics. The findings of this study could be used by practitioners to evaluate their SNS platforms and develop more user-centered applications. These studies can also help organizations to understand better the needs of their employees.

  10. Investigation of user behavior on social networking sites.

    Directory of Open Access Journals (Sweden)

    Hajra Waheed

    Full Text Available Social networking sites (SNS are used for social and professional interaction with people. SNS popularity has encouraged researchers to analyze the relationship of activities performed on SNS with user behavior. In doing so, the term "user behavior" is rather used ambiguously with different interpretations, which makes it difficult to identify studies on user behavior in relation to SNS. This phenomenon has encouraged this thorough research on the characteristics of user behavior being discussed in the literature. Therefore, in this study, we aim to identify, analyze, and classify the characteristics associated with user behavior to answer the research questions designed to conduct this research. A mapping study (also called scoping study, which is a type of systematic literature review, is employed to identify potential studies from digital databases through a developed protocol. Thematic analysis is carried out for the classification of user behavior. We identified 116 primary studies for full analysis. This study found seven characteristics associated with behavior that have direct influence on SNS use and nine factors that have an indirect effect. All studies were conducted largely under seven areas that set the context of these studies. Findings show that the research on SNS is still in its early stage. The range of topics covered in the analyzed studies is quite expansive, although the depth in terms of number of studies under each topic is quite limited. This study reports that activities performed on SNS are either associated with user behavior or reflect personality characteristics. The findings of this study could be used by practitioners to evaluate their SNS platforms and develop more user-centered applications. These studies can also help organizations to understand better the needs of their employees.

  11. The establishment of heterogeneous networks in performative spaces

    DEFF Research Database (Denmark)

    Suenson, Valinka; Harder, Henrik

    2010-01-01

    This paper presents an empirical research combining the Actor Network Theory with a development of RFID (Radio Frequency Identification) technology for tracking indoor movement behavior. The aim of the paper is to disucss the value of RFID technology as a method for observing heterogeneous networks...... and architecture through this theoretical perspective, it highlights the importance of the user involvement in the performative spaces where materiality becomes an actant on equal terms with the users. This paper discusses the use of RFID technology for tracking indoor movenment behavior as a method for examining...

  12. An Efficient SDN Load Balancing Scheme Based on Variance Analysis for Massive Mobile Users

    Directory of Open Access Journals (Sweden)

    Hong Zhong

    2015-01-01

    Full Text Available In a traditional network, server load balancing is used to satisfy the demand for high data volumes. The technique requires large capital investment while offering poor scalability and flexibility, which difficultly supports highly dynamic workload demands from massive mobile users. To solve these problems, this paper analyses the principle of software-defined networking (SDN and presents a new probabilistic method of load balancing based on variance analysis. The method can be used to dynamically manage traffic flows for supporting massive mobile users in SDN networks. The paper proposes a solution using the OpenFlow virtual switching technology instead of the traditional hardware switching technology. A SDN controller monitors data traffic of each port by means of variance analysis and provides a probability-based selection algorithm to redirect traffic dynamically with the OpenFlow technology. Compared with the existing load balancing methods which were designed to support traditional networks, this solution has lower cost, higher reliability, and greater scalability which satisfy the needs of mobile users.

  13. Dynamic Trust Models between Users over Social Networks

    Science.gov (United States)

    2016-03-30

    SUPPLEMENTARY NOTES 14. ABSTRACT In this project, by focusing on a number of word -of- mouth communication websites, we attempted to...analyzed evolution of trust networks in social media sites from a perspective of mediators. To this end, we proposed two stochastic models that...focusing on a number of word -of- mouth communication websites, we first attempt to construct dynamic trust models between users that enable to explain trust

  14. Validating User Flows to Protect Software Defined Network Environments

    Directory of Open Access Journals (Sweden)

    Ihsan H. Abdulqadder

    2018-01-01

    Full Text Available Software Defined Network is a promising network paradigm which has led to several security threats in SDN applications that involve user flows, switches, and controllers in the network. Threats as spoofing, tampering, information disclosure, Denial of Service, flow table overloading, and so on have been addressed by many researchers. In this paper, we present novel SDN design to solve three security threats: flow table overloading is solved by constructing a star topology-based architecture, unsupervised hashing method mitigates link spoofing attack, and fuzzy classifier combined with L1-ELM running on a neural network for isolating anomaly packets from normal packets. For effective flow migration Discrete-Time Finite-State Markov Chain model is applied. Extensive simulations using OMNeT++ demonstrate the performance of our proposed approach, which is better at preserving holding time than are other state-of-the-art works from the literature.

  15. Using social networking to understand social networks: analysis of a mobile phone closed user group used by a Ghanaian health team.

    Science.gov (United States)

    Kaonga, Nadi Nina; Labrique, Alain; Mechael, Patricia; Akosah, Eric; Ohemeng-Dapaah, Seth; Sakyi Baah, Joseph; Kodie, Richmond; Kanter, Andrew S; Levine, Orin

    2013-04-03

    The network structure of an organization influences how well or poorly an organization communicates and manages its resources. In the Millennium Villages Project site in Bonsaaso, Ghana, a mobile phone closed user group has been introduced for use by the Bonsaaso Millennium Villages Project Health Team and other key individuals. No assessment on the benefits or barriers of the use of the closed user group had been carried out. The purpose of this research was to make the case for the use of social network analysis methods to be applied in health systems research--specifically related to mobile health. This study used mobile phone voice records of, conducted interviews with, and reviewed call journals kept by a mobile phone closed user group consisting of the Bonsaaso Millennium Villages Project Health Team. Social network analysis methodology complemented by a qualitative component was used. Monthly voice data of the closed user group from Airtel Bharti Ghana were analyzed using UCINET and visual depictions of the network were created using NetDraw. Interviews and call journals kept by informants were analyzed using NVivo. The methodology was successful in helping identify effective organizational structure. Members of the Health Management Team were the more central players in the network, rather than the Community Health Nurses (who might have been expected to be central). Social network analysis methodology can be used to determine the most productive structure for an organization or team, identify gaps in communication, identify key actors with greatest influence, and more. In conclusion, this methodology can be a useful analytical tool, especially in the context of mobile health, health services, and operational and managerial research.

  16. Robust Nash Dynamic Game Strategy for User Cooperation Energy Efficiency in Wireless Cellular Networks

    Directory of Open Access Journals (Sweden)

    Shuhuan Wen

    2012-01-01

    Full Text Available Recently, there is an emerging trend of addressing “energy efficiency” aspect of wireless communications. It has been shown that cooperating users relay each other's information to improve data rates. The energy is limited in the wireless cellular network, but the mobile users refuse to relay. This paper presents an approach that encourages user cooperation in order to improve the energy efficiency. The game theory is an efficient method to solve such conflicts. We present a cellular framework in which two mobile users, who desire to communicate with a common base station, may cooperate via decode-and-forward relaying. In the case of imperfect information assumption, cooperative Nash dynamic game is used between the two users' cooperation to tackle the decision making problems: whether to cooperate and how to cooperate in wireless networks. The scheme based on “cooperative game theory” can achieve general pareto-optimal performance for cooperative games, and thus, maximize the entire system payoff while maintaining fairness.

  17. Network Gateway Technology: The Issue of Redundancy towards ...

    African Journals Online (AJOL)

    Everyone connected to the Internet is concerned about two basic things: the availability of network services and the speed of the network. Network gateway redundancy technology falls within these categories and happens to be one of the newest technologies which only few companies, such as mobile companies and ...

  18. Survey of Promising Technologies for 5G Networks

    OpenAIRE

    Le, Nam Tuan; Hossain, Mohammad Arif; Islam, Amirul; Kim, Do-yun; Choi, Young-June; Jang, Yeong Min

    2016-01-01

    As an enhancement of cellular networks, the future-generation 5G network can be considered an ultra-high-speed technology. The proposed 5G network might include all types of advanced dominant technologies to provide remarkable services. Consequently, new architectures and service management schemes for different applications of the emerging technologies need to be recommended to solve issues related to data traffic capacity, high data rate, and reliability for ensuring QoS. Cloud computing, I...

  19. The user's view of commercially available medical technology

    Science.gov (United States)

    Harrison, D. C.

    1975-01-01

    The potential user of new medical equipment for imaging the cardiovascular system is often faced with the problem of deciding whether or not to accept a new piece of equipment or a new technological concept into the practice of cardiology. Considerations for acquiring new medical technology are discussed in some detail. Acquisition of new technology should depend on whether the equipment provides more and relevant clinical data, is for research or for limited use, is properly engineered for patient use, presents information in easily storable and retrievable form, is tested and validated clinically, is fabricated by a reliable manufacturer, is cost effective, and may be readily replaced by a new technology.

  20. User Matching with Relation to the Stable Marriage Problem in Cognitive Radio Networks

    KAUST Repository

    Hamza, Doha R.

    2017-03-20

    We consider a network comprised of multiple primary users (PUs) and multiple secondary users (SUs), where the SUs seek access to a set of orthogonal channels each occupied by one PU. Only one SU is allowed to coexist with a given PU. We propose a distributed matching algorithm to pair the network users, where a Stackelberg game model is assumed for the interaction between the paired PU and SU. The selected secondary is given access in exchange for monetary compensation to the primary. The PU optimizes the interference price it charges to a given SU and the power allocation to maintain communication. The SU optimizes its power demand so as to maximize its utility. Our algorithm provides a unique stable matching. Numerical results indicate the advantage of the proposed algorithm over other reference schemes.

  1. The Visual Web User Interface Design in Augmented Reality Technology

    OpenAIRE

    Chouyin Hsu; Haui-Chih Shiau

    2013-01-01

    Upon the popularity of 3C devices, the visual creatures are all around us, such the online game, touch pad, video and animation. Therefore, the text-based web page will no longer satisfy users. With the popularity of webcam, digital camera, stereoscopic glasses, or head-mounted display, the user interface becomes more visual and multi-dimensional. For the consideration of 3D and visual display in the research of web user interface design, Augmented Reality technology providing the convenient ...

  2. A survey on the wireless sensor network technology

    International Nuclear Information System (INIS)

    Kim, Jae Hee; Jun, Hyeong Seop; Lee, Jae Cheol; Choi, Yoo Rak

    2007-12-01

    Wireless sensor technology is required in the safety inspection for safety-critical unit of nuclear power plant. This report describes wireless sensor technology related with the project named 'Development of a remote care system of NPP components based on the network and safety database'. This report includes contents of methodology and status of sensor network construction, status of zigbee sensor network, problem of security and sensor battery. Energy harvesting technology will be mentioned on the next report

  3. Estimating the Theoretical Value for LAN Network Throughput Based Power Line Communications Technology Under the Homeplug 1.0 Standard

    Directory of Open Access Journals (Sweden)

    Martha Fabiola Contreras Higuera

    2013-06-01

    Full Text Available Power Line Communications (PLC refers to a group of technologies that allow to establish communication processes under the use of the grid as a physical means of transmission. The use of the grid as a physical means of transmission of information is not a new idea. Until a few years ago, the use of PLC had been limited to the implementation of solutions of control, automation and monitoring of sensors; which did not require a high bandwidth for its operation.During the late 1990s due to the new technological developments and the need to implement new alternatives for transfer of information, it was possible to reach speeds on the order of the Mbps, establishing the possibility of making use of the electricity network as a network of access. The current state of technology PLC allows to reach speeds of up to 200Mbps, which has enabled the transformation of the grid in a true network of band wide, capable of supporting data, voice and video provided by a telecommunications operator. The use of PLC-based network adapters allow easily design LANs and broadband communications through the electrical network, making any outlet in a point of connection for the user, without the need for wiring additional to existing ones.  The electrical network is a structure which so far has been exclusively used for the transport of electrical energy. However, it is possible to make use of this network in processes of communication and transmission of information such as: voice, data and video; Bearing in mind that grid had not been designed for this purpose. The performance is without doubt one of the aspects of greatest interest in the global analysis in networks LAN, due to the effect it produces on the end user. Basically, the most common parameters for evaluating the performance of a network are: Throughput, use of the canal and various measures of retardation. In this article is presented a simple analysis of the HomePlug 1.0 standard applied to the

  4. The Models of Applying Online Privacy Literacy Strategies: A Case Study of Instagram Girl Users

    Directory of Open Access Journals (Sweden)

    Abdollah Bicharanlou

    2017-09-01

    Full Text Available Social networks affect remarkably in the lives of virtual space users. These networks like most human relations involve compromising between self-disclosure and privacy protection. A process which is realized through improving privacy and empowering the user at the personal level. This study aimed to assess strategies based on online privacy literacy. In particular, strategies that Instagram young girls users should employ to achieve the optimum level of privacy. For this purpose, firstly the paradox of privacy, benefits and risks of self-disclosure are explained, then according to online privacy literacy, some social and technological strategies are introduced by which users can solve the “paradox of privacy.” In the result section, after describing the main benefits and risks of self-disclosure by girl users, the current models of using these social and technological strategies to solve the mentioned paradox are discussed. The research method is ethnography based on non-collaborative observation of Instagram pages and semi-structured interviews with 20 girl users of social networks.

  5. Non-Contact Plant Growth Measurement Method and System Based on Ubiquitous Sensor Network Technologies

    Directory of Open Access Journals (Sweden)

    Intae Ryoo

    2011-04-01

    Full Text Available This paper proposes a non-contact plant growth measurement system using infrared sensors based on the ubiquitous sensor network (USN technology. The proposed system measures plant growth parameters such as the stem radius of plants using real-time non-contact methods, and generates diameter, cross-sectional area and thickening form of plant stems using this measured data. Non-contact sensors have been used not to cause any damage to plants during measurement of the growth parameters. Once the growth parameters are measured, they are transmitted to a remote server using the sensor network technology and analyzed in the application program server. The analyzed data are then provided for administrators and a group of interested users. The proposed plant growth measurement system has been designed and implemented using fixed-type and rotary-type infrared sensor based measurement methods and devices. Finally, the system performance is compared and verified with the measurement data that have been obtained by practical field experiments.

  6. A Cloud-User Protocol Based on Ciphertext Watermarking Technology

    Directory of Open Access Journals (Sweden)

    Keyang Liu

    2017-01-01

    Full Text Available With the growth of cloud computing technology, more and more Cloud Service Providers (CSPs begin to provide cloud computing service to users and ask for users’ permission of using their data to improve the quality of service (QoS. Since these data are stored in the form of plain text, they bring about users’ worry for the risk of privacy leakage. However, the existing watermark embedding and encryption technology is not suitable for protecting the Right to Be Forgotten. Hence, we propose a new Cloud-User protocol as a solution for plain text outsourcing problem. We only allow users and CSPs to embed the ciphertext watermark, which is generated and embedded by Trusted Third Party (TTP, into the ciphertext data for transferring. Then, the receiver decrypts it and obtains the watermarked data in plain text. In the arbitration stage, feature extraction and the identity of user will be used to identify the data. The fixed Hamming distance code can help raise the system’s capability for watermarks as much as possible. Extracted watermark can locate the unauthorized distributor and protect the right of honest CSP. The results of experiments demonstrate the security and validity of our protocol.

  7. Autonomous vision networking: miniature wireless sensor networks with imaging technology

    Science.gov (United States)

    Messinger, Gioia; Goldberg, Giora

    2006-09-01

    The recent emergence of integrated PicoRadio technology, the rise of low power, low cost, System-On-Chip (SOC) CMOS imagers, coupled with the fast evolution of networking protocols and digital signal processing (DSP), created a unique opportunity to achieve the goal of deploying large-scale, low cost, intelligent, ultra-low power distributed wireless sensor networks for the visualization of the environment. Of all sensors, vision is the most desired, but its applications in distributed sensor networks have been elusive so far. Not any more. The practicality and viability of ultra-low power vision networking has been proven and its applications are countless, from security, and chemical analysis to industrial monitoring, asset tracking and visual recognition, vision networking represents a truly disruptive technology applicable to many industries. The presentation discusses some of the critical components and technologies necessary to make these networks and products affordable and ubiquitous - specifically PicoRadios, CMOS imagers, imaging DSP, networking and overall wireless sensor network (WSN) system concepts. The paradigm shift, from large, centralized and expensive sensor platforms, to small, low cost, distributed, sensor networks, is possible due to the emergence and convergence of a few innovative technologies. Avaak has developed a vision network that is aided by other sensors such as motion, acoustic and magnetic, and plans to deploy it for use in military and commercial applications. In comparison to other sensors, imagers produce large data files that require pre-processing and a certain level of compression before these are transmitted to a network server, in order to minimize the load on the network. Some of the most innovative chemical detectors currently in development are based on sensors that change color or pattern in the presence of the desired analytes. These changes are easily recorded and analyzed by a CMOS imager and an on-board DSP processor

  8. Network speech systems technology program

    Science.gov (United States)

    Weinstein, C. J.

    1981-09-01

    This report documents work performed during FY 1981 on the DCA-sponsored Network Speech Systems Technology Program. The two areas of work reported are: (1) communication system studies in support of the evolving Defense Switched Network (DSN) and (2) design and implementation of satellite/terrestrial interfaces for the Experimental Integrated Switched Network (EISN). The system studies focus on the development and evaluation of economical and endurable network routing procedures. Satellite/terrestrial interface development includes circuit-switched and packet-switched connections to the experimental wideband satellite network. Efforts in planning and coordination of EISN experiments are reported in detail in a separate EISN Experiment Plan.

  9. Configuring the User as Everybody: Gender and Design in Information and Communication Technologies

    NARCIS (Netherlands)

    Oudshoorn, Nelly E.J.; Rommes, E.W.M.; Stienstra, Marcelle

    2004-01-01

    Based on two case studies of the design of electronic communication networks developed in the public and private sector, this article explores the barriers within current design cultures to account for the needs and diversity of users. Whereas the constraints on user-centered design are usually

  10. 78 FR 17418 - Rural Health Information Technology Network Development Grant

    Science.gov (United States)

    2013-03-21

    ... Information Technology Network Development Grant AGENCY: Health Resources and Services Administration (HRSA...-competitive replacement award under the Rural Health Information Technology Network Development Grant (RHITND... relinquishing its fiduciary responsibilities for the Rural Health Information Technology Network Development...

  11. Uplink Interference Analysis for Two-tier Cellular Networks with Diverse Users under Random Spatial Patterns

    OpenAIRE

    Bao, Wei; Liang, Ben

    2013-01-01

    Multi-tier architecture improves the spatial reuse of radio spectrum in cellular networks, but it introduces complicated heterogeneity in the spatial distribution of transmitters, which brings new challenges in interference analysis. In this work, we present a stochastic geometric model to evaluate the uplink interference in a two-tier network considering multi-type users and base stations. Each type of tier-1 users and tier-2 base stations are modeled as independent homogeneous Poisson point...

  12. Integrating neural network technology and noise analysis

    International Nuclear Information System (INIS)

    Uhrig, R.E.; Oak Ridge National Lab., TN

    1995-01-01

    The integrated use of neural network and noise analysis technologies offers advantages not available by the use of either technology alone. The application of neural network technology to noise analysis offers an opportunity to expand the scope of problems where noise analysis is useful and unique ways in which the integration of these technologies can be used productively. The two-sensor technique, in which the responses of two sensors to an unknown driving source are related, is used to demonstration such integration. The relationship between power spectral densities (PSDs) of accelerometer signals is derived theoretically using noise analysis to demonstrate its uniqueness. This relationship is modeled from experimental data using a neural network when the system is working properly, and the actual PSD of one sensor is compared with the PSD of that sensor predicted by the neural network using the PSD of the other sensor as an input. A significant deviation between the actual and predicted PSDs indicate that system is changing (i.e., failing). Experiments carried out on check values and bearings illustrate the usefulness of the methodology developed. (Author)

  13. Distributed User Selection in Network MIMO Systems with Limited Feedback

    KAUST Repository

    Elkhalil, Khalil; Eltayeb, Mohammed E.; Dahrouj, Hayssam; Al-Naffouri, Tareq Y.

    2015-01-01

    We propose a distributed user selection strategy in a network MIMO setting with M base stations serving K users. Each base station is equipped with L antennas, where LM ≪ K. The conventional selection strategy is based on a well known technique called semi-orthogonal user selection when the zero-forcing beamforming (ZFBF) is adopted. Such technique, however, requires perfect channel state information at the transmitter (CSIT), which might not be available or need large feedback overhead. This paper proposes an alternative distributed user selection technique where each user sets a timer that is inversely proportional to his channel quality indicator (CQI), as a means to reduce the feedback overhead. The proposed strategy allows only the user with the highest CQI to respond with a feedback. Such technique, however, remains collision free only if the transmission time is shorter than the difference between the strongest user timer and the second strongest user timer. To overcome the situation of longer transmission times, the paper proposes another feedback strategy that is based on the theory of compressive sensing, where collision is allowed and all users encode their feedback information and send it back to the base-stations simultaneously. The paper shows that the problem can be formulated as a block sparse recovery problem which is agnostic on the transmission time, which makes it a good alternative to the timer approach when collision is dominant.

  14. Distributed User Selection in Network MIMO Systems with Limited Feedback

    KAUST Repository

    Elkhalil, Khalil

    2015-09-06

    We propose a distributed user selection strategy in a network MIMO setting with M base stations serving K users. Each base station is equipped with L antennas, where LM ≪ K. The conventional selection strategy is based on a well known technique called semi-orthogonal user selection when the zero-forcing beamforming (ZFBF) is adopted. Such technique, however, requires perfect channel state information at the transmitter (CSIT), which might not be available or need large feedback overhead. This paper proposes an alternative distributed user selection technique where each user sets a timer that is inversely proportional to his channel quality indicator (CQI), as a means to reduce the feedback overhead. The proposed strategy allows only the user with the highest CQI to respond with a feedback. Such technique, however, remains collision free only if the transmission time is shorter than the difference between the strongest user timer and the second strongest user timer. To overcome the situation of longer transmission times, the paper proposes another feedback strategy that is based on the theory of compressive sensing, where collision is allowed and all users encode their feedback information and send it back to the base-stations simultaneously. The paper shows that the problem can be formulated as a block sparse recovery problem which is agnostic on the transmission time, which makes it a good alternative to the timer approach when collision is dominant.

  15. Social network members' roles and use of mental health services among drug users in New York City.

    Science.gov (United States)

    Sapra, Katherine J; Crawford, Natalie D; Rudolph, Abby E; Jones, Kandice C; Benjamin, Ebele O; Fuller, Crystal M

    2013-10-01

    Depression is more common among drug users (15-63 %) than the general population (5-16 %). Lack of social support network members may be associated with low mental health service (MHS) use rates observed among drug users. We investigated the relationship between social network members' roles and MHS use among frequent drug users using Social Ties Associated with Risk of Transition into Injection Drug Use data (NYC 2006-2009). Surveys assessed depression, MHS use, demographics, drug use and treatment, and social network members' roles. Participants reporting lifetime depressive episode with start/end dates and information on social/risk network members were included (n = 152). Adjusting for emotional support and HIV status, having one or more informational support network members remained associated with MHS use at last depressive episode (adjusted odds ratio (AOR) 3.37, 95 % confidence interval (CI) 1.38-8.19), as did history of drug treatment (AOR 2.75, 95 % CI 1.02-7.41) and no legal income (AOR 0.23, 95 % CI 0.08-0.64). These data suggest that informational support is associated with MHS utilization among depressed drug users.

  16. Must Invisible Colleges Be Invisible? An Approach to Examining Large Communities of Network Users.

    Science.gov (United States)

    Ruth, Stephen R.; Gouet, Raul

    1993-01-01

    Discussion of characteristics of users of computer-mediated communication systems and scientific networks focuses on a study of the scientific community in Chile. Topics addressed include users and nonusers; productivity; educational level; academic specialty; age; gender; international connectivity; public policy issues; and future research…

  17. Networking Technologies for Future Home Networks Using 60 GHz Radio

    NARCIS (Netherlands)

    Wang, J.

    2010-01-01

    Networking technologies have been changing the life of people in their private residential space. With the arrival of high definition (HD) multimedia services and broadband communications into the living space, future home networks are expected to support high speed device-to-device connectivity

  18. EXPERIMEDIA: Innovate in New Media - a multi-venue experimentation service supporting technology innovation thrugh new forms of social interaction and user experience

    OpenAIRE

    Boniface, M.J.; Modafferi, Stefano; Voulodimos, Athanasios; Salama, David; Murg, Sandra

    2014-01-01

    New media applications and services are revolutionising social interaction and user experience in both society and in wide ranging industry sectors. The rapid emergence of pervasive human and environment sensing technologies, novel immersive presentation devices and high performance, globally connected network and cloud infrastructures is generating huge opportunities for application providers, service provider and content providers. These new applications are driving convergence across devic...

  19. Exploring users motivation in innovation communities

    OpenAIRE

    Ståhlbröst, Anna; Bergvall-Kåreborn, Birgitta

    2011-01-01

    A rapid growth of technologies supporting user interaction on the Internet, such as social networking sites and other virtual communities, can be seen today. These virtual communities have been shown to be of great value to companies that want to involve users in their innovation processes. However, in order to guide organisations on how to utilise their innovation intermediary communities, more knowledge is needed regarding who they are and their motivational drivers for participating in a c...

  20. Impact of Users Identities and Access Conditions on Downlink Performance in Closed Small-Cell Networks

    KAUST Repository

    Radaydeh, Redha; Gaaloul, Fakhreddine; Alouini, Mohamed-Slim

    2015-01-01

    This paper investigates the effect of various operation parameters on the downlink user performance in overlaid small-cell networks. The case study considers closed-access small cells (e.g., femtocells), wherein only active authorized user

  1. A Neural Network Approach to Intention Modeling for User-Adapted Conversational Agents.

    Science.gov (United States)

    Griol, David; Callejas, Zoraida

    2016-01-01

    Spoken dialogue systems have been proposed to enable a more natural and intuitive interaction with the environment and human-computer interfaces. In this contribution, we present a framework based on neural networks that allows modeling of the user's intention during the dialogue and uses this prediction to dynamically adapt the dialogue model of the system taking into consideration the user's needs and preferences. We have evaluated our proposal to develop a user-adapted spoken dialogue system that facilitates tourist information and services and provide a detailed discussion of the positive influence of our proposal in the success of the interaction, the information and services provided, and the quality perceived by the users.

  2. Teknologvurdering, Broer og Brugere (Technology Assessment: Bridges and Users)

    DEFF Research Database (Denmark)

    Munch, Birgitte

    A critique of the scientific approaches grounding Danish technology assessments for beingnon-reflexive upon the consequences of its biased treatment of who and how some countsas ‘users'. Implications and new approaches are outlined in a story of engineering designers conceptualization of ships pa...... passing the Great Belt - the ‘sailing users' - during the constructionof the suspension bridge across the east channel. A story about 'How the Great BeltEast bridge main span got the length of 1624m....

  3. User-centered Technologies For Blind Children

    Directory of Open Access Journals (Sweden)

    Jaime Sánchez

    2008-01-01

    Full Text Available The purpose of this paper is to review, summarize, and illustrate research work involving four audio-based games created within a user-centered design methodology through successive usability tasks and evaluations. These games were designed by considering the mental model of blind children and their styles of interaction to perceive and process data and information. The goal of these games was to enhance the cognitive development of spatial structures, memory, haptic perception, mathematical skills, navigation and orientation, and problem solving of blind children. Findings indicate significant improvements in learning and cognition from using audio-based tools specially tailored for the blind. That is, technologies for blind children, carefully tailored through user-centered design approaches, can make a significant contribution to cognitive development of these children. This paper contributes new insight into the design and implementation of audio-based virtual environments to facilitate learning and cognition in blind children.

  4. Technologies for Elastic Optical Networking Systems in Spatial, Temporal and Spectral Domains

    Science.gov (United States)

    Qin, Chuan

    As the demand for more data capacity keeps increasing, the need for the more efficient use of the data channel becomes more imperative. The fixed wavelength grid which has been in use for more than ten years in conventional wavelength division multiplexing (WDM) is a bottleneck that prevents the capacity from upgrading towards 400 Gb/s and above. A new elastic optical networking scheme where both transceivers and interconnects become flexible break the boundary of wavelength grids and allow a more efficient use of the limited optical bands for communication. This dissertation focuses on a few enabling technologies for elastic optical networking systems. Optical arbitrary waveform generation (OAWG) uses Fourier synthesis and generates user-defined broad-band scalable optical waveforms with high-fidelity through line-by-line full field control of a coherent optical frequency comb. OAWG finds its niche in elastic optical networking since it provides no grids, and scales to user-defined bandwidth. When elastic optical networking builds various connections to use an arbitrary number of subcarriers depending on the users' bandwidth needs, the flexibility also creates non-contiguous spectral fragmentation, much like a computer hard disk generating fragments. Spectral defragmentation aims to re-optimize and re-assign the optical spectrum to achieve more efficient use of the spectrum. One of the technologies is "hop tuning" defragmentation method with a fast auto-tracking local oscillator (LO). In the demonstrated defragmentation experiment, I used a field-programmable gate array (FPGA) to monitor the wavelength change in the signal laser and tune the front and rear current that controls the wavelength of the local oscillator laser. However, the control of the front and rear current needs a complete and accurate calibration of the LO laser and may not apply to a larger number of coherent communication links. A single-tone optical frequency shifter can shift the LO laser

  5. Plans & Policies for Technology in Education: A Compendium. A Technology Leadership Network Special Report.

    Science.gov (United States)

    National School Boards Association, Alexandria, VA. Inst. for the Transfer of Technology to Education.

    This document shows how education leaders nationwide--many of them part of the National School Boards Association's 345-district Technology Leadership Network--have addressed technology-related policy issues such as copyright, purchasing, network/Internet use, and ethics as well as technology planning topics including staff development, classroom…

  6. Upgrade of Spring-8 Beamline Network with Vlan Technology Over Gigabit Ethernet

    OpenAIRE

    Ishii, M.; Fukui, T.; Furukawa, Y.; Nakatani, T.; Ohata, T.; Tanaka, R.

    2001-01-01

    The beamline network system at SPring-8 consists of three LANs; a BL-LAN for beamline component control, a BL-USER-LAN for beamline experimental users and an OA-LAN for the information services. These LANs are interconnected by a firewall system. Since the network traffic and the number of beamlines have increased, we upgraded the backbone of BL-USER-LAN from Fast Ethernet to Gigabit Ethernet. And then, to establish the independency of a beamline and to raise flexibility of every beamline, we...

  7. User Profile Analysis Using an Online Social Network Integrated Quiz Game

    Directory of Open Access Journals (Sweden)

    Yusuf YASLAN

    2017-09-01

    Full Text Available User interest profiling is important for personalized web search, recommendation and retrieval systems. In order to develop a good personalized application one needs to have accurate representation of user profiles. Most of the personalized systems generate interest profiles from user declarations or inferred from cookies or visited web pages. But to achieve a certain result that satisfies the user needs, explicit definition of the user interests is needed. In this paper we propose to obtain interest profiles from a quiz game played by the user where at each play he/she is asked 10 questions from different categories with different difficulty levels. The developed quiz game is integrated to Facebook online social network. By doing so, we had the chance to extract each user’s both explicit Facebook interest profiles and implicit interest profiles from quiz game answers. These profiles are used to extract different features for each user. Both implicit interest profile and explicit interest profile features are evaluated for clustering and interest ranking tasks separately. The experimental results show that the implicit interest profile features have promising results on personalized systems.

  8. 76 FR 58020 - Prescription Drug User Fee Act IV Information Technology Plan

    Science.gov (United States)

    2011-09-19

    ...] Prescription Drug User Fee Act IV Information Technology Plan AGENCY: Food and Drug Administration, HHS. ACTION... information technology (IT) plan entitled ``PDUFA IV Information Technology Plan'' (updated plan) to achieve... Information Technology Plan.'' This plan will meet one of the performance goals agreed to under the 2007...

  9. Secure network for beamline control

    International Nuclear Information System (INIS)

    Ohata, T.; Fukui, T.; Ishii, M.; Furukawa, Y.; Nakatani, T.; Matsushita, T.; Takeuchi, M.; Tanaka, R.; Ishikawa, T.

