WorldWideScience

Sample records for wireless internet access

  1. Evaluasi Pemanfaatan Wireless Internet Protocol Access System di Kota Malang

    Directory of Open Access Journals (Sweden)

    Ahmad Budi Setiawan

    2012-03-01

    Full Text Available WIPAS (Wireless Internet Protocol Accsess System adalah salah satu teknologi pita lebar (broadband yang terbaru. Teknologi tersebut dikembangkan berdasarkan model point-to-multipoint access system pada jaringan nirkabel tetap atau Fixed Wireless Access (FWA dengan memanfaatkan pita frekuensi 26-GHz. Dengan besarnya pita frekuensi yang digunakan, teknologi WIPAS dapat menampung kapasitas akses untuk lalu lintas jaringan yang sangat besar. Dalam penelitian ini akan dikaji dan dievaluasi efektifitas penggunaan teknologi WIPAS melalui kasus pemanfaatan teknologi WIPAS untuk pemberdayaan komunitas di kota Malang. Dalam penelitian ini juga akan dideskripsikan pemanfaatan teknologi WIPAS untuk melihat manfaat penggunaan teknologi tersebut. Penelitian ini dilakukan dengan metode kualitatif dengan melakukan evaluasi terhadap infrastruktur yang telah dibangun untuk melihat efektifitas pemanfaatan WIPAS. Hasil penelitian ini adalah sebuah kajian evaluatif tentang pemanfaatan WIPAS di kota Malang dan rekomendasi untuk implementasi lebih lanjut.

  2. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  3. Wireless Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.

  4. Wired or Wireless Internet?

    DEFF Research Database (Denmark)

    Gimpel, Gregory

    2010-01-01

    This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...... the speed of technological obsolescence, market share dominance, and the black boxing of technology influence consumer intention to adopt WiMax and 3G wireless internet for their laptop computers. The results, implications for industry, and areas for further research are discussed....

  5. Broadband wireless communications for railway applications for onboard internet access and other applications

    CERN Document Server

    Masson, Émilie

    2017-01-01

    This book focuses on the needs of railway operators in terms of wireless communications, divided in two main categories: the commercial services and the operational needs. Then, all available technologies that can be used to provide Internet access on board trains and all the other operational applications requiring high capacity are detailed. Finally, challenges and trends in railway telecommunications are highlighted, through the presentation of the future and emerging technologies, the current discussions and works in the different authorities, and the key challenges and scientific barriers.

  6. Wireless mobile Internet security

    CERN Document Server

    Rhee, Man Young

    2013-01-01

      The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr

  7. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  8. Wireless Multi Hop Access Networks and Protocols

    OpenAIRE

    Nilsson Plymoth, Anders

    2007-01-01

    As more and more applications and services in our society now depend on the Internet, it is important that dynamically deployed wireless multi hop networks are able to gain access to the Internet and other infrastructure networks and services. This thesis proposes and evaluates solutions for providing multi hop Internet Access. It investigates how ad hoc networks can be combined with wireless and mesh networks in order to create wireless multi hop access networks. When several access points t...

  9. Planning of Efficient Wireless Access with IEEE 802.16 for Connecting Home Network to the Internet

    Directory of Open Access Journals (Sweden)

    Pichet Ritthisoonthorn

    2010-01-01

    Full Text Available The emergence of IEEE802.16 wireless standard technology (WiMAX has significantly increased the choice to operators for the provisioning of wireless broadband access network. WiMAX is being deployed to compliment with xDSL in underserved or lack of the broadband network area, in both developed and developing countries. Many incumbent operators in developing countries are considering the deployment of WiMAX as part of their broadband access strategy. This paper presents an efficient and simple method for planning of broadband fixed wireless access (BFWA with IEEE802.16 standard to support home connection to Internet. The study formulates the framework for planning both coverage and capacity designs. The relationship between coverage area and access rate from subscriber in each environment area is presented. The study also presents the throughput and channel capacity of IEEE802.16 in different access rates. An extensive analysis is performed and the results are applied to the real case study to demonstrate the practicality of using IEEE 802.16 for connecting home to Internet. Using empirical data and original subscriber traffic from measurement, it is shown that the BFWA with IEEE802.16 standard is a capacity limited system. The capacity of IEEE802.16 is related to different factors including frequency bandwidth, spectrum allocation, estimation of traffic per subscriber, and choice of adaptive modulation from subscriber terminal. The wireless access methods and procedures evolved in this research work and set out in this paper are shown to be well suited for planning BFWA system based on IEEE802.16 which supports broadband home to Internet connections.

  10. Economics and Governance of the wireless Internet

    DEFF Research Database (Denmark)

    Falch, Morten; Henten, Anders; Tadayoni, Reza

    barriers of entry. In this paper three issues are discussed: 1) Developments in pricing schemes for Internet interconnection and Internet access with special focus on the role of wireless access. 2) Developments in supporting infrastructures with special focus on the increasing role of wireless......The Internet has undergone a growing diversification with regard to types of users, kinds of services and use of transmission technologies and infrastructures. Today, internet services are delivered by the use of many different wired and wireless communication technologies with different technical...... capabilities and limitations, and with different techno-economic characteristics. The question is whether these trends challenge the current mode of governance for the Internet. In the early days, the Internet was considered to be open, free, competitive, with a high level of entrepreneurialism, and with low...

  11. Adoption of wireless internet parks: An empirical study in Qatar

    OpenAIRE

    Weerakkody, V

    2008-01-01

    This paper examines the adoption of free wireless internet parks (iPark) by Qatari citizens as means of accessing electronic services from public parks. The Qatar government has launched the iPark concept with a view of providing free internet access for all citizens while enjoying the outdoors. By offering free wireless Internet access, the Qatari government encourages its citizen's to actively participate in the global information society with a view of bridging the digital divide. Using a ...

  12. Architectural and Mobility Management Designs in Internet-Based Infrastructure Wireless Mesh Networks

    Science.gov (United States)

    Zhao, Weiyi

    2011-01-01

    Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. They have numerous applications, such as broadband Internet access, building automation, and intelligent transportation systems. One research challenge for Internet-based WMNs is to design efficient mobility…

  13. VT Wireless Internet Service Providers 2006

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) The VT Wireless Internet Service Provider (ISP) dataset (WISP2006) includes polygons depicting the extent of Vermont's WISP broadband system as of...

  14. VT Wireless Internet Service Providers 2007

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) The VT Wireless Internet Service Provider (ISP) dataset (WISP2007) includes polygons depicting the extent of Vermont's WISP broadband system as of...

  15. Mobile access to the Internet: from personal bubble to satellites

    Science.gov (United States)

    Gerla, Mario

    2001-10-01

    Mobile, wireless access and networking has emerged in the last few years as one of the most important directions of Internet growth. The popularity of mobile, and, more generally, nomadic Internet access is due to many enabling factors including: (a) emergence of meaningful applications tailored to the individual on the move; (b) small form factor and long battery life; (c) efficient middleware designed to support mobility; and, (d) efficient wireless networking technologies. A key player in the mobile Internet access is the nomad, i.e. the individual equipped with various computing and I/O gadgets (cellular phone, earphones, GPS navigator, palm pilot, beeper, portable scanner, digital camera, etc.). These devices form his/her Personal Area Network or PAN or personal bubble. The connectivity within the bubble is wireless (using for example a low cost, low power wireless LAN such as Bluetooth). The bubble can expand and contract dynamically depending on needs. It may temporarily include sensors and actuators as the nomad walks into a new environment. In this paper, we identify the need for the interconnection of the PAN with other wireless networks in order to achieve costeffective mobile access to the Internet. We will overview some key networking technologies required to support the PAN (eg, Bluetooth). We will also discuss an emerging technology, Ad Hoc wireless networking which is the natural complement of the PAN in sparsely populated areas. Finally, we will identify the need for intelligent routers to assist the mobile user in the selection of the best Internet access strategy.

  16. Photonic-assisted ultrafast THz wireless access

    DEFF Research Database (Denmark)

    Yu, Xianbin; Chen, Ying; Galili, Michael

    THz technology has been considered feasible for ultrafast wireless data communi- cation, to meet the increasing demand on next-generation fast wireless access, e.g., huge data file transferring and fast mobile data stream access. This talk reviews recent progress in high-speed THz wireless...

  17. Principles of wireless access and localization

    CERN Document Server

    Pahlavan, Kaveh

    2013-01-01

    A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless access and wireless localization techniques.  The book reflects principles of design and deployment of infrastructure for wireless access and localization for wide, local, and personal networking.   Description of wireless access methods includes design and deployment of traditional TDMA and CDMA technologies and emerging Long Term Evolution (LTE) techniques for wide area cellular networks, the

  18. Wireless Broadband Access and Accounting Schemes

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    In this paper, we propose two wireless broadband access and accounting schemes. In both schemes, the accounting system adopts RADIUS protocol, but the access system adopts SSH and SSL protocols respectively.

  19. Using Internet of Things technologies for wireless sensor networks

    Science.gov (United States)

    Martinez, K.; Hart, J. K.; Basford, P. J.; Bragg, G. M.; Ward, T.

    2013-12-01

    Numerous authors have envisioned the future internet where anything will be connected: the Internet of Things (IoT). The idea is an extrapolation of the spread of networked devices such as phones, tablets etc. Each device is expected to have its own Internet address and thus be easy to access. The key building blocks of any IoT system are networking, hardware platforms and node software - so they are similar to wireless sensor network requirements. Most existing IoT demonstrators and applications have been gadget-style objects where power and connectivity problems are not too restricting. Environmental sensor networks can benefit from using some of the technologies involved in IoT development. However it is expected that tuning the networking and power management will be necessary to make them as efficient as state of the art wireless sensor networks. Some IoT assumptions such as always-connected nodes and full IP capability need to be considered. This paper will illustrate the advantages and disadvantages of IoT techniques for environment sensing drawing on a range of employment scenarios. We also describe a glacial 'Internet of things' project, which aims to monitor glacial processes. In particular we describe the IoT developments in a deployment in Iceland to examine glacier seismicity, velocity and provide camera images.

  20. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  1. Internet Accessibility: Challenges before the African Nations

    African Journals Online (AJOL)

    Internet Accessibility: Challenges Before The African Nations. 207. Information ... increasing internet access in Africa (Jensen, ... bite, particularly in the area of policy ... especially the urban and rural poor. ... supply, but electricity power supply.

  2. Why People Aren't Using Wireless Internet

    DEFF Research Database (Denmark)

    Ahluwalia, Punit; Gimpel, Gregory; Varshney, Upkar

    2010-01-01

    This paper proposes a new model for understanding the adoption of internet services when competing technological standards can fulfil similar needs. Using prospect theory as its theoretical foundation, the model posits that reference prices, flat rate preference, and status quo bias constitute...... the perceived sacrifice when users consider adoption of new services such as wireless internet. Perceived sacrifice and perceived quality influence the perceived relative value, which in turn influences the intention to adopt wireless internet. The proposed model and related hypotheses are empirically confirmed...

  3. Wireless sensor communications and internet connectivity for sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Dunbar, M. [Crossbow Technology, Inc., San Jose, CA (United States)

    2001-07-01

    A wireless sensor network architecture is an integrated hardware/software solution that has the potential to change the way sensors are used in a virtually unlimited range of industries and applications. By leveraging Bluetooth wireless technology for low-cost, short-range radio links, wireless sensor networks such as CrossNet{sup TM} enable users to create wireless sensor networks. These wireless networks can link dozens or hundreds of sensors of disparate types and brands with data acquisition/analysis systems, such as handheld devices, internet-enabled laptop or desktop PCs. The overwhelming majority of sensor applications are hard-wired at present, and since wiring is often the most time-consuming, tedious, trouble-prone and expensive aspect of sensor applications, users in many fields will find compelling reasons to adopt the wireless sensor network solution. (orig.)

  4. Wireless Internet on Trains - Impact on Performance of Business Travelers

    NARCIS (Netherlands)

    Zhang, M.; Marchau, V.A.W.J.; Wee, B. van; Hoorn, T. van der

    2006-01-01

    Wireless Internet service (WIS) is finding increasing implementation in the Netherlands via several markets. Recently, the idea has emerged of providing WIS through public transport services. The impact of WIS on train travelers, particularly on business travelers, is, however, unknown. In a study

  5. An Experimental Performance Measurement of Implemented Wireless Access Point for Interworking Wi-Fi and HSDPA Networks

    Science.gov (United States)

    Byun, Tae-Young

    This paper presents a prototype of WAP(Wireless Access Point) that provides the wireless Internet access anywhere. Implemented WAP can be equipped with various wireless WAN interfaces such as WCDMA and HSDPA. WAP in the IP mechanism has to process connection setup procedure to one wireless WAN. Also, WAP can provide connection management procedures to reconnect interrupted connection automatically. By using WAP, several mobile devices such as netbook, UMPC and smart-phone in a moving vehicle can access to HSDPA network simultaneously. So, it has more convenient for using the WAP when there are needs to access wireless Internet more than two mobile devices in restricted spaces such as car, train and ship.

  6. Wireless IP and building the mobile Internet

    National Research Council Canada - National Science Library

    Dixit, Sudhir; Prasad, Ramjee

    2003-01-01

    ..., as well as the shortage of technical material in a single place in the field of wireless IP and closely related technologies that form the critical success factors. Therefore, we decided to invite the experts who are truly active in the field: the equipment manufacturers, mobile operators, and those working in research laboratories and unive...

  7. Revocable Anonymous Access to the Internet?

    Science.gov (United States)

    Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos

    2003-01-01

    Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…

  8. Browsing for the Best Internet Access Provider?

    Science.gov (United States)

    Weil, Marty

    1996-01-01

    Highlights points to consider when choosing an Internet Service Provider. Serial Line Internet Protocol (SLIP) and Point to Point Protocol (PPP) are compared regarding price, performance, bandwidth, speed, and technical support. Obtaining access via local, national, consumer online, and telephone-company providers is discussed. A pricing chart and…

  9. Virtualization of Event Sources in Wireless Sensor Networks for the Internet of Things

    Science.gov (United States)

    Martínez, Néstor Lucas; Martínez, José-Fernán; Díaz, Vicente Hernández

    2014-01-01

    Wireless Sensor Networks (WSNs) are generally used to collect information from the environment. The gathered data are delivered mainly to sinks or gateways that become the endpoints where applications can retrieve and process such data. However, applications would also expect from a WSN an event-driven operational model, so that they can be notified whenever occur some specific environmental changes instead of continuously analyzing the data provided periodically. In either operational model, WSNs represent a collection of interconnected objects, as outlined by the Internet of Things. Additionally, in order to fulfill the Internet of Things principles, Wireless Sensor Networks must have a virtual representation that allows indirect access to their resources, a model that should also include the virtualization of event sources in a WSN. Thus, in this paper a model for a virtual representation of event sources in a WSN is proposed. They are modeled as internet resources that are accessible by any internet application, following an Internet of Things approach. The model has been tested in a real implementation where a WSN has been deployed in an open neighborhood environment. Different event sources have been identified in the proposed scenario, and they have been represented following the proposed model. PMID:25470489

  10. Virtualization of Event Sources in Wireless Sensor Networks for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Néstor Lucas Martínez

    2014-12-01

    Full Text Available Wireless Sensor Networks (WSNs are generally used to collect information from the environment. The gathered data are delivered mainly to sinks or gateways that become the endpoints where applications can retrieve and process such data. However, applications would also expect from a WSN an event-driven operational model, so that they can be notified whenever occur some specific environmental changes instead of continuously analyzing the data provided periodically. In either operational model, WSNs represent a collection of interconnected objects, as outlined by the Internet of Things. Additionally, in order to fulfill the Internet of Things principles, Wireless Sensor Networks must have a virtual representation that allows indirect access to their resources, a model that should also include the virtualization of event sources in a WSN. Thus, in this paper a model for a virtual representation of event sources in a WSN is proposed. They are modeled as internet resources that are accessible by any internet application, following an Internet of Things approach. The model has been tested in a real implementation where a WSN has been deployed in an open neighborhood environment. Different event sources have been identified in the proposed scenario, and they have been represented following the proposed model.

  11. Virtualization of event sources in wireless sensor networks for the internet of things.

    Science.gov (United States)

    Lucas Martínez, Néstor; Martínez, José-Fernán; Hernández Díaz, Vicente

    2014-12-01

    Wireless Sensor Networks (WSNs) are generally used to collect information from the environment. The gathered data are delivered mainly to sinks or gateways that become the endpoints where applications can retrieve and process such data. However, applications would also expect from a WSN an event-driven operational model, so that they can be notified whenever occur some specific environmental changes instead of continuously analyzing the data provided periodically. In either operational model, WSNs represent a collection of interconnected objects, as outlined by the Internet of Things. Additionally, in order to fulfill the Internet of Things principles, Wireless Sensor Networks must have a virtual representation that allows indirect access to their resources, a model that should also include the virtualization of event sources in a WSN. Thus, in this paper a model for a virtual representation of event sources in a WSN is proposed. They are modeled as internet resources that are accessible by any internet application, following an Internet of Things approach. The model has been tested in a real implementation where a WSN has been deployed in an open neighborhood environment. Different event sources have been identified in the proposed scenario, and they have been represented following the proposed model.

  12. Access control mechanism of wireless gateway based on open flow

    Science.gov (United States)

    Peng, Rong; Ding, Lei

    2017-08-01

    In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.

  13. M2M massive wireless access

    DEFF Research Database (Denmark)

    Zanella, Andrea; Zorzi, Michele; Santos, André F.

    2013-01-01

    In order to make the Internet of Things a reality, ubiquitous coverage and low-complexity connectivity are required. Cellular networks are hence the most straightforward and realistic solution to enable a massive deployment of always connected Machines around the globe. Nevertheless, a paradigm...... shift in the conception and design of future cellular networks is called for. Massive access attempts, low-complexity and cheap machines, sporadic transmission and correlated signals are among the main properties of this new reality, whose main consequence is the disruption of the development...... Access Reservation, Coded Random Access and the exploitation of multiuser detection in random access. Additionally, we will show how the properties of machine originated signals, such as sparsity and spatial/time correlation can be exploited. The end goal of this paper is to provide motivation...

  14. An Internet of Energy Things Based on Wireless LPWAN

    Directory of Open Access Journals (Sweden)

    Yonghua Song

    2017-08-01

    Full Text Available Under intense environmental pressure, the global energy sector is promoting the integration of renewable energy into interconnected energy systems. The demand-side management (DSM of energy systems has drawn considerable industrial and academic attention in attempts to form new flexibilities to respond to variations in renewable energy inputs to the system. However, many DSM concepts are still in the experimental demonstration phase. One of the obstacles to DSM usage is that the current information infrastructure was mainly designed for centralized systems, and does not meet DSM requirements. To overcome this barrier, this paper proposes a novel information infrastructure named the Internet of Energy Things (IoET in order to make DSM practicable by basing it on the latest wireless communication technology: the low-power wide-area network (LPWAN. The primary advantage of LPWAN over general packet radio service (GPRS and area Internet of Things (IoT is its wide-area coverage, which comes with minimum power consumption and maintenance costs. Against this background, this paper briefly reviews the representative LPWAN technologies of narrow-band Internet of Things (NB-IoT and Long Range (LoRa technology, and compares them with GPRS and area IoT technology. Next, a wireless-to-cloud architecture is proposed for the IoET, based on the main technical features of LPWAN. Finally, this paper looks forward to the potential of IoET in various DSM application scenarios.

  15. The Making of a Sustainable Wireless City? Mapping Public Wi-Fi Access in Shanghai

    Directory of Open Access Journals (Sweden)

    Mingfeng Wang

    2016-01-01

    Full Text Available In the context of the global information economy, ready access to the Internet is critical to a city’s competitiveness, which has prompted a number of cities to launch plans to establish wireless networks. Most literature on the development of wireless cities focuses on cities in Western countries, and few have discussed how Chinese cities have adopted wireless technologies in their urban infrastructure development efforts. This paper examines recent development and spatial distribution of public Wi-Fi access in Shanghai, a leading business hub in China. We mapped Wi-Fi hotspots through the government sponsored “i-Shanghai” project and China Mobile Communications Corporation (CMCC. We find that while telecommunication providers have been proactively deploying WLAN (wireless local area network,a proxy of public Wi-Fi or wireless access hotspots in Shanghai, neither government sponsored WLAN hotspots nor facilities established by CMCC could cover the old traditional neighborhoods in the central city and sub-districts in remote rural areas. We also address the development of a more sustainable wireless city in Shanghai with a particular focus on digital divide and social equity issues.

  16. Internet Access from CERN GSM subscriptions

    CERN Multimedia

    IT Department

    2008-01-01

    The data service on GSM subscriptions has been improved, allowing CERN users to access the Internet directly. A CERN GSM subscription with data option now allows you to connect to the Internet from a mobile phone or a PC equipped with a GSM modem. The previous access (CERN intranet) still exists. To get access to the new service, you will find all the information on configurations at: http://cern.ch/gprs The use of this service on the Sunrise network is charged on a flat-rate basis (no extra charge related to the volume of downloaded data). Depending on your CERN subscription type (standard or master), you can also connect to foreign GSM data networks (roaming), but this is strongly discouraged, except where absolutely necessary, due to international roaming charges. Telecom Section, IT/CS

  17. Remote Access Unit for Optic-to-Wireless Conversion

    DEFF Research Database (Denmark)

    Chorchos, Łukasz; Rommel, Simon; Turkiewicz, J. P.

    . Growing demand for high speed wireless data transmission and new wireless standards like 5G force network operators to find new solutions for backhaul networks. Presently, to meet this need, attention of many researchers and top network vendors has been directed towards millimeter wave radio links....... Operation in the millimeter wave range brings new possibilities for a channel allocation as well as allows wider radio channels to be used. Moreover this frequency range is lighter licensed than regular GSM. This clearly shows a huge potential of millimeter waves for a high speed wireless data transmission...... was proposed and research projects like IPHOBAC-NG were founded. The aim of the mentioned project is to employ novel RAUs featuring opticto-wireless and wireless-to-optic conversion with a speeds of 1-10Gbit/s for broadband wireless access and up to 3Gbit/s for mobile backhaul. The RAU proposed in this paper...

  18. Efficient scheduling request algorithm for opportunistic wireless access

    KAUST Repository

    Nam, Haewoon; Alouini, Mohamed-Slim

    2011-01-01

    An efficient scheduling request algorithm for opportunistic wireless access based on user grouping is proposed in this paper. Similar to the well-known opportunistic splitting algorithm, the proposed algorithm initially adjusts (or lowers

  19. Ubiquitous Wireless Sensor Networks and future “Internet of Things""

    OpenAIRE

    Vermesan, Ovidiu

    2009-01-01

    Overview of heterogeneous networks of embedded devices that can range from RFID, to smart identifiable systems with sensing and actuating capabilitie. Presentation of wireless sensor networks protocols and Internet of Things future technology. Bridging the real, virtual and digital worlds by using wireless connectivity. Application examples in automotive, aeronautics, healthcare, building, oil and gas industries. Ubiquitous Wireless Sensor Networks and future “Internet ...

  20. Cross-layer model design in wireless ad hoc networks for the Internet of Things.

    Directory of Open Access Journals (Sweden)

    Xin Yang

    Full Text Available Wireless ad hoc networks can experience extreme fluctuations in transmission traffic in the Internet of Things, which is widely used today. Currently, the most crucial issues requiring attention for wireless ad hoc networks are making the best use of low traffic periods, reducing congestion during high traffic periods, and improving transmission performance. To solve these problems, the present paper proposes a novel cross-layer transmission model based on decentralized coded caching in the physical layer and a content division multiplexing scheme in the media access control layer. Simulation results demonstrate that the proposed model effectively addresses these issues by substantially increasing the throughput and successful transmission rate compared to existing protocols without a negative influence on delay, particularly for large scale networks under conditions of highly contrasting high and low traffic periods.

  1. Cross-layer model design in wireless ad hoc networks for the Internet of Things.

    Science.gov (United States)

    Yang, Xin; Wang, Ling; Xie, Jian; Zhang, Zhaolin

    2018-01-01

    Wireless ad hoc networks can experience extreme fluctuations in transmission traffic in the Internet of Things, which is widely used today. Currently, the most crucial issues requiring attention for wireless ad hoc networks are making the best use of low traffic periods, reducing congestion during high traffic periods, and improving transmission performance. To solve these problems, the present paper proposes a novel cross-layer transmission model based on decentralized coded caching in the physical layer and a content division multiplexing scheme in the media access control layer. Simulation results demonstrate that the proposed model effectively addresses these issues by substantially increasing the throughput and successful transmission rate compared to existing protocols without a negative influence on delay, particularly for large scale networks under conditions of highly contrasting high and low traffic periods.

  2. Internet-accessible real-time weather information system

    Digital Repository Service at National Institute of Oceanography (India)

    Desai, R.G.P.; Joseph, A.; Desa, E.; Mehra, P.; Desa, E.; Gouveia, A.D.

    An internet-accessible real-time weather information system has been developed. This system provides real-time accessibility to weather information from a multitude of spatially distributed weather stations. The Internet connectivity also offers...

  3. Approximate Networking for Universal Internet Access

    Directory of Open Access Journals (Sweden)

    Junaid Qadir

    2017-12-01

    Full Text Available Despite the best efforts of networking researchers and practitioners, an ideal Internet experience is inaccessible to an overwhelming majority of people the world over, mainly due to the lack of cost-efficient ways of provisioning high-performance, global Internet. In this paper, we argue that instead of an exclusive focus on a utopian goal of universally accessible “ideal networking” (in which we have a high throughput and quality of service as well as low latency and congestion, we should consider providing “approximate networking” through the adoption of context-appropriate trade-offs. In this regard, we propose to leverage the advances in the emerging trend of “approximate computing” that rely on relaxing the bounds of precise/exact computing to provide new opportunities for improving the area, power, and performance efficiency of systems by orders of magnitude by embracing output errors in resilient applications. Furthermore, we propose to extend the dimensions of approximate computing towards various knobs available at network layers. Approximate networking can be used to provision “Global Access to the Internet for All” (GAIA in a pragmatically tiered fashion, in which different users around the world are provided a different context-appropriate (but still contextually functional Internet experience.

  4. IPTV technology for the wireless Internet service provider (WISP

    Directory of Open Access Journals (Sweden)

    Mitchell Vásquez Bermúdez

    2018-02-01

    Full Text Available This article describes the implementation of the IPTV technology through an open source system for the wireless Internet service provider (WISP in the Cerecita site, located in the province of Guayas, Ecuador. The feasibility of implementing the IPTV technology is given through the use of the Emby Server application, in addition to the use of an operating system such as CentOS 7, which are open source and have the necessary requirements for the creation of this service. The analysis of data tra c generated on the WISP network, which will establish the advantages and disadvantages generated by the transmission of this technology, created to VOD multimedia content server that allows the video signal to be sent to users Finally, a feasibility study was carried out to analyze the advantages and disadvantages that exist in the implementation of this IPTV technology.

  5. 78 FR 30226 - Accessibility Requirements for Internet Browsers

    Science.gov (United States)

    2013-05-22

    ... software, such as an Internet browser, that it provides. Among other things, this means that the functions... CG Docket No. 10-145; FCC 13-57] Accessibility Requirements for Internet Browsers AGENCY: Federal... Act requires Internet browsers built into mobile phones to be accessible to individuals who are blind...

  6. Accessing northern California earthquake data via Internet

    Science.gov (United States)

    Romanowicz, Barbara; Neuhauser, Douglas; Bogaert, Barbara; Oppenheimer, David

    The Northern California Earthquake Data Center (NCEDC) provides easy access to central and northern California digital earthquake data. It is located at the University of California, Berkeley, and is operated jointly with the U.S. Geological Survey (USGS) in Menlo Park, Calif., and funded by the University of California and the National Earthquake Hazard Reduction Program. It has been accessible to users in the scientific community through Internet since mid-1992.The data center provides an on-line archive for parametric and waveform data from two regional networks: the Northern California Seismic Network (NCSN) operated by the USGS and the Berkeley Digital Seismic Network (BDSN) operated by the Seismographic Station at the University of California, Berkeley.

  7. Technological advancements and Internet sexuality: does private access to the Internet influence online sexual behavior?

    Science.gov (United States)

    Daneback, Kristian; Månsson, Sven-Axel; Ross, Michael W

    2012-08-01

    The aim of this study was to investigate whether demographic characteristics and sexual behavior online and offline were associated with private, respectively, nonprivate access to the Internet in a Web sample of people who use the Internet for sexual purposes. A total of 1,913 respondents completed an online questionnaire about Internet sexuality, and 1,614 reported using the Internet for sexual purposes. The majority of these respondents reported having access to an Internet-connected computer no one else had access to (62 percent women and 70 percent men). The results showed that it is possible to differentiate between those who have access to an Internet-connected computer no one else has access to and those who have shared access to an Internet-connected computer. Not only did they differ in demographic characteristics, but also in the sexual activities they engaged in on the Internet. Different patterns were found for women and men. For example, men who had private access to Internet-connected computers were more likely than those who had shared access to seek information about sexual issues. Thus, having access to Internet computers no one else has access to may promote sexual knowledge and health for men. The results of this study along with the technological development implies that in future research, attention should be paid to where and how people access the Internet in relation to online behavior in general and online sexual behavior in particular.

  8. An Introduction to Services Accessible on the Internet.

    Science.gov (United States)

    Giguere, Marlene

    1992-01-01

    Provides an overview of the INTERNET and INTERNET services of interest to libraries, including electronic mail, bulletin boards, electronic publishing, online public access catalogs and databases, and downloaded texts and software. (16 references) (MES)

  9. Threats and risks to information security: a practical analysis of free access wireless networks

    Science.gov (United States)

    Quirumbay, Daniel I.; Coronel, Iván. A.; Bayas, Marcia M.; Rovira, Ronald H.; Gromaszek, Konrad; Tleshova, Akmaral; Kozbekova, Ainur

    2017-08-01

    Nowadays, there is an ever-growing need to investigate, consult and communicate through the internet. This need leads to the intensification of free access to the web in strategic and functional points for the benefit of the community. However, this open access is also related to the increase of information insecurity. The existing works on computer security primarily focus on the development of techniques to reduce cyber-attacks. However, these approaches do not address the sector of inexperienced users who have difficulty understanding browser settings. Two methods can solve this problem: first the development of friendly browsers with intuitive setups for new users and on the other hand, by implementing awareness programs on essential security without deepening on technical information. This article addresses an analysis of the vulnerabilities of wireless equipment that provides internet service in the open access zones and the potential risks that could be found when using these means.

  10. A Survey on Energy Conserving Mechanisms for the Internet of Things: Wireless Networking Aspects

    Science.gov (United States)

    Abbas, Zeeshan; Yoon, Wonyong

    2015-01-01

    The Internet of Things (IoT) is an emerging key technology for future industries and everyday lives of people, where a myriad of battery operated sensors, actuators, and smart objects are connected to the Internet to provide services such as mobile healthcare, intelligent transport system, environmental monitoring, etc. Since energy efficiency is of utmost importance to these battery constrained IoT devices, IoT-related standards and research works have focused on the device energy conserving issues. This paper presents a comprehensive survey on energy conserving issues and solutions in using diverse wireless radio access technologies for IoT connectivity, e.g., the 3rd Generation Partnership Project (3GPP) machine type communications, IEEE 802.11ah, Bluetooth Low Energy (BLE), and Z-Wave. We look into the literature in broad areas of standardization, academic research, and industry development, and structurally summarize the energy conserving solutions based on several technical criteria. We also propose future research directions regarding energy conserving issues in wireless networking-based IoT. PMID:26404275

  11. A Survey on Energy Conserving Mechanisms for the Internet of Things: Wireless Networking Aspects

    Directory of Open Access Journals (Sweden)

    Zeeshan Abbas

    2015-09-01

    Full Text Available The Internet of Things (IoT is an emerging key technology for future industries and everyday lives of people, where a myriad of battery operated sensors, actuators, and smart objects are connected to the Internet to provide services such as mobile healthcare, intelligent transport system, environmental monitoring, etc. Since energy efficiency is of utmost importance to these battery constrained IoT devices, IoT-related standards and research works have focused on the device energy conserving issues. This paper presents a comprehensive survey on energy conserving issues and solutions in using diverse wireless radio access technologies for IoT connectivity, e.g., the 3rd Generation Partnership Project (3GPP machine type communications, IEEE 802.11ah, Bluetooth Low Energy (BLE, and Z-Wave. We look into the literature in broad areas of standardization, academic research, and industry development, and structurally summarize the energy conserving solutions based on several technical criteria. We also propose future research directions regarding energy conserving issues in wireless networking-based IoT.

  12. A Survey on Energy Conserving Mechanisms for the Internet of Things: Wireless Networking Aspects.

    Science.gov (United States)

    Abbas, Zeeshan; Yoon, Wonyong

    2015-09-25

    The Internet of Things (IoT) is an emerging key technology for future industries and everyday lives of people, where a myriad of battery operated sensors, actuators, and smart objects are connected to the Internet to provide services such as mobile healthcare, intelligent transport system, environmental monitoring, etc. Since energy efficiency is of utmost importance to these battery constrained IoT devices, IoT-related standards and research works have focused on the device energy conserving issues. This paper presents a comprehensive survey on energy conserving issues and solutions in using diverse wireless radio access technologies for IoT connectivity, e.g., the 3rd Generation Partnership Project (3GPP) machine type communications, IEEE 802.11ah, Bluetooth Low Energy (BLE), and Z-Wave. We look into the literature in broad areas of standardization, academic research, and industry development, and structurally summarize the energy conserving solutions based on several technical criteria. We also propose future research directions regarding energy conserving issues in wireless networking-based IoT.

  13. Access to the internet for knowledge dissemination: agricultural ...

    African Journals Online (AJOL)

    Access to agricultural information is a prerequisite for agricultural development. However, information on how agricultural scientists make use of the Internet to access agricultural information is limited. This study therefore investigated access to the Internet for knowledge dissemination by agricultural researchers in ...

  14. Medium Access Control in Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon

    Focusing on Wireless Sensor Networks (WSN) that are powered by energy harvesting, this dissertation focuses on energy-efficient communication links between senders and receivers that are alternating between active and sleeping states of operation. In particular, the focus lies on Medium Access...

  15. Wireless-accessible sensor populations for monitoring biological variables

    NARCIS (Netherlands)

    Mazzu, Marco; Scalvini, Simonetta; Giordano, A.; Frumento, E.; Wells, Hannah; Lokhorst, C.; Glisenti, Fulvio

    2008-01-01

    The current health-care infrastructure is generally considered to be inadequate to meet the needs of an increasingly older population. We have investigated the feasibility of a passive in-home monitoring system based on wireless accessible sensor populations (WASP). In an EU-funded project we have

  16. Adaptive Media Access Control for Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Dragoni, Nicola

    2012-01-01

    ODMAC (On-Demand Media Access Control) is a recently proposed MAC protocol designed to support individual duty cycles for Energy Harvesting — Wireless Sensor Networks (EH-WSNs). Individual duty cycles are vital for EH-WSNs, because they allow nodes to adapt their energy consumption to the ever-ch...

  17. An Internet of Things Example: Classrooms Access Control over Near Field Communication

    Science.gov (United States)

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-01-01

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks. PMID:24755520

  18. An internet of things example: classrooms access control over near field communication.

    Science.gov (United States)

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-04-21

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  19. An Internet of Things Example: Classrooms Access Control over Near Field Communication

    Directory of Open Access Journals (Sweden)

    Daniel Palma

    2014-04-01

    Full Text Available The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  20. On the scalability of uncoordinated multiple access for the Internet of Things

    KAUST Repository

    Chisci, Giovanni; Elsawy, Hesham; Conti, Andrea; Alouini, Mohamed-Slim; Win, Moe Z.

    2017-01-01

    The Internet of things (IoT) will entail massive number of wireless connections with sporadic traffic patterns. To support the IoT traffic, several technologies are evolving to support low power wide area (LPWA) wireless communications. However

  1. ICSW2AN : An Inter-vehicle Communication System Using Mobile Access Point over Wireless Wide Area Networks

    Science.gov (United States)

    Byun, Tae-Young

    This paper presents a prototype of inter-vehicle communication system using mobile access point that internetworks wired or wireless LAN and wireless WAN anywhere. Implemented mobile access point can be equipped with various wireless WAN interfaces such as WCDMA and HSDPA. Mobile access point in the IP mechanism has to process connection setup procedure to one wireless WAN. To show the applicability of the mobile access point to inter-vehicle communication, a simplified V2I2V-based car communication system called ICSW2AN is implemented to evaluate major performance metrics by road test. In addition, results of road test for traffic information service are investigated in view of RTT, latency and server processing time. The experimental result indicates that V2I2V-based car communication system sufficiently can provide time-tolerant traffic information to moving vehicles while more than two mobile devices in restricted spaces such as car, train and ship access wireless Internet simultaneously.

  2. Millimeter Wave Hybrid Photonic Wireless Links for High-Speed Wireless Access and Mobile Fronthaul

    DEFF Research Database (Denmark)

    Rommel, Simon

    As the introduction of the fifth generation of mobile services (5G) is set to revolutionize the way people, devices and machines connect, the changes to the underlying networks and technologies are no less drastic. The massive increase in user and data capacity, as well as the decrease in latency...... networks. In summary, the work presented in this thesis has regarded a multitude of aspects of millimeter wave hybrid photonic wireless links, expanding upon the state of the art and showing their feasibility for use in fifth generation mobile and high speed wireless access networks – hopefully bringing...

  3. Revenue-Maximizing Radio Access Technology Selection with Net Neutrality Compliance in Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Elissar Khloussy

    2018-01-01

    Full Text Available The net neutrality principle states that users should have equal access to all Internet content and that Internet Service Providers (ISPs should not practice differentiated treatment on any of the Internet traffic. While net neutrality aims to restrain any kind of discrimination, it also grants exemption to a certain category of traffic known as specialized services (SS, by allowing the ISP to dedicate part of the resources for the latter. In this work, we consider a heterogeneous LTE/WiFi wireless network and we investigate revenue-maximizing Radio Access Technology (RAT selection strategies that are net neutrality-compliant, with exemption granted to SS traffic. Our objective is to find out how the bandwidth reservation for SS traffic would be made in a way that allows maximizing the revenue while being in compliance with net neutrality and how the choice of the ratio of reserved bandwidth would affect the revenue. The results show that reserving bandwidth for SS traffic in one RAT (LTE can achieve higher revenue. On the other hand, when the capacity is reserved across both LTE and WiFi, higher social benefit in terms of number of admitted users can be realized, as well as lower blocking probability for the Internet access traffic.

  4. Wireless virtualization

    CERN Document Server

    Wen, Heming; Le-Ngoc, Tho

    2013-01-01

    This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless technologies by summarizing and comparing different architectures, techniques and technologies applicable to a future virtualized wireless network infrastructure. The readers are exposed to a short walkthrough of the future Internet initiative and network virtualization technologies in order to understand the potential role of wireless virtualization in the broader context of next-generation ubiq

  5. On the scalability of uncoordinated multiple access for the Internet of Things

    KAUST Repository

    Chisci, Giovanni

    2017-11-16

    The Internet of things (IoT) will entail massive number of wireless connections with sporadic traffic patterns. To support the IoT traffic, several technologies are evolving to support low power wide area (LPWA) wireless communications. However, LPWA networks rely on variations of uncoordinated spectrum access, either for data transmissions or scheduling requests, thus imposing a scalability problem to the IoT. This paper presents a novel spatiotemporal model to study the scalability of the ALOHA medium access. In particular, the developed mathematical model relies on stochastic geometry and queueing theory to account for spatial and temporal attributes of the IoT. To this end, the scalability of the ALOHA is characterized by the percentile of IoT devices that can be served while keeping their queues stable. The results highlight the scalability problem of ALOHA and quantify the extend to which ALOHA can support in terms of number of devices, traffic requirement, and transmission rate.