    2001-01-01

    In SPring-8, beamline control system is constructed with a highly available distributed network system. The socket based communication protocol is used for the beamline control mainly. Beamline users can control the equipment by sending simple control commands to a server process, which is running on a beamline-managing computer (Ohata et al., SPring-8 beamline control system, ICALEPCS'99, Trieste, Italy, 1999). At the beginning the network was based on the shared topology at all beamlines. Consequently, it has a risk for misapplication of the user's program to access different machines on the network system cross over beamlines. It is serious problem for the SPring-8 beamline control system, because all beamlines controlled with unified software interfaces. We introduced the switching technology and the firewalls to support network access control. Also the virtual networking (VLAN: IEEE 802.1Q) and the gigabit Ethernet technology (IEEE 802.3ab) are introduced. Thus the network security and the reliability are guaranteed at the higher level in SPring-8 beamline

  10. Psychological risk factors of addiction to social networking site among Chinese smart phone users

    OpenAIRE

    Wu, Anise M. S.; Cheung, Vivi I.; Ku, L.; Hung, Eva P. W.

    2013-01-01

    Background and aims: Smartphones allow users to access social networking sites (SNSs) whenever and wherever they want. Such easy availability and accessibility may increase their vulnerability to addiction. Based on the social cognitive theory (SCT), we examined the impacts of outcome expectancies, self-efficacy, and impulsivity on young Chinese smartphone users' addictive tendencies toward SNSs. Methods: Two hundred seventy-seven Macau young smartphone users (116 males and 161 females; mean ...

  11. Multilabel user classification using the community structure of online networks.

    Science.gov (United States)

    Rizos, Georgios; Papadopoulos, Symeon; Kompatsiaris, Yiannis

    2017-01-01

    We study the problem of semi-supervised, multi-label user classification of networked data in the online social platform setting. We propose a framework that combines unsupervised community extraction and supervised, community-based feature weighting before training a classifier. We introduce Approximate Regularized Commute-Time Embedding (ARCTE), an algorithm that projects the users of a social graph onto a latent space, but instead of packing the global structure into a matrix of predefined rank, as many spectral and neural representation learning methods do, it extracts local communities for all users in the graph in order to learn a sparse embedding. To this end, we employ an improvement of personalized PageRank algorithms for searching locally in each user's graph structure. Then, we perform supervised community feature weighting in order to boost the importance of highly predictive communities. We assess our method performance on the problem of user classification by performing an extensive comparative study among various recent methods based on graph embeddings. The comparison shows that ARCTE significantly outperforms the competition in almost all cases, achieving up to 35% relative improvement compared to the second best competing method in terms of F1-score.

  12. Multilabel user classification using the community structure of online networks.

    Directory of Open Access Journals (Sweden)

    Georgios Rizos

    Full Text Available We study the problem of semi-supervised, multi-label user classification of networked data in the online social platform setting. We propose a framework that combines unsupervised community extraction and supervised, community-based feature weighting before training a classifier. We introduce Approximate Regularized Commute-Time Embedding (ARCTE, an algorithm that projects the users of a social graph onto a latent space, but instead of packing the global structure into a matrix of predefined rank, as many spectral and neural representation learning methods do, it extracts local communities for all users in the graph in order to learn a sparse embedding. To this end, we employ an improvement of personalized PageRank algorithms for searching locally in each user's graph structure. Then, we perform supervised community feature weighting in order to boost the importance of highly predictive communities. We assess our method performance on the problem of user classification by performing an extensive comparative study among various recent methods based on graph embeddings. The comparison shows that ARCTE significantly outperforms the competition in almost all cases, achieving up to 35% relative improvement compared to the second best competing method in terms of F1-score.

  13. Classifying and profiling Social Networking Site users: a latent segmentation approach.

    Science.gov (United States)

    Alarcón-del-Amo, María-del-Carmen; Lorenzo-Romero, Carlota; Gómez-Borja, Miguel-Ángel

    2011-09-01

    Social Networking Sites (SNSs) have showed an exponential growth in the last years. The first step for an efficient use of SNSs stems from an understanding of the individuals' behaviors within these sites. In this research, we have obtained a typology of SNS users through a latent segmentation approach, based on the frequency by which users perform different activities within the SNSs, sociodemographic variables, experience in SNSs, and dimensions related to their interaction patterns. Four different segments have been obtained. The "introvert" and "novel" users are the more occasional. They utilize SNSs mainly to communicate with friends, although "introverts" are more passive users. The "versatile" user performs different activities, although occasionally. Finally, the "expert-communicator" performs a greater variety of activities with a higher frequency. They tend to perform some marketing-related activities such as commenting on ads or gathering information about products and brands as well as commenting ads. The companies can take advantage of these segmentation schemes in different ways: first, by tracking and monitoring information interchange between users regarding their products and brands. Second, they should match the SNS users' profiles with their market targets to use SNSs as marketing tools. Finally, for most business, the expert users could be interesting opinion leaders and potential brand influencers.

  14. A Collaborative Education Network for Advancing Climate Literacy using Data Visualization Technology

    Science.gov (United States)

    McDougall, C.; Russell, E. L.; Murray, M.; Bendel, W. B.

    2013-12-01

    One of the more difficult issues in engaging broad audiences with scientific research is to present it in a way that is intuitive, captivating and up-to-date. Over the past ten years, the National Oceanic and Atmospheric Administration (NOAA) has made significant progress in this area through Science On a Sphere(R) (SOS). SOS is a room-sized, global display system that uses computers and video projectors to display Earth systems data onto a six-foot diameter sphere, analogous to a giant animated globe. This well-crafted data visualization system serves as a way to integrate and display global change phenomena; including polar ice melt, projected sea level rise, ocean acidification and global climate models. Beyond a display for individual data sets, SOS provides a holistic global perspective that highlights the interconnectedness of Earth systems, nations and communities. SOS is now a featured exhibit at more than 100 science centers, museums, universities, aquariums and other institutions around the world reaching more than 33 million visitors every year. To facilitate the development of how this data visualization technology and these visualizations could be used with public audiences, we recognized the need for the exchange of information among the users. To accomplish this, we established the SOS Users Collaborative Network. This network consists of the institutions that have an SOS system or partners who are creating content and educational programming for SOS. When we began the Network in 2005, many museums had limited capacity to both incorporate real-time, authentic scientific data about the Earth system and interpret global change visualizations. They needed not only the visualization platform and the scientific content, but also assistance with methods of approach. We needed feedback from these users on how to craft understandable visualizations and how to further develop the SOS platform to support learning. Through this Network and the collaboration

  15. Information and communication technology and user knowledge-driven innovation in services

    Directory of Open Access Journals (Sweden)

    Hong Y. Park

    2015-12-01

    Full Text Available User knowledge has been an important source of novel product development and innovation, but gathering accurate user knowledge has been time consuming and difficult because user knowledge is tacit and globally dispersed. However, information and communication technology can expand the boundaries by making user knowledge easier and less expensive to access. Structures and organizations are emerging to perform the task of user information gathering. This paper examines the nature of user knowledge and the emergence of a new system/structure for user knowledge gathering and user involvement in innovation. Three case studies of business innovation in three different organizations illustrate the ways that the organization matches the type of innovation with the characteristics of user knowledge. User involvement can occur either through direct input or via feedback provided after customers received services. User input can also be either proactive or reactive. User knowledge is often employed to monitor service workers also, which has significantly contributed to recent improvement in service quality. The cases presented support our proposition.

  16. Wireless sensor and actuator networks for lighting energy efficiency and user satisfaction

    Science.gov (United States)

    Wen, Yao-Jung

    Buildings consume more than one third of the primary energy generated in the U.S., and lighting alone accounts for approximately 30% of the energy usage in commercial buildings. As the largest electricity consumer of all building electrical systems, lighting harbors the greatest potential for energy savings in the commercial sector. Fifty percent of current energy consumption could be reduced with energy-efficient lighting management strategies. While commercial products do exist, they are poorly received due to exorbitant retrofitting cost and unsatisfactory performance. As a result, most commercial buildings, especially legacy buildings, have not taken advantage of the opportunity to generate savings from lighting. The emergence of wireless sensor and actuator network (WSAN) technologies presents an alternative that circumvents costly rewiring and promises better performance than existing commercial lighting systems. The goal of this dissertation research is to develop a framework for wireless-networked lighting systems with increased cost effectiveness, energy efficiency, and user satisfaction. This research is realized through both theoretical developments and implementations. The theoretical research aims at developing techniques for harnessing WSAN technologies to lighting hardware and control strategies. Leveraging redundancy, a sensor validation and fusion algorithm is developed for extracting pertinent lighting information from the disturbance-prone desktop-mounted photosensors. An adaptive sensing strategy optimizes the timing of data acquisition and power-hungry wireless transmission of sensory feedback in real-time lighting control. Exploiting the individual addressability of wireless-enabled luminaires, a lighting optimization algorithm is developed to create the optimal lighting that minimizes energy usage while satisfying occupants' diverse lighting preferences. The wireless-networked lighting system was implemented and tested in a number of real

  17. Networks dynamics in the case of emerging technologies

    Energy Technology Data Exchange (ETDEWEB)

    Rotolo, D

    2016-07-01

    This research in progress aims at increasing our understanding of how collaborative networks form, evolve and are configured in the case of emerging technologies. The architecture of the relationships among the variety of organisational actors involved in the emergence process exerts a significant influence in shaping technological change in certain directions rather than others, especially in the early stage of emergence. As a result, socially optimal or desirable technological trajectories may be ‘opportunistically’ rejected. Our empirical analysis is based on a case-study of an emerging medical technology, namely ‘microneedles’. On the basis of co-authorship data reported in 1,943 publications on the topic from 1990 to 2014, longitudinal collaboration (co-authorship) networks were built at two levels: affiliation and author. We examined the dynamics of co-authorship networks by building on recent methodological advancements in network analysis, i.e. Exponential Random Graph Models (ERGMs). These models enable us to make statistical inferences about on the extent to which a network configuration occurs more than could be expected by chance and to identify which social mechanisms may be shaping the network in certain configurations. The findings of the statistical analyses (currently in progress) combined with the qualitative understanding of the case will increase our understanding of which mechanisms are more likely to drive the network dynamics in the case of emerging technologies. These include evidence of the extent to which the likelihood of forming, maintaining, or terminating ties among actors (authors or affiliations) is affected by actors’ covariates such as types of organisations, diversity/specialisation of the research undertaken, and status. These findings have potential to provide important inputs for policymaking process in the case of emerging technologies. (Author)

  18. Networks dynamics in the case of emerging technologies

    International Nuclear Information System (INIS)

    Rotolo, D

    2016-01-01

    This research in progress aims at increasing our understanding of how collaborative networks form, evolve and are configured in the case of emerging technologies. The architecture of the relationships among the variety of organisational actors involved in the emergence process exerts a significant influence in shaping technological change in certain directions rather than others, especially in the early stage of emergence. As a result, socially optimal or desirable technological trajectories may be ‘opportunistically’ rejected. Our empirical analysis is based on a case-study of an emerging medical technology, namely ‘microneedles’. On the basis of co-authorship data reported in 1,943 publications on the topic from 1990 to 2014, longitudinal collaboration (co-authorship) networks were built at two levels: affiliation and author. We examined the dynamics of co-authorship networks by building on recent methodological advancements in network analysis, i.e. Exponential Random Graph Models (ERGMs). These models enable us to make statistical inferences about on the extent to which a network configuration occurs more than could be expected by chance and to identify which social mechanisms may be shaping the network in certain configurations. The findings of the statistical analyses (currently in progress) combined with the qualitative understanding of the case will increase our understanding of which mechanisms are more likely to drive the network dynamics in the case of emerging technologies. These include evidence of the extent to which the likelihood of forming, maintaining, or terminating ties among actors (authors or affiliations) is affected by actors’ covariates such as types of organisations, diversity/specialisation of the research undertaken, and status. These findings have potential to provide important inputs for policymaking process in the case of emerging technologies. (Author)

  19. TinCan: User-Defined P2P Virtual Network Overlays for Ad-hoc Collaboration

    Directory of Open Access Journals (Sweden)

    Pierre St Juste

    2014-10-01

    Full Text Available Virtual private networking (VPN has become an increasingly important component of a collaboration environment because it ensures private, authenticated communication among participants, using existing collaboration tools, where users are distributed across multiple institutions and can be mobile. The majority of current VPN solutions are based on a centralized VPN model, where all IP traffic is tunneled through a VPN gateway. Nonetheless, there are several use case scenarios that require a model where end-to-end VPN links are tunneled upon existing Internet infrastructure in a peer-to-peer (P2P fashion, removing the bottleneck of a centralized VPN gateway. We propose a novel virtual network — TinCan — based on peerto-peer private network tunnels. It reuses existing standards and implementations of services for discovery notification (XMPP, reflection (STUN and relaying (TURN, facilitating configuration. In this approach, trust relationships maintained by centralized (or federated services are automatically mapped to TinCan links. In one use scenario, TinCan allows unstructured P2P overlays connecting trusted end-user devices — while only requiring VPN software on user devices and leveraging online social network (OSN infrastructure already widely deployed. This paper describes the architecture and design of TinCan and presents an experimental evaluation of a prototype supporting Windows, Linux, and Android mobile devices. Results quantify the overhead introduced by the network virtualization layer, and the resource requirements imposed on services needed to bootstrap TinCan links.

  20. Multipath TCP for user cooperation in wireless networks

    CERN Document Server

    Zhou, Dizhi

    2014-01-01

    This brief presents several enhancement modules to Multipath Transmission Control Protocol (MPTCP) in order to support stable and efficient multipath transmission with user cooperation in the Long Term Evolution (LTE) network. The text explains how these enhancements provide a stable aggregate throughput to the upper-layer applications; guarantee a steady goodput, which is the real application-layer perceived throughput; and ensure that the local traffic of the relays is not adversely affected when the relays are forwarding data for the destination. The performance of the proposed solutions is extensively evaluated using various scenarios. The simulation results demonstrate that the proposed modules can achieve a stable aggregate throughput and significantly improve the goodput by 1.5 times on average. The brief also shows that these extensions can well respect the local traffic of the relays and motivate the relay users to provide the relaying service.

  1. Computing networks from cluster to cloud computing

    CERN Document Server

    Vicat-Blanc, Pascale; Guillier, Romaric; Soudan, Sebastien

    2013-01-01

    "Computing Networks" explores the core of the new distributed computing infrastructures we are using today:  the networking systems of clusters, grids and clouds. It helps network designers and distributed-application developers and users to better understand the technologies, specificities, constraints and benefits of these different infrastructures' communication systems. Cloud Computing will give the possibility for millions of users to process data anytime, anywhere, while being eco-friendly. In order to deliver this emerging traffic in a timely, cost-efficient, energy-efficient, and

  2. Navigating the massive world of reddit: using backbone networks to map user interests in social media

    Directory of Open Access Journals (Sweden)

    Randal S. Olson

    2015-05-01

    Full Text Available In the massive online worlds of social media, users frequently rely on organizing themselves around specific topics of interest to find and engage with like-minded people. However, navigating these massive worlds and finding topics of specific interest often proves difficult because the worlds are mostly organized haphazardly, leaving users to find relevant interests by word of mouth or using a basic search feature. Here, we report on a method using the backbone of a network to create a map of the primary topics of interest in any social network. To demonstrate the method, we build an interest map for the social news web site reddit and show how such a map could be used to navigate a social media world. Moreover, we analyze the network properties of the reddit social network and find that it has a scale-free, small-world, and modular community structure, much like other online social networks such as Facebook and Twitter. We suggest that the integration of interest maps into popular social media platforms will assist users in organizing themselves into more specific interest groups, which will help alleviate the overcrowding effect often observed in large online communities.

  3. A user exposure based approach for non-structural road network vulnerability analysis.

    Directory of Open Access Journals (Sweden)

    Lei Jin

    Full Text Available Aiming at the dense urban road network vulnerability without structural negative consequences, this paper proposes a novel non-structural road network vulnerability analysis framework. Three aspects of the framework are mainly described: (i the rationality of non-structural road network vulnerability, (ii the metrics for negative consequences accounting for variant road conditions, and (iii the introduction of a new vulnerability index based on user exposure. Based on the proposed methodology, a case study in the Sioux Falls network which was usually threatened by regular heavy snow during wintertime is detailedly discussed. The vulnerability ranking of links of Sioux Falls network with respect to heavy snow scenario is identified. As a result of non-structural consequences accompanied by conceivable degeneration of network, there are significant increases in generalized travel time costs which are measurements for "emotionally hurt" of topological road network.

  4. Evaluation of intersectoral resources in the composition of care networks for crack users

    Directory of Open Access Journals (Sweden)

    Leandro Barbosa de Pinho

    2017-10-01

    Full Text Available Abstract Objective: To evaluate the intersectoral resources in the composition of care networks for crack users. Method: Evaluative, qualitative study based on the Fourth Generation Evaluation. The participants were 10 users, 11 family members, eight workers, and seven managers from a municipality in the metropolitan region of Porto Alegre/Rio Grande do Sul, Brazil. Data were collected in 2014 through observation and semi-structured interviews. The analysis occurred by the constant comparative method. Results: Stakeholders have discussed how the Public Prosecutor's Office and the Military Brigade are inserted in the network, since they carry out actions that often are not compatible with the psychosocial care proposal. The need for expansion and maintenance of liaisons with community resources was identified. Conclusion: It is noted the need for sector integration and participation of all social agents from different spheres in order to promote and evaluate the practices and policies of care for crack users.

  5. Latest Trends in Home Networking Technologies

    Science.gov (United States)

    Tsutsui, Akihiro

    Broadband access service, including FTTH, is now in widespread use in Japan. More than half of the households that have broadband Internet access construct local area networks (home networks) in their homes. In addition, information appliances such as personal computers, networked audio, and visual devices and game machines are connected to home networks, and many novel service applications are provided via the Internet. However, it is still difficult to install and incorporate these devices and services because networked devices have been developed in different communities. I briefly explain the current status of information appliances and home networking technologies and services and discuss some of the problems in this and their solutions.

  6. Configuring the User as Everybody. Gender and Design Cultures in Information and Communication Technologies

    NARCIS (Netherlands)

    Oudshoorn, N.E.J.; Rommes, E.W.M.; Stienstra, M.

    2004-01-01

    Based on two case studies of the design of electronic communication networks developed in the public and private sector, this article explores the barriers within current design cultures to account for the needs and diversity of users. Whereas the constraints on user-centered design are usually

  7. Proceedings of a Conference on Telecommunication Technologies, Networkings and Libraries

    Science.gov (United States)

    Knight, N. K.

    1981-12-01

    Current and developing technologies for digital transmission of image data likely to have an impact on the operations of libraries and information centers or provide support for information networking are reviewed. Technologies reviewed include slow scan television, teleconferencing, and videodisc technology and standards development for computer network interconnection through hardware and software, particularly packet switched networks computer network protocols for library and information service applications, the structure of a national bibliographic telecommunications network; and the major policy issues involved in the regulation or deregulation of the common communications carriers industry.

  8. Design and value of service oriented technologies for smart business networking

    NARCIS (Netherlands)

    Alt, R.; Smits, M.T.; Beverungen, D.; Tuunanen, T.; Wijnhoven, F.

    2014-01-01

    Business networks that effectively use technologies and outperform competing networks are known as smart business networks. Theory hypothesizes that smart business networking requires a ‘Networked Business Operating System’ (NBOS), a technological architecture consisting of business logic, that

  9. User involvement in service delivery predicts outcomes of assistive technology use: A cross-sectional study in Bangladesh

    Directory of Open Access Journals (Sweden)

    Borg Johan

    2012-09-01

    Full Text Available Abstract Background Knowledge about the relation between user involvement in the provision of assistive technology and outcomes of assistive technology use is a prerequisite for the development of efficient service delivery strategies. However, current knowledge is limited, particularly from low-income countries where affordability is an issue. The objective was therefore to explore the relation between outcomes of assistive technology use and user involvement in the service delivery process in Bangladesh. Methods Using structured interviews, data from 136 users of hearing aids and 149 users of manual wheelchairs were collected. Outcomes were measured using the International Outcome Inventory for Hearing Aids (IOI-HA, which was adapted for wheelchair users. Predictors of user involvement included preference, measurement and training. Results Users reported outcomes comparable to those found in other high- and low-income countries. User involvement increased the likelihood for reporting better outcomes except for measurement among hearing aid users. Conclusions The findings support the provision of assistive technology as a strategy to improve the participation of people with disabilities in society. They also support current policies and guidelines for user-involvement in the service delivery process. Simplified strategies for provision of hearing aids may be explored.

  10. Growth Limits in Large Scale Networks

    DEFF Research Database (Denmark)

    Knudsen, Thomas Phillip

    limitations. The rising complexity of network management with the convergence of communications platforms is shown as problematic for both automatic management feasibility and for manpower resource management. In the fourth step the scope is extended to include the present society with the DDN project as its......The Subject of large scale networks is approached from the perspective of the network planner. An analysis of the long term planning problems is presented with the main focus on the changing requirements for large scale networks and the potential problems in meeting these requirements. The problems...... the fundamental technological resources in network technologies are analysed for scalability. Here several technological limits to continued growth are presented. The third step involves a survey of major problems in managing large scale networks given the growth of user requirements and the technological...

  11. Security of social network credentials for accessing course portal: Users' experience

    Science.gov (United States)

    Katuk, Norliza; Fong, Choo Sok; Chun, Koo Lee

    2015-12-01

    Social login (SL) has recently emerged as a solution for single sign-on (SSO) within the web and mobile environments. It allows users to use their existing social network credentials (SNC) to login to third party web applications without the need to create a new identity in the intended applications' database. Although it has been used by many web application providers, its' applicability in accessing learning materials is not yet fully investigated. Hence, this research aims to explore users' (i.e., instructors' and students') perception and experience on the security of SL for accessing learning contents. A course portal was developed for students at a higher learning institution and it provides two types of user authentications (i) traditional user authentication, and (ii) SL facility. Users comprised instructors and students evaluated the login facility of the course portal through a controlled lab experimental study following the within-subject design. The participants provided their feedback in terms of the security of SL for accessing learning contents. The study revealed that users preferred to use SL over the traditional authentication, however, they concerned on the security of SL and their privacy.

  12. Research on the model of home networking

    Science.gov (United States)

    Yun, Xiang; Feng, Xiancheng

    2007-11-01

    It is the research hotspot of current broadband network to combine voice service, data service and broadband audio-video service by IP protocol to transport various real time and mutual services to terminal users (home). Home Networking is a new kind of network and application technology which can provide various services. Home networking is called as Digital Home Network. It means that PC, home entertainment equipment, home appliances, Home wirings, security, illumination system were communicated with each other by some composing network technology, constitute a networking internal home, and connect with WAN by home gateway. It is a new network technology and application technology, and can provide many kinds of services inside home or between homes. Currently, home networking can be divided into three kinds: Information equipment, Home appliances, Communication equipment. Equipment inside home networking can exchange information with outer networking by home gateway, this information communication is bidirectional, user can get information and service which provided by public networking by using home networking internal equipment through home gateway connecting public network, meantime, also can get information and resource to control the internal equipment which provided by home networking internal equipment. Based on the general network model of home networking, there are four functional entities inside home networking: HA, HB, HC, and HD. (1) HA (Home Access) - home networking connects function entity; (2) HB (Home Bridge) Home networking bridge connects function entity; (3) HC (Home Client) - Home networking client function entity; (4) HD (Home Device) - decoder function entity. There are many physical ways to implement four function entities. Based on theses four functional entities, there are reference model of physical layer, reference model of link layer, reference model of IP layer and application reference model of high layer. In the future home network

  13. Network Gateway Technology: The Issue of Redundancy towards ...

    African Journals Online (AJOL)

    The Internet has provided advancement in the areas of network and networking facilities. Everyone connected to the Internet is concerned about two basic things: the availability of network services and the speed of the network. Network gateway redundancy technology falls within these categories and happens to be one of ...

  14. A Topic Space Oriented User Group Discovering Scheme in Social Network: A Trust Chain Based Interest Measuring Perspective

    Directory of Open Access Journals (Sweden)

    Wang Dong

    2016-01-01

    Full Text Available Currently, user group has become an effective platform for information sharing and communicating among users in social network sites. In present work, we propose a single topic user group discovering scheme, which includes three phases: topic impact evaluation, interest degree measurement, and trust chain based discovering, to enable selecting influential topic and discovering users into a topic oriented group. Our main works include (1 an overview of proposed scheme and its related definitions; (2 topic space construction method based on topic relatedness clustering and its impact (influence degree and popularity degree evaluation; (3 a trust chain model to take user relation network topological information into account with a strength classification perspective; (4 an interest degree (user explicit and implicit interest degree evaluation method based on trust chain among users; and (5 a topic space oriented user group discovering method to group core users according to their explicit interest degrees and to predict ordinary users under implicit interest and user trust chain. Finally, experimental results are given to explain effectiveness and feasibility of our scheme.

  15. NSDann2BS, a neutron spectrum unfolding code based on neural networks technology and two bonner spheres

    Energy Technology Data Exchange (ETDEWEB)

    Ortiz-Rodriguez, J. M.; Reyes Alfaro, A.; Reyes Haro, A.; Solis Sanches, L. O.; Miranda, R. Castaneda; Cervantes Viramontes, J. M. [Universidad Autonoma de Zacatecas, Unidad Academica de Ingenieria Electrica. Av. Ramon Lopez Velarde 801. Col. Centro Zacatecas, Zac (Mexico); Vega-Carrillo, H. R. [Universidad Autonoma de Zacatecas, Unidad Academica de Ingenieria Electrica. Av. Ramon Lopez Velarde 801. Col. Centro Zacatecas, Zac., Mexico. and Unidad Academica de Estudios Nucleares. C. Cip (Mexico)

    2013-07-03

    In this work a neutron spectrum unfolding code, based on artificial intelligence technology is presented. The code called ''Neutron Spectrometry and Dosimetry with Artificial Neural Networks and two Bonner spheres'', (NSDann2BS), was designed in a graphical user interface under the LabVIEW programming environment. The main features of this code are to use an embedded artificial neural network architecture optimized with the ''Robust design of artificial neural networks methodology'' and to use two Bonner spheres as the only piece of information. In order to build the code here presented, once the net topology was optimized and properly trained, knowledge stored at synaptic weights was extracted and using a graphical framework build on the LabVIEW programming environment, the NSDann2BS code was designed. This code is friendly, intuitive and easy to use for the end user. The code is freely available upon request to authors. To demonstrate the use of the neural net embedded in the NSDann2BS code, the rate counts of {sup 252}Cf, {sup 241}AmBe and {sup 239}PuBe neutron sources measured with a Bonner spheres system.

  16. NSDann2BS, a neutron spectrum unfolding code based on neural networks technology and two bonner spheres

    International Nuclear Information System (INIS)

    Ortiz-Rodríguez, J. M.; Reyes Alfaro, A.; Reyes Haro, A.; Solís Sánches, L. O.; Miranda, R. Castañeda; Cervantes Viramontes, J. M.; Vega-Carrillo, H. R.

    2013-01-01

    In this work a neutron spectrum unfolding code, based on artificial intelligence technology is presented. The code called ''Neutron Spectrometry and Dosimetry with Artificial Neural Networks and two Bonner spheres'', (NSDann2BS), was designed in a graphical user interface under the LabVIEW programming environment. The main features of this code are to use an embedded artificial neural network architecture optimized with the ''Robust design of artificial neural networks methodology'' and to use two Bonner spheres as the only piece of information. In order to build the code here presented, once the net topology was optimized and properly trained, knowledge stored at synaptic weights was extracted and using a graphical framework build on the LabVIEW programming environment, the NSDann2BS code was designed. This code is friendly, intuitive and easy to use for the end user. The code is freely available upon request to authors. To demonstrate the use of the neural net embedded in the NSDann2BS code, the rate counts of 252 Cf, 241 AmBe and 239 PuBe neutron sources measured with a Bonner spheres system

  17. NSDann2BS, a neutron spectrum unfolding code based on neural networks technology and two bonner spheres

    Science.gov (United States)

    Ortiz-Rodríguez, J. M.; Reyes Alfaro, A.; Reyes Haro, A.; Solís Sánches, L. O.; Miranda, R. Castañeda; Cervantes Viramontes, J. M.; Vega-Carrillo, H. R.

    2013-07-01

    In this work a neutron spectrum unfolding code, based on artificial intelligence technology is presented. The code called "Neutron Spectrometry and Dosimetry with Artificial Neural Networks and two Bonner spheres", (NSDann2BS), was designed in a graphical user interface under the LabVIEW programming environment. The main features of this code are to use an embedded artificial neural network architecture optimized with the "Robust design of artificial neural networks methodology" and to use two Bonner spheres as the only piece of information. In order to build the code here presented, once the net topology was optimized and properly trained, knowledge stored at synaptic weights was extracted and using a graphical framework build on the LabVIEW programming environment, the NSDann2BS code was designed. This code is friendly, intuitive and easy to use for the end user. The code is freely available upon request to authors. To demonstrate the use of the neural net embedded in the NSDann2BS code, the rate counts of 252Cf, 241AmBe and 239PuBe neutron sources measured with a Bonner spheres system.

  18. Social Networks as Enablers of Enterprise Creativity: Evidence from Portuguese Firms and Users

    Directory of Open Access Journals (Sweden)

    Silvia Fernandes

    2016-06-01

    Full Text Available The present work analyzes the profiles of social networks’ users, individuals and enterprises in Algarve (Portugal, having accomplished online questionnaires. Samples of 230 users and 70 firms were collected. According to data obtained there are different behaviors. Users’ results highlight the need of harnessing the potential of recruitment and business projects through social networks, as searching for knowledge, communication and professional relations are expressive. Firms’ results reveal two types of social networks’ use: 1 knowledge search, interact with customers, launch new products; and 2 potential for marketing. Users’ desire of expressing own ideas and being creative had low importance. In social networks they auscultate more about what others are doing than revealing own aspirations. Here firms can act in order to shape users’ attitudes and preferences to their creativity. Thus, enterprises can use the first level of social networks (knowledge and product-customer interaction in order to enhance the second level (marketing and innovation.

  19. Homeplug AV and IEEE 1901 a handbook for PLC designers and users

    CERN Document Server

    Latchman, Haniph A; Yonge, Larry; Gavette, Sherman

    2013-01-01

      The only authorized book explaining the HomePlug networking standards HomePlug is a growing technology for creating high-speed Power Line Communication (PLC) networks by transmitting data over in-home or in-office power lines. Users only need to plug adapters into wall outlets to create an instant network of computers, printers, routers, home entertainment

  20. Unsupervised Scalable Statistical Method for Identifying Influential Users in Online Social Networks.

    Science.gov (United States)

    Azcorra, A; Chiroque, L F; Cuevas, R; Fernández Anta, A; Laniado, H; Lillo, R E; Romo, J; Sguera, C

    2018-05-03

    Billions of users interact intensively every day via Online Social Networks (OSNs) such as Facebook, Twitter, or Google+. This makes OSNs an invaluable source of information, and channel of actuation, for sectors like advertising, marketing, or politics. To get the most of OSNs, analysts need to identify influential users that can be leveraged for promoting products, distributing messages, or improving the image of companies. In this report we propose a new unsupervised method, Massive Unsupervised Outlier Detection (MUOD), based on outliers detection, for providing support in the identification of influential users. MUOD is scalable, and can hence be used in large OSNs. Moreover, it labels the outliers as of shape, magnitude, or amplitude, depending of their features. This allows classifying the outlier users in multiple different classes, which are likely to include different types of influential users. Applying MUOD to a subset of roughly 400 million Google+ users, it has allowed identifying and discriminating automatically sets of outlier users, which present features associated to different definitions of influential users, like capacity to attract engagement, capacity to attract a large number of followers, or high infection capacity.