  6. Service Class Resource Management For Green Wireless-Optical Broadband Access NetworksWOBAN

    Directory of Open Access Journals (Sweden)

    SRUTHY.S

    2015-08-01

    Full Text Available Abstract-Broadband access networks have become an essential part of worldwide communication systems because of the exponential growth of broadband services such as video on demand high definition TV internet protocol TV and video conferencing. Exponential growth in the volume of wireless data boosted by the growing popularity of mobile devices such as smartphone and tablets has forced the telecommunication industries to rethink the way networks are currently designed and to focus on the development of high-capacity mobile broadband networks. In response to this challenge researchers have been working toward the development of an integrated wireless optical broadband access network. Two major candidate technologies which are currently known for their high capacity as well as quality of service QoS for multimedia traffic are passive optical networks PON and fourth generation 4G wireless networks. PON is a wired access technology well known for its cost efficiency and high capacity whereas 4G is a wireless broadband access technology which has achieved broad market acceptance because of its ease of deployment ability to offer mobility and its cost efficiency. Integration of PON and 4G technologies in the form of wireless-optical broadband access networks offers advantages such as extension of networks in rural areas support for mobile broadband services and quick deployment of broadband networks. These two technologies however have different design architectures for handling broadband services that require quality of service. For example 4G networks use traffic classification for supporting different QoS demands whereas the PON architecture has no such mechanism to differentiate between types of traffic. These two technologies also differ in their power saving mechanisms. Propose a service class mapping for the integrated PON-4G network which is based on the MG1 queuing model and class-based power saving mechanism which significantly improves the

  7. What is harmful for male fertility: Cell phone or the wireless internet?

    Directory of Open Access Journals (Sweden)

    Mehmet Erol Yildirim

    2015-09-01

    Full Text Available In this study, we aimed to assess the potential harmful effects of radiofrequency-electromagnetic radiation on sperm parameters. We requested semen for analyses from the male patients coming to our infertility division and also asked them to fill out an anonymous questionnaire. We queried their mobile phone and wireless internet usage frequencies in order to determine their radiofrequency-electromagnetic radiation exposure. A total of 1082 patients filled the questionnaire but 51 of them were excluded from the study because of azoospermia. There was no significant difference between sperm counts and sperm morphology excluding sperm motility, due to mobile phone usage period, (p = 0.074, p = 0.909, and p = 0.05, respectively. The total motile sperm count and the progressive motile sperm count decreased due to the increase of internet usage (p = 0.032 and p = 0.033, respectively. In line with the total motile sperm count, progressive motile sperm count also decreased with wireless internet usage compared with the wired internet connection usage (p = 0.009 and p = 0.018, respectively. There was a negative correlation between wireless internet usage duration and the total sperm count (r = −0.089, p = 0.039. We have also explored the negative effect of wireless internet use on sperm motility according to our preliminary results.

  8. What is harmful for male fertility: cell phone or the wireless Internet?

    Science.gov (United States)

    Yildirim, Mehmet Erol; Kaynar, Mehmet; Badem, Huseyin; Cavis, Mucahıt; Karatas, Omer Faruk; Cimentepe, Ersın

    2015-09-01

    In this study, we aimed to assess the potential harmful effects of radiofrequency-electromagnetic radiation on sperm parameters. We requested semen for analyses from the male patients coming to our infertility division and also asked them to fill out an anonymous questionnaire. We queried their mobile phone and wireless Internet usage frequencies in order to determine their radiofrequency-electromagnetic radiation exposure. A total of 1082 patients filled the questionnaire but 51 of them were excluded from the study because of azoospermia. There was no significant difference between sperm counts and sperm morphology excluding sperm motility, due to mobile phone usage period, (p = 0.074, p = 0.909, and p = 0.05, respectively). The total motile sperm count and the progressive motile sperm count decreased due to the increase of internet usage (p = 0.032 and p = 0.033, respectively). In line with the total motile sperm count, progressive motile sperm count also decreased with wireless Internet usage compared with the wired Internet connection usage (p = 0.009 and p = 0.018, respectively). There was a negative correlation between wireless Internet usage duration and the total sperm count (r = -0.089, p = 0.039). We have also explored the negative effect of wireless Internet use on sperm motility according to our preliminary results. Copyright © 2015. Published by Elsevier Taiwan.

  9. Breaking barriers to Internet access | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Furthermore, the short answers would allow mobile phone users to search the Internet. ... The research team is developing a natural language search engine that ... a Braille interface; has a Chinese-English interface enabling Chinese users to ...

  10. Security Issues in Networks with Internet Access

    National Research Council Canada - National Science Library

    Landwehr, Carl E; Goldschlag, David M

    1997-01-01

    .... The principles are illustrated by describing the security issues a hypothetical company faces as the networks that support its operations evolve from strictly private, through a mix of Internet...

  11. Access Routes of Internet Finance Dictionaries: Present Solutions ...

    African Journals Online (AJOL)

    Lexicographers working on finance dictionaries have not properly exploited the fast development of the Internet. This is revealed by the poor utilization of the access routes found in current Internet finance dictionaries. Consequently, users cannot effectively and efficiently find answers to their lexicographical problems. Firstly ...

  12. Wireless ad hoc networks access for aeronautical communications

    OpenAIRE

    Besse , Frédéric; Garcia , Fabien; Pirovano , Alain; Radzik , José

    2010-01-01

    International audience; There is an increasing interest in the current aeronautical context to offer new services for civil aircraft passengers. For example, airlines want to offer their customers the opportunity to access the Internet, to manage their mails, to watch video on demand, to access corporate VPNs.... All these services represent a new type of air-ground communications called APC (Aeronautical Passenger Communications) in the ATN (Aeronautical Telecommunication Network) context. I...

  13. Using the Internet to access information inflates future use of the Internet to access other information.

    Science.gov (United States)

    Storm, Benjamin C; Stone, Sean M; Benjamin, Aaron S

    2017-07-01

    The ways in which people learn, remember, and solve problems have all been impacted by the Internet. The present research explored how people become primed to use the Internet as a form of cognitive offloading. In three experiments, we show that using the Internet to retrieve information alters a person's propensity to use the Internet to retrieve other information. Specifically, participants who used Google to answer an initial set of difficult trivia questions were more likely to decide to use Google when answering a new set of relatively easy trivia questions than were participants who answered the initial questions from memory. These results suggest that relying on the Internet to access information makes one more likely to rely on the Internet to access other information.

  14. Convergence of broadband optical and wireless access networks

    Science.gov (United States)

    Chang, Gee-Kung; Jia, Zhensheng; Chien, Hung-Chang; Chowdhury, Arshad; Hsueh, Yu-Ting; Yu, Jianjun

    2009-01-01

    This paper describes convergence of optical and wireless access networks for delivering high-bandwidth integrated services over optical fiber and air links. Several key system technologies are proposed and experimentally demonstrated. We report here, for the first ever, a campus-wide field trial demonstration of radio-over-fiber (RoF) system transmitting uncompressed standard-definition (SD) high-definition (HD) real-time video contents, carried by 2.4-GHz radio and 60- GHz millimeter-wave signals, respectively, over 2.5-km standard single mode fiber (SMF-28) through the campus fiber network at Georgia Institute of Technology (GT). In addition, subsystem technologies of Base Station and wireless tranceivers operated at 60 GHz for real-time video distribution have been developed and tested.

  15. A Fuzzy Preprocessing Module for Optimizing the Access Network Selection in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Faisal Kaleem

    2013-01-01

    Full Text Available A heterogeneous wireless network is characterized by the presence of different wireless access technologies that coexist in an overlay fashion. These wireless access technologies usually differ in terms of their operating parameters. On the other hand, Mobile Stations (MSs in a heterogeneous wireless network are equipped with multiple interfaces to access different types of services from these wireless access technologies. The ultimate goal of these heterogeneous wireless networks is to provide global connectivity with efficient ubiquitous computing to these MSs based on the Always Best Connected (ABC principle. This is where the need for intelligent and efficient Vertical Handoffs (VHOs between wireless technologies in a heterogeneous environment becomes apparent. This paper presents the design and implementation of a fuzzy multicriteria based Vertical Handoff Necessity Estimation (VHONE scheme that determines the proper time for VHO, while considering the continuity and quality of the currently utilized service, and the end-users' satisfaction.

  16. Access Control with RFID in the Internet of Things

    DEFF Research Database (Denmark)

    Jensen, Steffen Elstrøm Holst; Jacobsen, Rune Hylsberg

    2013-01-01

    , to the Internet is suggested. The solution uses virtual representations of objects by using low-cost, passive RFID tags to give objects identities on the Internet. A prototype that maps an RFID identity into an IPv6 address is constructed. It is illustrated how this approach can be used in access control systems......Future Internet research is needed to bring the Internet and the Things closer to each other to form the Internet of Things. As objects in our daily life gradually become smarter, there is an increasing benefit of networking these objects. In this article, a method to couple objects, the Things...... based on open network protocols and packet filtering. The solution includes a novel RFID reader architecture that supports the internetworking of components of a future access control system based on network layer technology....

  17. The challenges of M2M massive access in wireless cellular networks

    Directory of Open Access Journals (Sweden)

    Andrea Biral

    2015-02-01

    Full Text Available The next generation of communication systems, which is commonly referred to as 5G, is expected to support, besides the traditional voice and data services, new communication paradigms, such as Internet of Things (IoT and Machine-to-Machine (M2M services, which involve communication between Machine-Type Devices (MTDs in a fully automated fashion, thus, without or with minimal human intervention. Although the general requirements of 5G systems are progressively taking shape, the technological issues raised by such a vision are still partially unclear. Nonetheless, general consensus has been reached upon some specific challenges, such as the need for 5G wireless access networks to support massive access by MTDs, as a consequence of the proliferation of M2M services. In this paper, we describe the main challenges raised by the M2M vision, focusing in particular on the problems related to the support of massive MTD access in current cellular communication systems. Then we analyze the most common approaches proposed in the literature to enable the coexistence of conventional and M2M services in the current and next generation of cellular wireless systems. We finally conclude by pointing out the research challenges that require further investigation in order to provide full support to the M2M paradigm.

  18. An Adaptive Channel Access Method for Dynamic Super Dense Wireless Sensor Networks.

    Science.gov (United States)

    Lei, Chunyang; Bie, Hongxia; Fang, Gengfa; Zhang, Xuekun

    2015-12-03

    Super dense and distributed wireless sensor networks have become very popular with the development of small cell technology, Internet of Things (IoT), Machine-to-Machine (M2M) communications, Vehicular-to-Vehicular (V2V) communications and public safety networks. While densely deployed wireless networks provide one of the most important and sustainable solutions to improve the accuracy of sensing and spectral efficiency, a new channel access scheme needs to be designed to solve the channel congestion problem introduced by the high dynamics of competing nodes accessing the channel simultaneously. In this paper, we firstly analyzed the channel contention problem using a novel normalized channel contention analysis model which provides information on how to tune the contention window according to the state of channel contention. We then proposed an adaptive channel contention window tuning algorithm in which the contention window tuning rate is set dynamically based on the estimated channel contention level. Simulation results show that our proposed adaptive channel access algorithm based on fast contention window tuning can achieve more than 95 % of the theoretical optimal throughput and 0 . 97 of fairness index especially in dynamic and dense networks.

  19. An Adaptive Channel Access Method for Dynamic Super Dense Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chunyang Lei

    2015-12-01

    Full Text Available Super dense and distributed wireless sensor networks have become very popular with the development of small cell technology, Internet of Things (IoT, Machine-to-Machine (M2M communications, Vehicular-to-Vehicular (V2V communications and public safety networks. While densely deployed wireless networks provide one of the most important and sustainable solutions to improve the accuracy of sensing and spectral efficiency, a new channel access scheme needs to be designed to solve the channel congestion problem introduced by the high dynamics of competing nodes accessing the channel simultaneously. In this paper, we firstly analyzed the channel contention problem using a novel normalized channel contention analysis model which provides information on how to tune the contention window according to the state of channel contention. We then proposed an adaptive channel contention window tuning algorithm in which the contention window tuning rate is set dynamically based on the estimated channel contention level. Simulation results show that our proposed adaptive channel access algorithm based on fast contention window tuning can achieve more than 95 % of the theoretical optimal throughput and 0 . 97 of fairness index especially in dynamic and dense networks.

  20. Comparative study of internet cloud and cloudlet over wireless mesh networks for real-time applications

    Science.gov (United States)

    Khan, Kashif A.; Wang, Qi; Luo, Chunbo; Wang, Xinheng; Grecos, Christos

    2014-05-01

    Mobile cloud computing is receiving world-wide momentum for ubiquitous on-demand cloud services for mobile users provided by Amazon, Google etc. with low capital cost. However, Internet-centric clouds introduce wide area network (WAN) delays that are often intolerable for real-time applications such as video streaming. One promising approach to addressing this challenge is to deploy decentralized mini-cloud facility known as cloudlets to enable localized cloud services. When supported by local wireless connectivity, a wireless cloudlet is expected to offer low cost and high performance cloud services for the users. In this work, we implement a realistic framework that comprises both a popular Internet cloud (Amazon Cloud) and a real-world cloudlet (based on Ubuntu Enterprise Cloud (UEC)) for mobile cloud users in a wireless mesh network. We focus on real-time video streaming over the HTTP standard and implement a typical application. We further perform a comprehensive comparative analysis and empirical evaluation of the application's performance when it is delivered over the Internet cloud and the cloudlet respectively. The study quantifies the influence of the two different cloud networking architectures on supporting real-time video streaming. We also enable movement of the users in the wireless mesh network and investigate the effect of user's mobility on mobile cloud computing over the cloudlet and Amazon cloud respectively. Our experimental results demonstrate the advantages of the cloudlet paradigm over its Internet cloud counterpart in supporting the quality of service of real-time applications.

  1. A Mobility-aware Broadcasting Infrastructure for a Wireless Internet with Hotspots

    NARCIS (Netherlands)

    Hesselman, C.E.W.; Eertink, Henk; Eertink, E.H.; Widya, I.A.; Huizer, E.; Kermani, P.

    In this paper, we consider the problem of adaptively delivering live multimedia broadcasts (e.g., for applications such as TV, radio, or e-cinema) to a potentially large number of mobile hosts that roam about in a wireless internet with hotspots. We take a user-oriented approach based on an

  2. A telemedicine system for wireless home healthcare based on Bluetooth and the Internet.

    Science.gov (United States)

    Zhao, Xiaoming; Fei, Ding-Yu; Doarn, Charles R; Harnett, Brett; Merrell, Ronald

    2004-01-01

    The VitalPoll Telemedicine System (VTS) was designed and developed for wireless home healthcare. The aims of this study were: to design the architecture and communication methods for a telemedicine system; to implement a physiologic routing hub to collect data from different medical devices and sensors; and to evaluate the feasibility of this system for applications in wireless home healthcare. The VTS was built using Bluetooth wireless and Internet technologies with client/server architecture. Several medical devices, which acquire vital signs, such as real-time electrocardiogram signals, heart rate, body temperature, and activity (physical motion), were integrated into the VTS. Medical information and data were transmitted over short-range interface (USB, RS232), wireless communication, and the Internet. The medical results were stored in a database and presented using a web browser. The patient's vital signals can be collected, transmitted, and displayed in real time by the VTS. The experiments verified no data loss during Bluetooth and Internet communication. Bluetooth and the Internet provide enough bandwidth channels to tranmit these vital signs. The experimental results show that VTS may be suitable for a practical telemedicine system in home healthcare.

  3. Centralized optical-frequency-comb-based RF carrier generator for DWDM fiber-wireless access systems

    DEFF Research Database (Denmark)

    Pang, Xiaodan; Beltran, Marta; Sanchez, Jose

    2014-01-01

    In this paper, we report on a gigabit capacity fiber-wireless system that enables smooth integration between high-speed wireless networks and dense wavelength-division-multiplexing (DWDM) access networks. By employing a centralized optical frequency comb, both the wireline and the wireless services...

  4. Internet access to scanned paper documents

    NARCIS (Netherlands)

    Worring, M.; Smeulders, A.W.M.; Witten, I.; Akscyn, R.; Shipman, F.M.

    1998-01-01

    In this contribution we identify the different structures to encounterin a hyperdocument. Methods are described for deriving those structures from scanned paper originals. The content and structure of the document is then made available in a form suited for an Internet browser. It provides

  5. Preservice Teachers' Internet Addiction in Terms of Gender, Internet Access, Loneliness and Life Satisfaction

    Science.gov (United States)

    Demirer, Veysel; Bozoglan, Bahadir; Sahin, Ismail

    2013-01-01

    The aim of this study is to investigate pre-service teachers' Internet addiction in terms of gender, Internet accessibility, loneliness and life satisfaction. Statistical analyses were completed on the data by the 247 preservice teachers that filled the surveys completely. According to findings, pre-service teachers' level of loneliness and…

  6. A novel and efficient user access control scheme for wireless body area sensor networks

    Directory of Open Access Journals (Sweden)

    Santanu Chatterjee

    2014-07-01

    Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.

  7. XACML to build access control policies for Internet of Things

    OpenAIRE

    Atlam, Hany F.; Alassafi, Madini, Obad; Alenezi, Ahmed; Walters, Robert; Wills, Gary

    2018-01-01

    Although the Internet of things (IoT) brought unlimited benefits, it also brought many security issues. The access control is one of the main elements to address these issues. It provides the access to system resources only to authorized users and ensures that they behave in an authorized manner during their access sessions. One of the significant components of any access control model is access policies. They are used to build the criteria to permit or deny any access request. Building an ef...

  8. A Survey of Internet Access and Use by Students of Library and ...

    African Journals Online (AJOL)

    A Survey of Internet Access and Use by Students of Library and Information Science ... access and utilize Internet facilities, level of search skills, reasons for use of Internet, ... Data collected for the study was analyzed using descriptive statistics.

  9. Internet pharmacy: issues of access, quality, costs, and regulation.

    Science.gov (United States)

    Crawford, Stephanie Y

    2003-02-01

    Internet pharmacy has been the focus of heightened interest over the past 3 years since the first major Web site was introduced in the United States. This paper addresses issues pertaining to Internet pharmacies that sell prescriptions and other products to consumers at the retail level. The Internet pharmacy industry has shifted rapidly in the short time span. This paper begins with a summary of historical considerations and the shifting organization of Internet pharmacy. The advantages and disadvantages of online pharmacy practice are listed. Issues of access, quality, and cost are described. The challenges in regulation at the state and federal levels are presented. Advice to consumers is offered regarding the use of Internet pharmacy sites for purchasing prescription drug products.

  10. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things.

    Science.gov (United States)

    Yi, Meng; Chen, Qingkui; Xiong, Neal N

    2016-11-03

    This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  11. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Meng Yi

    2016-11-01

    Full Text Available This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  12. 75 FR 55297 - Further Inquiry Into Two Under-Developed Issues in the Open Internet Proceeding

    Science.gov (United States)

    2010-09-10

    ...). The second is the application of open Internet rules to mobile wireless Internet access services...). The second is the application of open Internet rules to mobile wireless Internet access services... in the market. (B) Truth in Advertising: Prohibit broadband providers from marketing specialized...

  13. Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview

    Science.gov (United States)

    Zhang, Junqing; Duong, Trung; Woods, Roger; Marshall, Alan

    2017-08-01

    The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of key generation and physical layer encryption. These schemes can be implemented and are lightweight, and thus offer practical solutions for providing effective IoT wireless security. Future research to make IoT-based physical layer security more robust and pervasive is also covered.

  14. Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT

    Directory of Open Access Journals (Sweden)

    Ming Luo

    2018-01-01

    Full Text Available Nowadays wireless sensor network (WSN is increasingly being used in the Internet of Things (IoT for data collection, and design of an access control scheme that allows an Internet user as part of IoT to access the WSN becomes a hot topic. A lot of access control schemes have been proposed for the WSNs in the context of the IoT. Nevertheless, almost all of these schemes assume that communication nodes in different network domains share common system parameters, which is not suitable for cross-domain IoT environment in practical situations. To solve this shortcoming, we propose a more secure and efficient access control scheme for wireless sensor networks in the cross-domain context of the Internet of Things, which allows an Internet user in a certificateless cryptography (CLC environment to communicate with a sensor node in an identity-based cryptography (IBC environment with different system parameters. Moreover, our proposed scheme achieves known session-specific temporary information security (KSSTIS that most of access control schemes cannot satisfy. Performance analysis is given to show that our scheme is well suited for wireless sensor networks in the cross-domain context of the IoT.

  15. Internet Access Practices and Employee Attitudes toward Internet Usage Policy Implementation in Selected Philippines Financial Institutions

    Directory of Open Access Journals (Sweden)

    Maria Sagrario R. Simbulan

    2004-06-01

    Full Text Available This study explores the employees’ concept of appropriate use of Internet facilities as well as their perception of the rights and liabilities, both of the individual and of the organization, associated with the grant of Internet access privileges in the workplace. It further examines how employees perceive their organization’s monitoring of employees online activities and the use of an Internet Usage Policy, whether these are seen as monitoring and control mechanisms or as ways to ensure that Internet access facilities are shared equitably and used responsibly. While the issue of the impact of Internet access on employee productivity will not directly be tackled, the study will provide insights into the frequency and type of usage of Internet facilities in the workplace. Considering the sizeable investment that an organization makes to provide Internet facilities, determining how employees use these facilities to achieve the goals of the organization is, in the very least, interesting and for most organizations concerned with their survival in difficult times, critically important.

  16. Quantum internet using code division multiple access

    Science.gov (United States)

    Zhang, Jing; Liu, Yu-xi; Özdemir, Şahin Kaya; Wu, Re-Bing; Gao, Feifei; Wang, Xiang-Bin; Yang, Lan; Nori, Franco

    2013-01-01

    A crucial open problem inS large-scale quantum networks is how to efficiently transmit quantum data among many pairs of users via a common data-transmission medium. We propose a solution by developing a quantum code division multiple access (q-CDMA) approach in which quantum information is chaotically encoded to spread its spectral content, and then decoded via chaos synchronization to separate different sender-receiver pairs. In comparison to other existing approaches, such as frequency division multiple access (FDMA), the proposed q-CDMA can greatly increase the information rates per channel used, especially for very noisy quantum channels. PMID:23860488

  17. The Effect of Information Access Strategy on Power Consumption and Reliability in Wireless Sensor Network

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2013-01-01

    This paper examines the effect of different information access strategies on power consumption and information reliability, considering the wireless sensor network as the source of information. Basically, the paper explores three different access strategies, namely; reactive, periodic and hybrid...

  18. Enhancing Cellular Coverage Quality by Virtual Access Point and Wireless Power Transfer

    Directory of Open Access Journals (Sweden)

    Jinsong Gui

    2018-01-01

    Full Text Available The ultradensification deploying for cellular networks is a direct and effective method for the improvement of network capacity. However, the benefit is achieved at the cost of network infrastructure investment and operating overheads, especially when there is big gap between peak-hour Internet traffic and average one. Therefore, we put forward the concept of virtual cellular coverage area, where wireless terminals with high-end configuration are motivated to enhance cellular coverage quality by both providing RF energy compensation and rewarding free traffic access to Internet. This problem is formulated as the Stackelberg game based on three-party circular decision, where a Macro BS (MBS acts as the leader to offer a charging power to Energy Transferring Relays (ETRs, and the ETRs and their associating Virtual Access Points (VAPs act as the followers to make their decisions, respectively. According to the feedback from the followers, the leader may readjust its strategy. The circular decision is repeated until the powers converge. Also, the better response algorithm for each game player is proposed to iteratively achieve the Stackelberg-Nash Equilibrium (SNE. Theoretical analysis proves the convergence of the proposed game scheme, and simulation results demonstrate its effectiveness.

  19. Efficient scheduling request algorithm for opportunistic wireless access

    KAUST Repository

    Nam, Haewoon

    2011-08-01

    An efficient scheduling request algorithm for opportunistic wireless access based on user grouping is proposed in this paper. Similar to the well-known opportunistic splitting algorithm, the proposed algorithm initially adjusts (or lowers) the threshold during a guard period if no user sends a scheduling request. However, if multiple users make requests simultaneously and therefore a collision occurs, the proposed algorithm no longer updates the threshold but narrows down the user search space by splitting the users into multiple groups iteratively, whereas the opportunistic splitting algorithm keeps adjusting the threshold until a single user is found. Since the threshold is only updated when no user sends a request, it is shown that the proposed algorithm significantly alleviates the burden of the signaling for the threshold distribution to the users by the scheduler. More importantly, the proposed algorithm requires a less number of mini-slots to make a user selection given a certain scheduling outage probability. © 2011 IEEE.

  20. Do We Really Have an Internet Problem? Statistics, Credibility and Issues Concerning Public Internet Access in Academic Libraries.

    Science.gov (United States)

    Cubbage, Charlotte

    2002-01-01

    Discusses problems with patron Internet access in academic libraries and describes a study conducted at Northwestern University (Illinois) that used Internet tracking software to assess user Internet behavior. Topics include Internet use policies; pornography; and loss of control over library services and information content that is provided. (LRW)

  1. Cellular 5G Access for Massive Internet of Things

    DEFF Research Database (Denmark)

    Madueño, Germán Corrales; Pratas, Nuno; Stefanovic, Cedomir

    2017-01-01

    The Internet of Things (IoT) refers to the paradigm of physical and virtual “things” that communicate and collaborate over the Internet, with minimal or no human intervention. There are multiple ways in which an IoT device can be connected to the Internet. Cellular technologies are seen as viable...... candidates in this respect, due to their maturity, worldwide availability and the use of reserved spectrum. However, current cellular systems are not well-equipped to efficiently and reliably support IoT traffic, particularly in the radio access part, as they are designed for low number of high......-rate connections and not for high number of low-rate IoT connections. In this chapter we outline the main features of the IoT traffic types, review operation of the current cellular access and provide some guidelines how to address its shortcomings and evolve it in order to support IoT services. However...

  2. What drives individuals to access the internet mostly using a cell phone?

    OpenAIRE

    Yook, Seungyun; Jung, Yumi

    2012-01-01

    Mobile Internet users can access content, applications, and services using their cell phones. Recent PEW Internet research shows that more than half of U.S. cell phone owners have smartphones. Among them, some people have adopted a mobile phone and use it as a major Internet access medium; they may use other devices such as a desktop computer, notebook, netbook, or tablet PC, but those are not included in their Internet access medium repertoire. This paper examines who accesses the Internet m...

  3. Accessing Wireless Sensor Networks Via Dynamically Reconfigurable Interaction Models

    Directory of Open Access Journals (Sweden)

    Maria Cecília Gomes

    2012-12-01

    Full Text Available The Wireless Sensor Networks (WSNs technology is already perceived as fundamental for science across many domains, since it provides a low cost solution for environment monitoring. WSNs representation via the service concept and its inclusion in Web environments, e.g. through Web services, supports particularly their open/standard access and integration. Although such Web enabled WSNs simplify data access, network parameterization and aggregation, the existing interaction models and run-time adaptation mechanisms available to clients are still scarce. Nevertheless, applications increasingly demand richer and more flexible accesses besides the traditional client/server. For instance, applications may require a streaming model in order to avoid sequential data requests, or the asynchronous notification of subscribed data through the publish/subscriber. Moreover, the possibility to automatically switch between such models at runtime allows applications to define flexible context-based data acquisition. To this extent, this paper discusses the relevance of the session and pattern abstractions on the design of a middleware prototype providing richer and dynamically reconfigurable interaction models to Web enabled WSNs.

  4. Internet access and use among Nigerian dental students ...

    African Journals Online (AJOL)

    Objective: The aim of this study was to determine access to internet /e-mail and its usage among Nigerian clinical dental students in year 4 to year 6. Methods: This is a cross-sectional study involving clinical dental students in year 4 to year 6 of the College of Medicine, University of Lagos. Information obtained from the ...

  5. Accessing And Utilizing Hinagoa Resources On The Internet By The ...

    African Journals Online (AJOL)

    This paper presents simple descriptive steps required in accessing full -text articles from the HINAGOA resources on the Internet. The primary aim is to enable NIFOR scientists search and obtain desired information from the HINAGOA resources much more precis ely and efficiently. The three portals that make up HINAGOA, ...

  6. Creation of an online multimedia radiology module access to Internet

    International Nuclear Information System (INIS)

    Alejo, J.P.; Vega, J.M.; Perez, R.

    1996-01-01

    Using freely distributed programs, we have created a radiology data server in the world wide web (WWW) system, which includes among its services a radiological teaching module developed entirely in Spanish. This server is linked to Internet, the extensive worldwide computer network, to which WWW subscribers have access. The data is presented in hypertext and hypermedia format. (Author) 9 refs

  7. Sustainable and Practical Firmware Upgrade for Wireless Access Point Using Password-Based Authentication

    Directory of Open Access Journals (Sweden)

    Jaejin Jang

    2016-08-01

    Full Text Available Wireless access points (WAPs are devices that provide Internet connectivity to devices such as desktops, laptops, smartphones, and tablets. Hence, it is important to provide sufficient availability to devices and security for the traffic that is routed by a WAP. However, attackers can decrease the network bandwidth or obtain the traffic including private data such as search histories, login information, and device usage patterns by exploiting the vulnerabilities in firmware upgrades to install malicious firmware. To address this problem, we propose a sustainable and practical firmware upgrade for a WAP using password-based authentication. The proposed upgrade protocol ensures security by adding freshness to the firmware whenever a firmware upgrade occurs. This freshness is different for each event and each firmware; therefore, even if the freshness of one firmware is exposed, the others are secure. In addition, confidentiality, integrity, and authentication are ensured. Furthermore, the proposed protocol can be easily implemented and adapted to WAPs. Experiments are performed to evaluate the upgrade time, resource usage, and code size in wired and wireless connected environments by implementing a prototype and analyzing the security of the protocol. The results show that the proposed upgrade is secure and practical.

  8. Wireless access to a pharmaceutical database: A demonstrator for data driven Wireless Application Prorocol (WAP) applications in medical information processing

    DEFF Research Database (Denmark)

    Hansen, Michael Schacht; Dørup, Jens

    2001-01-01

    script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2......) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. RESULTS: A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol...... service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. CONCLUSIONS: We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further...

  9. Reliable low-power wireless networks over unstable transmission power

    NARCIS (Netherlands)

    Kotian, Roshan; Exarchakos, Georgios; Liotta, Antonio

    2017-01-01

    Internet of Things promises large scale interconnected sensing and actuation capabilities in domains, areas, applications and activities never accessed before by Internet. Besides other technical barriers, wireless network node lifetime impedes its applicability. To reduce the energy cost incurred

  10. Non-Orthogonal Multiple Access for Ubiquitous Wireless Sensor Networks.

    Science.gov (United States)

    Anwar, Asim; Seet, Boon-Chong; Ding, Zhiguo

    2018-02-08

    Ubiquitous wireless sensor networks (UWSNs) have become a critical technology for enabling smart cities and other ubiquitous monitoring applications. Their deployment, however, can be seriously hampered by the spectrum available to the sheer number of sensors for communication. To support the communication needs of UWSNs without requiring more spectrum resources, the power-domain non-orthogonal multiple access (NOMA) technique originally proposed for 5th Generation (5G) cellular networks is investigated for UWSNs for the first time in this paper. However, unlike 5G networks that operate in the licensed spectrum, UWSNs mostly operate in unlicensed spectrum where sensors also experience cross-technology interferences from other devices sharing the same spectrum. In this paper, we model the interferences from various sources at the sensors using stochastic geometry framework. To evaluate the performance, we derive a theorem and present new closed form expression for the outage probability of the sensors in a downlink scenario under interference limited environment. In addition, diversity analysis for the ordered NOMA users is performed. Based on the derived outage probability, we evaluate the average link throughput and energy consumption efficiency of NOMA against conventional orthogonal multiple access (OMA) technique in UWSNs. Further, the required computational complexity for the NOMA users is presented.

  11. [Differences in access to Internet and Internet-based information seeking according to the type of psychiatric disorder].

    Science.gov (United States)

    Brunault, P; Bray, A; Rerolle, C; Cognet, S; Gaillard, P; El-Hage, W

    2017-04-01

    Internet has become a major tool for patients to search for health-related information and to communicate on health. We currently lack data on how patients with psychiatric disorders access and use Internet to search for information on their mental health. This study aimed to assess, in patients followed for a psychiatric disorder (schizophrenia, bipolar disorder, mood and anxiety disorder, substance-related and addictive disorders and eating disorders), prevalence of Internet access and use, and patient expectations and needs regarding the use of Internet to search for mental-health information depending on the psychiatric disorder. We conducted this cross-sectional study between May 2013 and July 2013 in 648 patients receiving psychiatric care in 8 hospitals from the Region Centre, France. We used multivariate logistic regression adjusted for age, gender, socio-educational level and professional status to compare use, expectations and needs regarding Internet-based information about the patient's psychiatric disorder (65-items self-administered questionnaires) as a function of the psychiatric disorders. We identified patients clusters with multiple correspondence analysis and ascending hierarchical classification. Although 65.6% of our population accessed Internet at home, prevalence for Internet access varied depending on the type of psychiatric disorder and was much more related to limited access to a computer and low income than to a lack of interest in the Internet. Most of the patients who used Internet were interested in having access to reliable Internet-based information on their health (76.8%), and most used Internet to search for Internet based health-information about their psychiatric disorder (58.8%). We found important differences in terms of expectations and needs depending on the patient's psychiatric disorder (e.g., higher interest in Internet-based information among patients with bipolar disorder, substance-related and addictive disorders

  12. Getting ahead of the curve in wireless communications | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The demand for wireless communications is expected to increase significantly over ... would become more accessible to those without mobile phones, or Internet access. ... that will have a lasting impact on the field of wireless communications. ... problems: cooperative communication, coexistence of wireless systems, and ...

  13. Integrated Coherent Radio-over-Fiber Units for Millimeter-Wave Wireless Access

    DEFF Research Database (Denmark)

    Stöhr, A.; Babiel, S.; Chuenchom, M.

    2015-01-01

    For providing wireless access as a complementary access technology to direct optical access, supporting 1–10 Gb/s per client, we propose a novel scheme based upon the transparent integration of coherent Radio-over-Fiber (CRoF) units with next generation optical access (NGOA) networks using dense ...

  14. Knowledge-Based Multiple Access Protocol in Broadband Wireless ATM Networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    1999-01-01

    In this paper, we propose a knowledge-based multiple access protocol for the extension of wireline ATM to wireless networks. The objective is to enable effecient transmission of all kinds of ATM traffic in the wireless channel with guaranteed QoS.The proposed protocol utilixes knowledge of the main...... guaranteed QoS requirements to a variety of ATM applications....

  15. Analysis of the Decoupled Access for Downlink and Uplink in Wireless Heterogeneous Networks

    DEFF Research Database (Denmark)

    Smiljkovikj, K.; Popovski, Petar; Gavrilovska, L.

    2015-01-01

    Wireless cellular networks evolve towards a heterogeneous infrastructure, featuring multiple types of Base Stations (BSs), such as Femto BSs (FBSs) and Macro BSs (MBSs). A wireless device observes multiple points (BSs) through which it can access the infrastructure and it may choose to receive th...

  16. Opportunistic Nonorthogonal Packet Scheduling in Fixed Broadband Wireless Access Networks

    Directory of Open Access Journals (Sweden)

    Ahmed Mohamed H

    2006-01-01

    Full Text Available In order to mitigate high cochannel interference resulting from dense channel reuse, the interference management issues are often considered as essential part of scheduling schemes in fixed broadband wireless access (FBWA networks. To that end, a series of literature has been published recently, in which a group of base stations forms an interferer group (downlink transmissions from each base station become dominant interference for the users in other in-group base stations, and the scheduling scheme deployed in the group allows only one base station to transmit at a time. As a result of time orthogonality in transmissions, the dominant cochannel interferers are prevented, and hence the packet error rate can be improved. However, prohibiting concurrent transmissions in these orthogonal schemes introduces throughput penalty as well as higher end-to-end packet delay which might not be desirable for real-time services. In this paper, we utilize opportunistic nonorthogonality among the in-group transmissions whenever possible and propose a novel transmission scheduling scheme for FBWA networks. The proposed scheme, in contrast to the proactive interference avoidance techniques, strives for the improvements in delay and throughput efficiency. To facilitate opportunistic nonorthogonal transmissions in the interferer group, estimation of signal-to-interference-plus-noise ratio (SINR is required at the scheduler. We have observed from simulations that the proposed scheme outperforms the reference orthogonal scheme in terms of spectral efficiency, mean packet delay, and packet dropping rate.

  17. Optimal Pricing of Spectrum Resources in Wireless Opportunistic Access

    Directory of Open Access Journals (Sweden)

    Hanna Bogucka

    2012-01-01

    Full Text Available We consider opportunistic access to spectrum resources in cognitive wireless networks. The users equipment, or the network nodes in general are able to sense the spectrum and adopt a subset of available resources (the spectrum and the power individually and independently in a distributed manner, that is, based on their local channel quality information and not knowing the Channel State Information (CSI of the other nodes' links in the considered network area. In such a network scenery, the competition of nodes for available resources is observed, which can be modeled as a game. To obtain spectrally efficient and fair spectrum allocation in this competitive environment with the nodes having no information on the other players, taxation of resources is applied to coerce desired behavior of the competitors. In the paper, we present mathematical formulation of the problem of finding the optimal taxation rate (common for all nodes and propose a reduced-complexity algorithm for this optimization. Simulation results for these derived optimal values in various scenarios are also provided.

  18. EAP-Kerberos: A Low Latency EAP Authentication Method for Faster Handoffs in Wireless Access Networks

    Science.gov (United States)

    Zrelli, Saber; Okabe, Nobuo; Shinoda, Yoichi

    The wireless medium is a key technology for enabling ubiquitous and continuous network connectivity. It is becoming more and more important in our daily life especially with the increasing adoption of networking technologies in many fields such as medical care and transportation systems. Although most wireless technologies nowadays provide satisfying bandwidth and higher speeds, several of these technologies still lack improvements with regard to handoff performance. In this paper, we focus on wireless network technologies that rely on the Extensible Authentication Protocol for mutual authentication between the station and the access network. Such technologies include local area wireless networks (IEEE 802.11) as well as broadband wireless networks (IEEE 802.16). We present a new EAP authentication method based on a three party authentication scheme, namely Kerberos, that considerably shortens handoff delays. Compared to other methods, the proposed method has the advantage of not requiring any changes on the access points, making it readily deployable at reasonable costs.

  19. Internet access and usage by staff and students: a case study of ...

    African Journals Online (AJOL)

    This study focused on Internet access and usage by staff and students in the University of Jos Main Library. It investigated monthly number of users that queued to access Internet monthly and the number of users who actually had access to use the Internet between January – December 2006. Other things investigated ...