  1. The dynamics of injection drug users' personal networks and HIV risk behaviors.

    Science.gov (United States)

    Costenbader, Elizabeth C; Astone, Nan M; Latkin, Carl A

    2006-07-01

    While studies of the social networks of injection drug users (IDUs) have provided insight into how the structures of interpersonal relationships among IDUs affect HIV risk behaviors, the majority of these studies have been cross-sectional. The present study examined the dynamics of IDUs' social networks and HIV risk behaviors over time. Using data from a longitudinal HIV-intervention study conducted in Baltimore, MD, this study assessed changes in the composition of the personal networks of 409 IDUs. We used a multi-nomial logistic regression analysis to assess the association between changes in network composition and simultaneous changes in levels of injection HIV risk behaviors. Using the regression parameters generated by the multi-nomial model, we estimated the predicted probability of being in each of four HIV risk behavior change groups. Compared to the base case, individuals who reported an entirely new set of drug-using network contacts at follow-up were more than three times as likely to be in the increasing risk group. In contrast, reporting all new non-drug-using contacts at follow-up increased the likelihood of being in the stable low-risk group by almost 50% and decreased the probability of being in the consistently high-risk group by more than 70%. The findings from this study show that, over and above IDUs' baseline characteristics, changes in their personal networks are associated with changes in individuals' risky injection behaviors. They also suggest that interventions aimed at reducing HIV risk among IDUs might benefit from increasing IDUs' social contacts with individuals who are not drug users.

  2. Information Propagation in Peer-to-Peer Networking : Modeling and Empirical Studies

    NARCIS (Netherlands)

    Tang, S.

    2010-01-01

    Although being a young technology, peer-to-peer (P2P) networking has spurred dramatic evolution on the Internet over the recent twenty years. Unlike traditional server-client mode, P2P networking applications are user-centric. Users (peers) generate their own content and share it with others across

  3. Networked Intimacy. Intimacy and Friendship among Italian Facebook users

    OpenAIRE

    Farci, Manolo; Rossi, Luca; Boccia Artieri, Giovanni; Giglietto, Fabio

    2016-01-01

    In this paper, we describe the results of a qualitative study conducted with 120 Italian Facebook users to investigate how Facebook enables people to achieve a mutually constitutive intimacy with their own friendship network: a negotiation of intimacy in public through self-disclosure, where the affordances of the platform are useful to elicit significant reactions, validations and demonstrations of affection from others. We observed that, in order to achieve various levels of intimacy on Fac...

  4. Managing a User’s Vulnerability on a Social Networking Site

    Science.gov (United States)

    2015-05-01

    aid not only the cyberbullying of teenagers but also the cyberstalking and cyberharassment of adults3. On a social networking site, an individual user...news/2011-07-23-facebook-stalker- sentenced_n.htm 3en.wikipedia.org/wiki/ Cyberbullying 1 posts and subsequent interactions. The owner of the site

  5. The design and implementation of access control management system in IHEP network

    International Nuclear Information System (INIS)

    Wang Yanming; An Dehai; Qi Fazhi

    2010-01-01

    In campus network environment of Institute of High Energy Physics, because of the number of Network devices and computers are large scale, ensuring the access validity of network devices and user's computer, and aiming at effective control the exceptional network communication are technological means to achieve network normal running. The access control system of Campus network of institute of High Energy Physics using MySQL database in the behind, and using CGI PHP HTML language to develop the front interface. The System achieves user information management, user computer access control, cutting down the exceptional network communication and alarm function. Increasing the management effective of network, to ensure campus network safety and reliable running. (authors)

  6. Performance Analysis of Diversity-Controlled Multi-User Superposition Transmission for 5G Wireless Networks.

    Science.gov (United States)

    Yeom, Jeong Seon; Chu, Eunmi; Jung, Bang Chul; Jin, Hu

    2018-02-10

    In this paper, we propose a novel low-complexity multi-user superposition transmission (MUST) technique for 5G downlink networks, which allows multiple cell-edge users to be multiplexed with a single cell-center user. We call the proposed technique diversity-controlled MUST technique since the cell-center user enjoys the frequency diversity effect via signal repetition over multiple orthogonal frequency division multiplexing (OFDM) sub-carriers. We assume that a base station is equipped with a single antenna but users are equipped with multiple antennas. In addition, we assume that the quadrature phase shift keying (QPSK) modulation is used for users. We mathematically analyze the bit error rate (BER) of both cell-edge users and cell-center users, which is the first theoretical result in the literature to the best of our knowledge. The mathematical analysis is validated through extensive link-level simulations.

  7. A Service-Oriented Approach for Dynamic Chaining of Virtual Network Functions over Multi-Provider Software-Defined Networks

    Directory of Open Access Journals (Sweden)

    Barbara Martini

    2016-06-01

    Full Text Available Emerging technologies such as Software-Defined Networks (SDN and Network Function Virtualization (NFV promise to address cost reduction and flexibility in network operation while enabling innovative network service delivery models. However, operational network service delivery solutions still need to be developed that actually exploit these technologies, especially at the multi-provider level. Indeed, the implementation of network functions as software running over a virtualized infrastructure and provisioned on a service basis let one envisage an ecosystem of network services that are dynamically and flexibly assembled by orchestrating Virtual Network Functions even across different provider domains, thereby coping with changeable user and service requirements and context conditions. In this paper we propose an approach that adopts Service-Oriented Architecture (SOA technology-agnostic architectural guidelines in the design of a solution for orchestrating and dynamically chaining Virtual Network Functions. We discuss how SOA, NFV, and SDN may complement each other in realizing dynamic network function chaining through service composition specification, service selection, service delivery, and placement tasks. Then, we describe the architecture of a SOA-inspired NFV orchestrator, which leverages SDN-based network control capabilities to address an effective delivery of elastic chains of Virtual Network Functions. Preliminary results of prototype implementation and testing activities are also presented. The benefits for Network Service Providers are also described that derive from the adaptive network service provisioning in a multi-provider environment through the orchestration of computing and networking services to provide end users with an enhanced service experience.

  8. Continuity of care in the Health Care Network: negotiation between users and professionals

    Directory of Open Access Journals (Sweden)

    Maria Denise Schimith

    2014-12-01

    Full Text Available This study aimed to identify the negotiation and shared decision-making between professionals and users in a Family Health Unit and its influence on the continuity of care in the Health Care Network. Qualitative research created from a case study. One conducted 19 interviews, observation and document research. It was developed in a city in the countryside of Rio Grande do Sul, Brazil, in 2012. The results show that decisions used to happen unilaterally and that users and professionals looked for alternative ways to the continuity of care. It was not possible to identify the negotiation between professional and users and it was noticed that the user was alone looking for access. It is understood that primary care in the city researched needs to take responsibility for users and their access.

  9. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    Science.gov (United States)

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).

  10. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    Full Text Available A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000 model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks.

  11. Mass storage technology in networks

    Science.gov (United States)

    Ishii, Katsunori; Takeda, Toru; Itao, Kiyoshi; Kaneko, Reizo

    1990-08-01

    Trends and features of mass storage subsystems in network are surveyed and their key technologies spotlighted. Storage subsystems are becoming increasingly important in new network systems in which communications and data processing are systematically combined. These systems require a new class of high-performance mass-information storage in order to effectively utilize their processing power. The requirements of high transfer rates, high transactional rates and large storage capacities, coupled with high functionality, fault tolerance and flexibility in configuration, are major challenges in storage subsystems. Recent progress in optical disk technology has resulted in improved performance of on-line external memories to optical disk drives, which are competing with mid-range magnetic disks. Optical disks are more effective than magnetic disks in using low-traffic random-access file storing multimedia data that requires large capacity, such as in archive use and in information distribution use by ROM disks. Finally, it demonstrates image coded document file servers for local area network use that employ 130mm rewritable magneto-optical disk subsystems.

  12. US long distance fiber optic networks: Technology, evolution and advanced concepts. Volume 2: Fiber optic technology and long distance networks

    Science.gov (United States)

    1986-10-01

    The study projects until 2000 the evolution of long distance fiber optic networks in the U.S. Volume 1 is the Executive Summary. Volume 2 focuses on fiber optic components and systems that are directly related to the operation of long-haul networks. Optimistic, pessimistic and most likely scenarios of technology development are presented. The activities of national and regional companies implementing fiber long haul networks are also highlighted, along with an analysis of the market and regulatory forces affecting network evolution. Volume 3 presents advanced fiber optic network concept definitions. Inter-LATA traffic is quantified and forms the basis for the construction of 11-, 15-, 17-, and 23-node networks. Using the technology projections from Volume 2, a financial model identifies cost drivers and determines circuit mile costs between any two LATAs. A comparison of fiber optics with alternative transmission concludes the report.

  13. Optimization in a Networked Economy

    Directory of Open Access Journals (Sweden)

    Ahmet Sekreter

    2017-10-01

    Full Text Available An age of network has been living for the last decades. The information technologies have been used by hundreds of millions of users. These technologies are enabling to connect businesses and economic activities. One of the characteristics of the networked economy is the amount of data that produced due to the interlinking of firms, individuals, processes by businesses, and economic activities. Another issue with the networked economy is the complexity of the data. Extraction of the knowledge from the networked economy has challenges by the traditional approach since data is large scale, second decentralized, and third they connect many heterogeneous agents. The challenges can be overcome by the new optimization methods including human element or the social interactions with technological infrastructure.

  14. Impact of bandwidth for various services in heterogeneous network and quality of service via communication technologies in Malaysian higher educational

    Directory of Open Access Journals (Sweden)

    Mohd Nazri ISMAIL

    2007-12-01

    Full Text Available This study focuses on heterogeneous services and communication technologies for retrieving and sending information between students and lecturers in Malaysian higher educational institutes. It intends to investigate pattern and significant level of various services implementation, convergence of communication technologies and bandwidth capacity for last mile users (students and lecturers. It is designed to determine which communication technologies, services, bandwidth capacity and QoS will achieve the highest level acceptance in Malaysian higher educational institutes. Heterogeneous environment can also generate mobility approaches. A survey method is used to collect data from respondents (System Network Administrator in Malaysian higher educational institutes. Statistical Analysis using t-test shows that implementation of high speed bandwidth for Internet (WAN achieved significant level. Frequency test are used to analyze the various services implementation via convergence of communication technologies in heterogeneous environment for retrieving information. The most apparent finding of this study is that various services implementation in higher educational institutes can affect convergence of communication technologies usage in accessing information over heterogeneous network environment between students and lecturers. The study or analysis confirms that Malaysia higher educational institutes have not achieved a maximum level of various services implementation via convergence of communication technologies between students and lecturers in heterogeneous network environment. Therefore, low convergence of communication technologies can produce a low mobility and ubiquitous interaction between students and lectures in Malaysian higher educational institutes.

  15. Creation of a European network dedicated to technology transfer

    CERN Multimedia

    2008-01-01

    The CERN Council recently approved the creation of a technology transfer network, whose aim will be to improve European industry’s access to the technologies developed by the particle physics community in the Member States. The gas detectors for the TOTEM experiment (GEM) offer potential for fruitful collaboration within the framework of the TT network. Many other technologies are going down the same road.The desire to set up a technology transfer network follows on from the European Strategy for Particle Physics, approved by the CERN Council on 14 July 2006 in Lisbon. In this context, special emphasis was laid on European industry’s participation in the implementation of particle physics programmes and, in particular, its access to the new technologies developed by the scientific community. It was recognised that effort needs to be put into improving the efficiency of technology transfer...

  16. Real Time Synchronization of Live Broadcast Streams with User Generated Content and Social Network Streams

    NARCIS (Netherlands)

    Stokking, H.M.; Kaptein, A.M.; Veenhuizen, A.T.; Spitters4, M.M.; Niamut, O.A.

    2013-01-01

    This paper describes the work in the FP7 STEER project on augmenting a live broadcast with live user generated content. This user generated content consists of both video content, captured with mobile devices, and social network content, such as Facebook or Twitter messages. To enable multi-source

  17. A user credit assessment model based on clustering ensemble for broadband network new media service supervision

    Science.gov (United States)

    Liu, Fang; Cao, San-xing; Lu, Rui

    2012-04-01

    This paper proposes a user credit assessment model based on clustering ensemble aiming to solve the problem that users illegally spread pirated and pornographic media contents within the user self-service oriented broadband network new media platforms. Its idea is to do the new media user credit assessment by establishing indices system based on user credit behaviors, and the illegal users could be found according to the credit assessment results, thus to curb the bad videos and audios transmitted on the network. The user credit assessment model based on clustering ensemble proposed by this paper which integrates the advantages that swarm intelligence clustering is suitable for user credit behavior analysis and K-means clustering could eliminate the scattered users existed in the result of swarm intelligence clustering, thus to realize all the users' credit classification automatically. The model's effective verification experiments are accomplished which are based on standard credit application dataset in UCI machine learning repository, and the statistical results of a comparative experiment with a single model of swarm intelligence clustering indicates this clustering ensemble model has a stronger creditworthiness distinguishing ability, especially in the aspect of predicting to find user clusters with the best credit and worst credit, which will facilitate the operators to take incentive measures or punitive measures accurately. Besides, compared with the experimental results of Logistic regression based model under the same conditions, this clustering ensemble model is robustness and has better prediction accuracy.

  18. Frameworks for Understanding the Nature of Interactions, Networking, and Community in a Social Networking Site for Academic Practice

    Directory of Open Access Journals (Sweden)

    Grainne Conole

    2011-03-01

    Full Text Available This paper describes a new social networking site, Cloudworks, which has been developed to enable discussion and sharing of learning and teaching ideas/designs and to promote reflective academic practice. The site aims to foster new forms of social and participatory practices (peer critiquing, sharing, user-generated content, aggregation, and personalisation within an educational context. One of the key challenges in the development of the site has been to understand the user interactions and the changing patterns of user behaviour as it evolves. The paper explores the extent to which four frameworks that have been used in researching networked learning contexts can provide insights into the patterns of user behaviour that we see in Cloudworks. The paper considers this within the current debate about the new types of interactions, networking, and community being observed as users adapt to and appropriate new technologies.

  19. Proposal for Implementing Multi-User Database (MUD) Technology in an Academic Library.

    Science.gov (United States)

    Filby, A. M. Iliana

    1996-01-01

    Explores the use of MOO (multi-user object oriented) virtual environments in academic libraries to enhance reference services. Highlights include the development of multi-user database (MUD) technology from gaming to non-recreational settings; programming issues; collaborative MOOs; MOOs as distinguished from other types of virtual reality; audio…

  20. Psychological risk factors of addiction to social networking sites among Chinese smartphone users.

    Science.gov (United States)

    Wu, Anise M S; Cheung, Vivi I; Ku, Lisbeth; Hung, Eva P W

    2013-09-01

    Smartphones allow users to access social networking sites (SNSs) whenever and wherever they want. Such easy availability and accessibility may increase their vulnerability to addiction. Based on the social cognitive theory (SCT), we examined the impacts of outcome expectancies, self-efficacy, and impulsivity on young Chinese smartphone users' addictive tendencies toward SNSs. Two hundred seventy-seven Macau young smartphone users (116 males and 161 females; mean age = 26.62) filled out an online Chinese questionnaire concerning their usage of social networking sites via smartphones, addiction tendencies toward SNSs, impulsivity trait, outcome expectancies toward the use, and Internet self-efficacy. The findings revealed that those who spent more time on SNSs also reported higher addictive tendencies. Addictive tendencies were positively correlated with both outcome expectancies and impulsivity, but negatively associated with Internet self-efficacy. These three psychological variables explained 23% of the variance in addictive tendencies. The findings of this study suggest that, compared to demographics, psychological factors provide a better account for addictive tendencies towards SNSs among Chinese smartphone users in Macau. The three psychological risk factors were low Internet self-efficacy, favorable outcome expectancies, and high impulsivity trait. Educational campaigns with screening procedures for high-risk groups are recommended for effective prevention and treatment.

  1. Mobile Phone User Interfaces in Multiplayer Games

    OpenAIRE

    NURMINEN, MINNA

    2007-01-01

    This study focuses on the user interface elements of mobile phones and their qualities in multiplayer games. Mobile phone is not intended as a gaming device. Therefore its technology has many shortcomings when it comes to playing mobile games on the device. One of those is the non-standardized user interface design. However, it has also some strengths, such as the portability and networked nature. In addition, many mobile phone models today have a camera, a feature only few gaming devices hav...

  2. Rural public transportation technologies : user needs and applications : final report

    Science.gov (United States)

    1998-07-01

    The Rural Public Transportation Technologies: User Needs and Applications study was conducted as part of the U.S. Department of Transportations (DOT) overall Rural Intelligent Transportation System (ITS) Program. The study examined the opportuniti...

  3. Rural Public Transportation Technologies: User Needs and Applications. Executive Summary

    Science.gov (United States)

    1998-07-01

    The Rural Public Transportation Technologies: User Needs and Applications study was conducted as part of the U.S. Department of Transportation's (DOT) overall Rural Intelligent Transportation System (ITS) Program. The study examined the opportunities...

  4. Capacity planning for Carrier Ethernet LTE backhaul networks

    DEFF Research Database (Denmark)

    Checko, Aleksandra; Ellegaard, Lars; Berger, Michael Stübert

    2012-01-01

    With the introduction of LTE networks operators need to plan a new, IP-based mobile backhaul. In this paper, we provide recommendation on dimensioning LTE backhaul networks links using three methods: delay-, dimensioning formula- and overbooking factor-based. Results are obtained from OPNET simul...... and verified. Simulation in this work proves that Carrier Ethernet, one of the candidate technologies for mobile backhaul, protects the network from users that want to flood the network with their data and manages to keep the delay experienced by other users low....... simulations with traffic model based on traffic forecast for 2015. A delay-based approach gives recommended bandwidth for expected number of users. A dimensioning formula is proposed to calculate link bandwidth when mean value of aggregated traffic in the network is known. An overbooking factor is calculated...

  5. Security Awareness in Software-Defined Multi-Domain 5G Networks

    Directory of Open Access Journals (Sweden)

    Jani Suomalainen

    2018-03-01

    Full Text Available Fifth generation (5G technologies will boost the capacity and ease the management of mobile networks. Emerging virtualization and softwarization technologies enable more flexible customization of network services and facilitate cooperation between different actors. However, solutions are needed to enable users, operators, and service providers to gain an up-to-date awareness of the security and trustworthiness of 5G systems. We describe a novel framework and enablers for security monitoring, inferencing, and trust measuring. The framework leverages software-defined networking and big data technologies to customize monitoring for different applications. We present an approach for sharing security measurements across administrative domains. We describe scenarios where the correlation of multi-domain information improves the accuracy of security measures with respect to two threats: end-user location tracking and Internet of things (IoT authentication storms. We explore the security characteristics of data flows in software networks dedicated to different applications with a mobile network testbed.

  6. User habits of smartphone owners in terms of consumption of media content

    OpenAIRE

    Kimla, Lukáš

    2017-01-01

    The thesis "User habits of smartphone owners in terms of consumption of media content" aims to expertly uncover a deeper description of user habits of today's smartphone users, and focus primarily on aspects of the consumption of media content on these devices, such as applications, games, web browsing, news, audiovisual content and social networks. The purpose is to give a complete picture of today's smartphone users as consumers of new technological media and to reveal the spectrum of influ...

  7. The rise and fall of self-service in Amsterdam trams: User technology relations in a case of service innovation

    NARCIS (Netherlands)

    Nahuis, Roel

    2009-01-01

    The stabilisation of innovative technology depends on reconciling technological opportunities and user behaviour. This can be achieved by adjusting the technology to the users, by configuring the user, or by a combination thereof. This paper evaluates different strategies in a case of service

  8. [Social network analysis and high risk behavior characteristics of recreational drug users: a qualitative study].

    Science.gov (United States)

    Wu, Di; Wang, Zhenhong; Jiang, Zhenxia; Fu, Xiaojing; Li, Hui; Zhang, Dapeng; Liu, Hui; Hu, Yifei

    2014-11-01

    To understand the characteristics of recreational drug users' behaviors and social network, as well as their potential impact to the transmission of sexual transmitted infections (STI). Qualitative interview was used to collect information on rough estimation of population size and behavior change before and after recreational drug use. A total of 120 participants were recruited by convenient sampling from April to October, 2013 in a community of Qingdao city. Blood specimens were taken for HIV/syphilis serological testing and social network analysis was performed to understand the characteristics of their behavior and social network. All participants used methamphetamine and 103 of them showed social connection. The prevalence of syphilis and HIV were 24.2% (29/120) and 2.5% (3/120) respectively. The estimated size of recreational drug users was big with a wide diversity of occupations and age range, and males were more frequent than females. Drug use may affect condom use and frequent drug users showed symptom of psychosis and neuro-toxicities. The size of social network was 2.45 ± 1.63 in the past 6 months, which indicated an increasing trend of the sexual partner number and risky behaviors. Recreational drug use could increase the size of social network among sex partners, the frequency of risky sexual behaviors and syphilis prevalence, which indicate a high risk of HIV/STI among this population as well as a huge burden of disease prevention and control in the future.

  9. Mobile Computing and Ubiquitous Networking: Concepts, Technologies and Challenges.

    Science.gov (United States)

    Pierre, Samuel

    2001-01-01

    Analyzes concepts, technologies and challenges related to mobile computing and networking. Defines basic concepts of cellular systems. Describes the evolution of wireless technologies that constitute the foundations of mobile computing and ubiquitous networking. Presents characterization and issues of mobile computing. Analyzes economical and…

  10. Multi-user cognitive radio network resource allocation based on the adaptive niche immune genetic algorithm

    International Nuclear Information System (INIS)

    Zu Yun-Xiao; Zhou Jie

    2012-01-01

    Multi-user cognitive radio network resource allocation based on the adaptive niche immune genetic algorithm is proposed, and a fitness function is provided. Simulations are conducted using the adaptive niche immune genetic algorithm, the simulated annealing algorithm, the quantum genetic algorithm and the simple genetic algorithm, respectively. The results show that the adaptive niche immune genetic algorithm performs better than the other three algorithms in terms of the multi-user cognitive radio network resource allocation, and has quick convergence speed and strong global searching capability, which effectively reduces the system power consumption and bit error rate. (geophysics, astronomy, and astrophysics)

  11. Users' Perception of Medical Simulation Training: A Framework for Adopting Simulator Technology

    Science.gov (United States)

    Green, Leili Hayati

    2014-01-01

    Users play a key role in many training strategies, yet some organizations often fail to understand the users' perception after a simulation training implementation, their attitude about acceptance or rejection of and integration of emerging simulation technology in medical training (Gaba, 2007, and Topol, 2012). Several factors are considered to…

  12. A Wireless Location System in LTE Networks

    OpenAIRE

    Liu, Qi; Hu, Rongyi; Liu, Shan

    2017-01-01

    Personal location technologies are becoming important with the rapid development of Mobile Internet services. In traditional cellular networks, the key problems of user location technologies are high-precision synchronization among different base stations, inflexible processing resources, and low accuracy positioning, especially for indoor environment. In this paper, a new LTE location system in Centralized Radio Access Network (C-RAN) is proposed, which makes channel and location measurement...

  13. Knowledge network for medical technology management in Mexico.

    Science.gov (United States)

    Licona, Fabiola Martínez; Leehan, Joaquín Azpiroz; Méndez, Miguel Cadena; Yuriar, Salvador Duarte; Salazar, Raúl Molina; Gilmore, Amador Terán

    2009-10-01

    The role of biomedical engineers (BMEs) has changed widely over the years, from managing a group of technicians to the planning of large installations and the management of medical technology countrywide. As the technology has advanced, the competence of BMEs has been challenged because it is no longer possible to be an expert in every component of the technology involved in running a hospital. Our approach has been to form a network of professionals that are experts in different fields related to medical technology, where work is coordinated to provide high quality services at the planning and execution stages of projects related to medical technology. A study of the procedures involved in the procurement of medical technology has been carried out over the years. These experiences have been compared with several case studies where the approach to problem solving in this area has been multidisciplinary. Planning and execution phases of projects involving medical technology management have been identified. After several instances of collaboration among experts from different fields, a network for management of healthcare technology has been formed at our institution that incorporates the experience from different departments that were dealing separately with projects involving medical technology. This network has led us to propose this approach to solve medical technology management projects, where the strengths of each subgroup complement each other. This structure will lead to a more integrated approach to healthcare technology management and will ensure higher quality solutions.

  14. Rural Public Transportation Technologies: User Needs and Applications. Final Report

    Science.gov (United States)

    1998-08-01

    The Rural Public Transportation Technologies: User Needs and Applications Study was conducted as part of the U.S. DOT's overall Rural Intelligent Transportation System (ITS) Program. The study examined the opportunities and challenges of planning and...

  15. Scaled CMOS Technology Reliability Users Guide

    Science.gov (United States)

    White, Mark

    2010-01-01

    The desire to assess the reliability of emerging scaled microelectronics technologies through faster reliability trials and more accurate acceleration models is the precursor for further research and experimentation in this relevant field. The effect of semiconductor scaling on microelectronics product reliability is an important aspect to the high reliability application user. From the perspective of a customer or user, who in many cases must deal with very limited, if any, manufacturer's reliability data to assess the product for a highly-reliable application, product-level testing is critical in the characterization and reliability assessment of advanced nanometer semiconductor scaling effects on microelectronics reliability. A methodology on how to accomplish this and techniques for deriving the expected product-level reliability on commercial memory products are provided.Competing mechanism theory and the multiple failure mechanism model are applied to the experimental results of scaled SDRAM products. Accelerated stress testing at multiple conditions is applied at the product level of several scaled memory products to assess the performance degradation and product reliability. Acceleration models are derived for each case. For several scaled SDRAM products, retention time degradation is studied and two distinct soft error populations are observed with each technology generation: early breakdown, characterized by randomly distributed weak bits with Weibull slope (beta)=1, and a main population breakdown with an increasing failure rate. Retention time soft error rates are calculated and a multiple failure mechanism acceleration model with parameters is derived for each technology. Defect densities are calculated and reflect a decreasing trend in the percentage of random defective bits for each successive product generation. A normalized soft error failure rate of the memory data retention time in FIT/Gb and FIT/cm2 for several scaled SDRAM generations is

  16. [Design and application of user managing system of cardiac remote monitoring network].

    Science.gov (United States)

    Chen, Shouqiang; Zhang, Jianmin; Yuan, Feng; Gao, Haiqing

    2007-12-01

    According to inpatient records, data managing demand of cardiac remote monitoring network and computer, this software was designed with relative database ACCESS. Its interface, operational button and menu were designed in VBA language assistantly. Its design included collective design, amity, practicability and compatibility. Its function consisted of registering, inquiring, statisticing and printing, et al. It could be used to manage users effectively and could be helpful to exerting important action of cardiac remote monitoring network in preventing cardiac-vascular emergency ulteriorly.

  17. The research of computer network security and protection strategy

    Science.gov (United States)

    He, Jian

    2017-05-01

    With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.

  18. An investigation into users' information security awareness on social networks in south western Nigeria

    Directory of Open Access Journals (Sweden)

    Julius O. Okesola

    2016-11-01

    Full Text Available Background: Social networks (SNs offer new and exciting opportunities for interaction among people, cutting across different stratum of the society and providing a ubiquitous mechanism that supports a wide variety of activities. They are at the same time being exploited by criminals to fraudulently obtain information from unsuspecting users. Unfortunately, the seamless communication and semblance of safety assumed by most users make them oblivious to the potential online dangers. Objective: Using quantitative methods on selected social sites, this study empirically examined the information security awareness of SN users in south western Nigeria. Method: A self-designed research instrument was administered for data collection while descriptive and inferential statistics were employed using chi-square, cross-tabulation and t-test for data analysis and result interpretation. Result: Findings from the analysed data suggest that the risk perception vary among male and female SN users and that the general perception of risks regarding SN usage is also very low. Conclusion: Adequate security awareness coupled with detailed legal measures are required to keep SNs secured. However, an individual is duly responsible for the habit of ignoring potential risks posed by the networks.

  19. PREFACE: Complex Networks: from Biology to Information Technology

    Science.gov (United States)

    Barrat, A.; Boccaletti, S.; Caldarelli, G.; Chessa, A.; Latora, V.; Motter, A. E.

    2008-06-01

    The field of complex networks is one of the most active areas in contemporary statistical physics. Ten years after seminal work initiated the modern study of networks, interest in the field is in fact still growing, as indicated by the ever increasing number of publications in network science. The reason for such a resounding success is most likely the simplicity and broad significance of the approach that, through graph theory, allows researchers to address a variety of different complex systems within a common framework. This special issue comprises a selection of contributions presented at the workshop 'Complex Networks: from Biology to Information Technology' held in July 2007 in Pula (Cagliari), Italy as a satellite of the general conference STATPHYS23. The contributions cover a wide range of problems that are currently among the most important questions in the area of complex networks and that are likely to stimulate future research. The issue is organised into four sections. The first two sections describe 'methods' to study the structure and the dynamics of complex networks, respectively. After this methodological part, the issue proceeds with a section on applications to biological systems. The issue closes with a section concentrating on applications to the study of social and technological networks. The first section, entitled Methods: The Structure, consists of six contributions focused on the characterisation and analysis of structural properties of complex networks: The paper Motif-based communities in complex networks by Arenas et al is a study of the occurrence of characteristic small subgraphs in complex networks. These subgraphs, known as motifs, are used to define general classes of nodes and their communities by extending the mathematical expression of the Newman-Girvan modularity. The same line of research, aimed at characterising network structure through the analysis of particular subgraphs, is explored by Bianconi and Gulbahce in Algorithm

  20. Secure, Mobile, Wireless Network Technology Designed, Developed, and Demonstrated

    Science.gov (United States)

    Ivancic, William D.; Paulsen, Phillip E.

    2004-01-01

    The inability to seamlessly disseminate data securely over a high-integrity, wireless broadband network has been identified as a primary technical barrier to providing an order-of-magnitude increase in aviation capacity and safety. Secure, autonomous communications to and from aircraft will enable advanced, automated, data-intensive air traffic management concepts, increase National Air Space (NAS) capacity, and potentially reduce the overall cost of air travel operations. For the first time ever, secure, mobile, network technology was designed, developed, and demonstrated with state-ofthe- art protocols and applications by a diverse, cooperative Government-industry team led by the NASA Glenn Research Center. This revolutionary technology solution will make fundamentally new airplane system capabilities possible by enabling secure, seamless network connections from platforms in motion (e.g., cars, ships, aircraft, and satellites) to existing terrestrial systems without the need for manual reconfiguration. Called Mobile Router, the new technology autonomously connects and configures networks as they traverse from one operating theater to another. The Mobile Router demonstration aboard the Neah Bay, a U.S. Coast Guard vessel stationed in Cleveland, Ohio, accomplished secure, seamless interoperability of mobile network systems across multiple domains without manual system reconfiguration. The Neah Bay was chosen because of its low cost and communications mission similarity to low-Earth-orbiting satellite platforms. This technology was successfully advanced from technology readiness level (TRL) 2 (concept and/or application formation) to TRL 6 (system model or prototype demonstration in a relevant environment). The secure, seamless interoperability offered by the Mobile Router and encryption device will enable several new, vehicle-specific and systemwide technologies to perform such things as remote, autonomous aircraft performance monitoring and early detection and

  1. Non-visual Interfaces and Network Games for Blind Users

    OpenAIRE

    Ina, Satoshi

    2002-01-01

    Visually impaired people have difficulty with communication of graphical information. It is to be more difficult for them to work/play in cooperation with sighted people at a distance. We developed a non-visual access method to a graphical screen through tactile and auditory sense, and applied it into network board/card games as a joint workspace for blind and sighted users via communication of image, sound, and voice. We took an "IGO" type boardgame and a Card game "SEVENS" as sample subject...

  2. Towards the systematic development of medical networking technology.

    Science.gov (United States)

    Faust, Oliver; Shetty, Ravindra; Sree, S Vinitha; Acharya, Sripathi; Acharya U, Rajendra; Ng, E Y K; Poo, Chua Kok; Suri, Jasjit

    2011-12-01

    Currently, there is a disparity in the availability of doctors between urban and rural areas of developing countries. Most experienced doctors and specialists, as well as advanced diagnostic technologies, are available in urban areas. People living in rural areas have less or sometimes even no access to affordable healthcare facilities. Increasing the number of doctors and charitable medical hospitals or deploying advanced medical technologies in these areas might not be economically feasible, especially in developing countries. We need to mobilize science and technology to master this complex, large scale problem in an objective, logical, and professional way. This can only be achieved with a collaborative effort where a team of experts works on both technical and non-technical aspects of this health care divide. In this paper we use a systems engineering framework to discuss hospital networks which might be solution for the problem. We argue that with the advancement in communication and networking technologies, economically middle class people and even some rural poor have access to internet and mobile communication systems. Thus, Hospital Digital Networking Technologies (HDNT), such as telemedicine, can be developed to utilize internet, mobile and satellite communication systems to connect primitive rural healthcare centers to well advanced modern urban setups and thereby provide better consultation and diagnostic care to the needy people. This paper describes requirements and limitations of the HDNTs. It also presents the features of telemedicine, the implementation issues and the application of wireless technologies in the field of medical networking.