  20. Energy-efficient wireless mesh infrastructures

    OpenAIRE

    Al-Hazmi, Y.; de Meer, Hermann; Hummel, Karin Anna; Meyer, Harald; Meo, Michela; Remondo Bueno, David

    2011-01-01

    The Internet comprises access segments with wired and wireless technologies. In the future, we can expect wireless mesh infrastructures (WMIs) to proliferate in this context. Due to the relatively low energy efficiency of wireless transmission, as compared to wired transmission, energy consumption of WMIs can represent a significant part of the energy consumption of the Internet as a whole. We explore different approaches to reduce energy consumption in WMIs, taking into accoun...

  1. Wireless and wireline service convergence in next generation optical access networks - the FP7 WISCON project

    DEFF Research Database (Denmark)

    Vegas Olmos, Juan José; Pang, Xiaodan; Lebedev, Alexander

    2014-01-01

    The next generation of information technology demands both high capacity and mobility for applications such as high speed wireless access capable of supporting broadband services. The transport of wireless and wireline signals is converging into a common telecommunication infrastructure....... In this paper, we will present the Marie Curie Framework Program 7 project “Wireless and wireline service convergence in next generation optical access networks” (WISCON), which focuses on the conception and study of novel architectures for wavelength-division-multiplexing (WDM) optical multi-modulation format...

  2. Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network.

    Science.gov (United States)

    Omala, Anyembe Andrew; Mbandu, Angolo Shem; Mutiria, Kamenyi Domenic; Jin, Chunhua; Li, Fagen

    2018-04-28

    Wireless body area network (WBAN) provides a medium through which physiological information could be harvested and transmitted to application provider (AP) in real time. Integrating WBAN in a heterogeneous Internet of Things (IoT) ecosystem would enable an AP to monitor patients from anywhere and at anytime. However, the IoT roadmap of interconnected 'Things' is still faced with many challenges. One of the challenges in healthcare is security and privacy of streamed medical data from heterogeneously networked devices. In this paper, we first propose a heterogeneous signcryption scheme where a sender is in a certificateless cryptographic (CLC) environment while a receiver is in identity-based cryptographic (IBC) environment. We then use this scheme to design a heterogeneous access control protocol. Formal security proof for indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model is presented. In comparison with some of the existing access control schemes, our scheme has lower computation and communication cost.

  3. Comparison of Broadband Wireless Access Technology for HAPS Communication

    Directory of Open Access Journals (Sweden)

    Mingxiang GUAN

    2014-03-01

    Full Text Available An information system formed by HAP (High Altitude Platform will be a new generation-system for the wireless communications and HAPS (HAP Station communication system combines the advantages of both terrestrial and satellite communication systems and avoids, to different extents, their disadvantages. Third generation (3G mobile technology which is specified by the third generation partnership project (3 GPP is definitely one of the candidates. With the success of wireless network, the IEEE 802.16 standard, with its wireless metropolitan area network (MAN air interface appears to be a strong competitor. We provide initial practical comparison of these two technologies for HAPS Communication.

  4. High-Capacity Hybrid Optical Fiber-Wireless Communications Links in Access Networks

    DEFF Research Database (Denmark)

    Pang, Xiaodan

    of broadband services access. To realize the seamless convergence between the two network segments, the lower capacity of wireless systems need to be increased to match the continuously increasing bandwidth of fiber-optic systems. The research works included in this thesis are devoted to experimental...... investigations of photonic-wireless links with record high capacities to fulfill the requirements of next generation hybrid optical fiber-wireless access networks. The main contributions of this thesis have expanded the state-of-the-art in two main areas: high speed millimeter-wave (mm-wave) communication links......Integration between fiber-optic and wireless communications systems in the "last mile" access networks is currently considered as a promising solution for both service providers and users, in terms of minimizing deployment cost, shortening upgrading period and increasing mobility and flexibility...

  5. Multigigabit W-Band (75–110 GHz) Bidirectional Hybrid Fiber-Wireless Systems in Access Networks

    DEFF Research Database (Denmark)

    Pang, Xiaodan; Lebedev, Alexander; Vegas Olmos, Juan José

    2014-01-01

    compare the transmission performances in terms of achievable wireless distances with and without using a high-frequency electrical power amplifier at the wireless transmitter. A downlink 16-Gbit/s QPSK signal and an uplink 1.25-Gbit/s ASK signal transmission over the two implementations are experimentally......We experimentally demonstrate multigigabit capacity bidirectional hybrid fiber-wireless systems with RF carrier frequencies at the W-band (75-110 GHz) that enables the seamless convergence between wireless and fiber-optic data transmission systems in access networks. In this study, we evaluate...... the transmission performances in two scenarios: a fiber-wireless access link that directly provide high-speed connections to wireless end users, and a fiber-wireless-fiber signal relay where a high capacity wireless link can be used to bridge two access fiber spans over physical obstacles. In both scenarios, we...

  6. Democracy and the Internet: Access, Engagement and Deliberation

    Directory of Open Access Journals (Sweden)

    Roman Gerodimos

    2005-12-01

    Full Text Available The internet has the capacity to facilitate the creation of new forms of civic engagement, but the realisation of these opportunities requires institutional and cultural reinforcement. The democratic character of e-citizenship and the equal distribution of online resources to the public require the fulfilment of four conditions: access, engagement (incorporating education, motivation and trust, meaningful deliberation and a link between civic input and public policy output. Furthermore, the gap between the main features of cyberspace and the inherent prerequisites of democracy, such as a finite space and a set of rules, create tensions that need to be negotiated politically. Although the empirical evidence available includes some encouraging signs regarding the future use of the internet for civic engagement, the existing limitations and obstacles mean that the new media will complement, rather than replace, the old media as a democratic public sphere.

  7. On the Security of Data Collection and Transmission from Wireless Sensor Networks in the Context of Internet of Things

    OpenAIRE

    Yu, Hong; He, Jingsha; Liu, Ruohong; Ji, Dajie

    2013-01-01

    In the context of Internet of Things (IoT), multiple cooperative nodes in wireless sensor networks (WSNs) can be used to monitor an event, jointly generate a report and then send it to one or more Internet nodes for further processing. A primary security requirement in such applications is that every event data report be authenticated to intended Internet users and effectively filtered on its way to the Internet users to realize the security of data collection and transmission from the WSN. H...

  8. Pengembangan Wireless Sensor Network Berbasis Internet of Things untuk Sistem Pemantauan Kualitas Air dan Tanah Pertanian

    Directory of Open Access Journals (Sweden)

    Ummi Syafiqoh

    2018-05-01

    Full Text Available Water and soil quality is very important in agriculture. The level of acidity (pH and soil temperature is one of the things that affect the fertility of plants. Therefore the quality of water and soil on agricultural land is one of the important things that need special attention in its management. One solution to water and soil quality can be monitored and managed efficiently is by utilizing the Wireless Sensor Network based on the Internet of Things (IoT. Use of ESP8266 Module as a WIFI module, widely used by Internet-based applications of Things because the price is cheap, thus reducing many costs and have a pretty good speed of 80 MHz. This research aims to develop the concept of Wireless Sensor Network by utilizing ESP8266 module to monitor pH value using pH Meter Analog Kit sensor and temperature of agricultural land using DS18B20 Waterproof sensor. The result of temperature measurement accuracy using DS18B20 Waterproof sensor of the designed system is 99.09% while the pH measurement using pH Meter Analog Kit sensor is 91.33%.

  9. Heterogeneous wireless/wireline optical access networks with the R-EAT as backend component

    Science.gov (United States)

    Hagedorn, Klaus; Gindera, Ralf; Stohr, Andreas; Jager, Dieter

    2004-09-01

    A heterogeneous wireless/wireline optical transmission link using a reflection type electroabsorption transceiver (R-EAT) is presented. Simultaneous transmission of full-duplex broadband wireless LAN (WLAN) channels and 1Gb/s base band data is experimentally demonstrated. The system link employs sub-carrier multiplexing (SCM) and two optical channels for full duplex transmission of various analog WLAN channels and downlink digital base band data. The developed link architecture is suitable for simultaneous transmission of broadband wireline and wireless signals, it enables the coexistence and interoperability between wireline and wireless access technologies. The developed R-EAT component employed in this wireline/wireless access system, features "single-chip-component" base stations in access networks with star type topology where only a single optical fiber is used for bidirectional optical transmission. The R-EAT can be used within the optical C-band (1530- 1560nm) and is suitable for (D)WDM networks. Bit error rate measurements demonstrate the capabilities of the R-EAT for 1Gb/s base band transmission. The analog performance for WLAN transmission is characterised by a spurious free dynamic range (SFDR) of more than 75dB and 90dB for uplink and downlink transmission, respectively. The link gain for uplink and downlink transmission is -42dB and -37dB, respectively. The demonstrates the analog performances of the R-EAT for being used in wireless access networks such as W-LAN.

  10. Multiple access protocol for supporting multimedia services in wireless ATM networks

    DEFF Research Database (Denmark)

    Liu, Hong; Dittmann, Lars; Gliese, Ulrik Bo

    1999-01-01

    The furture broadband wireless asynchronous transfer mode (ATM) networks must provide seamless extension of multimedia services from the wireline ATM networks. This requires an effecient wireless access protocol to fulfill varying Quality-og-Service (QoS) requirements for multimedia applications....... In this paper, we propose a multiple access protocol using centralized and distributed channel access control techniques to provide QoS guarantees for multimedia services by taking advantage of the characteristics of different kinds of ATM traffics. Multimedia traffic, including constant bit rate (CBR...

  11. Upper bound for energy efficiency in multi-cell fibre-wireless access systems

    NARCIS (Netherlands)

    Koonen, A.M.J.; Popov, M.; Wessing, H.

    2013-01-01

    Bringing radio access points closer to the end-users improves radio energy efficiency. However, taking into account both the radio and the optical parts of a fibre-wireless access system, the overall system energy efficiency has an upper bound determined by the relation between the energy

  12. Upper bound for energy efficiency in multi-cell fibre-wireless access systems

    DEFF Research Database (Denmark)

    Koonen, A.M.J.; Popov, M.; Wessing, Henrik

    2013-01-01

    Bringing radio access points closer to the end-users improves radio energy efficiency. However, taking into account both the radio and the optical parts of a fibre-wireless access system, the overall system energy efficiency has an upper bound determined by the relation between the energy...

  13. Household computer and Internet access: The digital divide in a pediatric clinic population

    Science.gov (United States)

    Carroll, Aaron E.; Rivara, Frederick P.; Ebel, Beth; Zimmerman, Frederick J.; Christakis, Dimitri A.

    2005-01-01

    Past studies have noted a digital divide, or inequality in computer and Internet access related to socioeconomic class. This study sought to measure how many households in a pediatric primary care outpatient clinic had household access to computers and the Internet, and whether this access differed by socio-economic status or other demographic information. We conducted a phone survey of a population-based sample of parents with children ages 0 to 11 years old. Analyses assessed predictors of having home access to a computer, the Internet, and high-speed Internet service. Overall, 88.9% of all households owned a personal computer, and 81.4% of all households had Internet access. Among households with Internet access, 48.3% had high speed Internet at home. There were statistically significant associations between parental income or education and home computer ownership and Internet access. However, the impact of this difference was lessened by the fact that over 60% of families with annual household income of $10,000–$25,000, and nearly 70% of families with only a high-school education had Internet access at home. While income and education remain significant predictors of household computer and internet access, many patients and families at all economic levels have access, and might benefit from health promotion interventions using these modalities. PMID:16779012

  14. Adaptive Information Access on Multiple Applications Support Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2014-01-01

    information is challenged by dynamic nature of information elements. These challenges are more prominent in case of wireless sensor network (WSN) applications, as the information that the sensor node collects are mostly dynamic in nature (say, temperature). Therefore, it is likely that there can be a mismatch...

  15. Adaptive Information Access in Multiple Applications Support Wireless Sensor Network

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2012-01-01

    Nowadays, due to wide applicability of Wireless Sensor Network (WSN) added by the low cost sensor devices, its popularity among the researchers and industrialists are very much visible. A substantial amount of works can be seen in the literature on WSN which are mainly focused on application...

  16. Enabling multimode wireless access networks using remote radio heads

    DEFF Research Database (Denmark)

    Kardaras, Georgios; Soler, José; Dittmann, Lars

    2012-01-01

    and management plane. Switching between wireless standards becomes easily feasible through firmware upgrading. Finally, real-time configuration of radio functionalities, such as transmit power, receiver gain, carrier frequency, channel bandwidth and others result in a modular software defined radio platform...

  17. Access Point Security Service for wireless ad-hoc communication

    NARCIS (Netherlands)

    Scholten, Johan; Nijdam, M.

    2006-01-01

    This paper describes the design and implementation of a security solution for ad-hoc peer-to-peer communication. The security solution is based on a scenario where two wireless devices require secure communication, but share no security relationship a priori. The necessary requirements for the

  18. How Much Is Too Much to Pay for Internet Access? A Behavioral Economic Analysis of Internet Use.

    Science.gov (United States)

    Broadbent, Julie; Dakki, Michelle A

    2015-08-01

    The popularity of online recreational activities, such as social networking, has dramatically increased the amount of time spent on the Internet. Excessive or inappropriate use of the Internet can result in serious adverse consequences. The current study used a behavioral economic task to determine if the amount of time spent online by problematic and nonproblematic users can be modified by price. The Internet Purchase Task was used to determine how much time undergraduate students (N=233) would spend online at 13 different prices. Despite high demand for Internet access when access was free, time spent online by both problematic and nonproblematic users decreased dramatically, even at low prices. These results suggest that the amount of time spent online may be modified by having a tangible cost associated with use, whereas having free access to the Internet may encourage excessive, problematic use.

  19. Patient access to complex chronic disease records on the Internet

    Directory of Open Access Journals (Sweden)

    Bartlett Cherry

    2012-08-01

    Full Text Available Abstract Background Access to medical records on the Internet has been reported to be acceptable and popular with patients, although most published evaluations have been of primary care or office-based practice. We tested the feasibility and acceptability of making unscreened results and data from a complex chronic disease pathway (renal medicine available to patients over the Internet in a project involving more than half of renal units in the UK. Methods Content and presentation of the Renal PatientView (RPV system was developed with patient groups. It was designed to receive information from multiple local information systems and to require minimal extra work in units. After piloting in 4 centres in 2005 it was made available more widely. Opinions were sought from both patients who enrolled and from those who did not in a paper survey, and from staff in an electronic survey. Anonymous data on enrolments and usage were extracted from the webserver. Results By mid 2011 over 17,000 patients from 47 of the 75 renal units in the UK had registered. Users had a wide age range (90 yrs but were younger and had more years of education than non-users. They were enthusiastic about the concept, found it easy to use, and 80% felt it gave them a better understanding of their disease. The most common reason for not enrolling was being unaware of the system. A minority of patients had security concerns, and these were reduced after enrolling. Staff responses were also strongly positive. They reported that it aided patient concordance and disease management, and increased the quality of consultations with a neutral effect on consultation length. Neither patient nor staff responses suggested that RPV led to an overall increase in patient anxiety or to an increased burden on renal units beyond the time required to enrol each patient. Conclusions Patient Internet access to secondary care records concerning a complex chronic disease is feasible and popular

  20. Patient access to complex chronic disease records on the Internet.

    Science.gov (United States)

    Bartlett, Cherry; Simpson, Keith; Turner, A Neil

    2012-08-06

    Access to medical records on the Internet has been reported to be acceptable and popular with patients, although most published evaluations have been of primary care or office-based practice. We tested the feasibility and acceptability of making unscreened results and data from a complex chronic disease pathway (renal medicine) available to patients over the Internet in a project involving more than half of renal units in the UK. Content and presentation of the Renal PatientView (RPV) system was developed with patient groups. It was designed to receive information from multiple local information systems and to require minimal extra work in units. After piloting in 4 centres in 2005 it was made available more widely. Opinions were sought from both patients who enrolled and from those who did not in a paper survey, and from staff in an electronic survey. Anonymous data on enrollment and usage were extracted from the webserver. By mid 2011 over 17,000 patients from 47 of the 75 renal units in the UK had registered. Users had a wide age range (90 yrs) but were younger and had more years of education than non-users. They were enthusiastic about the concept, found it easy to use, and 80% felt it gave them a better understanding of their disease. The most common reason for not enrolling was being unaware of the system. A minority of patients had security concerns, and these were reduced after enrolling. Staff responses were also strongly positive. They reported that it aided patient concordance and disease management, and increased the quality of consultations with a neutral effect on consultation length. Neither patient nor staff responses suggested that RPV led to an overall increase in patient anxiety or to an increased burden on renal units beyond the time required to enroll each patient. Patient Internet access to secondary care records concerning a complex chronic disease is feasible and popular, providing an increased sense of empowerment and understanding, with no

  1. Converged wireline and wireless signal distribution in optical fiber access networks

    DEFF Research Database (Denmark)

    Prince, Kamau

    This thesis presents results obtained during the course of my doctoral studies into the transport of fixed and wireless signaling over a converged otpical access infrastructure. In the formulation, development and assessment of a converged paradigma for multiple-services delivery via optical access...... networking infrastructure, I have demonstrated increased functionalities with existing optical technologies and commercially available optoelectronic devices. I have developed novel systems for extending the range of optical access systems, and have demonstrated the repurposing of standard digital devices...

  2. QoS Provisioning Techniques for Future Fiber-Wireless (FiWi Access Networks

    Directory of Open Access Journals (Sweden)

    Martin Maier

    2010-04-01

    Full Text Available A plethora of enabling optical and wireless access-metro network technologies have been emerging that can be used to build future-proof bimodal fiber-wireless (FiWi networks. Hybrid FiWi networks aim at providing wired and wireless quad-play services over the same infrastructure simultaneously and hold great promise to mitigate the digital divide and change the way we live and work by replacing commuting with teleworking. After overviewing enabling optical and wireless network technologies and their QoS provisioning techniques, we elaborate on enabling radio-over-fiber (RoF and radio-and-fiber (R&F technologies. We describe and investigate new QoS provisioning techniques for future FiWi networks, ranging from traffic class mapping, scheduling, and resource management to advanced aggregation techniques, congestion control, and layer-2 path selection algorithms.

  3. Within a Stone's Throw: Proximal Geolocation of Internet Users via Covert Wireless Signaling

    Energy Technology Data Exchange (ETDEWEB)

    Paul, Nathanael R [ORNL; Shue, Craig [Worcester Polytechnic Institute, Worcester; Taylor, Curtis [Worcester Polytechnic Institute, Worcester

    2013-01-01

    While Internet users may often believe they have anonymity online, a culmination of technologies and recent research may allow an adversary to precisely locate an online user s geophysical location. In many cases, such as peer-to-peer applications, an adversary can easily use a target s IP address to quickly obtain the general geographical location of the target. Recent research has scoped this general area to a 690m (0.43 mile) radius circle. In this work, we show how an adversary can exploit Internet communication for geophysical location by embedding covert signals in communication with a target on a remote wireless local area network. We evaluated the approach in two common real-world settings: a residential neighborhood and an apartment building. In the neighborhood case, we used a single-blind trial in which an observer located a target network to within three houses in less than 40 minutes. Directional antennas may have allowed even more precise geolocation. This approach had only a 0.38% false positive rate, despite 24,000 observed unrelated packets and many unrelated networks. This low rate allowed the observer to exclude false locations and continue searching for the target. Our results enable law enforcement or copyright holders to quickly locate online Internet users without requiring time-consuming subpoenas to Internet Service Providers. Other privacy use cases include rapidly locating individuals based on their online speech or interests. We hope to raise awareness of these issues and to spur discussion on privacy and geolocating techniques.

  4. Virtual Wireless Sensor Networks: Adaptive Brain-Inspired Configuration for Internet of Things Applications

    Science.gov (United States)

    Toyonaga, Shinya; Kominami, Daichi; Murata, Masayuki

    2016-01-01

    Many researchers are devoting attention to the so-called “Internet of Things” (IoT), and wireless sensor networks (WSNs) are regarded as a critical technology for realizing the communication infrastructure of the future, including the IoT. Against this background, virtualization is a crucial technique for the integration of multiple WSNs. Designing virtualized WSNs for actual environments will require further detailed studies. Within the IoT environment, physical networks can undergo dynamic change, and so, many problems exist that could prevent applications from running without interruption when using the existing approaches. In this paper, we show an overall architecture that is suitable for constructing and running virtual wireless sensor network (VWSN) services within a VWSN topology. Our approach provides users with a reliable VWSN network by assigning redundant resources according to each user’s demand and providing a recovery method to incorporate environmental changes. We tested this approach by simulation experiment, with the results showing that the VWSN network is reliable in many cases, although physical deployment of sensor nodes and the modular structure of the VWSN will be quite important to the stability of services within the VWSN topology. PMID:27548177

  5. Virtual Wireless Sensor Networks: Adaptive Brain-Inspired Configuration for Internet of Things Applications.

    Science.gov (United States)

    Toyonaga, Shinya; Kominami, Daichi; Murata, Masayuki

    2016-08-19

    Many researchers are devoting attention to the so-called "Internet of Things" (IoT), and wireless sensor networks (WSNs) are regarded as a critical technology for realizing the communication infrastructure of the future, including the IoT. Against this background, virtualization is a crucial technique for the integration of multiple WSNs. Designing virtualized WSNs for actual environments will require further detailed studies. Within the IoT environment, physical networks can undergo dynamic change, and so, many problems exist that could prevent applications from running without interruption when using the existing approaches. In this paper, we show an overall architecture that is suitable for constructing and running virtual wireless sensor network (VWSN) services within a VWSN topology. Our approach provides users with a reliable VWSN network by assigning redundant resources according to each user's demand and providing a recovery method to incorporate environmental changes. We tested this approach by simulation experiment, with the results showing that the VWSN network is reliable in many cases, although physical deployment of sensor nodes and the modular structure of the VWSN will be quite important to the stability of services within the VWSN topology.

  6. Partial Interference and Its Performance Impact on Wireless Multiple Access Networks

    Directory of Open Access Journals (Sweden)

    Lau WingCheong

    2010-01-01

    Full Text Available To determine the capacity of wireless multiple access networks, the interference among the wireless links must be accurately modeled. In this paper, we formalize the notion of the partial interference phenomenon observed in many recent wireless measurement studies and establish analytical models with tractable solutions for various types of wireless multiple access networks. In particular, we characterize the stability region of IEEE 802.11 networks under partial interference with two potentially unsaturated links numerically. We also provide a closed-form solution for the stability region of slotted ALOHA networks under partial interference with two potentially unsaturated links and obtain a partial characterization of the boundary of the stability region for the general M-link case. Finally, we derive a closed-form approximated solution for the stability region for general M-link slotted ALOHA system under partial interference effects. Based on our results, we demonstrate that it is important to model the partial interference effects while analyzing wireless multiple access networks. This is because such considerations can result in not only significant quantitative differences in the predicted system capacity but also fundamental qualitative changes in the shape of the stability region of the systems.

  7. Prescription for trouble: Medicare Part D and patterns of computer and internet access among the elderly.

    Science.gov (United States)

    Wright, David W; Hill, Twyla J

    2009-01-01

    The Medicare Prescription Drug, Improvement, and Modernization Act of 2003 specifically encourages Medicare enrollees to use the Internet to obtain information regarding the new prescription drug insurance plans and to enroll in a plan. This reliance on computer technology and the Internet leads to practical questions regarding implementation of the insurance coverage. For example, it seems unlikely that all Medicare enrollees have access to computers and the Internet or that they are all computer literate. This study uses the 2003 Current Population Survey to examine the effects of disability and income on computer access and Internet use among the elderly. Internet access declines with age and is exacerbated by disabilities. Also, decreases in income lead to decreases in computer ownership and use. Therefore, providing prescription drug coverage primarily through the Internet seems likely to maintain or increase stratification of access to health care, especially for low-income, disabled elderly, who are also a group most in need of health care access.

  8. EEM{sup TM} wireless supervision

    Energy Technology Data Exchange (ETDEWEB)

    Bilic, H. [Ericsson-Nikola Tesla d.d. Zagreb (Croatia)

    2000-07-01

    By adding the GSM network to the communication level of Energy Management systems, energy operating centres (EOC) can offer wireless access to the supervised equipment. Furthermore EOC can profit from rapid service development in the GSM networks. With implementation of GPRS to the GSM network EOC can instantly offer wireless access to external IP based networks such as Internet and corporate Intranets. The author describes architecture and key characteristic of Ericsson EnergyMaster{sup TM} (EEM{sup TM}) system for Energy Management, how and where to implement wireless supervision, wireless access to IP addresses and also how to implement new services provided by the GSM network. (orig.)

  9. Internet Access: How to Design and Test an Internet Use/Management Policy

    National Research Council Canada - National Science Library

    Montgomery, Doris

    2001-01-01

    The Internet is filled with tremendous marketing potential and vulnerabilities, organizations should develop polices that offer both Internet Usage/Management policies that are consisted with their organization...

  10. Investigating the Perceptions and Behaviors of Elementary Students and Teachers when Internet Access is Universal

    Science.gov (United States)

    Hinson, Janice M

    2005-01-01

    This study presents a preliminary investigation into changes in the perceptions and behaviors of teachers and students when all have universal Internet access at home and school using Internet-on-TV technology. Four hundred fourth-grade students and their teachers from seven schools participated in the WISH TV (WorldGate Internet School to Home)…

  11. A Novel Scheme for an Energy Efficient Internet of Things Based on Wireless Sensor Networks.

    Science.gov (United States)

    Rani, Shalli; Talwar, Rajneesh; Malhotra, Jyoteesh; Ahmed, Syed Hassan; Sarkar, Mahasweta; Song, Houbing

    2015-11-12

    One of the emerging networking standards that gap between the physical world and the cyber one is the Internet of Things. In the Internet of Things, smart objects communicate with each other, data are gathered and certain requests of users are satisfied by different queried data. The development of energy efficient schemes for the IoT is a challenging issue as the IoT becomes more complex due to its large scale the current techniques of wireless sensor networks cannot be applied directly to the IoT. To achieve the green networked IoT, this paper addresses energy efficiency issues by proposing a novel deployment scheme. This scheme, introduces: (1) a hierarchical network design; (2) a model for the energy efficient IoT; (3) a minimum energy consumption transmission algorithm to implement the optimal model. The simulation results show that the new scheme is more energy efficient and flexible than traditional WSN schemes and consequently it can be implemented for efficient communication in the IoT.

  12. A Novel Scheme for an Energy Efficient Internet of Things Based on Wireless Sensor Networks

    Science.gov (United States)

    Rani, Shalli; Talwar, Rajneesh; Malhotra, Jyoteesh; Ahmed, Syed Hassan; Sarkar, Mahasweta; Song, Houbing

    2015-01-01

    One of the emerging networking standards that gap between the physical world and the cyber one is the Internet of Things. In the Internet of Things, smart objects communicate with each other, data are gathered and certain requests of users are satisfied by different queried data. The development of energy efficient schemes for the IoT is a challenging issue as the IoT becomes more complex due to its large scale the current techniques of wireless sensor networks cannot be applied directly to the IoT. To achieve the green networked IoT, this paper addresses energy efficiency issues by proposing a novel deployment scheme. This scheme, introduces: (1) a hierarchical network design; (2) a model for the energy efficient IoT; (3) a minimum energy consumption transmission algorithm to implement the optimal model. The simulation results show that the new scheme is more energy efficient and flexible than traditional WSN schemes and consequently it can be implemented for efficient communication in the IoT. PMID:26569260

  13. A Novel Scheme for an Energy Efficient Internet of Things Based on Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Shalli Rani

    2015-11-01

    Full Text Available One of the emerging networking standards that gap between the physical world and the cyber one is the Internet of Things. In the Internet of Things, smart objects communicate with each other, data are gathered and certain requests of users are satisfied by different queried data. The development of energy efficient schemes for the IoT is a challenging issue as the IoT becomes more complex due to its large scale the current techniques of wireless sensor networks cannot be applied directly to the IoT. To achieve the green networked IoT, this paper addresses energy efficiency issues by proposing a novel deployment scheme. This scheme, introduces: (1 a hierarchical network design; (2 a model for the energy efficient IoT; (3 a minimum energy consumption transmission algorithm to implement the optimal model. The simulation results show that the new scheme is more energy efficient and flexible than traditional WSN schemes and consequently it can be implemented for efficient communication in the IoT.

  14. Accessing files in an Internet: The Jade file system

    Science.gov (United States)

    Peterson, Larry L.; Rao, Herman C.

    1991-01-01

    Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.

  15. Accessing files in an internet - The Jade file system

    Science.gov (United States)

    Rao, Herman C.; Peterson, Larry L.

    1993-01-01

    Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.

  16. Digital Divide: How Do Home Internet Access and Parental Support Affect Student Outcomes?

    Directory of Open Access Journals (Sweden)

    Jing Lei

    2012-03-01

    Full Text Available This study examined the relationship between home Internet access/parental support and student outcomes. Survey data were collected from 1,576 middle school students in China. Data were analyzed using descriptive analysis, independent-samples T-test, and regression analysis. Results indicate that students who had home Internet access reported higher scores than those without home Internet on all three dimensions: Computer and Internet self-efficacy, Attitudes towards technology and Developmental outcomes. Home Internet access and parental support were significantly positively associated with technology self-efficacy, interest in technology, perceived importance of the Internet, and perceived impact of the Internet on learning. Findings from this study have significant implications for research and practice on how to narrow down the digital divide.

  17. Multiple wireless protocol advertising system, enabling automatic access selection and local services

    NARCIS (Netherlands)

    Houben, S.A.; Baken, N.; Herve, P.; Smets, R.

    2006-01-01

    We examined efficiency within wireless access options for mobile devices and discovered that a classic pitfall is revisited. As with the proliferation of services in incumbents’ portfolios, leading to a number of coexisting so-called ‘stove-pipes’, we see an isomorphic phenomenon evolving in

  18. Receiver-initiated medium access control protocols for wireless sensor networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Di Mauro, Alessio; Vithanage, Madava D.

    2015-01-01

    One of the fundamental building blocks of a Wireless Sensor Network (WSN) is the Medium Access Control (MAC) protocol, that part of the system governing when and how two independent neighboring nodes activate their respective transceivers to directly interact. Historically, data exchange has always...

  19. A hybrid medium access control for convergence of broadband wireless and wireline ATM networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    2000-01-01

    In this paper, we propose a hybrid medium access control protocol for supporting broadband integrated services in the wireless ATM networks. The integrated services include CBR, VBR and ABR traffic varying from low bit-rate to very high bit-rate. The proposed protocol is an excellent compromise...

  20. Reconfigurable Radio Access Unit for DWDM to W-Band Wireless Conversion

    DEFF Research Database (Denmark)

    Chorchos, Łukasz; Rommel, Simon; Turkiewicz, Jarosław P.

    2017-01-01

    In this letter a reconfigurable Remote Access Unit (RAU) is proposed and demonstrated, interfacing dense wavelength division multiplexed (DWDM) optical and W-band wireless links. The RAU is composed of a tunable local oscillator, a narrow optical filter and a control unit, making it reconfigurable...

  1. Design Aspects of An Energy-Efficient, Lightweight Medium Access Control Protocol for Wireless Sensor Networks

    NARCIS (Netherlands)

    van Hoesel, L.F.W.; Havinga, Paul J.M.

    2006-01-01

    This document gives an overview of the most relevant design aspects of the lightweight medium access control (LMAC) protocol [16] for wireless sensor networks (WSNs). These aspects include selfconfiguring and localized operation of the protocol, time synchronization in multi-hop networks, network

  2. One4All Cooperative Media Access Strategy in Infrastructure Based Distributed Wireless Networks

    DEFF Research Database (Denmark)

    Zhang, Qi; Fitzek, Frank H.P.; Iversen, Villy Bæk

    2008-01-01

    a cooperative cluster using their short-range air interface and one device contends the channel for all the devices within the cluster. This strategy reduces the number of mobile devices involved in the collision process for the wireless medium resulting in larger throughput, smaller access delay, and less...

  3. Combined single-mode/multimode fiber link supporting simplified in-building 60-GHz gigabit wireless access

    DEFF Research Database (Denmark)

    Pham, Tien Thang; Lebedev, Alexander; Beltrán, Marta

    2012-01-01

    In this paper, we propose and experimentally demonstrate a simple, cost-effective hybrid gigabit fiber-wireless system for in-building wireless access. Simplicity and cost-effectiveness are achieved in all parts of the system by utilizing direct laser modulation, optical frequency up-conversion, ......In this paper, we propose and experimentally demonstrate a simple, cost-effective hybrid gigabit fiber-wireless system for in-building wireless access. Simplicity and cost-effectiveness are achieved in all parts of the system by utilizing direct laser modulation, optical frequency up...

  4. Adaptive Code Division Multiple Access Protocol for Wireless Network-on-Chip Architectures

    Science.gov (United States)

    Vijayakumaran, Vineeth

    Massive levels of integration following Moore's Law ushered in a paradigm shift in the way on-chip interconnections were designed. With higher and higher number of cores on the same die traditional bus based interconnections are no longer a scalable communication infrastructure. On-chip networks were proposed enabled a scalable plug-and-play mechanism for interconnecting hundreds of cores on the same chip. Wired interconnects between the cores in a traditional Network-on-Chip (NoC) system, becomes a bottleneck with increase in the number of cores thereby increasing the latency and energy to transmit signals over them. Hence, there has been many alternative emerging interconnect technologies proposed, namely, 3D, photonic and multi-band RF interconnects. Although they provide better connectivity, higher speed and higher bandwidth compared to wired interconnects; they also face challenges with heat dissipation and manufacturing difficulties. On-chip wireless interconnects is one other alternative proposed which doesn't need physical interconnection layout as data travels over the wireless medium. They are integrated into a hybrid NOC architecture consisting of both wired and wireless links, which provides higher bandwidth, lower latency, lesser area overhead and reduced energy dissipation in communication. However, as the bandwidth of the wireless channels is limited, an efficient media access control (MAC) scheme is required to enhance the utilization of the available bandwidth. This thesis proposes using a multiple access mechanism such as Code Division Multiple Access (CDMA) to enable multiple transmitter-receiver pairs to send data over the wireless channel simultaneously. It will be shown that such a hybrid wireless NoC with an efficient CDMA based MAC protocol can significantly increase the performance of the system while lowering the energy dissipation in data transfer. In this work it is shown that the wireless NoC with the proposed CDMA based MAC protocol

  5. Mobility support for ubiquitous Internet

    NARCIS (Netherlands)

    Karagiannis, Georgios; Heijenk, Geert

    2000-01-01

    This document describes an architecture that is providing Internet access to mobile hosts, by allowing them to access this architecture through various access points and using various wireless technologies. In particular, this deliverable focuses on QoS and mobility between various IP subnetworks

  6. A 15-meter Multi-Gigabit W-band Bidirectional Wireless Bridge in Fiber-Optic Access Networks

    DEFF Research Database (Denmark)

    Pang, Xiaodan; Vegas Olmos, Juan José; Lebedev, Alexander

    2013-01-01

    . The down-converted signal is re-modulated on to the lightwave and transmit further through the fiber-optic system. In the uplink, both up-and down-conversion are performed by electrical means. Furthermore, we investigate both passive and active wireless transmitters in this work for both downlink......We present a bidirectional wireless bridge in the W-band enabling the seamless convergence between the wireless and fiber-optic access networks. In the downlink, a 16 Gbit/s QPSK signal is photonically up-converted at the wireless transmitter and electrically down-converted at the wireless receiver...... and uplink transmissions. With an active wireless transmitter, up to 15 meters wireless transmission is successfully achieved with a BER below the 7% FEC limit in the downlink....

  7. Towards convergence of wireless and wireline signal transport in broadband access networks

    DEFF Research Database (Denmark)

    Yu, Xianbin; Prince, Kamau; Tafur Monroy, Idelfonso

    2010-01-01

    Hybrid optical wireless access networks are to play an important role in the realization of the vision of delivery of broadband services to the end-user any time, anywhere and at affordable costs. We present results of experiments conducted over a field deployed optical fibre links we successfull...... demonstrated converged wireless and wireline signal transport over a common fibre infrastructure. The type of signal used in this field deployed experiments cover WiMax, Impulse-radio ultra-wideband (UWB) and coherent transmission of baseband QPSK and radio-over-fibre signals....

  8. Building secure wireless access point based on certificate authentication and firewall captive portal

    Directory of Open Access Journals (Sweden)

    Soewito B.

    2014-03-01

    Full Text Available Wireless local area network or WLAN more vulnerability than wired network even though WLAN has many advantages over wired. Wireless networks use radio transmissions to carry data between end users and access point. Therefore, it is possible for someone to sit in your office building's lobby or parking lot or parking lot to eavesdrop on the wireless network communication. This paper discussed securing wires local area network used WPA2 Enterprise based PEAP MS-CHAP and Captive portal firewall. We also divided the network for employer and visitor to increase the level of security. Our experiment showed that the WLAN could be broken using the attacker tool such as airodump, aireply, and aircrack.

  9. Joint estimation and contention-resolution protocol for wireless random access

    DEFF Research Database (Denmark)

    Stefanovic, Cedomir; Trillingsgaard, Kasper Fløe; Kiilerich Pratas, Nuno

    2013-01-01

    We propose a contention-based random-access protocol, designed for wireless networks where the number of users is not a priori known. The protocol operates in rounds divided into equal-duration slots, performing at the same time estimation of the number of users and resolution of their transmissi......We propose a contention-based random-access protocol, designed for wireless networks where the number of users is not a priori known. The protocol operates in rounds divided into equal-duration slots, performing at the same time estimation of the number of users and resolution...... successive interference cancellation which, coupled with the use of the optimized access probabilities, enables throughputs that are substantially higher than the traditional slotted ALOHA-like protocols. The key feature of the proposed protocol is that the round durations are not a priori set...

  10. Cognitive radio networks medium access control for coexistence of wireless systems

    CERN Document Server

    Bian, Kaigui; Gao, Bo

    2014-01-01

    This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing.  From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources.  Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.   • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...

  11. Internet access and online cancer information seeking among Latino immigrants from safety net clinics.

    Science.gov (United States)

    Selsky, Claire; Luta, George; Noone, Anne-Michelle; Huerta, Elmer E; Mandelblatt, Jeanne S

    2013-01-01

    Internet use is widespread, but little is known about Internet use for cancer information among Latinos, especially those who rely on safety net clinics. The authors investigated access to and intended use of the Internet for cancer information among low income, immigrant Latinos predominately from Central and South America. A cross-sectional study of 1,273 Latinos 21 years and older attending safety net clinics or health fairs was conducted from June 2007 to November 2008. The authors used logistic regression models to evaluate associations of age, acculturation, psychosocial factors and other covariates with Internet access and intended use of the Internet for cancer information among those with access. Of the sample, 44% reported Internet access. Higher information self-efficacy and greater trust in the Internet were independently associated with Internet access (p = .05 and p Internet use for cancer information, considering covariates. In addition, those with high (vs. low) perceived risk of cancer (OR = 1.76; 95% CI [1.14, 2.73]; p = .01) and higher levels of trust in online health information (OR = 1.47 per one-point increase; 95% [CI 1.19, 1.82]; p = .0004) were more likely to intend to seek cancer information online. These findings that Internet access is fairly high in the immigrant Latino population and that the Internet is a trusted source of cancer information suggest that the Internet may be a channel for cancer control interventions.