  3. Router Agent Technology for Policy-Based Network Management

    Science.gov (United States)

    Chow, Edward T.; Sudhir, Gurusham; Chang, Hsin-Ping; James, Mark; Liu, Yih-Chiao J.; Chiang, Winston

    2011-01-01

    This innovation can be run as a standalone network application on any computer in a networked environment. This design can be configured to control one or more routers (one instance per router), and can also be configured to listen to a policy server over the network to receive new policies based on the policy- based network management technology. The Router Agent Technology transforms the received policies into suitable Access Control List syntax for the routers it is configured to control. It commits the newly generated access control lists to the routers and provides feedback regarding any errors that were faced. The innovation also automatically generates a time-stamped log file regarding all updates to the router it is configured to control. This technology, once installed on a local network computer and started, is autonomous because it has the capability to keep listening to new policies from the policy server, transforming those policies to router-compliant access lists, and committing those access lists to a specified interface on the specified router on the network with any error feedback regarding commitment process. The stand-alone application is named RouterAgent and is currently realized as a fully functional (version 1) implementation for the Windows operating system and for CISCO routers.

  4. Security-Reliability Trade-Off Analysis for Multiuser SIMO Mixed RF/FSO Relay Networks With Opportunistic User Scheduling

    KAUST Repository

    El-Malek, Ahmed H. Abd; Salhab, Anas M.; Zummo, Salam A.; Alouini, Mohamed-Slim

    2016-01-01

    In this paper, we study the performance of multiuser single-input multiple-output mixed radio frequency (RF)/free space optical (FSO) relay network with opportunistic user scheduling. The considered system includes multiple users, one amplify

  5. User Needs and Advances in Space Wireless Sensing and Communications

    Science.gov (United States)

    Kegege, Obadiah

    2017-01-01

    Decades of space exploration and technology trends for future missions show the need for new approaches in space/planetary sensor networks, observatories, internetworking, and communications/data delivery to Earth. The User Needs to be discussed in this talk includes interviews with several scientists and reviews of mission concepts for the next generation of sensors, observatories, and planetary surface missions. These observatories, sensors are envisioned to operate in extreme environments, with advanced autonomy, whereby sometimes communication to Earth is intermittent and delayed. These sensor nodes require software defined networking capabilities in order to learn and adapt to the environment, collect science data, internetwork, and communicate. Also, some user cases require the level of intelligence to manage network functions (either as a host), mobility, security, and interface data to the physical radio/optical layer. For instance, on a planetary surface, autonomous sensor nodes would create their own ad-hoc network, with some nodes handling communication capabilities between the wireless sensor networks and orbiting relay satellites. A section of this talk will cover the advances in space communication and internetworking to support future space missions. NASA's Space Communications and Navigation (SCaN) program continues to evolve with the development of optical communication, a new vision of the integrated network architecture with more capabilities, and the adoption of CCSDS space internetworking protocols. Advances in wireless communications hardware and electronics have enabled software defined networking (DVB-S2, VCM, ACM, DTN, Ad hoc, etc.) protocols for improved wireless communication and network management. Developing technologies to fulfil these user needs for wireless communications and adoption of standardized communication/internetworking protocols will be a huge benefit to future planetary missions, space observatories, and manned missions

  6. Distinctive roles of lead users and opinion leaders in the social networks of schoolchildren

    DEFF Research Database (Denmark)

    Kratzer, Jan; Lettl, Christopher

    2009-01-01

    Prior research has shown that both lead users and opinion leaders may propel the diffusion of innovation. This raises the question of whether lead users and opinion leaders are positioned similarly in social networks, which we addressed using a sample of 23 school classes consisting of 537 children....... Research among children is very scarce in this particular domain. Our statistical analyses based on hierarchical linear modeling reveal two general results: First, lead users among children appear to possess a variety of links between clusters. Second, opinion leaders are locally positioned within clusters...

  7. MONITORING POTENTIAL DRUG INTERACTIONS AND REACTIONS VIA NETWORK ANALYSIS OF INSTAGRAM USER TIMELINES.

    Science.gov (United States)

    Correia, Rion Brattig; Li, Lang; Rocha, Luis M

    2016-01-01

    Much recent research aims to identify evidence for Drug-Drug Interactions (DDI) and Adverse Drug reactions (ADR) from the biomedical scientific literature. In addition to this "Bibliome", the universe of social media provides a very promising source of large-scale data that can help identify DDI and ADR in ways that have not been hitherto possible. Given the large number of users, analysis of social media data may be useful to identify under-reported, population-level pathology associated with DDI, thus further contributing to improvements in population health. Moreover, tapping into this data allows us to infer drug interactions with natural products-including cannabis-which constitute an array of DDI very poorly explored by biomedical research thus far. Our goal is to determine the potential of Instagram for public health monitoring and surveillance for DDI, ADR, and behavioral pathology at large. Most social media analysis focuses on Twitter and Facebook, but Instagram is an increasingly important platform, especially among teens, with unrestricted access of public posts, high availability of posts with geolocation coordinates, and images to supplement textual analysis. Using drug, symptom, and natural product dictionaries for identification of the various types of DDI and ADR evidence, we have collected close to 7000 user timelines spanning from October 2010 to June 2015.We report on 1) the development of a monitoring tool to easily observe user-level timelines associated with drug and symptom terms of interest, and 2) population-level behavior via the analysis of co-occurrence networks computed from user timelines at three different scales: monthly, weekly, and daily occurrences. Analysis of these networks further reveals 3) drug and symptom direct and indirect associations with greater support in user timelines, as well as 4) clusters of symptoms and drugs revealed by the collective behavior of the observed population. This demonstrates that Instagram

  8. Applying Trusted Network Technology To Process Control Systems

    Science.gov (United States)

    Okhravi, Hamed; Nicol, David

    Interconnections between process control networks and enterprise networks expose instrumentation and control systems and the critical infrastructure components they operate to a variety of cyber attacks. Several architectural standards and security best practices have been proposed for industrial control systems. However, they are based on older architectures and do not leverage the latest hardware and software technologies. This paper describes new technologies that can be applied to the design of next generation security architectures for industrial control systems. The technologies are discussed along with their security benefits and design trade-offs.

  9. Information technology resources assessment

    Energy Technology Data Exchange (ETDEWEB)

    Loken, S.C. [ed.

    1993-01-01

    The emphasis in Information Technology (IT) development has shifted from technology management to information management, and the tools of information management are increasingly at the disposal of end-users, people who deal with information. Moreover, the interactive capabilities of technologies such as hypertext, scientific visualization, virtual reality, video conferencing, and even database management systems have placed in the hands of users a significant amount of discretion over how these resources will be used. The emergence of high-performance networks, as well as network operating systems, improved interoperability, and platform independence of applications will eliminate technical barriers to the use of data, increase the power and range of resources that can be used cooperatively, and open up a wealth of possibilities for new applications. The very scope of these prospects for the immediate future is a problem for the IT planner or administrator. Technology procurement and implementation, integration of new technologies into the existing infrastructure, cost recovery and usage of networks and networked resources, training issues, and security concerns such as data protection and access to experiments are just some of the issues that need to be considered in the emerging IT environment. As managers we must use technology to improve competitiveness. When procuring new systems, we must take advantage of scalable resources. New resources such as distributed file systems can improve access to and efficiency of existing operating systems. In addition, we must assess opportunities to improve information worker productivity and information management through tedmologies such as distributed computational visualization and teleseminar applications.

  10. Challenges of user-centred assistive technology provision in Australia: shopping without a prescription.

    Science.gov (United States)

    Steel, Emily J; Layton, Natasha Ann; Foster, Michele M; Bennett, Sally

    2016-01-01

    People with disability have a right to assistive technology devices and services, to support their inclusion and participation in society. User-centred approaches aim to address consumer dissatisfaction and sub-optimal outcomes from assistive technology (AT) provision, but make assumptions of consumer literacy and empowerment. Policy discourses about consumer choice prompt careful reflection, and this paper aims to provide a critical perspective on user involvement in assistive technology provision. User-centred approaches are considered, using literature to critically reflect on what user involvement means in AT provision. Challenges at the level of interactions between practitioners and consumers, and also the level of markets and policies are discussed, using examples from Australia. There is no unanimous conceptual framework for user-centred practice. Power imbalances and differing perspectives between practitioners and consumers make it difficult for consumers to feel empowered. Online access to information and international suppliers has not surmounted information asymmetries for consumers or lifted the regulation of publicly funded AT devices. Ensuring access and equity in the public provision of AT is challenging in an expanding market with diverse stakeholders. Consumers require personalised information and support to facilitate their involvement and choice in AT provision. Implications for Rehabilitation Variations in approaches informing AT provision practices have a profound impact on equity of access and outcomes for consumers. An internationalised and online market for AT devices is increasing the need for effective information provision strategies and services. Power imbalances between practitioners and consumers present barriers to the realisation of user-centred practice.

  11. Social network sites: Indispensable or optional social tools?

    DEFF Research Database (Denmark)

    Shklovski, Irina

    2012-01-01

    Much research has enumerated potential benefits of online social network sites. Given the pervasiveness of these sites and the numbers of people that use them daily, both re-search and media tend to make the assumption that social network sites have become indispensible to their users. Based...... on the analysis of qualitative data from users of social network sites in Russia and Kazakhstan, this paper consid-ers under what conditions social network sites can become indispensable to their users and when these technologies remain on the periphery of life despite fulfilling useful func-tions. For some...... respondents, these sites had become indis-pensable tools as they were integrated into everyday rou-tines of communicating with emotionally important and proximal contacts and were often used for coordination of offline activities. For others social network sites remained spaces where they occasionally visited...

  12. Controlling P2P File-Sharing Networks Traffic

    OpenAIRE

    García Pineda, Miguel; HAMMOUMI, MOHAMMED; Canovas Solbes, Alejandro; Lloret, Jaime

    2011-01-01

    Since the appearance of Peer-To-Peer (P2P) file-sharing networks some time ago, many Internet users have chosen this technology to share and search programs, videos, music, documents, etc. The total number of P2P file-sharing users has been increasing and decreasing in the last decade depending on the creation or end of some well known P2P file-sharing systems. P2P file-sharing networks traffic is currently overloading some data networks and it is a major headache for netw...

  13. Research on Network Defense Strategy Based on Honey Pot Technology

    Science.gov (United States)

    Hong, Jianchao; Hua, Ying

    2018-03-01

    As a new network security technology of active defense, The honeypot technology has become a very effective and practical method of decoy attackers. The thesis discusses the theory, structure, characteristic, design and implementation of Honeypot in detail. Aiming at the development of means of attack, put forward a kind of network defense technology based on honeypot technology, constructing a virtual Honeypot demonstrate the honeypot’s functions.

  14. Open Problems in Network-aware Data Management in Exa-scale Computing and Terabit Networking Era

    Energy Technology Data Exchange (ETDEWEB)

    Balman, Mehmet; Byna, Surendra

    2011-12-06

    Accessing and managing large amounts of data is a great challenge in collaborative computing environments where resources and users are geographically distributed. Recent advances in network technology led to next-generation high-performance networks, allowing high-bandwidth connectivity. Efficient use of the network infrastructure is necessary in order to address the increasing data and compute requirements of large-scale applications. We discuss several open problems, evaluate emerging trends, and articulate our perspectives in network-aware data management.

  15. Novel 3D media technologies

    CERN Document Server

    Dagiuklas, Tasos

    2015-01-01

    This book describes recent innovations in 3D media and technologies, with coverage of 3D media capturing, processing, encoding, and adaptation, networking aspects for 3D Media, and quality of user experience (QoE). The contributions are based on the results of the FP7 European Project ROMEO, which focuses on new methods for the compression and delivery of 3D multi-view video and spatial audio, as well as the optimization of networking and compression jointly across the future Internet. The delivery of 3D media to individual users remains a highly challenging problem due to the large amount of data involved, diverse network characteristics and user terminal requirements, as well as the user’s context such as their preferences and location. As the number of visual views increases, current systems will struggle to meet the demanding requirements in terms of delivery of consistent video quality to fixed and mobile users. ROMEO will present hybrid networking solutions that combine the DVB-T2 and DVB-NGH broadcas...

  16. The automated ground network system

    Science.gov (United States)

    Smith, Miles T.; Militch, Peter N.

    1993-01-01

    The primary goal of the Automated Ground Network System (AGNS) project is to reduce Ground Network (GN) station life-cycle costs. To accomplish this goal, the AGNS project will employ an object-oriented approach to develop a new infrastructure that will permit continuous application of new technologies and methodologies to the Ground Network's class of problems. The AGNS project is a Total Quality (TQ) project. Through use of an open collaborative development environment, developers and users will have equal input into the end-to-end design and development process. This will permit direct user input and feedback and will enable rapid prototyping for requirements clarification. This paper describes the AGNS objectives, operations concept, and proposed design.

  17. User Interface Technology Transfer to NASA's Virtual Wind Tunnel System

    Science.gov (United States)

    vanDam, Andries

    1998-01-01

    Funded by NASA grants for four years, the Brown Computer Graphics Group has developed novel 3D user interfaces for desktop and immersive scientific visualization applications. This past grant period supported the design and development of a software library, the 3D Widget Library, which supports the construction and run-time management of 3D widgets. The 3D Widget Library is a mechanism for transferring user interface technology from the Brown Graphics Group to the Virtual Wind Tunnel system at NASA Ames as well as the public domain.

  18. The Relationship Between Attachment Styles, Self-Monitoring and Cybercrime in Social Network Users.

    Science.gov (United States)

    Yaghoobi, Abolghasem; Mohammadzade, Serwa; Chegini, Ali Asghar; Yarmohammadi Vasel, Mosaeib; Zoghi Paidar, Mohammad Reza

    2016-09-01

    The anonymity in the cyberspace environment, as well as the rapid advent of and improvements to online activities has increased cybercrime. The aim of this paper was to survey the relationship between attachment styles, self-monitoring and cybercrime in social network users. The Collins and Read Adult Attachment Scale, and the Snyder self-monitoring and cybercrime scales were sent to 500 social network users. Of these, 203 users (103 men and 100 women) filled out the questionnaires. The results showed that women achieved higher scores in self-monitoring and the anxious attachment style, and men achieved higher scores in cybercrime and the anxious attachment style. There was a negative correlation between self-monitoring and cybercrime, and the anxious attachment style had a positive correlation with cybercrime and a negative correlation with self-monitoring. The secure attachment style had a positive correlation with self-monitoring and a negative correlation with cybercrime. The dependent attachment style had a positive correlation with self-monitoring and a negative correlation with cybercrime. All correlations were significant. Attachment styles have significant relationships with both self-monitoring and cybercrime. Self-monitoring and attachment styles are significant predictors of cybercrimes.

  19. Configuring the users of new HIV-prevention technologies: the case of HIV pre-exposure prophylaxis.

    Science.gov (United States)

    Holt, Martin

    2015-01-01

    HIV pre-exposure prophylaxis (PrEP) is a prevention technology that involves prescribing antiretroviral drugs to HIV-negative people to protect them from infection. This paper considers how the development of the technology has necessitated the parallel configuration of its users, and how this process has affected the perception and uptake of the technology. In designing a technology, potential users are typically defined, enabled and constrained, partly to create a target population (or market) for the technology, but also to reassure people that it can be used safely and effectively. This process may or may not be helpful for the uptake and use of the technology. Published research on PrEP indicates that while the technology was under trial, the primary focus was on the 'at-risk' subject in need of PrEP, with little or no consideration of the other qualities necessary for successful use. Post-trial accounts of PrEP have begun to outline desirable qualities of successful PrEP use, such as caution, compliance and being organised. It appears that the PrEP user was only partially configured during the technology's development, and the initial focus on risk has done little to counter fears of the technology, which may partially account for its slow uptake.

  20. Efficient technologies or user behaviour, which is the more important when reducing households' energy consumption?

    DEFF Research Database (Denmark)

    Gram-Hanssen, Kirsten

    2013-01-01

    Much policy effort focuses on energy efficiency of technology, though not only efficiency but also user behaviour is an important factor influencing the amount of consumed energy. This paper explores to what extent energy efficiency of appliances and houses or user behaviour is the more important...... and Danish national statistics. These Danish data are discussed together with international studies. Through the presentation of these different projects and examples, it is shown how user behaviour is at least as important as the efficiency of technology when explaining households' energy consumption...

  1. Networking Technologies for Future Home Networks Using 60 GHz Radio

    OpenAIRE

    Wang, J.

    2010-01-01

    Networking technologies have been changing the life of people in their private residential space. With the arrival of high definition (HD) multimedia services and broadband communications into the living space, future home networks are expected to support high speed device-to-device connectivity with Quality-of-Service (QoS) provisioning. There is no prize for guessing that it has to be wireless communication which creates maximal freedom. Nevertheless, it is doubtful that today's home networ...

  2. Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-06-01

    Full Text Available Wireless sensor networks (WSNs consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC for WSNs. However, it turned out that Yeh et al.’s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.’s protocol. However, Shi et al.’s improvement introduces other security weaknesses. In this paper, we show that Shi et al.’s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  3. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography.

    Science.gov (United States)

    Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho

    2014-06-10

    Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  4. Script of Healthcare Technology: Do Designs of Robotic Beds Exclude or Include Users?

    DEFF Research Database (Denmark)

    Brodersen, Søsser Grith Kragh; Hansen, Meiken; Lindegaard, Hanne

    2015-01-01

    Many new product designs are currently being implemented in the healthcare sector, and this presents designers with challenges involved in socially innovative design. In this paper, we argue that designing assistive technologies requires focus on multiple users and use practices. We see the design...... of assistive technologies as design of socio-material assemblies , which include an analysis of the products already used in relation to multiple users, their practices and wishes. In the article we focus on the challenges in the implementation of two types of robotic beds used for disability care...

  5. Virtual Lab for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    PICOVICI, D.

    2008-06-01

    Full Text Available This article details an experimental system developed to enhance the education and research in the area of wireless networks technologies. The system referred, as Virtual Lab (VL is primarily targeting first time users or users with limited experience in programming and using wireless sensor networks. The VL enables a set of predefined sensor networks to be remotely accessible and controlled for constructive and time-efficient experimentation. In order to facilitate the user's wireless sensor applications, the VL is using three main components: a a Virtual Lab Motes (VLM, representing the wireless sensor, b a Virtual Lab Client (VLC, representing the user's tool to interact with the VLM and c a Virtual Lab Server (VLS representing the software link between the VLM and VLC. The concept has been proven using the moteiv produced Tmote Sky modules. Initial experimental use clearly demonstrates that the VL approach reduces dramatically the learning curve involved in programming and using the associated wireless sensor nodes. In addition the VL allows the user's focus to be directed towards the experiment and not towards the software programming challenges.

  6. Authenticated multi-user quantum key distribution with single particles

    Science.gov (United States)

    Lin, Song; Wang, Hui; Guo, Gong-De; Ye, Guo-Hua; Du, Hong-Zhen; Liu, Xiao-Fen

    2016-03-01

    Quantum key distribution (QKD) has been growing rapidly in recent years and becomes one of the hottest issues in quantum information science. During the implementation of QKD on a network, identity authentication has been one main problem. In this paper, an efficient authenticated multi-user quantum key distribution (MQKD) protocol with single particles is proposed. In this protocol, any two users on a quantum network can perform mutual authentication and share a secure session key with the assistance of a semi-honest center. Meanwhile, the particles, which are used as quantum information carriers, are not required to be stored, therefore the proposed protocol is feasible with current technology. Finally, security analysis shows that this protocol is secure in theory.

  7. Threshold Based Opportunistic Scheduling of Secondary Users in Underlay Cognitive Radio Networks

    KAUST Repository

    Song, Yao

    2011-12-01

    In underlay cognitive radio networks, secondary users can share the spectrum with primary users as long as the interference caused by the secondary users to primary users is below a certain predetermined threshold. It is reasonable to assume that there is always a large pool of secondary users trying to access the channel, which can be occupied by only one secondary user at a given time. As a result, a multi-user scheduling problem arises among the secondary users. In this thesis, by manipulating basic schemes based on selective multi-user diversity, normalized thresholding, transmission power control, and opportunistic round robin, we propose and analyze eight scheduling schemes of secondary users in an underlay cognitive radio set-up. The system performance of these schemes is quantified by using various performance metrics such as the average system capacity, normalized average feedback load, scheduling outage probability, and system fairness of access. In our proposed schemes, the best user out of all the secondary users in the system is picked to transmit at each given time slot in order to maximize the average system capacity. Two thresholds are used in the two rounds of the selection process to determine the best user. The first threshold is raised by the power constraint from the primary user. The second threshold, which can be adjusted by us, is introduced to reduce the feedback load. The overall system performance is therefore dependent on the choice of these two thresholds and the number of users in the system given the channel conditions for all the users. In this thesis, by deriving analytical formulas and presenting numerical examples, we try to provide insights of the relationship between the performance metrics and the involved parameters including two selection thresholds and the number of active users in the system, in an effort to maximize the average system capacity as well as satisfy the requirements of scheduling outage probability and

  8. Network and user interface for PAT DOME virtual motion environment system

    Science.gov (United States)

    Worthington, J. W.; Duncan, K. M.; Crosier, W. G.

    1993-01-01

    The Device for Orientation and Motion Environments Preflight Adaptation Trainer (DOME PAT) provides astronauts a virtual microgravity sensory environment designed to help alleviate tye symptoms of space motion sickness (SMS). The system consists of four microcomputers networked to provide real time control, and an image generator (IG) driving a wide angle video display inside a dome structure. The spherical display demands distortion correction. The system is currently being modified with a new graphical user interface (GUI) and a new Silicon Graphics IG. This paper will concentrate on the new GUI and the networking scheme. The new GUI eliminates proprietary graphics hardware and software, and instead makes use of standard and low cost PC video (CGA) and off the shelf software (Microsoft's Quick C). Mouse selection for user input is supported. The new Silicon Graphics IG requires an Ethernet interface. The microcomputer known as the Real Time Controller (RTC), which has overall control of the system and is written in Ada, was modified to use the free public domain NCSA Telnet software for Ethernet communications with the Silicon Graphics IG. The RTC also maintains the original ARCNET communications through Novell Netware IPX with the rest of the system. The Telnet TCP/IP protocol was first used for real-time communication, but because of buffering problems the Telnet datagram (UDP) protocol needed to be implemented. Since the Telnet modules are written in C, the Adap pragma 'Interface' was used to interface with the network calls.

  9. Network technology for depot modernization

    Energy Technology Data Exchange (ETDEWEB)

    Hostick, C.J.

    1990-12-01

    This report was prepared by the Pacific Northwest Laboratory to summarize existing and emerging information system technology and standards applicable to Depot System Command (DESCOM) modernization efforts. The intent of this summarization is to provide the Revitalization of Army Depots for the Year 2000 (READY 2000) team a clear understanding of the enabling information system technologies required to support effective modernization activities. Much of the information contained in this report was acquired during the last year in support of the US Army Armament, Munitions, and Chemical Command (AMCCOM) Facility Integrated Manufacturing Management System (FIMMS) project at PNL, which is targeting the modernization of plant-wide information systems at Army Ammunition Plants. The objective of information system modernization is to improve the effectiveness of an organization in performing its mission. Information system modernization strives to meet this objective by creating an environment where data is electronically captured near the source and readily available to all areas of the organization. Advanced networks, together with related information system technology, are the enabling mechanisms that make modern information system infrastructures possible. The intent of this paper is to present an overview of advanced information system network technology to support depot modernization planners in making technology management decisions. Existing and emerging Open System Interconnection (OSI) and Government Open System Interconnection Profile (GOSIP) standards are explained, as well as a brief assessment of existing products compliant with these standards. Finally, recommendations for achieving plant-wide integration using existing products are presented, and migration strategies for full OSI compliance are introduced. 5 refs., 16 figs. (JF)

  10. Caching and Network Coding for Smart Radio Access

    NARCIS (Netherlands)

    Serbetci, Berksan

    2018-01-01

    The current generation has undoubtedly been witnessing a revolution of wireless network technologies in recent decades. First of all, there has been an enormous growth of wireless user equipments and network infrastructures in terms of both number and variety. Moreover, data traffic over wireless

  11. Emerging wireless networks concepts, techniques and applications

    CERN Document Server

    Makaya, Christian

    2011-01-01

    An authoritative collection of research papers and surveys, Emerging Wireless Networks: Concepts, Techniques, and Applications explores recent developments in next-generation wireless networks (NGWNs) and mobile broadband networks technologies, including 4G (LTE, WiMAX), 3G (UMTS, HSPA), WiFi, mobile ad hoc networks, mesh networks, and wireless sensor networks. Focusing on improving the performance of wireless networks and provisioning better quality of service and quality of experience for users, it reports on the standards of different emerging wireless networks, applications, and service fr

  12. Proof-of-Concept System for Opportunistic Spectrum Access in Multi-user Decentralized Networks

    Directory of Open Access Journals (Sweden)

    Sumit J. Darak

    2016-09-01

    Full Text Available Poor utilization of an electromagnetic spectrum and ever increasing demand for spectrum have led to surge of interests in opportunistic spectrum access (OSA based paradigms like cognitive radio and unlicensed LTE. In OSA for decentralized networks, frequency band selection from wideband spectrum is a challenging task since secondary users (SUs do not share any information with each other. In this paper, a new decision making policy (DMP has been proposed for OSA in the multi-user decentralized networks. First contribution is an accurate characterization of frequency bands using Bayes-UCB algorithm. Then, a novel SU orthogonization scheme using Bayes-UCB algorithm is proposed replacing randomization based scheme. At the end, USRP testbed has been developed for analyzing the performance of DMPs using real radio signals. Experimental results show that the proposed DMP offers significant improvement in spectrum utilization, fewer subband switching and collisions compared to other DMPs.

  13. Technical Evaluation Report (Workshop on Visualising Network Information)

    National Research Council Canada - National Science Library

    Rasmussen, Lisbeth M

    2006-01-01

    The workshop brought together operational users, developers and researchers to explore the connection between visualisation technologies and network analysis for military and civil protection applications...

  14. The Role of Cultural and Identity Differences in Self-expression of Iranian Users of Social Networking Sites; A Case Study of Students of Tehran University, Amirkabir University, and Sharif University of Technology

    OpenAIRE

    H. Molaei; Z. Majdizadeh

    2017-01-01

    Social media with their features such as interactivity, participatory, and user-generated content have provided a great opportunity for self-expression of the users. However, cultural differences affect the extent and modality of users’ self-expression. This study aims to investigate the modality of self-expression of Iranian users of the social networking sites. In doing so, an online survey was conducted among the students of three Iran universities: University of Tehran, Amirkabir Universi...

  15. A Stable-Matching-Based User Linking Method with User Preference Order

    Directory of Open Access Journals (Sweden)

    Xuzhong Wang

    2017-01-01

    Full Text Available With the development of social networks, more and more users choose to use multiple accounts from different networks to meet their needs. Linking a particular user’s multiple accounts not only can improve user’s experience of the net-services such as recommender system, but also plays a significant role in network security. However, multiple accounts of the same user are often not directly linked to each other, and further, the privacy policy provided by the service provider makes it harder to find accounts for a particular user. In this paper, we propose a stable-matching-based method with user preference order for the problem of low accuracy of user linking in cross-media sparse data. Different from the traditional way which just calculates the similarity of accounts, we take full account of the mutual influence among multiple accounts by regarding different networks as bilateral (multilateral market and user linking as a stable matching problem in such a market. Based on the combination of Game-Theoretic Machine Learning and Pairwise, a novel user linking method has been proposed. The experiment shows that our method has a 21.6% improvement in accuracy compared with the traditional linking method and a further increase of about 7.8% after adding the prior knowledge.

  16. Integrated IoT technology in industrial lasers for the improved user experience

    Science.gov (United States)

    Ding, Jianwu; Liu, Jinhui

    2018-02-01

    The end users' biggest concern for any industrial equipment is the reliability and the service down-time. This is especially true for industrial lasers as they are typically used in fully or semi- automated processes. Here we demonstrate how to use the integrated Internet of Things (IoT) technology in industrial lasers to address the reliability and the service down-time so to improve end users' experience.

  17. Wireless Cognitive Networks Technologies and Protocols

    OpenAIRE

    Loscri , Valeria; Maskooki , Arash; Mitton , Nathalie; Vegni , Anna Maria

    2015-01-01

    International audience; Software Defined Radio and Cognitive Radio applied to Wireless Sensor Networks and Body Area Networks represent an intriguing and really recent paradigm, which represents an objective of study of several researchers. In order to make this technology effective, it is necessary to consider an analytical model of communication capacity, energy consumption and congestion, to effectively exploit the Software Defined Radio and Cognitive Radio in this type of systems. This ch...

  18. Bridge Management Strategy Based on Extreme User Costs for Bridge Network Condition

    Directory of Open Access Journals (Sweden)

    Ladislaus Lwambuka

    2014-01-01

    Full Text Available This paper presents a practical approach for prioritization of bridge maintenance within a given bridge network. The maintenance prioritization is formulated as a multiobjective optimization problem where the simultaneous satisfaction of several conflicting objectives includes minimization of maintenance costs, maximization of bridge deck condition, and minimization of traffic disruption and associated user costs. The prevalence of user cost during maintenance period is twofold; the first case refers to the period of dry season where normally the traffic flow is diverted to alternative routes usually resurfaced to regain traffic access. The second prevalence refers to the absence of alternative routes which is often the case in the least developed countries; in this case the user cost referred to results from the waiting time while the traffic flow is put on hold awaiting accomplishment of the maintenance activity. This paper deals with the second scenario of traffic closure in the absence of alternative diversion routes which in essence results in extreme user cost. The paper shows that the multiobjective optimization approach remains valid for extreme cases of user costs in the absence of detour roads as often is the scenario in countries with extreme poor road infrastructure.

  19. Discussion on the Technology and Method of Computer Network Security Management

    Science.gov (United States)

    Zhou, Jianlei

    2017-09-01

    With the rapid development of information technology, the application of computer network technology has penetrated all aspects of society, changed people's way of life work to a certain extent, brought great convenience to people. But computer network technology is not a panacea, it can promote the function of social development, but also can cause damage to the community and the country. Due to computer network’ openness, easiness of sharing and other characteristics, it had a very negative impact on the computer network security, especially the loopholes in the technical aspects can cause damage on the network information. Based on this, this paper will do a brief analysis on the computer network security management problems and security measures.

  20. A simplistic model for identifying prominent web users in directed multiplex social networks: a case study using Twitter networks

    Science.gov (United States)

    Loucif, Hemza; Boubetra, Abdelhak; Akrouf, Samir

    2016-10-01

    This paper aims to describe a new simplistic model dedicated to gauge the online influence of Twitter users based on a mixture of structural and interactional features. The model is an additive mathematical formulation which involves two main parts. The first part serves to measure the influence of the Twitter user on just his neighbourhood covering his followers. However, the second part evaluates the potential influence of the Twitter user beyond the circle of his followers. Particularly, it measures the likelihood that the tweets of the Twitter user will spread further within the social graph through the retweeting process. The model is tested on a data set involving four kinds of real-world egocentric networks. The empirical results reveal that an active ordinary user is more prominent than a non-active celebrity one. A simple comparison is conducted between the proposed model and two existing simplistic approaches. The results show that our model generates the most realistic influence scores due to its dealing with both explicit (structural and interactional) and implicit features.

  1. Cyber Insurance for Heterogeneous Wireless Networks

    OpenAIRE

    Lu, Xiao; Niyato, Dusit; Jiang, Hai; Wang, Ping; Poor, H. Vincent

    2017-01-01

    Heterogeneous wireless networks (HWNs) composed of densely deployed base stations of different types with various radio access technologies have become a prevailing trend to accommodate ever-increasing traffic demand in enormous volume. Nowadays, users rely heavily on HWNs for ubiquitous network access that contains valuable and critical information such as financial transactions, e-health, and public safety. Cyber risks, representing one of the most significant threats to network security an...

  2. MONITORING POTENTIAL DRUG INTERACTIONS AND REACTIONS VIA NETWORK ANALYSIS OF INSTAGRAM USER TIMELINES

    Science.gov (United States)

    CORREIA, RION BRATTIG; LI, LANG; ROCHA, LUIS M.

    2015-01-01

    Much recent research aims to identify evidence for Drug-Drug Interactions (DDI) and Adverse Drug reactions (ADR) from the biomedical scientific literature. In addition to this “Bibliome”, the universe of social media provides a very promising source of large-scale data that can help identify DDI and ADR in ways that have not been hitherto possible. Given the large number of users, analysis of social media data may be useful to identify under-reported, population-level pathology associated with DDI, thus further contributing to improvements in population health. Moreover, tapping into this data allows us to infer drug interactions with natural products—including cannabis—which constitute an array of DDI very poorly explored by biomedical research thus far. Our goal is to determine the potential of Instagram for public health monitoring and surveillance for DDI, ADR, and behavioral pathology at large. Most social media analysis focuses on Twitter and Facebook, but Instagram is an increasingly important platform, especially among teens, with unrestricted access of public posts, high availability of posts with geolocation coordinates, and images to supplement textual analysis. Using drug, symptom, and natural product dictionaries for identification of the various types of DDI and ADR evidence, we have collected close to 7000 user timelines spanning from October 2010 to June 2015. We report on 1) the development of a monitoring tool to easily observe user-level timelines associated with drug and symptom terms of interest, and 2) population-level behavior via the analysis of co-occurrence networks computed from user timelines at three different scales: monthly, weekly, and daily occurrences. Analysis of these networks further reveals 3) drug and symptom direct and indirect associations with greater support in user timelines, as well as 4) clusters of symptoms and drugs revealed by the collective behavior of the observed population. This demonstrates that

  3. Bridging the Gap from Networking Technologies to Applications: Workshop Report

    Science.gov (United States)

    Johnson, Marjory J.; desJardins, Richard

    2000-01-01

    The objective of the Next Generation Internet (NGI) Federal program is threefold, encompassing development of networking technologies, high-performance network testbeds, and revolutionary applications. There have been notable advances in emerging network technologies and several nationwide testbeds have been established, but the integration of emerging technologies into applications is lagging. To help bridge this gap between developers of NGI networking technologies and developers of NGI applications, the NASA Research and Education Network (NREN) project hosted a two-day workshop at NASA Ames Research Center in August 1999. This paper presents a summary of the results of this workshop and also describes some of the challenges NREN is facing while incorporating new technologies into HPCC and other NASA applications. The workshop focused on three technologies - Quality of Service (QoS), advanced multicast, and security-and five major NGI application areas - telemedicine, digital earth, digital video, distributed data-intensive applications, and computational infrastructure applications. Network technology experts, application developers, and NGI testbed representatives came together at the workshop to promote cross-fertilization between the groups. Presentations on the first day, including an overview of the three technologies, application case studies and testbed status reports, laid the foundation for discussions on the second day. The objective of these latter discussions, held within smaller breakout groups, was to establish a coherent picture of the current status of the various pieces of each of the three technologies, to create a roadmap outlining future technology development, and to offer technological guidance to application developers. In this paper we first present a brief overview of the NGI applications that were represented at the workshop, focusing on the identification of technological advances that have successfully been incorporated in each

  4. From BAN to AmI-BAN: micro and nano technologies in future Body Area Networks

    OpenAIRE

    Jones, Val; Jones, Val

    2006-01-01

    At the University of Twente we have been researching mobile healthcare applications since 1999. Since 2002 the University of Twente and partners have been developing health Body Area Networks (BANs) and a BAN service platform. We define a BAN as a network of communicating devices worn on, around or in the body which provides mobile services to the user. The BAN may also communicate to remote users such as healthcare providers via external network services such as GPRS or UMTS. The generic BAN...

  5. On the area spectral efficiency improvement of heterogeneous network by exploiting the integration of macro-femto cellular networks

    KAUST Repository

    Shakir, Muhammad

    2012-06-01

    Heterogeneous networks are an attractive means of expanding mobile network capacity. A heterogeneous network is typically composed of multiple radio access technologies (RATs) where the base stations are transmitting with variable power. In this paper, we consider a Heterogeneous network where we complement the macrocell network with low-power low-cost user deployed nodes, such as femtocell base stations to increase the mean achievable capacity of the system. In this context, we integrate macro-femto cellular networks and derive the area spectral efficiency of the proposed two tier Heterogeneous network. We consider the deployment of femtocell base stations around the edge of the macrocell such that this configuration is referred to as femto-on-edge (FOE) configuration. Moreover, FOE configuration mandates reduction in intercell interference due to the mobile users which are located around the edge of the macrocell since these femtocell base stations are low-power nodes which has significantly lower transmission power than macrocell base stations. We present a mathematical analysis to calculate the instantaneous carrier to interference ratio (CIR) of the desired mobile user in macro and femto cellular networks and determine the total area spectral efficiency of the Heterogeneous network. Details of the simulation processes are included to support the analysis and show the efficacy of the proposed deployment. It has been shown that the proposed setup of the Heterogeneous network offers higher area spectral efficiency which aims to fulfill the expected demand of the future mobile users. © 2012 IEEE.

  6. Technological, biological, and acoustical constraints to music perception in cochlear implant users.

    Science.gov (United States)

    Limb, Charles J; Roy, Alexis T

    2014-02-01

    Despite advances in technology, the ability to perceive music remains limited for many cochlear implant users. This paper reviews the technological, biological, and acoustical constraints that make music an especially challenging stimulus for cochlear implant users, while highlighting recent research efforts to overcome these shortcomings. The limitations of cochlear implant devices, which have been optimized for speech comprehension, become evident when applied to music, particularly with regards to inadequate spectral, fine-temporal, and dynamic range representation. Beyond the impoverished information transmitted by the device itself, both peripheral and central auditory nervous system deficits are seen in the presence of sensorineural hearing loss, such as auditory nerve degeneration and abnormal auditory cortex activation. These technological and biological constraints to effective music perception are further compounded by the complexity of the acoustical features of music itself that require the perceptual integration of varying rhythmic, melodic, harmonic, and timbral elements of sound. Cochlear implant users not only have difficulty perceiving spectral components individually (leading to fundamental disruptions in perception of pitch, melody, and harmony) but also display deficits with higher perceptual integration tasks required for music perception, such as auditory stream segregation. Despite these current limitations, focused musical training programs, new assessment methods, and improvements in the representation and transmission of the complex acoustical features of music through technological innovation offer the potential for significant advancements in cochlear implant-mediated music perception. Copyright © 2013 Elsevier B.V. All rights reserved.

  7. The influence of social networking technologies on female religious veil-wearing behavior in Iran.

    Science.gov (United States)

    Young, Sean D; Shakiba, Abbas; Kwok, Justin; Montazeri, Mohammad Sadegh

    2014-05-01

    Abstract Social networking technologies can influence attitudes, behaviors, and social norms. Research on this topic has been conducted primarily among early adopters of technology and within the United States. However, it is important to evaluate how social media might affect people's behaviors in international settings, especially among countries with longstanding, government recommended, cultural and religious traditions and behaviors, such as Iran. This study seeks to assess whether Iranian women who have been using social networking technologies for a longer time (compared to those who have recently joined) would be less likely to cover themselves with a veil and be more comfortable publicly displaying pictures of this behavior on Facebook. Iranian females (N=253) were selected through snowball sampling from nongovernmental organizations in November 2011 and asked to complete a survey assessing their use of Facebook, concerns about not wearing a veil in Facebook pictures, and their actual likelihood of wearing a veil. Items were combined to measure lack of interest in wearing a veil. Length of time as a Facebook user was significantly associated with not wearing a veil (b=0.16, peducation, and frequency of using Facebook. Results also revealed a significant relationship such that older people were more likely to adhere to the religious behavior of wearing a veil (b=-0.45, ptechnologies can affect attitudes and behaviors internationally. We discuss methods of using social media for self-presentation and expression, as well as the difficulties (and importance) of studying use of technologies, such as social media, internationally.

  8. Simulation analysis of security performance of DPSKOCDMA network via virtual user scheme

    Directory of Open Access Journals (Sweden)

    Vishav Jyoti

    2012-07-01

    Full Text Available A novel technique to enhance the security of an optical code division multipleaccess (OCDMA system against eavesdropping is proposed. It has been observed that whena single user is active in the network, an eavesdropper can easily sift the data beingtransmitted without decoding. To increase the security, a virtual user scheme is proposed andsimulated on a differential phase shift keying (DPSK OCDMA system. By using the virtualuser scheme, the security of the DPSK-OCDMA system can be effectively improved and themultiple access interference, which is generally considered to be a limitation of the OCDMAsystem, is used to increase the confidentiality of the system.

  9. Empowering users through design interdisciplinary studies and combined approaches for technological products and services

    CERN Document Server

    2015-01-01

    At the crossroads of various disciplines, this collective work examines the possibility of a new end-user “engagement” in ongoing digital/technological products and services development. It provides an overview of recent research specifically focused on the user’s democratic participation and empowerment. It also enables readers to better identify the main opportunities of participatory design, a concept which encourages the blurring of the role between user and designer. This allows people to escape their status as “end-user” and to elevate themselves to the level of creator. This book explores new avenues for rethinking the processes and practices of corporate innovation in order to cope with current socio-economic and technological changes. In so doing, it aims to help companies renew industrial models that allow them to design and produce new ranges of technological products and services by giving the user an active role in the development process, far beyond the basic role of consumer. Intended...

  10. CCTV networking and digital technology

    CERN Document Server

    Damjanovski, Vlado

    2005-01-01

    Closed circuit television (CCTV) is experiencing a leap in technology using digital techniques, networking and the Internet. The new edition of this high-level professional reference retains the particulars that made the first edition a success, including the details of CCD cameras, lenses, coaxial cables, fiber-optics, and system design, but it is expanded to cover all video compression techniques used in the ever increasing assortment of digital video recorders (DVRs) available on the market today. This new edition of the book CCTV demystifies DVR technology. It also serves to clarify the te

  11. Social and parasocial relationships on social network sites and their differential relationships with users' psychological well-being.

    Science.gov (United States)

    Baek, Young Min; Bae, Young; Jang, Hyunmi

    2013-07-01

    With the advent of social network sites (SNSs), people can efficiently maintain preexisting social relationships and make online friendships without offline encounters. While such technological features of SNSs hold a variety of potential for individual and collective benefits, some scholars warn that use of SNSs might lead to socially negative consequences, such as social isolation, erosion of social cohesion, or SNS addiction. This study distinguishes types of SNS relationships, and investigates their relationships with social isolation, interpersonal trust, and SNS addiction. We classify SNS relationships into two types: (a) social relationships based on reciprocity between a user and his/her friends, and (b) parasocial relationships in which an ordinary user is aware of activities of a celebrity (e.g., famous actors, athletes, and others) but not vice versa. Based on achievements in studies of media effect and social psychology, we constructed a set of hypotheses, and tested them using a subsample of SNS users drawn from representative survey data in South Korea. We found that dependency on parasocial relationships is positively related with loneliness but negatively correlated with interpersonal distrust, while dependency on social relationship is negatively correlated with loneliness but positively related with trust. However, more dependency on both social and parasocial relationships are positively related with SNS addiction. Implications based on findings are also discussed.

  12. A Network Analysis Model for Selecting Sustainable Technology

    Directory of Open Access Journals (Sweden)

    Sangsung Park

    2015-09-01

    Full Text Available Most companies develop technologies to improve their competitiveness in the marketplace. Typically, they then patent these technologies around the world in order to protect their intellectual property. Other companies may use patented technologies to develop new products, but must pay royalties to the patent holders or owners. Should they fail to do so, this can result in legal disputes in the form of patent infringement actions between companies. To avoid such situations, companies attempt to research and develop necessary technologies before their competitors do so. An important part of this process is analyzing existing patent documents in order to identify emerging technologies. In such analyses, extracting sustainable technology from patent data is important, because sustainable technology drives technological competition among companies and, thus, the development of new technologies. In addition, selecting sustainable technologies makes it possible to plan their R&D (research and development efficiently. In this study, we propose a network model that can be used to select the sustainable technology from patent documents, based on the centrality and degree of a social network analysis. To verify the performance of the proposed model, we carry out a case study using actual patent data from patent databases.

  13. Industrial Wireless Sensors: A User's Perspective on the Impact of Standards on Wide-spread Deployment

    Energy Technology Data Exchange (ETDEWEB)

    Taft, Cyrus W. [Taft Engineering, Inc.; Manges, Wayne W [ORNL; Sorge, John N [Southern Company Services, Inc.

    2012-01-01

    The role of wireless sensing technologies in industrial instrumentation will undoubtedly become more important in the years ahead. . Deployment of such instrumentation in an industrial setting with its heightened security and robustness criteria hinges on user acceptance of verified performance as well as meeting cost requirements. Today, industrial users face many choices when specifying a wireless sensor network, including radio performance, battery life, interoperability, security, and standards compliance. The potential market for industrial wireless sensors is literally millions of wireless instruments and it is imperative that accurate information for applying the technology to real-world applications be available to the end-user so that they can make informed deployment decisions. The majority of industrial wireless automation designs now being deployed or being considered for deployment are based on three different standards . The HART Communications Foundation s WirelessHART (IEC 62591), the International Society of Automation s ISA100.11a, and the offering from the Industrial Wireless Alliance of China known as WIA-PA (IEC 62601). Aside from these industrial automation standards, users must also be cognizant of the underlying wireless network standards IEEE 802.11, IEEE 802.15.4, and IEEE 802.15.3a and their interactions with the three principal industrial automation protocols mentioned previously. The crucial questions being asked by end users revolve around sensor network performance, interoperability, reliability, and security. This paper will discuss potential wireless sensor applications in power plants, barriers to the acceptance of wireless technology, concerns related to standards, and provide an end user prospective on the issues affecting wide-spread deployment of wireless sensors. Finally, the authors conclude with a discussion of a recommended path forward including how standards organizations can better facilitate end user decision making and

  14. Implementation of Network Coding for Social Mobile Clouds

    DEFF Research Database (Denmark)

    Fitzek, Frank; Heide, Janus; Pedersen, Morten Videbæk

    2013-01-01

    , the social elements will play an important role. By means of social networks, examples were given of how social benefits can be created to persuade users to cooperate. More examples will be found in the future as social networking technology develops, but the initial examples underline the feasibility...

  15. Contemporary, emerging, and ratified wireless security standards: an update for the networked dental office.

    Science.gov (United States)

    Mupparapu, Muralidhar

    2006-02-15

    Wireless networking is not new to contemporary dental offices around the country. Wireless routers and network cards have made access to patient records within the office handy and, thereby, saving valuable chair side time and increasing productivity. As is the case with any rapidly developing technology, wireless technology also changes with the same rate. Unless, the users of the wireless networking understand the implications of these changes and keep themselves updated periodically, the office network will become obsolete very quickly. This update of the emerging security protocols and pertaining to ratified wireless 802.11 standards will be timely for the contemporary dentist whose office is wirelessly networked. This article brings the practicing dentist up-to-date on the newer versions and standards in wireless networking that are changing at a fast pace. The introduction of newer 802.11 standards like super G, Super AG, Multiple Input Multiple Output (MIMO), and pre-n are changing the pace of adaptation of this technology. Like any other rapidly transforming technology, information pertaining to wireless networking should be a priority for the contemporary dentist, an eventual end-user in order to be a well-informed and techno-savvy consumer.

  16. An analysis of communications and networking technologies for the smart grid

    Energy Technology Data Exchange (ETDEWEB)

    Garcia Hernandez, Joaquin [Instituto de Investigaciones Electricas, Cuernavaca, Morelos (Mexico)

    2013-03-01

    The Smart Grid concept has been foreseen as the integration of the electrical generation, transmission and distribution network and the data communications network. Although, traditional communications interfaces, protocols and standards has been used in the electrical grid in an isolated manner, modern communications network is considered as the fundamental enabling technology within the future Smart Grid. Modern communications technologies, protocol architectures and standards can help to build a common communications network infrastructure for data transport between customer premises, power substations, and power distribution systems, utility control centers and utility data centers. The Smart Grid will support traditional applications such as SCADA, distribution automation (DA), energy management systems (EMS), demand site management (DSM) and automatic meter reading (AMR), etc., as well as new applications like advanced metering infrastructure (AMI), substation automation (SA), microgrids, distributed generation, grid monitoring and control, data storage and analysis, among others. To make this possible, the Smart Grid requires a two-way wide area communications network between different dispersed areas, from generation, to distribution to consumer premises. In fact, it will consist of many different types of communications networks such as wide area networks, local area network, home area networks, etc. This requires a new architectural approach to implement a common communications infrastructure that provides the reliability, scalability, security and interoperability to support multiple applications. In addition, open standards addressing interoperability, are key for the development and deployment of the Smart Grid as a true integrated network. A communications backbone is necessary to provide interoperability. To achieve the level of networking, interoperability and security that meets the technical requirements of the Smart Grid, its data communications

  17. Chaos in a dynamic model of urban transportation network flow based on user equilibrium states

    International Nuclear Information System (INIS)

    Xu Meng; Gao Ziyou

    2009-01-01

    In this study, we investigate the dynamical behavior of network traffic flow. We first build a two-stage mathematical model to analyze the complex behavior of network flow, a dynamical model, which is based on the dynamical gravity model proposed by Dendrinos and Sonis [Dendrinos DS, Sonis M. Chaos and social-spatial dynamic. Berlin: Springer-Verlag; 1990] is used to estimate the number of trips. Considering the fact that the Origin-Destination (O-D) trip cost in the traffic network is hard to express as a functional form, in the second stage, the user equilibrium network assignment model was used to estimate the trip cost, which is the minimum cost of used path when user equilibrium (UE) conditions are satisfied. It is important to use UE to estimate the O-D cost, since a connection is built among link flow, path flow, and O-D flow. The dynamical model describes the variations of O-D flows over discrete time periods, such as each day and each week. It is shown that even in a system with dimensions equal to two, chaos phenomenon still exists. A 'Chaos Propagation' phenomenon is found in the given model.

  18. A Fuzzy Preprocessing Module for Optimizing the Access Network Selection in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Faisal Kaleem

    2013-01-01

    Full Text Available A heterogeneous wireless network is characterized by the presence of different wireless access technologies that coexist in an overlay fashion. These wireless access technologies usually differ in terms of their operating parameters. On the other hand, Mobile Stations (MSs in a heterogeneous wireless network are equipped with multiple interfaces to access different types of services from these wireless access technologies. The ultimate goal of these heterogeneous wireless networks is to provide global connectivity with efficient ubiquitous computing to these MSs based on the Always Best Connected (ABC principle. This is where the need for intelligent and efficient Vertical Handoffs (VHOs between wireless technologies in a heterogeneous environment becomes apparent. This paper presents the design and implementation of a fuzzy multicriteria based Vertical Handoff Necessity Estimation (VHONE scheme that determines the proper time for VHO, while considering the continuity and quality of the currently utilized service, and the end-users' satisfaction.

  19. National research and education network

    Science.gov (United States)

    Villasenor, Tony

    1991-01-01

    Some goals of this network are as follows: Extend U.S. technological leadership in high performance computing and computer communications; Provide wide dissemination and application of the technologies both to the speed and the pace of innovation and to serve the national economy, national security, education, and the global environment; and Spur gains in the U.S. productivity and industrial competitiveness by making high performance computing and networking technologies an integral part of the design and production process. Strategies for achieving these goals are as follows: Support solutions to important scientific and technical challenges through a vigorous R and D effort; Reduce the uncertainties to industry for R and D and use of this technology through increased cooperation between government, industry, and universities and by the continued use of government and government funded facilities as a prototype user for early commercial HPCC products; and Support underlying research, network, and computational infrastructures on which U.S. high performance computing technology is based.

  20. Opinion Mining for User Generated Design by Social Networking Service and Japanese Manga

    Directory of Open Access Journals (Sweden)

    Anak Agung Gede Dharma

    2013-09-01

    Full Text Available The growth of Social Networking Service (SNS has created a new potential in marketing. While users communicate and interact via SNS, the list of their conversation, which is called casual data can be used to determine their needs or aspirations. SNS can be very useful for product/service developers, especially when developing new ideas or simply evaluating the feasibility of their existing products/services. Furthermore, SNS provides a unique system that enables expressive and two-way communication between its users. SNS is known for its effectiveness in delivering fresh news and information, thus it can be used as promotional media. Although several online services that utilize SNS and casual data have been provided, the purpose of those services is still unclear and ineffective. In those services, users were only asked for their opinions without receiving sufficient feedbacks. Therefore, to solve these problems we propose an innovative way of utilizing SNS and casual data in designing user generated design XE "user generated design" . In our proposed system, users can directly contribute to the product/service development process in an interesting way. We designed an online service, which allows users to posts manga that describes their original idea. While contributing to the product/service development, they can also benefit from expressing their hobbies and receiving feedbacks from other users.

  1. Wireless local area network. A new technology of network

    International Nuclear Information System (INIS)

    Wu Yunjun; Zhao Zongtao

    2003-01-01

    This paper introduces Wireless Local Area Network (WLAN), including the concept, history, characters and the foreground of its development, it also narrates in detail the several key techniques used to implement IEEE802.11 WLAN, and ideas on key technology of future progress in wireless LAN field have also been presented. (authors)

  2. User Modeling for Activity Recognition and Support in Ambient Assisted Living

    DEFF Research Database (Denmark)

    Hossain, Shabbir; Valente, Pedro Ricardo da Nova; Hallenborg, Kasper

    Current research work shows that progress on AI and wireless sensor networks, made it possible to improve the quality of life of the people with disabilities using recent technologies [1]. Ambient Assisted Living (AAL) is one of the well-known research areas that has a goal to use ambient...... on user modeling to be more efficient to adapt the changes of user capabilities and preferences which is strongly correlated with the prime challenges of AAL. In this paper, a user model has been proposed that tends to be used in the autonomous and reliable recognition....

  3. Harvesting full-duplex rate gains in cellular networks with half-duplex user terminals

    KAUST Repository

    AlAmmouri, Ahmad

    2016-07-26

    Full-Duplex (FD) transceivers may be expensive in terms of complexity, power consumption, and price to be implemented in all user terminals. Therefore, techniques to exploit in-band full-duplex communication with FD base stations (BSs) and half-duplex (HD) users\\' equipment (UEs) are required. In this context, 3-node topology (3NT) has been recently proposed for FD BSs to reuse the uplink (UL) and downlink (DL) channels with HD terminals within the same cell. In this paper, we present a tractable mathematical framework, based on stochastic geometry, for 3NT in cellular networks. To this end, we propose a design paradigm via pulse-shaping and partial overlap between UL and DL channels to maximize the harvested rate gains in 3NT. The results show that 3NT achieves a close performance to networks with FD BSs and FD UEs, denoted by 2-node topology (2NT) networks. A maximum of 5% rate loss is reported when 3NT is compared to 2NT with efficient self-interference cancellation (SIC). If the SIC in 2NT is not efficient, 3NT highly outperforms 2NT. Consequently, we conclude that, irrespective to the UE duplexing scheme, it is sufficient to have FD BSs to harvest FD rate gains.

  4. Application of wireless sensor network technology in logistics information system

    Science.gov (United States)

    Xu, Tao; Gong, Lina; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-04-01

    This paper introduces the basic concepts of active RFID (WSN-ARFID) based on wireless sensor networks and analyzes the shortcomings of the existing RFID-based logistics monitoring system. Integrated wireless sensor network technology and the scrambling point of RFID technology. A new real-time logistics detection system based on WSN and RFID, a model of logistics system based on WSN-ARFID is proposed, and the feasibility of this technology applied to logistics field is analyzed.

  5. An Introduction to Face Recognition Technology

    Directory of Open Access Journals (Sweden)

    Shang-Hung Lin

    2000-01-01

    Full Text Available Recently face recognition is attracting much attention in the society of network multimedia information access.  Areas such as network security, content indexing and retrieval, and video compression benefits from face recognition technology because "people" are the center of attention in a lot of video.  Network access control via face recognition not only makes hackers virtually impossible to steal one's "password", but also increases the user-friendliness in human-computer interaction.  Indexing and/or retrieving video data based on the appearances of particular persons will be useful for users such as news reporters, political scientists, and moviegoers.  For the applications of videophone and teleconferencing, the assistance of face recognition also provides a more efficient coding scheme.  In this paper, we give an introductory course of this new information processing technology.  The paper shows the readers the generic framework for the face recognition system, and the variants that are frequently encountered by the face recognizer.  Several famous face recognition algorithms, such as eigenfaces and neural networks, will also be explained.

  6. Heterogeneous Wireless Mesh Network Technology Evaluation for Space Proximity and Surface Applications

    Science.gov (United States)

    DeCristofaro, Michael A.; Lansdowne, Chatwin A.; Schlesinger, Adam M.

    2014-01-01

    NASA has identified standardized wireless mesh networking as a key technology for future human and robotic space exploration. Wireless mesh networks enable rapid deployment, provide coverage in undeveloped regions. Mesh networks are also self-healing, resilient, and extensible, qualities not found in traditional infrastructure-based networks. Mesh networks can offer lower size, weight, and power (SWaP) than overlapped infrastructure-perapplication. To better understand the maturity, characteristics and capability of the technology, we developed an 802.11 mesh network consisting of a combination of heterogeneous commercial off-the-shelf devices and opensource firmware and software packages. Various streaming applications were operated over the mesh network, including voice and video, and performance measurements were made under different operating scenarios. During the testing several issues with the currently implemented mesh network technology were identified and outlined for future work.

  7. Coexistence: Threat to the Performance of Heterogeneous Network

    Science.gov (United States)

    Sharma, Neetu; Kaur, Amanpreet

    2010-11-01

    Wireless technology is gaining broad acceptance as users opt for the freedom that only wireless network can provide. Well-accepted wireless communication technologies generally operate in frequency bands that are shared among several users, often using different RF schemes. This is true in particular for WiFi, Bluetooth, and more recently ZigBee. These all three operate in the unlicensed 2.4 GHz band, also known as ISM band, which has been key to the development of a competitive and innovative market for wireless embedded devices. But, as with any resource held in common, it is crucial that those technologies coexist peacefully to allow each user of the band to fulfill its communication goals. This has led to an increase in wireless devices intended for use in IEEE 802.11 wireless local area networks (WLANs) and wireless personal area networks (WPANs), both of which support operation in the crowded 2.4-GHz industrial, scientific and medical (ISM) band. Despite efforts made by standardization bodies to ensure smooth coexistence it may occur that communication technologies transmitting for instance at very different power levels interfere with each other. In particular, it has been pointed out that ZigBee could potentially experience interference from WiFi traffic given that while both protocols can transmit on the same channel, WiFi transmissions usually occur at much higher power level. In this work, we considered a heterogeneous network and analyzed the impact of coexistence between IEEE 802.15.4 and IEEE 802.11b. To evaluate the performance of this network, measurement and simulation study are conducted and developed in the QualNet Network simulator, version 5.0.Model is analyzed for different placement models or topologies such as Random. Grid & Uniform. Performance is analyzed on the basis of characteristics such as throughput, average jitter and average end to end delay. Here, the impact of varying different antenna gain & shadowing model for this

  8. A novel and efficient user access control scheme for wireless body area sensor networks

    Directory of Open Access Journals (Sweden)

    Santanu Chatterjee

    2014-07-01

    Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.

  9. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chenyu Wang

    2017-12-01

    Full Text Available As an essential part of Internet of Things (IoT, wireless sensor networks (WSNs have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows–Abadi–Needham (BAN logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme.

  10. Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks.

    Science.gov (United States)

    Park, YoHan; Park, YoungHo

    2016-12-14

    Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.'s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment.

  11. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks.

    Science.gov (United States)

    Wang, Chenyu; Xu, Guoai; Sun, Jing

    2017-12-19

    As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows-Abadi-Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme.

  12. Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks

    Science.gov (United States)

    Park, YoHan; Park, YoungHo

    2016-01-01

    Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.’s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment. PMID:27983616

  13. Social Network Perspective: Model of Student Knowledge Sharing On Social Network Media

    OpenAIRE

    Bentar Priyopradono; Danny Manongga; Wiranto H. Utomo

    2012-01-01

    Recently, the role and development of information technology especially the internet, gives impact and influence in social relationship especially for social network site services users. The impact and influence the use of Internet which is related to exchange information and knowledge sharing still become one of the interesting topics to be researched. Now, the use of social media network by students are the best way to them to increase their knowledge as communication media such as, exchang...

  14. EconBiz — Meeting User Needs with New Technology

    Directory of Open Access Journals (Sweden)

    Tamara Pianos

    2010-08-01

    Full Text Available Virtual libraries try to combine traditional library services with new document types and services. The first generation of virtual libraries mostly tried to offer services based on a library-centric view of information retrieval systems. New virtual libraries try to concentrate on user's needs, but this is often easier said than done. Restrictions like copyright laws, technical limitations and the like often make it difficult to meet user requirements. A number of studies documented these needs: easy-to-use, comprehensive yet focussed search, and easy access to print and online documents, subject specific, yet not too restricted to specific areas. The new EconBiz-portal, relaunched in August 2010, has a disciplinary focus on business and economics and related subjects. It includes about 6 million records from different databases. Based on search-engine technology Lucene/Solr, combined with a metadata framework developed by the ZBW, it allows fast, convenient and complex searches. The integration of the Standard-Thesaurus-for Economics supports researchers by suggesting key words and related terms. Information on the availability of the documents is also included. Documents can either be accessed online or ways are shown to material that is available in print only. Journals Online & Print, a service developed by the German Electronic Journals Library (EZB and the German Union Catalogue of Serials (ZDB is included to provide easy access to all forms of journals. In addition, services like an event calendar, a tutorial on how to find information and an online-reference desk help to cater to the user's complex needs. The new EconBiz-portal was developed by the ZBW in close cooperation with the USB Cologne. Major parts of the search engine framework were developed by a company specialized in information technology. This paper elaborates on the extraction of users' requirements from different studies, the deduction of functional requirements, and

  15. PERANCANGAN VIRTUAL PRIVATE NETWORK DENGAN SERVER LINUX PADA PT. DHARMA GUNA SAKTI

    Directory of Open Access Journals (Sweden)

    Siswa Trihadi

    2008-05-01

    Full Text Available Purpose of this research is to analyze and design a network between head and branch office, andcompany mobile user, which can be used to increase performance and effectiveness of company in doingtheir business process. There were 3 main methods used in this research, which were: library study, analysis,and design method. Library study method was done by searching theoretical sources, knowledge, and otherinformation from books, articles in library, and internet pages. Analysis method was done by doing anobservation on company network, and an interview to acquire description of current business process andidentify problems which can be solved by using a network technology. Meanwhile, the design method wasdone by making a topology network diagram, and determining elements needed to design a VPN technology,then suggesting a configuration system, and testing to know whether the suggested system could run well ornot. The result is that network between the head and branch office, and the mobile user can be connectedsuccessfully using a VPN technology. In conclusion, with the connected network between the head andbranch office can create a centralization of company database, and a suggested VPN network has run well byencapsulating data packages had been sent.Keywords: network, Virtual Private Network (VPN, library study, analysis, design

  16. Analog-to-digital clinical data collection on networked workstations with graphic user interface.

    Science.gov (United States)

    Lunt, D

    1991-02-01

    An innovative respiratory examination system has been developed that combines physiological response measurement, real-time graphic displays, user-driven operating sequences, and networked file archiving and review into a scientific research and clinical diagnosis tool. This newly constructed computer network is being used to enhance the research center's ability to perform patient pulmonary function examinations. Respiratory data are simultaneously acquired and graphically presented during patient breathing maneuvers and rapidly transformed into graphic and numeric reports, suitable for statistical analysis or database access. The environment consists of the hardware (Macintosh computer, MacADIOS converters, analog amplifiers), the software (HyperCard v2.0, HyperTalk, XCMDs), and the network (AppleTalk, fileservers, printers) as building blocks for data acquisition, analysis, editing, and storage. System operation modules include: Calibration, Examination, Reports, On-line Help Library, Graphic/Data Editing, and Network Storage.