  12. Computer access and Internet use by urban and suburban emergency department customers.

    Science.gov (United States)

    Bond, Michael C; Klemt, Ryan; Merlis, Jennifer; Kopinski, Judith E; Hirshon, Jon Mark

    2012-07-01

    Patients are increasingly using the Internet (43% in 2000 vs. 70% in 2006) to obtain health information, but is there a difference in the ability of urban and suburban emergency department (ED) customers to access the Internet? To assess computer and Internet resources available to and used by people waiting to be seen in an urban ED and a suburban ED. Individuals waiting in the ED were asked survey questions covering demographics, type of insurance, access to a primary care provider, reason for their ED visit, computer access, and ability to access the Internet for health-related matters. There were 304 individuals who participated, 185 in the urban ED and 119 in the suburban ED. Urban subjects were more likely than suburban to be women, black, have low household income, and were less likely to have insurance. The groups were similar in regard to average age, education, and having a primary care physician. Suburban respondents were more likely to own a computer, but the majority in both groups had access to computers and the Internet. Their frequency of accessing the Internet was similar, as were their reasons for using it. Individuals from the urban ED were less willing to schedule appointments via the Internet but more willing to contact their health care provider via e-mail. The groups were equally willing to use the Internet to fill prescriptions and view laboratory results. Urban and suburban ED customers had similar access to the Internet. Both groups were willing to use the Internet to access personal health information. Copyright © 2012 Elsevier Inc. All rights reserved.

  13. Monitoring System of Environmental Variables Using a Wireless Sensor Network and Platforms of Internet of Things

    Directory of Open Access Journals (Sweden)

    Manuel Quiñones-Cuenca

    2017-02-01

    Full Text Available This work proposes a system for collecting meteorological data using a Wireless Sensor Network (WSN, that is able to transmit data in real-time. The system automatizes the process of collecting the data in a continuous manner for long periods of time, for this, the module is equipped with a source of solar energy that allows autonomous operation. In order to obtain viability of design and prototype implementation, the construction of two systems was proposed based on DigiMesh and Wi-Fi; those prototypes could be applied to different scenarios such as urban and rural areas. Additionally, it was performed an evaluation of broadcasting of information to platforms of Internet of Things (IoT, where the data collected by the nodes will be managed and displayed. This system was conceived as a low-cost alternative compared with conventional weather stations that offer these facilities and are based on free hardware and software components. Finally, the validation of the obtained results was performed using a statistical analysis with the collected data of the weather station Davis Vantage Pro, obtaining a maximum average relative error of 4.93%.

  14. Propagation Characteristics in an Underground Shopping Area for 5GHz-band Wireless Access Systems

    Science.gov (United States)

    Itokawa, Kiyohiko; Kita, Naoki; Sato, Akio; Matsue, Hideaki; Mori, Daisuke; Watanabe, Hironobu

    5-GHz band wireless access systems, such as the RLAN (Radio Local Area Network) system of IEEE802.11a, HiperLAN/2, HiSWANa and AWA, are developed and provide transmission rates over 20 Mbps for indoor use. Those 5-GHz access systems are expected to extend service areas from the office to the so-called “hot-spot" in public areas. Underground shopping malls are one of the anticipated service areas for such a nomadic wireless access service. Broadband propagation characteristics are required for radio zone design in an underground mall environment despite previous results obtained by narrow band measurements. This paper presents results of an experimental study on the propagation characteristics for broadband wireless access systems in an underground mall environment. First, broadband propagation path loss is measured and formulated considering human body shadowing. A ray trace simulation is used to clarify the basic propagation mechanism in such a closed environment. Next, a distance dependency of the delay spread during a crowded time period, rush hour, is found to be at most 65 nsec, which is under the permitted maximum value of the present 5-GHz systems. Finally, above propagation characteristics support the result of transmission test carried out by using AWA equipment.

  15. OFDM Towards Fixed and Mobile Broadband Wireless Access

    DEFF Research Database (Denmark)

    Shanker Jha, Uma; Prasad, Ramjee

    ) and orthogonal frequency division multiple access (OFDMA) schemes. Essential features of IEEE 802.16d (fixed) and 802.16e (mobile) and the role of the WiMAX Forum in defining interoperability and certification criteria. Important requirements, trade-offs, and other critical design considerations. Key issues...

  16. Convergent optical wired and wireless long-reach access network using high spectral-efficient modulation.

    Science.gov (United States)

    Chow, C W; Lin, Y H

    2012-04-09

    To provide broadband services in a single and low cost perform, the convergent optical wired and wireless access network is promising. Here, we propose and demonstrate a convergent optical wired and wireless long-reach access networks based on orthogonal wavelength division multiplexing (WDM). Both the baseband signal and the radio-over-fiber (ROF) signal are multiplexed and de-multiplexed in optical domain, hence it is simple and the operation speed is not limited by the electronic bottleneck caused by the digital signal processing (DSP). Error-free de-multiplexing and down-conversion can be achieved for all the signals after 60 km (long-reach) fiber transmission. The scalability of the system for higher bit-rate (60 GHz) is also simulated and discussed.

  17. A Unified Access Model for Interconnecting Heterogeneous Wireless Networks

    Science.gov (United States)

    2015-05-01

    validation of the proposed network design for unified network access, and it lays the foundation for implementing a Software - Defined Networking ( SDN ...York (NY): Springer; 2014. Chapter 2, Software - defined networking ; p. 19–32. 5. Sharma S, Staessens D, Colle D, Pickavet M, Demeester P. A...demonstration of fast failure recovery in software defined networking . In: Korakis T, Zink M, Ott, M, editors. Testbeds and research infrastructure

  18. Strategy for incumbent wireline operator: customers' provision of broadband wireless access

    Science.gov (United States)

    Khan, Naveed Ahmed; Kan, Kaili; Tareen, Abdul Wahid

    2011-10-01

    The phenomenal growth in mobile market during last decade has left incumbent wireline operators with very low fixed line customer base. The incumbent wireline operators are losing their market dominant position and wireline resources are lying underutilized. This paper proposed a cost effective strategy for incumbent wireline operators for customers' provision of broadband wireless access. The strategy will make wireline networks more value added and customer base will increase. The revenue will enhance and wireline resources will be utilized more efficiently.

  19. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    OpenAIRE

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols,...

  20. Digital predistortion of 75–110 GHz W-band frequency multiplier for fiber wireless short range access systems

    DEFF Research Database (Denmark)

    Zhao, Ying; Deng, Lei; Pang, Xiaodan

    2011-01-01

    be effectively pre-compensated. Without using costly W-band components, a transmission system with 26km fiber and 4m wireless transmission operating at 99.6GHz is experimentally validated. Adjacent-channel power ratio (ACPR) improvements for IQ-modulated vector signals are guaranteed and transmission......We present a W-band fiber-wireless transmission system based on a nonlinear frequency multiplier for high-speed wireless short range access applications. By implementing a baseband digital signal predistortion scheme, intensive nonlinear distortions induced in a sextuple frequency multiplier can...... performances for fiber and wireless channels are studied. This W-band predistortion technique is a promising candidate for applications in high capacity wireless-fiber access systems....

  1. Internet Access and Use among Students of Physical Education: A Study of Kurukshetra University, Kurukshetra

    Directory of Open Access Journals (Sweden)

    Kumar, Rajender

    2014-06-01

    Full Text Available This paper depicts a study conducted on the behavior of physical education students towards Internet usage at Kurukshetra University, Kurukshetra. Specially, the study aims to know the purposes for use of Internet resources and services, frequency of use, places and means of use, student's satisfaction level toward the Internet, and problems faced while using the Internet. A survey was carried out with a sample of 100 physical education students of Kurukshetra University and the response rate was 88%. A well-designed questionnaire was distributed to the students' sample. Amazingly, the results of the study reveal that usage of the Internet in research and education was not favored, whereas email, chatting, and sports websites were commonly used among students. The study also found that too much information on the Internet, slow access speeds, and finding relevant information were the main problems in using the Internet.

  2. Accessibility and preferred use of online Web applications among WIC participants with Internet access.

    Science.gov (United States)

    Bensley, Robert J; Hovis, Amanda; Horton, Karissa D; Loyo, Jennifer J; Bensley, Kara M; Phillips, Diane; Desmangles, Claudia

    2014-01-01

    This study examined the current technology use of clients in the western Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) region and the preferences these current clients have for using new technologies to interact with WIC. Cross-sectional convenience sample for online survey of WIC clients over 2 months in 2011. A weighted sample of 8,144 participants showed that the majority of WIC clients have access to the Internet using a computer or mobile phone. E-mail, texting, and Facebook were technologies most often used for communication. Significant differences (P video chat. Technologies should be considered for addressing WIC clients' needs, including use of text messaging and smartphone apps for appointments, education, and other WIC services; online scheduling and nutrition education; and a stronger Facebook presence for connecting with WIC clients and breastfeeding support. Published by Elsevier Inc.

  3. Delay-aware adaptive sleep mechanism for green wireless-optical broadband access networks

    Science.gov (United States)

    Wang, Ruyan; Liang, Alei; Wu, Dapeng; Wu, Dalei

    2017-07-01

    Wireless-Optical Broadband Access Network (WOBAN) is capacity-high, reliable, flexible, and ubiquitous, as it takes full advantage of the merits from both optical communication and wireless communication technologies. Similar to other access networks, the high energy consumption poses a great challenge for building up WOBANs. To shot this problem, we can make some load-light Optical Network Units (ONUs) sleep to reduce the energy consumption. Such operation, however, causes the increased packet delay. Jointly considering the energy consumption and transmission delay, we propose a delay-aware adaptive sleep mechanism. Specifically, we develop a new analytical method to evaluate the transmission delay and queuing delay over the optical part, instead of adopting M/M/1 queuing model. Meanwhile, we also analyze the access delay and queuing delay of the wireless part. Based on such developed delay models, we mathematically derive ONU's optimal sleep time. In addition, we provide numerous simulation results to show the effectiveness of the proposed mechanism.

  4. Access Routes of Internet Finance Dictionaries: Present Solutions ...

    African Journals Online (AJOL)

    rbr

    1. Introduction. Recent advances in Internet technology offer numerous features ..... (e) What is the level of their general cultural and encyclopaedic knowledge? ... the texts in the framework of preparing for the CFA examinations, the secon-.

  5. Rural Health Care Information Access and the Use of the Internet: Opportunity for University Extension

    Science.gov (United States)

    Das, Biswa R.; Leatherman, John C.; Bressers, Bonnie M.

    2015-01-01

    The Internet has potential for improving health information delivery and strengthening connections between rural populations and local health service providers. An exploratory case study six rural health care markets in Kansas showed that about 70% of adults use the Internet, with substantial use for accessing health information. While there are…

  6. Internet skill-related problems in accessing online health information and services

    NARCIS (Netherlands)

    van Deursen, Alexander Johannes Aloysius Maria

    2012-01-01

    Purpose Despite the amount of health information available online, there are several barriers that limit the Internet from being adopted as a source of health information. The purpose of this study was to identify individual skill-related problems that users experience when accessing the Internet

  7. Perceptions of the Risks and Benefits of Internet Access and Use by People with Intellectual Disabilities

    Science.gov (United States)

    Chadwick, Darren D.; Quinn, Sally; Fullwood, Chris

    2017-01-01

    Background: Information and communication technologies, with the Internet at the forefront, have the potential to enhance the knowledge, service, employment, development and social interactional opportunities available to people with intellectual disabilities. Despite this, people with intellectual disabilities are not accessing the Internet to…

  8. Internet Access and Usage by Students of the College of Medicine ...

    African Journals Online (AJOL)

    Findings revealed that the Internet facilities at the time of this study were inadequate – hence many students did not have access. It also revealed that although quite a number of the students were aware of the immense benefits of the use of the Internet for academic studies. They lacked the necessary skill to make effective ...

  9. Internet Access and Usage in Improving Students' Self-Directed Learning in Indonesia Open University

    Science.gov (United States)

    Rahardjo, Djoko; Sumardjo; Lubis, Djuara P.; Harijati, Sri Ir.

    2016-01-01

    Internet is well known nowadays, however higher distance education students who live in remote rural areas still have not been able to take advantages of this medium optimally for their learning process. For accessing the internet the students have to be available with the minimum prerequisites: the existence of adequate devices and the sufficient…

  10. Access to and use of Internet by adolescents who have a physical disability: a comparative study.

    NARCIS (Netherlands)

    Lathouwers, K.A.M.; Moor, J.M.H. de; Didden, R.

    2009-01-01

    The purpose of this study was to examine access to and use of Internet by 97 physically disabled adolescents. Four main objectives were to: (1) explore frequency and nature of Internet use and the role of care givers, (2) compare these results with non-disabled adolescents, (3) explore associations

  11. Access to and use of Internet by adolescents who have a physical disability: A comparative study

    NARCIS (Netherlands)

    Lathouwers, K.A.M.; Moor, J.M.H. de; Didden, H.C.M.

    2009-01-01

    The purpose of this study was to examine access to and use of Internet by 97 physically disabled adolescents. Four main objectives were to: (1) explore frequency and nature of Internet use and the role of care givers, (2) compare these results with non-disabled adolescents, (3) explore associations

  12. A Practical Application Combining Wireless Sensor Networks and Internet of Things: Safety Management System for Tower Crane Groups

    Directory of Open Access Journals (Sweden)

    Dexing Zhong

    2014-07-01

    Full Text Available The so-called Internet of Things (IoT has attracted increasing attention in the field of computer and information science. In this paper, a specific application of IoT, named Safety Management System for Tower Crane Groups (SMS-TC, is proposed for use in the construction industry field. The operating status of each tower crane was detected by a set of customized sensors, including horizontal and vertical position sensors for the trolley, angle sensors for the jib and load, tilt and wind speed sensors for the tower body. The sensor data is collected and processed by the Tower Crane Safety Terminal Equipment (TC-STE installed in the driver’s operating room. Wireless communication between each TC-STE and the Local Monitoring Terminal (LMT at the ground worksite were fulfilled through a Zigbee wireless network. LMT can share the status information of the whole group with each TC-STE, while the LMT records the real-time data and reports it to the Remote Supervision Platform (RSP through General Packet Radio Service (GPRS. Based on the global status data of the whole group, an anti-collision algorithm was executed in each TC-STE to ensure the safety of each tower crane during construction. Remote supervision can be fulfilled using our client software installed on a personal computer (PC or smartphone. SMS-TC could be considered as a promising practical application that combines a Wireless Sensor Network with the Internet of Things.

  13. A Practical Application Combining Wireless Sensor Networks and Internet of Things: Safety Management System for Tower Crane Groups

    Science.gov (United States)

    Zhong, Dexing; Lv, Hongqiang; Han, Jiuqiang; Wei, Quanrui

    2014-01-01

    The so-called Internet of Things (IoT) has attracted increasing attention in the field of computer and information science. In this paper, a specific application of IoT, named Safety Management System for Tower Crane Groups (SMS-TC), is proposed for use in the construction industry field. The operating status of each tower crane was detected by a set of customized sensors, including horizontal and vertical position sensors for the trolley, angle sensors for the jib and load, tilt and wind speed sensors for the tower body. The sensor data is collected and processed by the Tower Crane Safety Terminal Equipment (TC-STE) installed in the driver's operating room. Wireless communication between each TC-STE and the Local Monitoring Terminal (LMT) at the ground worksite were fulfilled through a Zigbee wireless network. LMT can share the status information of the whole group with each TC-STE, while the LMT records the real-time data and reports it to the Remote Supervision Platform (RSP) through General Packet Radio Service (GPRS). Based on the global status data of the whole group, an anti-collision algorithm was executed in each TC-STE to ensure the safety of each tower crane during construction. Remote supervision can be fulfilled using our client software installed on a personal computer (PC) or smartphone. SMS-TC could be considered as a promising practical application that combines a Wireless Sensor Network with the Internet of Things. PMID:25196106

  14. A practical application combining wireless sensor networks and Internet of Things: Safety Management System for Tower Crane Groups.

    Science.gov (United States)

    Zhong, Dexing; Lv, Hongqiang; Han, Jiuqiang; Wei, Quanrui

    2014-07-30

    The so-called Internet of Things (IoT) has attracted increasing attention in the field of computer and information science. In this paper, a specific application of IoT, named Safety Management System for Tower Crane Groups (SMS-TC), is proposed for use in the construction industry field. The operating status of each tower crane was detected by a set of customized sensors, including horizontal and vertical position sensors for the trolley, angle sensors for the jib and load, tilt and wind speed sensors for the tower body. The sensor data is collected and processed by the Tower Crane Safety Terminal Equipment (TC-STE) installed in the driver's operating room. Wireless communication between each TC-STE and the Local Monitoring Terminal (LMT) at the ground worksite were fulfilled through a Zigbee wireless network. LMT can share the status information of the whole group with each TC-STE, while the LMT records the real-time data and reports it to the Remote Supervision Platform (RSP) through General Packet Radio Service (GPRS). Based on the global status data of the whole group, an anti-collision algorithm was executed in each TC-STE to ensure the safety of each tower crane during construction. Remote supervision can be fulfilled using our client software installed on a personal computer (PC) or smartphone. SMS-TC could be considered as a promising practical application that combines a Wireless Sensor Network with the Internet of Things.

  15. Evaluation of internet access and utilization by medical students in Lahore, Pakistan

    Science.gov (United States)

    2011-01-01

    Background The internet is increasingly being used worldwide in imparting medical education and improving its delivery. It has become an important tool for healthcare professionals training but the data on its use by medical students in developing countries is lacking with no study on the subject from Pakistan. This study was, therefore, carried out with an aim to evaluate the pattern of internet access and utilization by medical students in Pakistan. Methods A structured pre-tested questionnaire was administered to a group of 750 medical students in clinical years studying at various public and private medical colleges in Lahore. The questions were related to patterns of internet access, purpose of use and self reported confidence in performing various internet related tasks, use of health related websites to supplement learning and the problems faced by students in using internet at the institution. Results A total of 532 medical students (70.9%) returned the questionnaire. The mean age of study participants was 21.04 years (SD 1.96 years). Majority of the respondents (84.0%) reported experience with internet use. About half of the students (42.1%) were using internet occasionally with 23.1%, 20.9% and 13.9% doing so frequently, regularly and rarely respectively. About two third of the students (61.0%) stated that they use internet for both academic and professional activities. Most of the participants preferred to use internet at home (70.5%). Self reported ability to search for required article from PubMed and PakMedinet was reported by only 34.0% of the entire sample. Students were moderately confident in performing various internet related tasks including downloading medical books from internet, searching internet for classification of diseases and downloading full text article. Health related websites were being accessed by 55.1% students to supplement their learning process. Lack of time, inadequate number of available computers and lack of support from

  16. Gastric cancer-related information on the Internet: incomplete, poorly accessible, and overly commercial.

    LENUS (Irish Health Repository)

    Killeen, Shane

    2011-02-01

    Patients increasingly use the Internet for gastric cancer information. However, the quality of the information is questionable. We evaluated the accuracy, completeness, accessibility, reliability, and readability of gastric cancer websites.