  17. Digital Native and Digital Immigrant Use of Scholarly Network for Doctoral Learners

    Directory of Open Access Journals (Sweden)

    Ronald Berman

    2014-01-01

    Full Text Available The Doctoral Community Network (DC is a learner driven, scholarly community designed to help online doctoral learners successfully complete their dissertation and program of study. While digital natives grew up in an environment immersed in technology, digital immigrants adapted to this environment through their ability to learn and adjust to new technologies. With several thousand Doctoral Community Network users, it was not known to what extent digital immigrants had embraced the technology. A study of 988 users determined that digital immigrants used the Doctoral Community Network more often and for a larger variety of purposes than digital natives did. Specifically, digital immigrants log-on more frequently, view leadership content at higher rates, read more blogs, use more doctoral community network research resources, and send and receive more peer messages than digital natives do. This research supports existing literature that found that digital immigrants possess higher levels of social reliance than digital natives while contradicting other literature that found that digital natives tend to use the internet for social networking and blog diaries at higher rates.

  18. Older adults' perspectives on the process of becoming users of assistive technology: a qualitative systematic review and meta-synthesis.

    Science.gov (United States)

    Larsen, Stina Meyer; Mortensen, Rikke Falgreen; Kristensen, Hanne Kaae; Hounsgaard, Lise

    2018-04-22

    To identify, synthesize, and evaluate existing literature concerning the process of becoming a user of assistive technology (AT). A systematic review and meta-synthesis were carried out. Five bibliographic databases (MEDLINE via PubMed, CINAHL, Web of Science, PsycINFO and SocINDEX) were systematically searched up to 13 th of March 2017, using two sets of search terms: (i) elderly and synonyms and (ii) assistive technology and similar words, and combined with a qualitative research filter. Articles were screened, read and critically assessed. The meta-synthesis was guided by Ricoeur's theory of interpretation. Seventeen out of 4645 articles were included. Five phases emerged relating to the process of becoming a user of AT: phase A: Evaluating need, phase B: Acknowledging need, phase C: Incorporating the AT into daily life, phase D: Using the AT, and phase E: Future use. Three transitions, describing factors essential to moving from one phase to the next, were identified; from phase A-B: Valued activities are threatened, from phase B-C: Obtaining the AT and from phase C-D: Trust in the AT. No transition was identified from phase D-E. The meta-synthesis led to a deeper understanding of the process of older adults becoming users of AT, by exploring findings across the included articles. The identified phases and transitions in the systematic review serve as an analytical framework for understanding the process from the older adult's perspective. This review advocates for using a client-centred approach throughout the entire delivery process. Implications for rehabilitation The process of the older adult becoming a user of AT involves an individualized time factor, and this supports the practice of individualized follow-up. The process of becoming a user of AT is closely related to self-image; healthcare professionals should support not only the use of AT but also the older adult's emotional adjustment to a new self-image. The process is highly influenced by the older

  19. A Neural Network Approach to Intention Modeling for User-Adapted Conversational Agents

    Directory of Open Access Journals (Sweden)

    David Griol

    2016-01-01

    Full Text Available Spoken dialogue systems have been proposed to enable a more natural and intuitive interaction with the environment and human-computer interfaces. In this contribution, we present a framework based on neural networks that allows modeling of the user’s intention during the dialogue and uses this prediction to dynamically adapt the dialogue model of the system taking into consideration the user’s needs and preferences. We have evaluated our proposal to develop a user-adapted spoken dialogue system that facilitates tourist information and services and provide a detailed discussion of the positive influence of our proposal in the success of the interaction, the information and services provided, and the quality perceived by the users.

  20. Distracted: Academic Performance Differences between Teen Users and Non-Users of MySpace and other Communication Technology

    Directory of Open Access Journals (Sweden)

    Tamyra A. Pierce

    2008-06-01

    Full Text Available This study examined the differences in academic performance between teen users and non-users of various communication technologies. Participants included 517 high school students who completed a self-report survey. The results revealed that approximately 3/4 of the teens had a MySpace account and a cell phone and more than 1/2 had an IM account. Results also showed that those who had a MySpace account, cell phone and IM had signifi cantly lower grades than those who did not. Results also revealed that teens who used their MySpace, cell phone and IM while doing their homework reported having lower grades than those who did not use the technology while doing their homework. In addition, those who put off doing their homework to spend time on MySpace also reported lower grades than those who did not put off doing their homework to spend time with MySpace. Finally, results showed that 28% text messaged during class from always to frequently, and 5% reported text messaging during an exam from always to frequently.

  1. Designing wireless sensor networks for hydrological and water resource applications: A purpose-oriented approach

    Science.gov (United States)

    Mao, F.; Hannah, D. M.; Krause, S.; Clark, J.; Buytaert, W.; Ochoa-Tocachi, B. F.

    2017-12-01

    There have been a growing number of studies using low-cost wireless sensor networks (LCWSNs) in hydrology and water resources fields. By reviewing the development of sensing and wireless communication technologies, as well as the recent relevant projects and applications, we observe that the challenges in applying LCWSNs have been moving beyond technical aspects. The large pool of available low-cost network modules, such as Arduino, Raspberry Pi, Xbee and inexpensive sensors, enable us to assemble networks rather than building them from scratch. With a wide variety of costs, functions and features, these modules support customisation of hydrological monitoring network for different user groups and purposes. Therefore, more attentions are needed to be placed on how to better design tailored LCWSNs with current technologies that create more added value for users. To address this challenge, this research proposes a tool-box for what we term `purpose-oriented' LCWSN. We identify the main LCWSN application scenarios from literature, and compare them from three perspectives including (1) the major stakeholders in each scenario, (2) the purposes for stakeholders, and (3) the network technologies and settings that meet the purposes. Notably, this innovative approach designs LCWSNs for different scenarios with considerations of not only technologies, but also stakeholders and purposes that are related to the usability, maintenance and social sustainability of networks. We conclude that this new, purpose-orientated approach can further release the potential of hydrological and water resources LCWSNs to maximise benefits for users and wider society.

  2. The Users' Views on Different Types of Instructional Materials Provided in Virtual Reality Technologies

    Science.gov (United States)

    Yildirim, Gürkan

    2017-01-01

    Today, it is seen that developing technologies are tried to be used continuously in the learning environments. These technologies have rapidly been diversifying and changing. Recently, virtual reality technology has become one of the technologies that experts have often been dwelling on. The present research tries to determine users' opinions and…

  3. [Medical doctors driving technological innovation: questions about and innovation management approaches to incentive structures for lead users].

    Science.gov (United States)

    Bohnet-Joschko, Sabine; Kientzler, Fionn

    2010-01-01

    Management science defines user-generated innovations as open innovation and lead user innovation. The medical technology industry finds user-generated innovations profitable and even indispensable. Innovative medical doctors as lead users need medical technology innovations in order to improve patient care. Their motivation to innovate is mostly intrinsic. But innovations may also involve extrinsic motivators such as gain in reputation or monetary incentives. Medical doctors' innovative activities often take place in hospitals and are thus embedded into the hospital's organisational setting. Hospitals find it difficult to gain short-term profits from in-house generated innovations and sometimes hesitate to support them. Strategic investment in medical doctors' innovative activities may be profitable for hospitals in the long run if innovations provide first-mover competitive advantages. Industry co-operations with innovative medical doctors offer chances but also bear potential risks. Innovative ideas generated by expert users may result in even higher complexity of medical devices; this could cause mistakes when applied by less specialised users and thus affect patient safety. Innovations that yield benefits for patients, medical doctors, hospitals and the medical technology industry can be advanced by offering adequate support for knowledge transfer and co-operation models.

  4. Power-Hop: A Pervasive Observation for Real Complex Networks

    Science.gov (United States)

    2016-03-14

    e.g., power grid, the Internet and the web-graph), social (e.g., friendship networks — Facebook , Gowalla—and co- authorship networks ), urban (e.g...Mislove A., Cha M. and Gummadi K.P. On the evolution of user interaction in Facebook . In Proc. Workshop on Online Social Networks 2009. doi...scale-free distribution is pervasive and describes a large variety of networks , ranging from social and urban to technological and biological networks

  5. User Adaptive and Context-Aware Smart Home Using Pervasive and Semantic Technologies

    Directory of Open Access Journals (Sweden)

    Aggeliki Vlachostergiou

    2016-01-01

    Full Text Available Ubiquitous Computing is moving the interaction away from the human-computer paradigm and towards the creation of smart environments that users and things, from the IoT perspective, interact with. User modeling and adaptation is consistently present having the human user as a constant but pervasive interaction introduces the need for context incorporation towards context-aware smart environments. The current article discusses both aspects of the user modeling and adaptation as well as context awareness and incorporation into the smart home domain. Users are modeled as fuzzy personas and these models are semantically related. Context information is collected via sensors and corresponds to various aspects of the pervasive interaction such as temperature and humidity, but also smart city sensors and services. This context information enhances the smart home environment via the incorporation of user defined home rules. Semantic Web technologies support the knowledge representation of this ecosystem while the overall architecture has been experimentally verified using input from the SmartSantander smart city and applying it to the SandS smart home within FIRE and FIWARE frameworks.

  6. Opinion Mining for User Generated Design By Social Networking Service and Japanese Manga

    Directory of Open Access Journals (Sweden)

    Anak Agung Gede Dharma

    2011-12-01

    Full Text Available The growth of Social Networking Service (SNS has created a new potential in marketing. While users communicate and interact via SNS, the list of their conversation, which is called casual data can be used to determine their needs or aspirations. SNS can be very useful for product/service developers, especially when developing new ideas or simply evaluating the feasibility of their existing products/services. Furthermore, SNS provides a unique system that enables expressive and two-way communication between its users. SNS is known for its effectiveness in delivering fresh news and information, thus it can be used as promotional media. Although several online services that utilize SNS and casual data have been provided, the purpose of those services is still unclear and ineffective. In those services, users were only asked for their opinions without receiving sufficient feedbacks. Therefore, to solve these problems we propose an innovative way of utilizing SNS and casual data in designing user generated design. In our proposed system, users can directly contribute to the product/service development process in an interesting way. We designed an online service, which allows users to posts manga that describes their original idea. While contributing to the product/service development, they can also benefit from expressing their hobbies and receiving feedbacks from other users.

  7. User Behavior Analytics

    Energy Technology Data Exchange (ETDEWEB)

    Turcotte, Melissa [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Moore, Juston Shane [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-02-28

    User Behaviour Analytics is the tracking, collecting and assessing of user data and activities. The goal is to detect misuse of user credentials by developing models for the normal behaviour of user credentials within a computer network and detect outliers with respect to their baseline.

  8. Ad hoc laser networks component technology for modular spacecraft

    Science.gov (United States)

    Huang, Xiujun; Shi, Dele; Shen, Jingshi

    2017-10-01

    Distributed reconfigurable satellite is a new kind of spacecraft system, which is based on a flexible platform of modularization and standardization. Based on the module data flow analysis of the spacecraft, this paper proposes a network component of ad hoc Laser networks architecture. Low speed control network with high speed load network of Microwave-Laser communication mode, no mesh network mode, to improve the flexibility of the network. Ad hoc Laser networks component technology was developed, and carried out the related performance testing and experiment. The results showed that ad hoc Laser networks components can meet the demand of future networking between the module of spacecraft.

  9. European network for health technology assessment, EUnetHTA: planning, development, and implementation of a sustainable European network for health technology assessment

    DEFF Research Database (Denmark)

    Kristensen, Finn Børlum; Mäkelä, Marjukka; Neikter, Susanna Allgurin

    2009-01-01

    OBJECTIVES: The European network on Health Technology Assessment (EUnetHTA) aimed to produce tangible and practical results to be used in the various phases of health technology assessment and to establish a framework and processes to support this. This article presents the background, objectives......, and organization of EUnetHTA, which involved a total of sixty-four partner organizations. METHODS: Establishing an effective and sustainable structure for a transnational network involved many managerial, policy, and methodological tools, according to the objective of each task or Work Package. Transparency...... the use of HTA at national and regional levels. Responsiveness to political developments in Europe should be balanced with maintaining a high level of ambition to promote independent, evidence-based information and well-tested tools for best practice based on a strong network of HTA institutions....

  10. User-friendly technology to help family carers cope.

    Science.gov (United States)

    Chambers, Mary; Connor, Samantha L

    2002-12-01

    Increases in the older adult population are occurring simultaneously with a growth in new technology. Modern technology presents an opportunity to enhance the quality of life and independence of older people and their family carers through communication and access to health care information. To evaluate the usability of a multimedia software application designed to provide family carers of the elderly or disabled with information, advice and psychological support to increase their coping capacity. The interactive application consisted of an information-based package that provided carers with advice on the promotion of psychological health, including relaxation and other coping strategies. The software application also included a carer self-assessment instrument, designed to provide both family and professional carers with information to assess how family carers were coping with their care-giving role. Usability evaluation was carried out in two stages. In the first stage (verification), user trials and an evaluation questionnaire were used to refine and develop the content and usability of the multimedia software application. In the second (demonstration), stage evaluation questionnaires were used to appraise the usability of the modified software application. The findings evidenced that the majority of users found the software to be usable and informative. Some areas were highlighted for improvement in the navigation of the software. The authors conclude that with further refinement, the software application has the potential to offer information and support to those who are caring for the elderly and disabled at home.

  11. A Sensitive Secondary Users Selection Algorithm for Cognitive Radio Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Aohan Li

    2016-03-01

    Full Text Available Secondary Users (SUs are allowed to use the temporarily unused licensed spectrum without disturbing Primary Users (PUs in Cognitive Radio Ad Hoc Networks (CRAHNs. Existing architectures for CRAHNs impose energy-consuming Cognitive Radios (CRs on SUs. However, the advanced CRs will increase energy cost for their cognitive functionalities, which is undesirable for the battery powered devices. A new architecture referred to as spectral Requirement-based CRAHN (RCRAHN is proposed to enhance energy efficiency for CRAHNs in this paper. In RCRAHNs, only parts of SUs are equipped with CRs. SUs equipped with CRs are referred to as Cognitive Radio Users (CRUs. To further enhance energy efficiency of CRAHNs, we aim to select minimum CRUs to sense available spectrum. A non-linear programming problem is mathematically formulated under the constraints of energy efficiency and real-time. Considering the NP-hardness of the problem, a framework of a heuristic algorithm referred to as Sensitive Secondary Users Selection (SSUS was designed to compute the near-optimal solutions. The simulation results demonstrate that SSUS not only improves the energy efficiency, but also achieves satisfied performances in end-to-end delay and communication reliability.

  12. A Sensitive Secondary Users Selection Algorithm for Cognitive Radio Ad Hoc Networks.

    Science.gov (United States)

    Li, Aohan; Han, Guangjie; Wan, Liangtian; Shu, Lei

    2016-03-26

    Secondary Users (SUs) are allowed to use the temporarily unused licensed spectrum without disturbing Primary Users (PUs) in Cognitive Radio Ad Hoc Networks (CRAHNs). Existing architectures for CRAHNs impose energy-consuming Cognitive Radios (CRs) on SUs. However, the advanced CRs will increase energy cost for their cognitive functionalities, which is undesirable for the battery powered devices. A new architecture referred to as spectral Requirement-based CRAHN (RCRAHN) is proposed to enhance energy efficiency for CRAHNs in this paper. In RCRAHNs, only parts of SUs are equipped with CRs. SUs equipped with CRs are referred to as Cognitive Radio Users (CRUs). To further enhance energy efficiency of CRAHNs, we aim to select minimum CRUs to sense available spectrum. A non-linear programming problem is mathematically formulated under the constraints of energy efficiency and real-time. Considering the NP-hardness of the problem, a framework of a heuristic algorithm referred to as Sensitive Secondary Users Selection (SSUS) was designed to compute the near-optimal solutions. The simulation results demonstrate that SSUS not only improves the energy efficiency, but also achieves satisfied performances in end-to-end delay and communication reliability.

  13. Evaluation of high-performance network technologies for ITER

    International Nuclear Information System (INIS)

    Zagar, K.; Hunt, S.; Kolaric, P.; Sabjan, R.; Zagar, A.; Dedic, J.

    2010-01-01

    For the fast feedback plasma controllers, ITER's Control, Data Access and Communication system (CODAC) will need to provide a mechanism for hard real-time communication between its distributed nodes. In particular, the ITER CODAC team identified four types of high-performance communication applications. Synchronous Databus Network (SDN) is to provide an ability to distribute parameters of plasma (estimated to about 5000 double-valued signals) across the system to allow for 1 ms control cycles. Event Distribution Network (EDN) and Time Communication Network (TCN) are to allow synchronization of node I/O operations to 10 ns. Finally, the Audio-Video Network (AVN) is to provide sufficient bandwidth for streaming of surveillance and diagnostics video at a high resolution (1024 x 1024) and frame rate (30 Hz). In this article, we present some combinations of common-off-the-shelf (COTS) technologies that allow the above requirements to be met. Also, we present the performances achieved in a practical (though small scale) technology demonstrator, which involved a real-time Linux operating running on National Instruments' PXI platform, UDP communication implemented directly atop the Ethernet network adapter, CISCO switches, Micro Research Finland's timing and event solution, and GigE audio-video streaming.

  14. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-08-16

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  15. Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'.

    Science.gov (United States)

    Khan, Muhammad Khurram; Alghathbar, Khaled

    2010-01-01

    User authentication in wireless sensor networks (WSN) is a critical security issue due to their unattended and hostile deployment in the field. Since sensor nodes are equipped with limited computing power, storage, and communication modules; authenticating remote users in such resource-constrained environments is a paramount security concern. Recently, M.L. Das proposed a two-factor user authentication scheme in WSNs and claimed that his scheme is secure against different kinds of attack. However, in this paper, we show that the M.L. Das-scheme has some critical security pitfalls and cannot be recommended for real applications. We point out that in his scheme: users cannot change/update their passwords, it does not provide mutual authentication between gateway node and sensor node, and is vulnerable to gateway node bypassing attack and privileged-insider attack. To overcome the inherent security weaknesses of the M.L. Das-scheme, we propose improvements and security patches that attempt to fix the susceptibilities of his scheme. The proposed security improvements can be incorporated in the M.L. Das-scheme for achieving a more secure and robust two-factor user authentication in WSNs.

  16. Research of application mode for FTTX technology

    Science.gov (United States)

    Wang, Zhong; Yun, Xiang; Huang, Wei

    2009-08-01

    With rapid development of Internet and broadband access network, the technologies of xDSL, FTTx+LAN, WLAN have more applications, new network service emerges in endless stream, especially the increase of network game, meeting TV, video on demand, etc. FTTH supports all present and future service with enormous bandwidth, including traditional telecommunication service, traditional data service and traditional TV service, and the future digital TV and VOD. With huge bandwidth of FTTH, it wins the final solution of broadband network, becomes the final goal of development of optical access network. In this paper, technique theory of EPON is introduced at first. At the same time, MAC frame structure, automatic detection and ranging of MPCP, DBA,and multi-LLID of EPON is analyzed. Then, service development ability, cost advantage and maintenance superiority based on EPON technology are carried out. At last,with Cost comparison between FTTH / FTTB building model and the traditional model, FTTB + LAN mode which is suitable for the newadding residential users in general areas and FTTN + DSL mode which is suitable for the old city and rural access network transformation are built up in detail. And FTTN + DSL project of rural information in rural areas and FTTH broadband HOUSE project on service solutions program are analyzed. comparing to the traditional access technologies, EPON technology has the obvious advantages, such as distance transmission, high or wide band, saving line resources, service abilities, etc. These are the qualities which not only be served for home users, but solve more access problems for us effectively.

  17. An Australian Perspective On The Challenges For Computer And Network Security For Novice End-Users

    Directory of Open Access Journals (Sweden)

    Patryk Szewczyk

    2012-12-01

    Full Text Available It is common for end-users to have difficulty in using computer or network security appropriately and thus have often been ridiculed when misinterpreting instructions or procedures. This discussion paper details the outcomes of research undertaken over the past six years on why security is overly complex for end-users. The results indicate that multiple issues may render end-users vulnerable to security threats and that there is no single solution to address these problems. Studies on a small group of senior citizens has shown that educational seminars can be beneficial in ensuring that simple security aspects are understood and used appropriately.

  18. International Symposium on Computing and Network Sustainability

    CERN Document Server

    Akashe, Shyam

    2017-01-01

    The book is compilation of technical papers presented at International Research Symposium on Computing and Network Sustainability (IRSCNS 2016) held in Goa, India on 1st and 2nd July 2016. The areas covered in the book are sustainable computing and security, sustainable systems and technologies, sustainable methodologies and applications, sustainable networks applications and solutions, user-centered services and systems and mobile data management. The novel and recent technologies presented in the book are going to be helpful for researchers and industries in their advanced works.

  19. Multi-user software of radio therapeutical calculation using a computational network

    International Nuclear Information System (INIS)

    Allaucca P, J.J.; Picon C, C.; Zaharia B, M.

    1998-01-01

    It has been designed a hardware and software system for a radiotherapy Department. It runs under an Operative system platform Novell Network sharing the existing resources and of the server, it is centralized, multi-user and of greater safety. It resolves a variety of problems and calculation necessities, patient steps and administration, it is very fast and versatile, it contains a set of menus and options which may be selected with mouse, direction arrows or abbreviated keys. (Author)

  20. The Impact of Culture On Smart Community Technology: The Case of 13 Wikipedia Instances

    Directory of Open Access Journals (Sweden)

    Zinayida Petrushyna

    2014-11-01

    Full Text Available Smart communities provide technologies for monitoring social behaviors inside communities. The technologies that support knowledge building should consider the cultural background of community members. The studies of the influence of the culture on knowledge building is limited. Just a few works consider digital traces of individuals that they explain using cultural values and beliefs. In this work, we analyze 13 Wikipedia instances where users with different cultural background build knowledge in different ways. We compare edits of users. Using social network analysis we build and analyze co- authorship networks and watch the networks evolution. We explain the differences we have found using Hofstede dimensions and Schwartz cultural values and discuss implications for the design of smart community technologies. Our findings provide insights in requirements for technologies used for smart communities in different cultures.

  1. A User Cooperation Stimulating Strategy Based on Cooperative Game Theory in Cooperative Relay Networks

    Directory of Open Access Journals (Sweden)

    Ping Zhang

    2009-01-01

    Full Text Available This paper proposes a user cooperation stimulating strategy among rational users. The strategy is based on cooperative game theory and enacted in the context of cooperative relay networks. Using the pricing-based mechanism, the system is modeled initially with two nodes and a Base Station (BS. Within this framework, each node is treated as a rational decision maker. To this end, each node can decide whether to cooperate and how to cooperate. Cooperative game theory assists in providing an optimal system utility and provides fairness among users. Under different cooperative forwarding modes, certain questions are carefully investigated, including “what is each node's best reaction to maximize its utility?” and “what is the optimal reimbursement to encourage cooperation?” Simulation results show that the nodes benefit from the proposed cooperation stimulating strategy in terms of utility and thus justify the fairness between each user.

  2. A User Cooperation Stimulating Strategy Based on Cooperative Game Theory in Cooperative Relay Networks

    Directory of Open Access Journals (Sweden)

    Jiang Fan

    2009-01-01

    Full Text Available This paper proposes a user cooperation stimulating strategy among rational users. The strategy is based on cooperative game theory and enacted in the context of cooperative relay networks. Using the pricing-based mechanism, the system is modeled initially with two nodes and a Base Station (BS. Within this framework, each node is treated as a rational decision maker. To this end, each node can decide whether to cooperate and how to cooperate. Cooperative game theory assists in providing an optimal system utility and provides fairness among users. Under different cooperative forwarding modes, certain questions are carefully investigated, including "what is each node's best reaction to maximize its utility?" and "what is the optimal reimbursement to encourage cooperation?" Simulation results show that the nodes benefit from the proposed cooperation stimulating strategy in terms of utility and thus justify the fairness between each user.

  3. Stochastic User Equilibrium Assignment in Schedule-Based Transit Networks with Capacity Constraints

    Directory of Open Access Journals (Sweden)

    Wangtu Xu

    2012-01-01

    Full Text Available This paper proposes a stochastic user equilibrium (SUE assignment model for a schedule-based transit network with capacity constraint. We consider a situation in which passengers do not have the full knowledge about the condition of the network and select paths that minimize a generalized cost function encompassing five components: (1 ride time, which is composed of in-vehicle and waiting times, (2 overload delay, (3 fare, (4 transfer constraints, and (5 departure time difference. We split passenger demands among connections which are the space-time paths between OD pairs of the network. All transit vehicles have a fixed capacity and operate according to some preset timetables. When the capacity constraint of the transit line segment is reached, we show that the Lagrange multipliers of the mathematical programming problem are equivalent to the equilibrium passenger overload delay in the congested transit network. The proposed model can simultaneously predict how passengers choose their transit vehicles to minimize their travel costs and estimate the associated costs in a schedule-based congested transit network. A numerical example is used to illustrate the performance of the proposed model.

  4. End User Development Toolkit for Developing Physical User Interface Applications

    OpenAIRE

    Abrahamsen, Daniel T; Palfi, Anders; Svendsen, Haakon Sønsteby

    2014-01-01

    BACKGROUND: Tangible user interfaces and end user development are two increasingresearch areas in software technology. Physical representation promoteopportunities to ease the use of technology and reinforce personality traits ascreativeness, collaboration and intuitive actions. However, designing tangibleuser interfaces are both cumbersome and require several layers of architecture.End user development allows users with no programming experience to createor customize their own applications. ...

  5. TECHNOLOGY TRANSFER NETWORKS ON PAPAYA PRODUCTION WITH TRANSITIONAL GROWERS

    Directory of Open Access Journals (Sweden)

    Octavio Cano-Reyes

    2012-11-01

    Full Text Available Social networks analysis applied to rural innovation processes becomes a very useful technology transfer tool, since it helps to understand the complexity of social relationships among people and/or institutions in their environment, and it also defines those innovation networks given in specific working groups or regions. This study was conducted from April to May 2011 to determine those networks and key players present in the group of growers associated as “Productora y Comercializadora de Papaya de Cotaxtla S.P.R. de R.L.”, that influence the technology transfer process in Cotaxtla, Veracruz, Mexico. Data were analyzed using UCINET 6 software. Three centrality measures were obtained: range, degree of mediation and closeness. Of 32 network players, 27 actively diffuse innovations according to their interests; alliances must be established with them to transfer technology. Four growers stand out as central actors, which along with the Instituto Nacional de Investigaciones Forestales Agricolas y Pecuarias, the Colegio de Postgraduados and the growers’ organization itself, could be the most appropriate actors to establish a technology transfer program to accelerate the diffusion and adoption of innovations. Wholesalers, middlemen and credit institutions do not participate in this process, but having capital they could be incorporated in the innovation diffusion process.

  6. Implementing Virtual Private Networking for Enabling Lower Cost, More Secure Wide Area Communications at Sandia National Laboratories; TOPICAL

    International Nuclear Information System (INIS)

    MILLER, MARC M.; YONEK JR., GEORGE A.

    2001-01-01

    Virtual Private Networking is a new communications technology that promises lower cost, more secure wide area communications by leveraging public networks such as the Internet. Sandia National Laboratories has embraced the technology for interconnecting remote sites to Sandia's corporate network, and for enabling remote access users for both dial-up and broadband access

  7. Termite: Emulation Testbed for Encounter Networks

    Directory of Open Access Journals (Sweden)

    Rodrigo Bruno

    2015-08-01

    Full Text Available Cutting-edge mobile devices like smartphones and tablets are equipped with various infrastructureless wireless interfaces, such as WiFi Direct and Bluetooth. Such technologies allow for novel mobile applications that take advantage of casual encounters between co-located users. However, the need to mimic the behavior of real-world encounter networks makes testing and debugging of such applications hard tasks. We present Termite, an emulation testbed for encounter networks. Our system allows developers to run their applications on a virtual encounter network emulated by software. Developers can model arbitrary encounter networks and specify user interactions on the emulated virtual devices. To facilitate testing and debugging, developers can place breakpoints, inspect the runtime state of virtual nodes, and run experiments in a stepwise fashion. Termite defines its own Petri Net variant to model the dynamically changing topology and synthesize user interactions with virtual devices. The system is designed to efficiently multiplex an underlying emulation hosting infrastructure across multiple developers, and to support heterogeneous mobile platforms. Our current system implementation supports virtual Android devices communicating over WiFi Direct networks and runs on top of a local cloud infrastructure. We evaluated our system using emulator network traces, and found that Termite is expressive and performs well.

  8. Digital Native and Digital Immigrant Use of Scholarly Network for Doctoral Learners

    OpenAIRE

    Ronald Berman; Deliesha Hassell

    2014-01-01

    The Doctoral Community Network (DC) is a learner driven, scholarly community designed to help online doctoral learners successfully complete their dissertation and program of study. While digital natives grew up in an environment immersed in technology, digital immigrants adapted to this environment through their ability to learn and adjust to new technologies. With several thousand Doctoral Community Network users, it was not known to what extent digital immigrants had embraced the technolog...

  9. A pervasive health monitoring service system based on ubiquitous network technology.

    Science.gov (United States)

    Lin, Chung-Chih; Lee, Ren-Guey; Hsiao, Chun-Chieh

    2008-07-01

    The phenomenon of aging society has derived problems such as shortage of medical resources and reduction of quality in healthcare services. This paper presents a system infrastructure for pervasive and long-term healthcare applications, i.e. a ubiquitous network composed of wireless local area network (WLAN) and cable television (CATV) network serving as a platform for monitoring physiological signals. Users can record vital signs including heart rate, blood pressure, and body temperature anytime either at home or at frequently visited public places in order to create a personal health file. The whole system was formally implemented in December 2004. Analysis of 2000 questionnaires indicates that 85% of users were satisfied with the provided community-wide healthcare services. Among the services provided by our system, health consultation services offered by family doctors was rated the most important service by 17.9% of respondents, and was followed by control of one's own health condition (16.4% of respondents). Convenience of data access was rated most important by roughly 14.3% of respondents. We proposed and implemented a long-term healthcare system integrating WLAN and CATV networks in the form of a ubiquitous network providing a service platform for physiological monitoring. This system can classify the health levels of the resident according to the variation tendency of his or her physiological signal for important reference of health management.

  10. User profiles and personas in the design and development of consumer health technologies.

    Science.gov (United States)

    LeRouge, Cynthia; Ma, Jiao; Sneha, Sweta; Tolle, Kristin

    2013-11-01

    "The graying of the globe" has resulted in exponential rise in health care expenses, over-worked health care professionals and a growing patient base suffering from multiple chronic diseases, one of which is diabetes. Consumer health technologies (CHT) are considered important catalysts for empowering health care consumers to take a proactive role in managing their health and related costs. Adoption rate and usability of such devices among the aging is far from being satisfactory. Past studies noted the motivation for adoption by the aging is dependent on the suitability/relevance, perceived usability and anticipated benefits associated with usage of technological innovation. Traditional information technology (IT) development adopts a systematic approach without necessarily using a specific user model that personalizes the system to the aging user groups. The aging patient population has unique needs arising from progressive deterioration in both physiological and psychological abilities. These needs are often ignored in the design, development, trial and adoption of consumer health products resulting in low adoption and usage. The main objective of this research is to investigate the user-centered design (UCD), specifically user profiles and personas, as methodological tools to inform the design and development of CHT devices for an aging population. The adoption of user profile and persona has not received much attention in health care informatics research and, in particular, research involving CHT. Our work begins to fill this void in three ways. We (1) illuminate the process of developing CHT user profiles and personas for a Chinese elder population with a demanding health care needs, i.e., self-management of chronic diabetes, with the hope that the resulting profiles and personas may be used as foundational material for informing the design, development and evaluation of CHT in other similar contexts; (2) call attention to how to further enhance and

  11. Real-time video streaming in mobile cloud over heterogeneous wireless networks

    Science.gov (United States)

    Abdallah-Saleh, Saleh; Wang, Qi; Grecos, Christos

    2012-06-01

    Recently, the concept of Mobile Cloud Computing (MCC) has been proposed to offload the resource requirements in computational capabilities, storage and security from mobile devices into the cloud. Internet video applications such as real-time streaming are expected to be ubiquitously deployed and supported over the cloud for mobile users, who typically encounter a range of wireless networks of diverse radio access technologies during their roaming. However, real-time video streaming for mobile cloud users across heterogeneous wireless networks presents multiple challenges. The network-layer quality of service (QoS) provision to support high-quality mobile video delivery in this demanding scenario remains an open research question, and this in turn affects the application-level visual quality and impedes mobile users' perceived quality of experience (QoE). In this paper, we devise a framework to support real-time video streaming in this new mobile video networking paradigm and evaluate the performance of the proposed framework empirically through a lab-based yet realistic testing platform. One particular issue we focus on is the effect of users' mobility on the QoS of video streaming over the cloud. We design and implement a hybrid platform comprising of a test-bed and an emulator, on which our concept of mobile cloud computing, video streaming and heterogeneous wireless networks are implemented and integrated to allow the testing of our framework. As representative heterogeneous wireless networks, the popular WLAN (Wi-Fi) and MAN (WiMAX) networks are incorporated in order to evaluate effects of handovers between these different radio access technologies. The H.264/AVC (Advanced Video Coding) standard is employed for real-time video streaming from a server to mobile users (client nodes) in the networks. Mobility support is introduced to enable continuous streaming experience for a mobile user across the heterogeneous wireless network. Real-time video stream packets

  12. Sparks in the Fog: Social and Economic Mechanisms as Enablers for Community Network Clouds

    Directory of Open Access Journals (Sweden)

    Muhammad Amin KHAN

    2014-10-01

    Full Text Available Internet and communication technologies have lowered the costs of enabling individuals and communities to collaborate together. This collaboration has provided new services like user-generated content and social computing, as evident from success stories like Wikipedia. Through collaboration, collectively built infrastructures like community wireless mesh networks where users provide the communication network, have also emerged. Community networks have demonstrated successful bandwidth sharing, but have not been able to extend their collective effort to other computing resources like storage and processing. The success of cloud computing has been enabled by economies of scale and the need for elastic, flexible and on-demand provisioning of computing services. The consolidation of today’s cloud technologies offers now the possibility of collectively built community clouds, building upon user-generated content and user-provided networks towards an ecosystem of cloud services. We explore in this paper how social and economic mechanisms can play a role in overcoming the barriers of voluntary resource provisioning in such community clouds, by analysing the costs involved in building these services and how they give value to the participants. We indicate socio-economic policies and how they can be implemented in community networks, to ease the uptake and ensure the sustainability of community clouds.

  13. Analysis of Network Parameters Influencing Performance of Hybrid Multimedia Networks

    Directory of Open Access Journals (Sweden)

    Dominik Kovac

    2013-10-01

    Full Text Available Multimedia networks is an emerging subject that currently attracts the attention of research and industrial communities. This environment provides new entertainment services and business opportunities merged with all well-known network services like VoIP calls or file transfers. Such a heterogeneous system has to be able satisfy all network and end-user requirements which are increasing constantly. Therefore the simulation tools enabling deep analysis in order to find the key performance indicators and factors which influence the overall quality for specific network service the most are highly needed. This paper provides a study on the network parameters like communication technology, routing protocol, QoS mechanism, etc. and their effect on the performance of hybrid multimedia network. The analysis was performed in OPNET Modeler environment and the most interesting results are discussed at the end of this paper

  14. Recon2Neo4j: applying graph database technologies for managing comprehensive genome-scale networks.

    Science.gov (United States)

    Balaur, Irina; Mazein, Alexander; Saqi, Mansoor; Lysenko, Artem; Rawlings, Christopher J; Auffray, Charles

    2017-04-01

    The goal of this work is to offer a computational framework for exploring data from the Recon2 human metabolic reconstruction model. Advanced user access features have been developed using the Neo4j graph database technology and this paper describes key features such as efficient management of the network data, examples of the network querying for addressing particular tasks, and how query results are converted back to the Systems Biology Markup Language (SBML) standard format. The Neo4j-based metabolic framework facilitates exploration of highly connected and comprehensive human metabolic data and identification of metabolic subnetworks of interest. A Java-based parser component has been developed to convert query results (available in the JSON format) into SBML and SIF formats in order to facilitate further results exploration, enhancement or network sharing. The Neo4j-based metabolic framework is freely available from: https://diseaseknowledgebase.etriks.org/metabolic/browser/ . The java code files developed for this work are available from the following url: https://github.com/ibalaur/MetabolicFramework . ibalaur@eisbm.org. Supplementary data are available at Bioinformatics online. © The Author 2016. Published by Oxford University Press.

  15. Virtual Social Networks Online and Mobile Systems

    Directory of Open Access Journals (Sweden)

    Maytham Safar

    2009-01-01

    Full Text Available Location-based applications are one of the most anticipated new segments of the mobile industry. These new applications are enabled by GPS-equipped phones (e.g., emergency applications, buddy finders, games, location-based advertising, etc.. These services are designed to give consumers instant access to personalized, local content of their immediate location. Some applications couple LBS with notification services, automatically alerting users when they are close to a pre-selected destination. With the advances in the Internet and communications/mobile technology, it became vital to analyze the effect of such technologies on human communications. This work studies how humans can construct social networks as a method for group communications using the available technologies. We constructed and analyzed a friends network using different parameters. The parameters that were calculated to analyze the network are the distribution sequence, characteristic path length, clustering coefficient and centrality measures. In addition, we built a PDA application that implements the concept of LBS using two system modules. In the first module, we have developed an application for entertainment purpose; an application program which enables end users to send their birth year and get their horoscope in return. The second part of the project was, to build an application, which helps people to stay in touch with their friends and family members (Find Friend. It helps users to find which of their buddies are within the same area they are in.

  16. Ensuring Energy Efficient 5G User Equipment by Technology Evolution and Reuse

    DEFF Research Database (Denmark)

    Lauridsen, Mads; Berardinelli, Gilberto; Sørensen, Troels Bundgaard

    2014-01-01

    the features’ pros and cons in achieving high performance in terms of data rate and/or latency while limiting their effect on the UE power consumption. Based on the discussion we give general recommendations for an energy efficient 5G design in the context of a previously proposed RAT concept.......Research on fifth generation (5G) radio access technology (RAT) is ramping up, with the goal of significantly improving user data rates and latency compared to previous radio generations. While energy efficiency (EE) of the user equipment (UE) was not a key optimization parameter for the current...... standards, it is anticipated to become a distinguishing factor for 5G. In this paper, we analyze established and emerging technological solutions for features such as waveform, frame structure, duplexing and multiple antenna transmission from an EE perspective. Our contribution is to identify and discuss...

  17. A Distributed Flow Rate Control Algorithm for Networked Agent System with Multiple Coding Rates to Optimize Multimedia Data Transmission

    Directory of Open Access Journals (Sweden)

    Shuai Zeng

    2013-01-01

    Full Text Available With the development of wireless technologies, mobile communication applies more and more extensively in the various walks of life. The social network of both fixed and mobile users can be seen as networked agent system. At present, kinds of devices and access network technology are widely used. Different users in this networked agent system may need different coding rates multimedia data due to their heterogeneous demand. This paper proposes a distributed flow rate control algorithm to optimize multimedia data transmission of the networked agent system with the coexisting various coding rates. In this proposed algorithm, transmission path and upload bandwidth of different coding rate data between source node, fixed and mobile nodes are appropriately arranged and controlled. On the one hand, this algorithm can provide user nodes with differentiated coding rate data and corresponding flow rate. On the other hand, it makes the different coding rate data and user nodes networked, which realizes the sharing of upload bandwidth of user nodes which require different coding rate data. The study conducts mathematical modeling on the proposed algorithm and compares the system that adopts the proposed algorithm with the existing system based on the simulation experiment and mathematical analysis. The results show that the system that adopts the proposed algorithm achieves higher upload bandwidth utilization of user nodes and lower upload bandwidth consumption of source node.

  18. Enabling mobile/wireless broadband technologies and services for the next billion users

    CSIR Research Space (South Africa)

    Mekuria, F

    2011-09-01

    Full Text Available devices, service activation and delivery will also be seamless. 3GPP UMTS-4G technology with the HSPA and LTE (long term evolution) capabilities are the industry?s favorite standard and choice for wireless broadband[1,2,14,15]. When it comes... interference as possible to existing primary users, in the case of licensed primary users in that frequency band. A sample of a white space measurement in using a spectrum monitoring device is depicted in Figure 4. Figure 4., Spectrum Between 800...

  19. Research of the self-healing technologies in the optical communication network of distribution automation

    Science.gov (United States)

    Wang, Hao; Zhong, Guoxin

    2018-03-01

    Optical communication network is the mainstream technique of the communication networks for distribution automation, and self-healing technologies can improve the in reliability of the optical communication networks significantly. This paper discussed the technical characteristics and application scenarios of several network self-healing technologies in the access layer, the backbone layer and the core layer of the optical communication networks for distribution automation. On the base of the contrastive analysis, this paper gives an application suggestion of these self-healing technologies.

  20. Unanticipated Effect of a Randomized Peer Network Intervention on Depressive Symptoms among Young Methamphetamine Users in Thailand

    Science.gov (United States)

    German, D.; Sutcliffe, C. G.; Sirirojn, B.; Sherman, S. G.; Latkin, C. A.; Aramrattana, A.; Celentano, D. D.

    2012-01-01

    We examined the effect on depressive symptoms of a peer network-oriented intervention effective in reducing sexual risk behavior and methamphetamine (MA) use. Current Thai MA users aged 18-25 years and their drug and/or sex network members enrolled in a randomized controlled trial with 4 follow-ups over 12 months. A total of 415 index participants…

  1. Wireless sensor communications and internet connectivity for sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Dunbar, M. [Crossbow Technology, Inc., San Jose, CA (United States)

    2001-07-01

    A wireless sensor network architecture is an integrated hardware/software solution that has the potential to change the way sensors are used in a virtually unlimited range of industries and applications. By leveraging Bluetooth wireless technology for low-cost, short-range radio links, wireless sensor networks such as CrossNet{sup TM} enable users to create wireless sensor networks. These wireless networks can link dozens or hundreds of sensors of disparate types and brands with data acquisition/analysis systems, such as handheld devices, internet-enabled laptop or desktop PCs. The overwhelming majority of sensor applications are hard-wired at present, and since wiring is often the most time-consuming, tedious, trouble-prone and expensive aspect of sensor applications, users in many fields will find compelling reasons to adopt the wireless sensor network solution. (orig.)

  2. THE PLACE OF FACEBOOK IN INTERNATIONAL SOCIAL NETWORK PORTFOLIO

    Directory of Open Access Journals (Sweden)

    ALIN CRISTIAN ISAC

    2012-12-01

    Full Text Available The paper aims to present a structure for social networks by various criteria, such as: user types, informational technology used as support and developed applications. Based on these elements, we presented Facebook not only in terms of user numbers and their evolution but also regarding the Facebook business, starting from share listing on international markets.

  3. New networks of technological creation in energy industries: reassessment of the roles of equipment suppliers and operators

    Energy Technology Data Exchange (ETDEWEB)

    Jacquier-Roux, V. [Institut de Recherche Economique sur la Production et le Developpement -IREPD, Universite Pierre Mendes-France, 38 - Grenoble (France); Bourgeois, B. [Institut d' Economie et de Politique de l' Energie - IEPE-CNRS/ Universite Pierre Mendes-France, 38 - Grenoble (France)

    2002-12-01

    Within a financial context of selection inducing either a decrease or a drop of their home research and development expenditures, energy industries companies have succeeded to maintain and even to increase their knowledge production during the last 15 years (1985 - 1998). To understand these apparently paradoxical changes, elements of analysis are looked for within an evolutionary framework, and more specially referring to the related developments to network-firms, user-supplier relationship, and interactive nature of innovation processes. Empirical data are set on granted patents to a sample of the top 15 world largest companies on both sides of operators and equipment suppliers, and for the two industries of oil production and power generation. Interpretation of the results suggests that two dynamics ought to be distinguished. On one side, dynamics of the networks of technological creation is characterized by an upstream going-up of the head of the network towards suppliers. On the other side networks of creation of competitive advantages and bargaining power continues to be based on the operators and their strategies of adaptation to the constraints and opportunities of their institutional, financial and competitive environment. (author)

  4. A flexible energy market - electric power reserves at the place of the end-user

    International Nuclear Information System (INIS)

    Livik, Klaus; Groenli, Helle; Fretheim, Stig; Feilberg, Nicolai; Gjervan, Sverre; Dymbe, Lars

    1996-01-01

    If short-term as well as long-term prices in the electric power market are to be stable, then the market must be flexible and both energy and power related efforts must be taken at the end-user's place. The report analyses what type of actors in the electric power market are profiting from a flexible end-user market for energy and power. It is found that a flexible market has utilitarian value for end-users, network owners, suppliers, market operators and system operators. It is also clearly desirable from the point of view of the authorities. Considerable possibilities of developing the flexible energy and power market exist at the end-user. The possibilities can be realized by means of technological developments and political incentives such as by rules for monopoly control. End-user measures may have considerable utilitarian value, socio economically. Especially in areas with high marginal costs of power transport will network owners see the advantages of such measures

  5. Incentive Mechanism for P2P Content Sharing over Heterogenous Access Networks

    Science.gov (United States)

    Sato, Kenichiro; Hashimoto, Ryo; Yoshino, Makoto; Shinkuma, Ryoichi; Takahashi, Tatsuro

    In peer-to-peer (P2P) content sharing, users can share their content by contributing their own resources to one another. However, since there is no incentive for contributing contents or resources to others, users may attempt to obtain content without any contribution. To motivate users to contribute their resources to the service, incentive-rewarding mechanisms have been proposed. On the other hand, emerging wireless technologies, such as IEEE 802.11 wireless local area networks, beyond third generation (B3G) cellular networks and mobile WiMAX, provide high-speed Internet access for wireless users. Using these high-speed wireless access, wireless users can use P2P services and share their content with other wireless users and with fixed users. However, this diversification of access networks makes it difficult to appropriately assign rewards to each user according to their contributions. This is because the cost necessary for contribution is different in different access networks. In this paper, we propose a novel incentive-rewarding mechanism called EMOTIVER that can assign rewards to users appropriately. The proposed mechanism uses an external evaluator and interactive learning agents. We also investigate a way of appropriately controlling rewards based on the system service's quality and managing policy.

  6. Performance Evaluation of TDMA Medium Access Control Protocol in Cognitive Wireless Networks

    Directory of Open Access Journals (Sweden)

    Muhammed Enes Bayrakdar

    2017-02-01

    Full Text Available Cognitive radio paradigm has been revealed as a new communication technology that shares channels in wireless networks. Channel assignment is a crucial issue in the field of cognitive wireless networks because of the spectrum scarcity. In this work, we have evaluated the performance of TDMA medium access control protocol. In our simulation scenarios, primary users and secondary users utilize TDMA as a medium access control protocol. We have designed a network environment in Riverbed simulation software that consists of primary users, secondary users, and base stations. In our system model, secondary users sense the spectrum and inform the base station about empty channels. Then, the base station decides accordingly which secondary user may utilize the empty channel. Energy detection technique is employed as a spectrum sensing technique because it is the best when information about signal of primary user is acquired. Besides, different number of users is selected in simulation scenarios in order to obtain accurate delay and throughput results. Comparing analytical model with simulation results, we have shown that performance analysis of our system model is consistent and accurate.

  7. Social acceptance of solar energy technologies in China-End users' perspective

    International Nuclear Information System (INIS)

    Yuan Xueliang; Zuo Jian; Ma Chunyuan

    2011-01-01

    Energy is essential to human beings. The increasing demand of energy has triggered the public scrutiny on the sustainability issues associated with the energy production and transmission. There have been a large number of studies focusing on reducing the environmental impacts associated with the energy sector. Renewable energy sources such as solar energy have been prompted to mitigate these environmental impacts. This research adopted a quantitative approach to investigate the social acceptance of solar energy technologies from end users' perspective in Shandong province, China. A large scale questionnaire survey was conducted. The results show that there is a considerable high level of social acceptance and public awareness of solar water heater. However, another major application of solar energy, solar PV has not gained a high level of social acceptance or public awareness in Shandong. This study provides useful references for policy makers to further promote the utilization of solar energy innovations. - Research Highlights: → Social acceptance of solar energy technologies from end users' perspective is investigated by a large scale questionnaire survey. → Higher level of social acceptance and public awareness of solar water heater than solar PV. → Impact factors for social acceptance of solar energy technologies are analyzed.

  8. Evaluation of High-Performance Network Technologies for ITER

    Energy Technology Data Exchange (ETDEWEB)

    Zagar, K.; Kolaric, P.; Sabjan, R.; Zagar, A. [Cosylab d.d., Ljubljana (Slovenia); Hunt, S. [Alceli Hunt Beratung, Meisterschwanden (Switzerland)

    2009-07-01

    To facilitate fast feedback control of plasma, ITER's Control, Data Access and Communication system (CODAC) will need to provide a mechanism for hard real-time communication between its distributed nodes. In particular, four types of high-performance communication have been identified. Synchronous Databus Network (SDN) is to provide an ability to distribute parameters of plasma (estimated to about 5000 double-valued signals) across the system to allow for 1 ms control cycles. Event Distribution Network (EDN) and Time Communication Network (TCN) are to allow synchronization of node I/O operations to 10 ns. Finally, the Audio Video Network (AVN) is to provide sufficient bandwidth for streaming of surveillance and diagnostics video at a high resolution (1024*1024) and frame rate (30 Hz). In this article, we present some combinations of common off-the-shelf (COTS) technologies that allow the above requirements to be met. Also, we present the performances achieved in a practical (though small scale) technology demonstrator, which involved a real-time LINUS operating running on National Instruments' PXI platform, UDP communication implemented directly atop the Ethernet network adapter, CISCO switches, Micro Research Finland's timing and event solution, and GigE audio-video streaming. This document is composed of an abstract followed by the presentation transparencies. (authors)

  9. Evaluation of high-performance network technologies for ITER

    Energy Technology Data Exchange (ETDEWEB)

    Zagar, K., E-mail: klemen.zagar@cosylab.co [Cosylab d.d., 1000 Ljubljana (Slovenia); Hunt, S. [Alceli Hunt Beratung, 5616 Meisterschwanden (Switzerland); Kolaric, P.; Sabjan, R.; Zagar, A.; Dedic, J. [Cosylab d.d., 1000 Ljubljana (Slovenia)

    2010-07-15

    For the fast feedback plasma controllers, ITER's Control, Data Access and Communication system (CODAC) will need to provide a mechanism for hard real-time communication between its distributed nodes. In particular, the ITER CODAC team identified four types of high-performance communication applications. Synchronous Databus Network (SDN) is to provide an ability to distribute parameters of plasma (estimated to about 5000 double-valued signals) across the system to allow for 1 ms control cycles. Event Distribution Network (EDN) and Time Communication Network (TCN) are to allow synchronization of node I/O operations to 10 ns. Finally, the Audio-Video Network (AVN) is to provide sufficient bandwidth for streaming of surveillance and diagnostics video at a high resolution (1024 x 1024) and frame rate (30 Hz). In this article, we present some combinations of common-off-the-shelf (COTS) technologies that allow the above requirements to be met. Also, we present the performances achieved in a practical (though small scale) technology demonstrator, which involved a real-time Linux operating running on National Instruments' PXI platform, UDP communication implemented directly atop the Ethernet network adapter, CISCO switches, Micro Research Finland's timing and event solution, and GigE audio-video streaming.

  10. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jaewook Jung

    2016-08-01

    Full Text Available In wireless sensor networks (WSNs, a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  11. 75 FR 57521 - Networking and Information Technology Research and Development (NITRD) Program: Draft NITRD 2010...

    Science.gov (United States)

    2010-09-21

    ... NATIONAL SCIENCE FOUNDATION Networking and Information Technology Research and Development (NITRD...) for Networking and Information Technology Research and Development (NITRD). ACTION: Notice, request.... SUMMARY: With this notice, the National Coordination Office for Networking and Information Technology...

  12. Nuclear technology databases and information network systems

    International Nuclear Information System (INIS)

    Iwata, Shuichi; Kikuchi, Yasuyuki; Minakuchi, Satoshi

    1993-01-01

    This paper describes the databases related to nuclear (science) technology, and information network. Following contents are collected in this paper: the database developed by JAERI, ENERGY NET, ATOM NET, NUCLEN nuclear information database, INIS, NUclear Code Information Service (NUCLIS), Social Application of Nuclear Technology Accumulation project (SANTA), Nuclear Information Database/Communication System (NICS), reactor materials database, radiation effects database, NucNet European nuclear information database, reactor dismantling database. (J.P.N.)

  13. Assessing user acceptance towards automated and conventional sink use for hand decontamination using the technology acceptance model.

    Science.gov (United States)

    Dawson, Carolyn H; Mackrill, Jamie B; Cain, Rebecca

    2017-12-01

    Hand hygiene (HH) prevents harmful contaminants spreading in settings including domestic, health care and food handling. Strategies to improve HH range from behavioural techniques through to automated sinks that ensure hand surface cleaning. This study aimed to assess user experience and acceptance towards a new automated sink, compared to a normal sink. An adapted version of the technology acceptance model (TAM) assessed each mode of handwashing. A within-subjects design enabled N = 46 participants to evaluate both sinks. Perceived Ease of Use and Satisfaction of Use were significantly lower for the automated sink, compared to the conventional sink (p technology. We provide recommendations for future HH technology development to contribute a positive user experience, relevant to technology developers, ergonomists and those involved in HH across all sectors. Practitioner Summary: The need to facilitate timely, effective hand hygiene to prevent illness has led to a rise in automated handwashing systems across different contexts. User acceptance is a key factor in system uptake. This paper applies the technology acceptance model as a means to explore and optimise the design of such systems.

  14. Software Defined Networks in Wireless Sensor Architectures

    Directory of Open Access Journals (Sweden)

    Jesús Antonio Puente Fernández

    2018-03-01

    Full Text Available Nowadays, different protocols coexist in Internet that provides services to users. Unfortunately, control decisions and distributed management make it hard to control networks. These problems result in an inefficient and unpredictable network behaviour. Software Defined Networks (SDN is a new concept of network architecture. It intends to be more flexible and to simplify the management in networks with respect to traditional architectures. Each of these aspects are possible because of the separation of control plane (controller and data plane (switches in network devices. OpenFlow is the most common protocol for SDN networks that provides the communication between control and data planes. Moreover, the advantage of decoupling control and data planes enables a quick evolution of protocols and also its deployment without replacing data plane switches. In this survey, we review the SDN technology and the OpenFlow protocol and their related works. Specifically, we describe some technologies as Wireless Sensor Networks and Wireless Cellular Networks and how SDN can be included within them in order to solve their challenges. We classify different solutions for each technology attending to the problem that is being fixed.

  15. Collaboration on technological innovation in Danish fashion chains: A network perspective

    DEFF Research Database (Denmark)

    Tambo, Torben

    2014-01-01

    and departments stores, technology and service providers, ownership structures and local level supply chain facilities. This paper analyses theoretical and empirical views of innovation in international retail networks using lead actors in the (Danish) fashion industry as a case to highlight how this industry...... in business networks. The network comprises an innovation system that focuses on organisational learning and iterative development of the intended technologies. Implications of the current study are suggestions to brand owners, network partners and retailers on how to identify, understand, support and promote......With brand owners struggling to compete with new products, physical production processes and sourcing logistics, innovation taking place in retail networks is often overlooked. Networks in retailing are comprised by the brand owner, the varieties of single- and multi-brand stores, chains...

  16. The key network communication technology in large radiation image cooperative process system

    International Nuclear Information System (INIS)

    Li Zheng; Kang Kejun; Gao Wenhuan; Wang Jingjin

    1998-01-01

    Large container inspection system (LCIS) based on radiation imaging technology is a powerful tool for the customs to check the contents inside a large container without opening it. An image distributed network system is composed of operation manager station, image acquisition station, environment control station, inspection processing station, check-in station, check-out station, database station by using advanced network technology. Mass data, such as container image data, container general information, manifest scanning data, commands and status, must be on-line transferred between different stations. Advanced network communication technology is presented

  17. Application and study of advanced network technology in large container inspection system

    International Nuclear Information System (INIS)

    Li Zheng; Kang Kejun; Gao Wenhuan; Wang Jingjin

    1996-01-01

    Large Container Inspection System (LCIS) based on radiation imaging technology is a powerful tool for the customs to check the contents inside a large container without opening it. An image distributed network system is composed of center manager station, image acquisition station, environment control station, inspection processing station, check-in station, check-out station, database station by using advanced network technology. Mass data, such as container image data, container general information, manifest scanning data, commands and status, must be on-line transferred between different stations. Advanced network technology and software programming technique are presented

  18. An exploration of options and functions of climate technology centres and networks. Discussion paper

    International Nuclear Information System (INIS)

    De Coninck, H.C.; Wuertenberger, L.; Cochran, J.; Cox, S.; Benioff, R.

    2010-11-01

    This paper responds to a request to UNEP from the UNFCCC Expert Group on Technology Transfer to examine operational modalities for climate technology centres and networks. The paper first discusses possible dimensions for the climate technology centre and network, and it reviews a number of existing networks and centres. It then distinguishes five options for the organizational structure and describes potential operational characteristics for each of these options. All options examined seek to build from existing climate and non-climate-related public and private technology centres, networks, and initiatives. Consistent with the UNFCCC negotiating text and draft technology decision, the paper evaluates potential implementation options and outcomes for each of the functions tentatively assigned to the climate technology centre and network, as well as selected functions of the technology executive committee. Approaches are offered for integrating delivery of these functions through coordinated programmes, and hypothetical examples are given to explain how the technology mechanism might add value in practice. The options presented in this paper are not an exhaustive treatment of potential structures or implementation approaches, and other approaches can be considered.

  19. Research and application of knowledge resources network for product innovation.

    Science.gov (United States)

    Li, Chuan; Li, Wen-qiang; Li, Yan; Na, Hui-zhen; Shi, Qian

    2015-01-01

    In order to enhance the capabilities of knowledge service in product innovation design service platform, a method of acquiring knowledge resources supporting for product innovation from the Internet and providing knowledge active push is proposed. Through knowledge modeling for product innovation based on ontology, the integrated architecture of knowledge resources network is put forward. The technology for the acquisition of network knowledge resources based on focused crawler and web services is studied. Knowledge active push is provided for users by user behavior analysis and knowledge evaluation in order to improve users' enthusiasm for participation in platform. Finally, an application example is illustrated to prove the effectiveness of the method.

  20. Sleep Scheduling Schemes Based on Location of Mobile User in Sensor-Cloud

    OpenAIRE

    N. Mahendran; R. Priya

    2016-01-01

    The mobile cloud computing (MCC) with wireless sensor networks (WSNs) technology gets more attraction by research scholars because its combines the sensors data gathering ability with the cloud data processing capacity. This approach overcomes the limitation of data storage capacity and computational ability of sensor nodes. Finally, the stored data are sent to the mobile users when the user sends the request. The most of the integrated sensor-cloud schemes fail to observe the following crite...

  1. Do technologies have politics? The new paradigm and pedagogy in networked learning

    OpenAIRE

    Jones, Chris

    2001-01-01

    This paper explores the relationships between the technologies deployed in networked and e-Learning and the pedagogies and politics associated with them. Networked learning and the related move to e-Learning are coincident with the globalisation, commodification and massification of Higher Education. It examines the hard and soft forms of technological determinism (TD) found in the current advocacy of technological futures for Higher Education. Hard TD claims that new technologies bring about...

  2. Networking of research information on global environment protection technologies; Chikyu kankyo taisaku gijutsu no kenkyu joho network jigyo

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-03-01

    Networking is being executed with an objective of exchanging information on global environment technologies at an international level. In order to further promote the information exchange, and to make web sites user-friendly, fiscal 1998 has performed structuring a thesis renewal system. As a result of structuring the thesis renewal system, researchers can use the system as using a word processor by inputting data from a terminal in their laboratories. The data can also be made into a data base nearly semi-automatically. In addition to reducing time loss, delay and input errors because of re-entry, the researchers can make the data into a database on nearly a real time basis, and can provide their own theses to any part of the world through Internet. With regard to retaining Internet security, the security software having been introduced last year was renewed. In addition, detailed status such as daily access has become possible of identification as a result of introducing the net intellect. (NEDO)

  3. Integrating pro-environmental behavior with transportation network modeling: User and system level strategies, implementation, and evaluation

    Science.gov (United States)

    Aziz, H. M. Abdul

    Personal transport is a leading contributor to fossil fuel consumption and greenhouse (GHG) emissions in the U.S. The U.S. Energy Information Administration (EIA) reports that light-duty vehicles (LDV) are responsible for 61% of all transportation related energy consumption in 2012, which is equivalent to 8.4 million barrels of oil (fossil fuel) per day. The carbon content in fossil fuels is the primary source of GHG emissions that links to the challenge associated with climate change. Evidently, it is high time to develop actionable and innovative strategies to reduce fuel consumption and GHG emissions from the road transportation networks. This dissertation integrates the broader goal of minimizing energy and emissions into the transportation planning process using novel systems modeling approaches. This research aims to find, investigate, and evaluate strategies that minimize carbon-based fuel consumption and emissions for a transportation network. We propose user and system level strategies that can influence travel decisions and can reinforce pro-environmental attitudes of road users. Further, we develop strategies that system operators can implement to optimize traffic operations with emissions minimization goal. To complete the framework we develop an integrated traffic-emissions (EPA-MOVES) simulation framework that can assess the effectiveness of the strategies with computational efficiency and reasonable accuracy. The dissertation begins with exploring the trade-off between emissions and travel time in context of daily travel decisions and its heterogeneous nature. Data are collected from a web-based survey and the trade-off values indicating the average additional travel minutes a person is willing to consider for reducing a lb. of GHG emissions are estimated from random parameter models. Results indicate that different trade-off values for male and female groups. Further, participants from high-income households are found to have higher trade-off values

  4. User's Guide for Mixed-Size Sediment Transport Model for Networks of One-Dimensional Open Channels

    Science.gov (United States)

    Bennett, James P.

    2001-01-01

    This user's guide describes a mathematical model for predicting the transport of mixed sizes of sediment by flow in networks of one-dimensional open channels. The simulation package is useful for general sediment routing problems, prediction of erosion and deposition following dam removal, and scour in channels at road embankment crossings or other artificial structures. The model treats input hydrographs as stepwise steady-state, and the flow computation algorithm automatically switches between sub- and supercritical flow as dictated by channel geometry and discharge. A variety of boundary conditions including weirs and rating curves may be applied both external and internal to the flow network. The model may be used to compute flow around islands and through multiple openings in embankments, but the network must be 'simple' in the sense that the flow directions in all channels can be specified before simulation commences. The location and shape of channel banks are user specified, and all bedelevation changes take place between these banks and above a user-specified bedrock elevation. Computation of sediment-transport emphasizes the sand-size range (0.0625-2.0 millimeter) but the user may select any desired range of particle diameters including silt and finer (user may set the original bed-sediment composition of any number of layers of known thickness. The model computes the time evolution of total transport and the size composition of bed- and suspended-load sand through any cross section of interest. It also tracks bed -surface elevation and size composition. The model is written in the FORTRAN programming language for implementation on personal computers using the WINDOWS operating system and, along with certain graphical output display capability, is accessed from a graphical user interface (GUI). The GUI provides a framework for selecting input files and parameters of a number of components of the sediment-transport process. There are no restrictions in the

  5. Organized technology. Networks and innovation in technical systems

    International Nuclear Information System (INIS)

    Shrum, W.

    1985-01-01

    The book is based on a study of radioactive waste and solar cell research. Social network methods are used to illuminate the differences between technologies such as nuclear waste disposal, dominated by the federal government, and potentially profitable technologies such as photovoltaics, where the private sector plays a larger role. The book examines the interaction of government agencies, national laboratories, private firms, universities, regulatory agencies, Congress, and public-interest groups in the technology development process

  6. Design mobile satellite system architecture as an integral part of the cellular access digital network

    Science.gov (United States)

    Chien, E. S. K.; Marinho, J. A.; Russell, J. E., Sr.

    1988-01-01

    The Cellular Access Digital Network (CADN) is the access vehicle through which cellular technology is brought into the mainstream of the evolving integrated telecommunications network. Beyond the integrated end-to-end digital access and per call network services provisioning of the Integrated Services Digital Network (ISDN), the CADN engenders the added capability of mobility freedom via wireless access. One key element of the CADN network architecture is the standard user to network interface that is independent of RF transmission technology. Since the Mobile Satellite System (MSS) is envisioned to not only complement but also enhance the capabilities of the terrestrial cellular telecommunications network, compatibility and interoperability between terrestrial cellular and mobile satellite systems are vitally important to provide an integrated moving telecommunications network of the future. From a network standpoint, there exist very strong commonalities between the terrestrial cellular system and the mobile satellite system. Therefore, the MSS architecture should be designed as an integral part of the CADN. This paper describes the concept of the CADN, the functional architecture of the MSS, and the user-network interface signaling protocols.

  7. US long distance fiber optic networks: Technology, evolution and advanced concepts. Volume 3: Advanced networks and economics

    Science.gov (United States)

    1986-10-01

    This study projects until 2000 the evolution of long distance fiber optic networks in the U.S. Volume 1 is the executive Summary. Volume 2 focuses on fiber optic components and systems that are directly related to the operation of long-haul networks. Optimistic, pessimistic and most likely scenarios of technology development are presented. The activities of national and regional companies implementing fiber long haul networks are also highlighted, along with an analysis of the market and regulatory forces affecting network evolution. Volume 3 presents advanced fiber optic network concept definitions. Inter-LATA traffic is quantified and forms the basis for the construction of 11-, 15-, 17-, and 23-node networks. Using the technology projections from Volume 2, a financial model identifies cost drivers and determines circuit mile costs between any two LATAs. A comparison of fiber optics with alternative transmission concludes the report.

  8. An Automatic User Grouping Model for a Group Recommender System in Location-Based Social Networks

    Directory of Open Access Journals (Sweden)

    Elahe Khazaei

    2018-02-01

    Full Text Available Spatial group recommendation refers to suggesting places to a given set of users. In a group recommender system, members of a group should have similar preferences in order to increase the level of satisfaction. Location-based social networks (LBSNs provide rich content, such as user interactions and location/event descriptions, which can be leveraged for group recommendations. In this paper, an automatic user grouping model is introduced that obtains information about users and their preferences through an LBSN. The preferences of the users, proximity of the places the users have visited in terms of spatial range, users’ free days, and the social relationships among users are extracted automatically from location histories and users’ profiles in the LBSN. These factors are combined to determine the similarities among users. The users are partitioned into groups based on these similarities. Group size is the key to coordinating group members and enhancing their satisfaction. Therefore, a modified k-medoids method is developed to cluster users into groups with specific sizes. To evaluate the efficiency of the proposed method, its mean intra-cluster distance and its distribution of cluster sizes are compared to those of general clustering algorithms. The results reveal that the proposed method compares favourably with general clustering approaches, such as k-medoids and spectral clustering, in separating users into groups of a specific size with a lower mean intra-cluster distance.

  9. Health Information Technology Systems profoundly impact users: a case study in a dental school.

    Science.gov (United States)

    Hill, Heather K; Stewart, Denice C L; Ash, Joan S

    2010-04-01

    The purpose of this study was to increase our understanding of the impact of Health Information Technology Systems (HITS) on dental school users when the systems are integrated into chair-side patient care. We used qualitative research methods, including interviews, focus groups, and observations, to capture the experiences of HITS users at a single institution. Users included administrators, clinical faculty members, predoctoral students, support staff, and residents. The data were analyzed using a grounded theory approach, and nine themes emerged: 1) HITS benefits were disproportionate among users; 2) communicating about the HITS was challenging; 3) users experienced a range of strong emotions; 4) the instructor persona diminished; 5) there were shifts in the school's power structure; 6) allocation of end-users' time shifted; 7) the training and support needs of end-users were significant; 8) perceived lack of HITS usability made documentation cumbersome for clinicians; and 9) clinicians' workflow was disrupted. HITS integration into patient care impacts the work of all system users, especially end-users. The themes highlight areas of potential concern for implementers and users in integrating a HITS into patient care.

  10. The Technological Advent and Dynamics of the Network Society. The "Middle-Aged Approach"

    Directory of Open Access Journals (Sweden)

    Elena Mădălina Vătămănescu

    2016-08-01

    Full Text Available Nowadays, scholars have become interested in the ways new media influence young people, but its influence on middle-aged people have not been thoroughly examined. This age category is often ignored as most of the online activities are performed by young persons. New media gathers a wide range of phenomena which may become concepts of the network society through their diversity, knowledge and novelty. Interactivity is the most important characteristic, turning the user into a content creator, not just into a receiver. Moreover, what was once considered to be a personal state of mind tends to become a part of the public domain. Starting from these premises, the article advances the idea that the Internet can be beneficial not just for teenagers, but also for the middle-aged group oriented towards keeping in touch with relatives and friends and towards finding online useful information. At this level, the present paper aims to discover directions given by network society in the lives of middle-aged people. To this end, the research relies on an interview-based survey which addresses the way people may adapt to communication technology and to its particularities, exploring advantages or discovering potential drawbacks.

  11. The construction of a public key infrastructure for healthcare information networks in Japan.

    Science.gov (United States)

    Sakamoto, N

    2001-01-01

    The digital signature is a key technology in the forthcoming Internet society for electronic healthcare as well as for electronic commerce. Efficient exchanges of authorized information with a digital signature in healthcare information networks require a construction of a public key infrastructure (PKI). In order to introduce a PKI to healthcare information networks in Japan, we proposed a development of a user authentication system based on a PKI for user management, user authentication and privilege management of healthcare information systems. In this paper, we describe the design of the user authentication system and its implementation. The user authentication system provides a certification authority service and a privilege management service while it is comprised of a user authentication client and user authentication serves. It is designed on a basis of an X.509 PKI and is implemented with using OpenSSL and OpenLDAP. It was incorporated into the financial information management system for the national university hospitals and has been successfully working for about one year. The hospitals plan to use it as a user authentication method for their whole healthcare information systems. One implementation of the system is free to the national university hospitals with permission of the Japanese Ministry of Education, Culture, Sports, Science and Technology. Another implementation is open to the other healthcare institutes by support of the Medical Information System Development Center (MEDIS-DC). We are moving forward to a nation-wide construction of a PKI for healthcare information networks based on it.

  12. Sharing cost in social community networks

    DEFF Research Database (Denmark)

    Pal, Ranjan; Elango, Divya; Wardana, Satya Ardhy

    2012-01-01

    their deployment in a residential locality. Our proposed mechanism accounts for heterogeneous user preferences towards different router features and comes up with the optimal (feature-set, user costs) router blueprint that satisfies each user in a locality, in turn motivating them to buy routers and thereby improve......Wireless social community networks (WSCNs) is an emerging technology that operate in the unlicensed spectrum and have been created as an alternative to cellular wireless networks for providing low-cost, high speed wireless data access in urban areas. WSCNs is an upcoming idea that is starting...... reflect their slow progress in capturing the WiFi router market. In this paper, we look at a router design and cost sharing problem in WSCNs to improve deployment. We devise a simple to implement, successful, budget-balanced, ex-post efficient, and individually rational auction-based mechanism...

  13. Computing and Network - Overview

    International Nuclear Information System (INIS)

    Jakubowski, Z.

    1999-01-01

    Full text: The responsibility of the Network Group covers: - providing central services like WWW, DNS (Domain Name Server), mail, etc.; - maintenance and support of the Local Area Networks,; - operation of the Wide Area Networks (LAN); - the support of the central UNIX servers and desktop workstations; - VAX/VMS cluster operation and support. The two-processor HP-UNIX K-200 and 6-processor SGI Challenge XL servers were delivering stable services to our users. Both servers were upgraded during the past year. SGI Challenge received additional 256 MB of memory. It was necessary in order to get all benefits of true 64-bit architecture of the SGI IRIX 6.2. The upgrade of our HP K-200 server were problematic so we decided to buy a new powerful machine and join the old and new machine via the fast network. Besides these main servers we have more than 30 workstations from IBM, DEC, HP, SGI and SUN. We observed a real race in PC technology in the past year. Intel processors deliver currently a performance that is comparable with HP or SUN workstations at very low costs. These CPU power is especially visible under Linux that is free Unix-like operating system. The clusters of cheap PC computers should be seriously considered in planning the computing power for the future experiments. The CPU power was further decentralized-smaller but powerful computers cover growing computing demands of our work-groups creating a small ''local computing centers''. The stable network and the concept of central services plays the essential role in this scenario. Unfortunately the network performance for the international communications is persistently unacceptable. We believe that attempts to join the European Quantum project is the only way to achieve the reasonable international network performance. In these plan polish scientific community will gain 34 Mbps international link. The growing costs of the ''real meetings'' give us no alternative to ''virtual meetings'' via the network in the

  14. Unethical Behaviours Preservice Teachers Encounter on Social Networks

    Science.gov (United States)

    Deveci Topal, Arzu; Kolburan Gecer, Aynur

    2015-01-01

    The development of web 2.0 technology has resulted in an increase in internet sharing. The scope of this study is social networking, which is one of the web 2.0 tools most heavily used by internet users. In this paper, the unethical behaviours that preservice teachers encounter on social networks and the ways to deal with these problems are…

  15. Outlier populations: individual and social network correlates of solvent-using injection drug users.

    Directory of Open Access Journals (Sweden)

    Souradet Y Shaw

    Full Text Available We previously identified a high prevalence of Hepatitis C (HCV amongst solvent-using injection drug users (S-IDU relative to other injection drug users within the same locality. Here we incorporated social network variables to better characterize some of the behavioural characteristics that may be putting this specific subgroup of IDU at elevated disease risk.A cross-sectional survey of at-risk populations was carried out in Winnipeg, Canada in 2009. Individuals reporting any history of injection drug and/or solvent use were included in the study. Associations between subgroup membership, infection with HCV and HIV and individual and social network variables were examined.In relation to other IDU, S-IDU were more likely to be infected with HCV, to report ever having shared a syringe, and to associate with other IDU. They were further differentiated in terms of their self-reported sexual orientation, ethnicity and in the injection drugs typically used.Solvent use stands as a proxy measure of numerous other characteristics that put this group of IDU at higher risk of infection. Provision of adequate services to ostracized subpopulations may result in wider population-level benefits.

  16. Network user's guide

    International Nuclear Information System (INIS)

    McGrady, P.W.

    1994-12-01

    NETWORK is a FORTRAN code used to model process flow systems in the gaseous diffusion plants at Portsmouth, Ohio and Paducah, Kentucky, operated by the United States Enrichment Corporation. It can handle a wide range of components and several different types of controllers. NETWORK can be run in either a steady-state mode or a transient mode. In the transient mode many different types of perturbations may be modeled. It is currently being used to model taking a cell off-stream in a gaseous diffusion plant. A brief description of the code is given, and process equipment models and input data are discussed

  17. Users as essential contributors to spatial cyberinfrastructures

    Science.gov (United States)

    Poore, B.S.

    2011-01-01

    Current accounts of spatial cyberinfrastructure development tend to overemphasize technologies to the neglect of critical social and cultural issues on which adoption depends. Spatial cyberinfrastructures will have a higher chance of success if users of many types, including nonprofessionals, are made central to the development process. Recent studies in the history of infrastructures reveal key turning points and issues that should be considered in the development of spatial cyberinfrastructure projects. These studies highlight the importance of adopting qualitative research methods to learn how users work with data and digital tools, and how user communities form. The author's empirical research on data sharing networks in the Pacific Northwest salmon crisis at the turn of the 21st century demonstrates that ordinary citizens can contribute critical local knowledge to global databases and should be considered in the design and construction of spatial cyberinfrastructures.

  18. Users as essential contributors to spatial cyberinfrastructures.

    Science.gov (United States)

    Poore, Barbara S

    2011-04-05

    Current accounts of spatial cyberinfrastructure development tend to overemphasize technologies to the neglect of critical social and cultural issues on which adoption depends. Spatial cyberinfrastructures will have a higher chance of success if users of many types, including nonprofessionals, are made central to the development process. Recent studies in the history of infrastructures reveal key turning points and issues that should be considered in the development of spatial cyberinfrastructure projects. These studies highlight the importance of adopting qualitative research methods to learn how users work with data and digital tools, and how user communities form. The author's empirical research on data sharing networks in the Pacific Northwest salmon crisis at the turn of the 21st century demonstrates that ordinary citizens can contribute critical local knowledge to global databases and should be considered in the design and construction of spatial cyberinfrastructures.

  19. The research of network database security technology based on web service

    Science.gov (United States)

    Meng, Fanxing; Wen, Xiumei; Gao, Liting; Pang, Hui; Wang, Qinglin

    2013-03-01

    Database technology is one of the most widely applied computer technologies, its security is becoming more and more important. This paper introduced the database security, network database security level, studies the security technology of the network database, analyzes emphatically sub-key encryption algorithm, applies this algorithm into the campus-one-card system successfully. The realization process of the encryption algorithm is discussed, this method is widely used as reference in many fields, particularly in management information system security and e-commerce.

  20. A unified plant information network

    International Nuclear Information System (INIS)

    Niederauer, G.F.

    1986-01-01

    Technology is bringing power plants fully into the age of computerization. Microcomputers, data base managers, networking, and friendly, expert software are principal technology factors. Monitoring will improve, and the number and power of computers is increasing. The huge information flow will cause computers to be integrated into a communication network. The total plant operating triangle includes process, engineering, and management systems. The total network will integrate all of these into a Total Unified Plant Information Network (TUPIN). Software will take the type of information beyond monitored data. Analysis will improve through direct access to logical, physical, and procedural models by end users. Information management will improve through widespread use of hierarchical, relational, and expert data base managers. Expert systems will aid in diagnostics and interpretation. The goal is to automate plant operations to enhance safety and performance and to reduce cost by making both the plants and the personnel more expert

  1. How user diversity and country of origin impact the readiness to adopt E-health technologies: an intercultural comparison.

    Science.gov (United States)

    Wilkowsk, Wiktoria; Ziefle, Martina; Alagöz, Firat

    2012-01-01

    In recent years, due to the demographical change and the resulting overload of healthcare systems, there has been an increasing interest focusing on the global proliferation of assistive medical technologies (=E-health) in home environments. The present study examines how users' diversity influences the readiness to adopt novel medical technologies, comparing users' attitudes in terms of perceived advantages and disadvantages in three technically and culturally different countries: Germany, Poland and Turkey. This investigation also intended to verify if acceptance of information and communication technologies is associated with the sensitive acceptance of E-health. Results revealed overall a considerably higher motivation to use medical technology compared to perceived barriers, with Polish users more willing to use E-health, higher than German or Turkish ones. Older participants showed a highly positive attitude, comparable to young and middle-aged respondents' receptiveness, differing from the latter in terms of greater appreciation of the advantage of higher independency when being supported by medical technology. With respect to gender, woman showed higher motivation to use E-health technology than men, although utilization barriers were not gendered. Following these results, an unconditional transfer of acceptance from information and communication to medical technology is not justified.

  2. Adaptive eye-gaze tracking using neural-network-based user profiles to assist people with motor disability.

    Science.gov (United States)

    Sesin, Anaelis; Adjouadi, Malek; Cabrerizo, Mercedes; Ayala, Melvin; Barreto, Armando

    2008-01-01

    This study developed an adaptive real-time human-computer interface (HCI) that serves as an assistive technology tool for people with severe motor disability. The proposed HCI design uses eye gaze as the primary computer input device. Controlling the mouse cursor with raw eye coordinates results in sporadic motion of the pointer because of the saccadic nature of the eye. Even though eye movements are subtle and completely imperceptible under normal circumstances, they considerably affect the accuracy of an eye-gaze-based HCI. The proposed HCI system is novel because it adapts to each specific user's different and potentially changing jitter characteristics through the configuration and training of an artificial neural network (ANN) that is structured to minimize the mouse jitter. This task is based on feeding the ANN a user's initially recorded eye-gaze behavior through a short training session. The ANN finds the relationship between the gaze coordinates and the mouse cursor position based on the multilayer perceptron model. An embedded graphical interface is used during the training session to generate user profiles that make up these unique ANN configurations. The results with 12 subjects in test 1, which involved following a moving target, showed an average jitter reduction of 35%; the results with 9 subjects in test 2, which involved following the contour of a square object, showed an average jitter reduction of 53%. For both results, the outcomes led to trajectories that were significantly smoother and apt at reaching fixed or moving targets with relative ease and within a 5% error margin or deviation from desired trajectories. The positive effects of such jitter reduction are presented graphically for visual appreciation.

  3. Energy-efficient peer-to-peer networking for constrained-capacity mobile environments

    OpenAIRE

    Harjula, E. (Erkki)

    2016-01-01

    Abstract Energy efficiency is a powerful measure for promoting sustainability in technological evolution and ensuring feasible battery life of end-user devices in mobile computing. Peer-to-peer technology provides decentralized and self-organizing architecture for distributing content between devices in networks that scale up almost infinitely. However, peer-to-peer networking may require lots of resources from peer nodes, which in turn may lead to increased energy consumption on mobile d...

  4. The GEOSS Science and Technology Stakeholder Network and Service Suite: Linking S&T Communities and GEOSS

    Science.gov (United States)

    Plag, Hans-Peter; Jules-Plag, Shelley

    2015-04-01

    The Global Earth Observation System of Systems (GEOSS) developed by the Group on Earth Observations (GEO) aims to provide practice-relevant knowledge in support of decision making in a wide range of societal benefit areas. Generating this practice-relevant knowledge based on Earth observations, socio-economic data and models often depends on research, and utilization of the societal benefits of EOs requires the involvement of science and research communities. Building a GEOSS responding to the needs of a wide range of users necessitates contributions from many science and technology (S&T) communities. In particular, a strong engagement of science and technology (S&T) communities in both the development and use of GEOSS is necessary to address the complex issues associated with the on-going transition out of the Holocene. S&T support is needed to improve interoperability between global observing, modeling, and information systems; to enable data integration across disciplinary boundaries; to facilitate data sharing, archiving, dissemination, and reanalysis; to optimize the recording of observations, assimilation of data into models, and generation of data products; to enhance the value of observations from individual observing systems through their integration in the SBAs; and to harmonize well-calibrated, highly accurate, stable, sustained in-situ and satellite observations of the same variable recorded by different sensors and different agencies. Consequently, the GEO Work Plan includes several Tasks focusing on outreach to S&T communities, and most of the GEO Community of Practice have a strong S&T component. The GEOSS S&T Stakeholder Network facilitates input from S&T communities to GEO. Infrastructure serving and linking S&T users communities and GEOSS has been developed and is integrated into a GEOSS S&T Service Suite (GSTSS). The GSTSS has several outreach components for the demonstration of GEOSS and its value for S&T communities, and for services supporting

  5. Louisiana coastal GIS network: Graphical user interface for access to spatial data

    Science.gov (United States)

    Hiland, Matteson; McBride, Randolph A.; Davis, Donald; Braud, Dewitt; Streiffer, Henry; Jones, Farrell; Lewis, Anthony; Williams, S.

    1991-01-01

    Louisiana's coastal wetlands support a large percentage of the nation's seafood and fur industries, vast deposits of oil and natural gas, habitat for thousands of species of plants and animals, winter nesting grounds and migratory paths for numerous waterfowl, and many recreational resources enjoyed by residents and tourists. Louisiana's wetlands also have the highest rates of coastal erosion and wetland loss in the nation. While numerous studies across many disciplines have been conducted on both local and regional scales, no complete inventory exists for this information. The Louisiana Coastal Geographic Information System Network (LCGISN) is currently being developed to facilitate access to existing data for coastal zone planners, managers, and researchers. The Louisiana Geological Survey (LGS), in cooperation with the LSU Department of Geography and Anthropology, the Computer Aided Design and Geographic Information Systems Research Laboratory (CADGIS), and others, is pursuing this project under the terms of a cooperative agreement with the U.S. Geological Survey. LCGISN is an automated system for searching and retrieving geographic, cartographic, and bibliographic data. By linking original programming with an existing GIS software package and an industry standard relational database management system, LCGISN will provide the capability for users to search for data references by interactively defining the area of interest on a displayed map/image reference background. Several agencies will be networked to provide easy access to a wide variety of information. LCGISN, with its headquarters at LGS, will serve as the central node on the network, providing data format conversions, projection and datum transformations, and storage of several of the most commonly used data sets. Thematic mapper data, USGS 7.5-minute quadrangle map boundaries, political and legal boundaries, major transportation routes, and other digital data will provide a base map to aid the user in

  6. Performance Analysis of Routing Protocols in Ad-hoc and Sensor Networking Environments

    Directory of Open Access Journals (Sweden)

    L. Gavrilovska

    2009-06-01

    Full Text Available Ad-hoc and sensor networks are becoming an increasingly popular wireless networking concepts lately. This paper analyzes and compares prominent routing schemes in these networking environments. The knowledge obtained can serve users to better understand short range wireless network solutions thus leading to options for implementation in various scenarios. In addition, it should aid researchers develop protocol improvements reliable for the technologies of interest.

  7. Topic Augmented Convolutional Neural Network for User Interest Recognition%基于主题增强卷积神经网络的用户兴趣识别

    Institute of Scientific and Technical Information of China (English)

    杜雨萌; 张伟男; 刘挺

    2018-01-01

    With the development of mobile Internet technology and the popularity of mobile terminals,there have been many social websites and applications on the Internet.As a social application,microblog has attracted a large number of users,with its convenience of operation and rapid propagation.A user receiving hundreds of microblogs every day,which leads to the situation of information overload,increases the difficulty of the user's information and knowledge acquisition.On the other hand,more and more merchants treat microblog as a marketing platform,which makes the advertisements directed delivery become a problem with highly commercial value.Microblog user interest recognition can contribute to solve the problems discussed above.This paper proposes a topic augmented convolutional neural network approach to recognize user interest.By integrating the continuous semantic information and the discrete topic information,the proposed approach first obtains the category distribution of users' microblogs.It then recognizes users' interest through the maximum likelihood estimation over the category distribution of users' microblogs.Experimental results show that the proposed topic augmented convolutional neural network approach outperforms the labeled LDA based approach and the traditional convolutional neural network approach significantly on the microblog classification and user interest recognition.%提出了一种基于主题增强卷积神经网络的用户兴趣识别的方法,通过构造一个双通道CNN模型,融合连续语义信息和离散主题信息,获取用户微博类别分布,在此基础上,通过极大似然估计识别用户的兴趣.实验结果表明,相较于基于Labeled LDA主题模型的方法和传统卷积神经网络的方法,提出的主题增强卷积神经网络缓解了噪声词对用户兴趣词的影响,并且通过融入主题信息提高了对于包含噪声词较多的微博的分类效果,在微博分类及用户兴趣识别上的效果获得了显著的提升.

  8. MUPBED - interworking challenges in a multi-domain and multi-technology network environment

    DEFF Research Database (Denmark)

    Foisel, Hans-Martin; Spaeth, Jan; Cavazzoni, Carlo

    2007-01-01

    Todays data transport networks are evolving continuously towards customer oriented and application aware networks. This evolution happens in Europe in a highly diverse network environment, covering multiple network domains, layers, technologies, control and management approaches. In this paper...

  9. The application of somputer and network technology in the realm of petroleum

    International Nuclear Information System (INIS)

    Liu Wei

    2003-01-01

    In the our country petroleum industry inside, the computer and network technology have become the important tools of exploring and developing new oil fields. Using jumped-up and most advanced computer and network technology will carve out wider foreground for the development of the petroleum realm. (authors)

  10. Game-theoretic pricing for video streaming in mobile networks.

    Science.gov (United States)

    Lin, W Sabrina; Liu, K J Ray

    2012-05-01

    Mobile phones are among the most popular consumer devices, and the recent developments of 3G networks and smart phones enable users to watch video programs by subscribing data plans from service providers. Due to the ubiquity of mobile phones and phone-to-phone communication technologies, data-plan subscribers can redistribute the video content to nonsubscribers. Such a redistribution mechanism is a potential competitor for the mobile service provider and is very difficult to trace given users' high mobility. The service provider has to set a reasonable price for the data plan to prevent such unauthorized redistribution behavior to protect or maximize his/her own profit. In this paper, we analyze the optimal price setting for the service provider by investigating the equilibrium between the subscribers and the secondary buyers in the content-redistribution network. We model the behavior between the subscribers and the secondary buyers as a noncooperative game and find the optimal price and quantity for both groups of users. Based on the behavior of users in the redistribution network, we investigate the evolutionarily stable ratio of mobile users who decide to subscribe to the data plan. Such an analysis can help the service provider preserve his/her profit under the threat of the redistribution networks and can improve the quality of service for end users.

  11. Increasing the coverage area through relay node deployment in long term evolution advanced cellular networks

    Science.gov (United States)

    Aldhaibani, Jaafar A.; Ahmad, R. B.; Yahya, A.; Azeez, Suzan A.

    2015-05-01

    Wireless multi-hop relay networks have become very important technologies in mobile communications. These networks ensure high throughput and coverage extension with a low cost. The poor capacity at cell edges is not enough to meet with growing demand of high capacity and throughput irrespective of user's placement in the cellular network. In this paper we propose optimal placement of relay node that provides maximum achievable rate at users and enhances the throughput and coverage at cell edge region. The proposed scheme is based on the outage probability at users and taken on account the interference between nodes. Numerical analyses along with simulation results indicated there are an improvement in capacity for users at the cell edge is 40% increment from all cell capacity.

  12. Information Technology Service

    International Nuclear Information System (INIS)

    Ageron, M.; Boninchi, V.; Chartoire, M.; Combroux, A.; Giraud, N.; Jacquet, G.; Lagrange, B.; Malleret, S.; Martin, C.; Mas, J.; Morgue, M.; Ollivier, T.

    1998-01-01

    The information technology service works out the choices concerning the information technology systems of general use in the laboratory: computers, network, peripherals, workstations, software. It intervenes at the same time in the definition of the procedures and equipment specific to the research groups. The entire data acquisition is centralized by the service. The personnel is sharing the following two large directions of activities: - management of information technology park (setup, configuration and maintenance of the materials and soft ensemble, training and assistance afforded to users); - participation in software projects either in elaboration of applications or in realization and maintenance of specific tools

  13. RESEARCH OF ENGINEERING TRAFFIC IN COMPUTER UZ NETWORK USING MPLS TE TECHNOLOGY

    Directory of Open Access Journals (Sweden)

    V. M. Pakhomovа

    2014-12-01

    Full Text Available Purpose. In railway transport of Ukraine one requires the use of computer networks of different technologies: Ethernet, Token Bus, Token Ring, FDDI and others. In combined computer networks on the railway transport it is necessary to use packet switching technology in multiprotocol networks MPLS (MultiProtocol Label Switching more effectively. They are based on the use of tags. Packet network must transmit different types of traffic with a given quality of service. The purpose of the research is development a methodology for determining the sequence of destination flows for the considered fragment of computer network of UZ. Methodology. When optimizing traffic management in MPLS networks has the important role of technology traffic engineering (Traffic Engineering, TE. The main mechanism of TE in MPLS is the use of unidirectional tunnels (MPLS TE tunnel to specify the path of the specified traffic. The mathematical model of the problem of traffic engineering in computer network of UZ technology MPLS TE was made. Computer UZ network is represented with the directed graph, their vertices are routers of computer network, and each arc simulates communication between nodes. As an optimization criterion serves the minimum value of the maximum utilization of the TE-tunnel. Findings. The six options destination flows were determined; rational sequence of flows was found, at which the maximum utilization of TE-tunnels considered a simplified fragment of a computer UZ network does not exceed 0.5. Originality. The method of solving the problem of traffic engineering in Multiprotocol network UZ technology MPLS TE was proposed; for different classes its own way is laid, depending on the bandwidth and channel loading. Practical value. Ability to determine the values of the maximum coefficient of use of TE-tunnels in computer UZ networks based on developed software model «TraffEng». The input parameters of the model: number of routers, channel capacity, the

  14. Plugging 3G mobile networks into the internet : a prototype-based evaluation

    NARCIS (Netherlands)

    Oredope, A.; Liotta, A.

    2006-01-01

    The third generation mobile network aims at providing present and future Internet services everywhere and at anytime using cellular technologies. This is based on its all-IP core network known as the IP multimedia subsystem which provides end-users with better QoS, charging and integration of

  15. The Networking and Information Technology Research and Development NITRD Program 2012 Strategic Plan

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — Information technology IT computers, wired and wireless digital networks, electronic data and information, IT devices and systems, and software applications?today...

  16. A phone-assistive device based on Bluetooth technology for cochlear implant users.

    Science.gov (United States)

    Qian, Haifeng; Loizou, Philipos C; Dorman, Michael F

    2003-09-01

    Hearing-impaired people, and particularly hearing-aid and cochlear-implant users, often have difficulty communicating over the telephone. The intelligibility of telephone speech is considerably lower than the intelligibility of face-to-face speech. This is partly because of lack of visual cues, limited telephone bandwidth, and background noise. In addition, cellphones may cause interference with the hearing aid or cochlear implant. To address these problems that hearing-impaired people experience with telephones, this paper proposes a wireless phone adapter that can be used to route the audio signal directly to the hearing aid or cochlear implant processor. This adapter is based on Bluetooth technology. The favorable features of this new wireless technology make the adapter superior to traditional assistive listening devices. A hardware prototype was built and software programs were written to implement the headset profile in the Bluetooth specification. Three cochlear implant users were tested with the proposed phone-adapter and reported good speech quality.

  17. Network Edge Intelligence for the Emerging Next-Generation Internet

    Directory of Open Access Journals (Sweden)

    Salekul Islam

    2010-11-01

    Full Text Available The success of the Content Delivery Networks (CDN in the recent years has demonstrated the increased benefits of the deployment of some form of “intelligence” within the network. Cloud computing, on the other hand, has shown the benefits of economies of scale and the use of a generic infrastructure to support a variety of services. Following that trend, we propose to move away from the smart terminal-dumb network dichotomy to a model where some degree of intelligence is put back into the network, specifically at the edge, with the support of Cloud technology. In this paper, we propose the deployment of an Edge Cloud, which integrates a variety of user-side and server-side services. On the user side, surrogate, an application running on top of the Cloud, supports a virtual client. The surrogate hides the underlying network infrastructure from the user, thus allowing for simpler, more easily managed terminals. Network side services supporting delivery of and exploiting content are also deployed on this infrastructure, giving the Internet Service Providers (ISP many opportunities to become directly involved in content and service delivery.

  18. Social network influences on technology acceptance : A matter of tie strength, centrality and density

    NARCIS (Netherlands)

    Ten Kate, Stephan; Haverkamp, Sophie; Mahmood, Fariha; Feldberg, Frans

    2010-01-01

    This study examines social network influences on the individual technology acceptance. Since it is believed that individuals' trust, opinions and behavior are influenced by their network, an analysis of that network may help to provide some explanations on technology acceptance. However, since

  19. [Exploration and practice of genetics teaching assisted by network technology platform].

    Science.gov (United States)

    Li, Ya-Xuan; Zhang, Fei-Xiong; Zhao, Xin; Cai, Min-Hua; Yan, Yue-Ming; Hu, Ying-Kao

    2010-04-01

    More teaching techniques have been brought out gradually along with the development of new technologies. On the basis of those traditional teaching methods, a new platform has been set up by the network technology for teaching process. In genetics teaching, it is possible to use the network platform to guide student studying, promote student's learning interest and study independently by themselves. It has been proved, after exploring and applying for many years, that network teaching is one of the most useful methods and has inimitable advantage comparing to the traditional ones in genetics teaching. The establishment of network teaching platform, the advantage and deficiency and relevant strategies were intro-duced in this paper.

  20. Experience with technology dynamics of user experience with mobile media devices

    CERN Document Server

    al-Azzawi, Ali

    2013-01-01

    With a focus on gaining an empirically derived understanding of the underlying psychological dimensions and processes behind people’s experiences with technology, this book contributes to the debate of user experience (UX) within several disciplines, including HCI, design and marketing. It analyses UX dynamics at various time scales, and explores the very nature of time and meaning in the context of UX.Experience with Technology uses personal construct theory (PCT) as a theoretical and methodological starting point to this project. Major case-studies are described that examine people’s exp