  17. Progress on Broadband Access to the Internet and Use of Mobile Devices in the United States.

    Science.gov (United States)

    Serrano, Katrina J; Thai, Chan L; Greenberg, Alexandra J; Blake, Kelly D; Moser, Richard P; Hesse, Bradford W

    Healthy People 2020 (HP2020) aims to improve population health outcomes through several objectives, including health communication and health information technology. We used 7 administrations of the Health Information National Trends Survey to examine HP2020 goals toward access to the Internet through broadband and mobile devices (N = 34 080). We conducted descriptive analyses and obtained predicted marginals, also known as model-adjusted risks, to estimate the association between demographic characteristics and use of mobile devices. The HP2020 target (7.7% of the US population) for accessing the Internet through a cellular network was surpassed in 2014 (59.7%), but the HP2020 target (83.2%) for broadband access fell short (63.8%). Sex and age were associated with accessing the Internet through a cellular network throughout the years (Wald F test, P Internet through mobile devices presents an opportunity for technology-based health interventions that should be explored.

  18. Internet-accessible radiographic database of Vietnam War casualties for medical student education.

    Science.gov (United States)

    Critchley, Eric P; Smirniotopoulos, James G

    2003-04-01

    The purpose of this study was to determine the feasibility of archiving radiographic images from Vietnam era conflict casualties into a personal computer-based electronic database of text and images and displaying the data using an Internet-accessible database for preservation and educational purposes. Thirty-two patient cases were selected at random from a pool of 1,000 autopsy reports in which radiographs were available. A total of 74 radiographs from these cases were digitized using a commercial image scanner and then uploaded into an Internet accessible database. The quality of the digitized images was assessed by administering an image-based test to a group of 12 medical students. No statistically significant (p > 0.05) differences were found between test scores when using the original radiographs versus using the digitized radiographs on the Internet-accessible database. An Internet-accessible database is capable of effectively archiving Vietnam era casualty radiographs for educational purposes.

  19. Virus spreading in wireless sensor networks with a medium access control mechanism

    International Nuclear Information System (INIS)

    Wang Ya-Qi; Yang Xiao-Yuan

    2013-01-01

    In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations. (general)

  20. Assessing the Impact of Internet Access on Household Income and Financial Performance of Small Farms

    OpenAIRE

    Khanal, Aditya R.; Mishra, Ashok K.

    2013-01-01

    With increased focus on survival strategies for small farm businesses, we investigate the impact of Internet access on income and farm expenses of small farm business and households. Using a nation-wide farm-level data in the U.S. and non-parametric matching estimators, the study finds a significant positive impact of Internet access on total household and off-farm income.

  1. Internet accessibility and disability policy: lessons for digital inclusion and equality from Australia

    Directory of Open Access Journals (Sweden)

    Gerard Goggin

    2017-03-01

    Full Text Available In the fifth decade of the internet, accessibility for all, especially those with disabilities, is central to digital inclusion. Yet internationally, the score card on internet and accessibility remains mixed, at best; and woefully inadequate, at worst. Via an Australian case study, we argue that it is imperative to better understand how internet technology interacts with the life worlds and dynamics of disability, and we suggest how policy can be articulated and improved to put people with disabilities on an equal basis to others in digital societies.

  2. IP Connected Low Power Wireless Personal Area Networks in the Future Internet

    DEFF Research Database (Denmark)

    Jacobsen, Rune Hylsberg; Toftegaard, Thomas Skjødeberg; Kjærgaard, Jens Kristian

    2012-01-01

    The Internet of Things is a key concept of the Future Internet. The Internet of Things potentially interconnects billions of small devices in a large ubiquitous infrastructure based on the Internet Protocol (IP). Typically, these devices will be limited in computational capacity, memory......WPANs). The authors address the key mechanisms from network aspects down to device design aspects and discuss how technologies interplay to make real application deployment practical for the Internet of Things....

  3. Easing Internet access of health information for elderly users

    NARCIS (Netherlands)

    Alpay, L.L.; Toussaint, P.J.; Ezendam, N.P.M.; Rövekamp, T.A.J.M.; Graafmans, W.C.; Westendorp, R.G.J.

    2004-01-01

    Elderly users are increasingly becoming active consumers of Internet technologies. Developing websites dedicated to this user group presents several design issues (such as that of 'design for all', participatory design, patient empowerment and cognitive usability assessment methods). SeniorGezond is

  4. Quick Access: Find Statistical Data on the Internet.

    Science.gov (United States)

    Su, Di

    1999-01-01

    Provides an annotated list of Internet sources (World Wide Web, ftp, and gopher sites) for current and historical statistical business data, including selected interest rates, the Consumer Price Index, the Producer Price Index, foreign currency exchange rates, noon buying rates, per diem rates, the special drawing right, stock quotes, and mutual…

  5. Human Right and Internet Access : A philosophical investigation

    NARCIS (Netherlands)

    Wang, Xiaowei

    2016-01-01

    As of December 2014, there are three billion Internet users worldwide, of which 649 million are Chinese. This number will grow in the years to come. This technology, of course, possesses immense significance in our everyday life. What is currently new in international human rights practice is the

  6. Rogue AP Detection in the Wireless LAN for Large Scale Deployment

    Directory of Open Access Journals (Sweden)

    Sang-Eon Kim

    2006-10-01

    Full Text Available The wireless LAN standard, also known as WiFi, has begun to use commercial purposes. This paper describes access network architecture of wireless LAN for large scale deployment to provide public service. A metro Ethernet and digital subscriber line access network can be used for wireless LAN with access point. In this network architecture, access point plays interface between wireless node and network infrastructure. It is important to maintain access point without any failure and problems to public users. This paper proposes definition of rogue access point and classifies based on functional problem to access the Internet. After that, rogue access point detection scheme is described based on classification over the wireless LAN. The rogue access point detector can greatly improve the network availability to network service provider of wireless LAN.

  7. Answers at your fingertips: Access to the Internet influences willingness to answer questions.

    Science.gov (United States)

    Ferguson, Amanda M; McLean, David; Risko, Evan F

    2015-12-01

    Recent technological advances have given rise to an information-gathering tool unparalleled by any in human history-the Internet. Understanding how access to such a powerful informational tool influences how we think represents an important question for psychological science. In the present investigation we examined the impact of access to the Internet on the metacognitive processes that govern our decisions about what we "know" and "don't know." Results demonstrated that access to the Internet influenced individuals' willingness to volunteer answers, which led to fewer correct answers overall but greater accuracy when an answer was offered. Critically, access to the Internet also influenced feeling-of-knowing, and this accounted for some (but not all) of the effect on willingness to volunteer answers. These findings demonstrate that access to the Internet can influence metacognitive processes, and contribute novel insights into the operation of the transactive memory system formed by people and the Internet. Copyright © 2015 Elsevier Inc. All rights reserved.

  8. Impact of the Digital Divide on Computer Use and Internet Access on the Poor in Nigeria

    Science.gov (United States)

    Tayo, Omolara; Thompson, Randall; Thompson, Elizabeth

    2016-01-01

    We recruited 20 community members in Ido Local Government Area, Oyo state and Yewa Local Government Area, Ogun state in Nigeria to explore experiences and perceptions of Internet access and computer use. Face-to-face interviews were conducted using open-ended questions to collect qualitative data regarding accessibility of information and…

  9. 40 CFR 1400.5 - Internet access to certain off-site consequence analysis data elements.

    Science.gov (United States)

    2010-07-01

    ... consequence analysis data elements. 1400.5 Section 1400.5 Protection of Environment ENVIRONMENTAL PROTECTION... UNDER THE CLEAN AIR ACT SECTION 112(r)(7); DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.5 Internet access to certain off...

  10. Providing Internet Access to the Ohio Career Information System for All Residents: A Feasibility Study.

    Science.gov (United States)

    Lewis, Morgan V.

    Expanded Internet access to the Ohio Career Information System (OCIS) would provide adults in Ohio who need to or wish to make career changes with the best available information about occupations, education and training programs, and financial aid. In order to determine the feasibility of improving access without cost to users, an advisory group,…

  11. Towards Effective Intra-flow Network Coding in Software Defined Wireless Mesh Networks

    OpenAIRE

    Donghai Zhu; Xinyu Yang Yang; Peng Zhao; Wei Yu

    2016-01-01

    Wireless Mesh Networks (WMNs) have potential to provide convenient broadband wireless Internet access to mobile users.With the support of Software-Defined Networking (SDN) paradigm that separates control plane and data plane, WMNs can be easily deployed and managed. In addition, by exploiting the broadcast nature of the wireless medium and the spatial diversity of multi-hop wireless networks, intra-flow network coding has shown a greater benefit in comparison with traditional routing paradigm...

  12. Access to DNA and protein databases on the Internet.

    Science.gov (United States)

    Harper, R

    1994-02-01

    During the past year, the number of biological databases that can be queried via Internet has dramatically increased. This increase has resulted from the introduction of networking tools, such as Gopher and WAIS, that make it easy for research workers to index databases and make them available for on-line browsing. Biocomputing in the nineties will see the advent of more client/server options for the solution of problems in bioinformatics.

  13. Internet and Social Media Access Among Youth Experiencing Homelessness: Mixed-Methods Study.

    Science.gov (United States)

    VonHoltz, Lauren A Houdek; Frasso, Rosemary; Golinkoff, Jesse M; Lozano, Alicia J; Hanlon, Alexandra; Dowshen, Nadia

    2018-05-22

    Youth experiencing homelessness are at a risk for a variety of adverse outcomes. Given the widespread use of the internet and social media, these new technologies may be used to address their needs and for outreach purposes. However, little is known about how this group uses these resources. This study investigated how homeless adolescents use these technologies for general and health-related purposes, whether the scope of their use changes with housing status, and their interest in a website dedicated to youth experiencing homelessness. A convenience sample of youth aged 18 to 21 years was recruited from a youth-specific homeless shelter. All participants completed a 47-item survey, with 10 individuals completing a semistructured interview. Descriptive statistics, exact testing, logistic regression, and generalized estimating equation modeling was performed for quantitative data analysis. Interviews were transcribed verbatim, and NVivo 10 (QSR International) was employed to facilitate double coding and thematic analysis. A total of 87 participants completed the survey with a mean age of 19.4 (SD 1.1) years. While experiencing homelessness, 56% (49/87) accessed the internet at least once a day, with 86% (75/87) accessing once a week. Access to a smartphone was associated with a 3.03 greater odds of accessing the internet and was the most frequently used device (66% of participants, 57/87). While experiencing homelessness, subjects reported a 68% decreased odds in internet access frequency (odds ratio [OR] 0.32, Psocial media use (OR 0.13, P=.01). Ten participants completed the semistructured interview. Several themes were identified, including (1) changes in internet behaviors while experiencing homelessness, (2) health status as a major concern and reason for Internet use, and (3) interest in a website dedicated to youth experiencing homelessness. While experiencing homelessness, participants indicated their behaviors were more goal-oriented and less focused on

  14. Internet Addiction Risk in the Academic Environment

    Science.gov (United States)

    Ellis, William F.; McAleer, Brenda; Szakas, Joseph S.

    2015-01-01

    The Internet's effect on society is growing exponentially. One only has to look at the growth of e-commerce, social media, wireless data access, and mobile devices to see how communication is changing. The need and desire for the Internet, especially in such disciplines as Computer Science or Computer Information Systems, pose a unique risk for…

  15. A scalable and continuous-upgradable optical wireless and wired convergent access network.

    Science.gov (United States)

    Sung, J Y; Cheng, K T; Chow, C W; Yeh, C H; Pan, C-L

    2014-06-02

    In this work, a scalable and continuous upgradable convergent optical access network is proposed. By using a multi-wavelength coherent comb source and a programmable waveshaper at the central office (CO), optical millimeter-wave (mm-wave) signals of different frequencies (from baseband to > 100 GHz) can be generated. Hence, it provides a scalable and continuous upgradable solution for end-user who needs 60 GHz wireless services now and > 100 GHz wireless services in the future. During the upgrade, user only needs to upgrade their optical networking unit (ONU). A programmable waveshaper is used to select the suitable optical tones with wavelength separation equals to the desired mm-wave frequency; while the CO remains intact. The centralized characteristics of the proposed system can easily add any new service and end-user. The centralized control of the wavelength makes the system more stable. Wired data rate of 17.45 Gb/s and w-band wireless data rate up to 3.36 Gb/s were demonstrated after transmission over 40 km of single-mode fiber (SMF).

  16. Polarization division multiple access with polarization modulation for LOS wireless communications

    Directory of Open Access Journals (Sweden)

    Cao Bin

    2011-01-01

    Full Text Available Abstract In this paper, we discuss a potential multiple access and modulation scheme based on polarized states (PS of electromagnetic (EM waves for line-of-sight (LOS communications. The proposed scheme is theoretic different from the existing polar modulation for EDGE and WCDMA systems. We propose the detailed bit representation (modulation and multiple access scheme using PS. Because of the inflexibility of polarization information in the time and frequency domains, as well as independence of frequency and space, the polarization information can be used independently for wireless communications, i.e., another independent resource domain that can be utilized. Due to the independence between the PS and the specific features of signals (such as waveform, bandwidth and data rate, the discussed polarization division multiple access (PDMA and polarization modulation (PM are expected to improve the spectrum utilization effectively. It is proved that the polarization filtering technique can be adopted in the PDMA-PM wireless communications to separate the multiuser signals and demodulate the bit information representing by PS for desired user. Some theoretical analysis is done to demonstrate the feasibility of the proposed scheme, and the simulation results are made to evaluate the performance of the suggested system.

  17. QoS Modeling for End-to-End Performance Evaluation over Networks with Wireless Access

    Directory of Open Access Journals (Sweden)

    Gómez Gerardo

    2010-01-01

    Full Text Available This paper presents an end-to-end Quality of Service (QoS model for assessing the performance of data services over networks with wireless access. The proposed model deals with performance degradation across protocol layers using a bottom-up strategy, starting with the physical layer and moving on up to the application layer. This approach makes it possible to analytically assess performance at different layers, thereby facilitating a possible end-to-end optimization process. As a representative case, a scenario where a set of mobile terminals connected to a streaming server through an IP access node has been studied. UDP, TCP, and the new TCP-Friendly Rate Control (TFRC protocols were analyzed at the transport layer. The radio interface consisted of a variable-rate multiuser and multichannel subsystem, including retransmissions and adaptive modulation and coding. The proposed analytical QoS model was validated on a real-time emulator of an end-to-end network with wireless access and proved to be very useful for the purposes of service performance estimation and optimization.

  18. A Fine-Grained Data Access Control System in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Boniface K. Alese

    2015-12-01

    Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.

  19. Traffic management mechanism for intranets with available-bit-rate access to the Internet

    Science.gov (United States)

    Hassan, Mahbub; Sirisena, Harsha R.; Atiquzzaman, Mohammed

    1997-10-01

    The design of a traffic management mechanism for intranets connected to the Internet via an available bit rate access- link is presented. Selection of control parameters for this mechanism for optimum performance is shown through analysis. An estimate for packet loss probability at the access- gateway is derived for random fluctuation of available bit rate of the access-link. Some implementation strategies of this mechanism in the standard intranet protocol stack are also suggested.

  20. Cell phone internet access, online sexual solicitation, partner seeking, and sexual risk behavior among adolescents.

    Science.gov (United States)

    Rice, Eric; Winetrobe, Hailey; Holloway, Ian W; Montoya, Jorge; Plant, Aaron; Kordic, Timothy

    2015-04-01

    Online partner seeking is associated with sexual risk behavior among young adults (specifically men who have sex with men), but this association has yet to be explored among a probability sample of adolescents. Moreover, cell phone internet access and sexual risk taking online and offline have not been explored. A probability sample (N = 1,831) of Los Angeles Unified School District high school students was collected in 2011. Logistic regression models assessed relationships between specific sexual risk behaviors (online sexual solicitation, seeking partners online, sex with internet-met partners, condom use) and frequency of internet use, internet access points, and demographics. Students with cell phone internet access were more likely to report being solicited online for sex, being sexually active, and having sex with an internet-met partner. Bisexual-identifying students reported higher rates of being approached online for sex, being sexually active, and not using condoms at last sex. Gay, lesbian, and questioning (GLQ) students were more likely to report online partner seeking and unprotected sex at last sex with an internet-met partner. Additionally, having sex with an internet-met partner was associated with being male, online sexual solicitation, and online partner seeking. Internet- and school-based sexual health programs should incorporate safety messages regarding online sexual solicitation, seeking sex partners online, and engaging in safer sex practices with all partners. Programs must target adolescents of all sexual identities, as adolescents may not yet be "out," and bisexual and GLQ adolescents are more likely to engage in risky sex behaviors.

  1. Subdividing the digital divide: differences in internet access and use among rural residents with medical limitations.

    Science.gov (United States)

    Wang, Jong-Yi; Bennett, Kevin; Probst, Janice

    2011-03-03

    Access to health care is often contingent upon an individual's ability to travel for services. Certain groups, such as those with physical limitations and rural residents, have more travel barriers than other groups, reducing their access to services. The use of the Internet may be a way for these groups to seek care or information to support their health care needs. The purpose of this study was to examine Internet use among those whose are, for medical reasons, limited in their ability to travel. We also examined disparities in Internet use by race/ethnicity and rural residence, particularly among persons with medical conditions. We used data from the 2001 National Household Travel Survey (NHTS), a nationally representative sample of US households, to examine Internet use among individuals with medical conditions, rural residents, and minority populations. Internet use was defined as any use within the past 6 months; among users, frequency of use and location of use were explored. Control variables included sociodemographics, family life cycle, employment status, region, and job density in the community. All analyses were weighted to reflect the complex NHTS sampling frame. Individuals with medical conditions were far less likely to report Internet use than those without medical conditions (32.6% vs 70.3%, P digital divide between urban and rural residents. Internet use and frequency was also lower among those reporting a medical condition than among those without a condition. After we controlled for many factors, however, African Americans and Hispanics were still less likely to use the Internet, and to use it less often, than whites. Policy makers should look for ways to improve the access to, and use of, the Internet among these populations.

  2. Beyond access: barriers to internet health information seeking among the urban poor.

    Science.gov (United States)

    McCloud, Rachel F; Okechukwu, Cassandra A; Sorensen, Glorian; Viswanath, K

    2016-11-01

    Communication inequalities deepen health disparities even when internet access is achieved. The goal of this study is to understand how a range of barriers may inhibit individuals from low socioeconomic position (SEP) from engaging with online health information even when it is freely available. Detailed data were collected from 118 low-SEP individuals from a randomized controlled trial providing internet access. Measures triangulated the health-seeking experience through internet use tracked in real-time, call log data, and self-reported barriers. Negative binomial regression models were fitted with technology and perceived predictors, and our outcome, health information seeking, and then stratified by medical status. Participants experienced a median of two computer issues (median 6 days) and two internet issues (median 6.5 days). Duration of internet problems was associated with a decrease in the rate of internet health information seeking by a factor of 0.990 (P = .03) for each additional day. Participants with a medical problem who were frustrated in their search for health information had half the rate of health information seeking of those who were not frustrated (incidence rate ratio = 0.395, P = .030). Despite IT support, participants still experienced internet connectivity issues that negatively impacted their health information seeking. Frustration in their search to find information may serve as an additional barrier to those who have medical issues. After initial internet access, a second-level digital divide emerged due to connectivity issues, highlighting the need to understand the complex network of barriers experienced by low-SEP internet users. © The Author 2016. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  3. Data Transmission and Access Protection of Community Medical Internet of Things

    OpenAIRE

    Wang, Xunbao; Chen, Fulong; Ye, Heping; Yang, Jie; Zhu, Junru; Zhang, Ziyang; Huang, Yakun

    2017-01-01

    On the basis of Internet of Things (IoT) technologies, Community Medical Internet of Things (CMIoT) is a new medical information system and generates massive multiple types of medical data which contain all kinds of user identity data, various types of medical data, and other sensitive information. To effectively protect users’ privacy, we propose a secure privacy data protection scheme including transmission protection and access control. For the uplink transmission data protection, bidirect...

  4. Regulating internet access in UK public libraries: legal compliance and ethical dilemmas

    OpenAIRE

    Muir, Adrienne; Spacey, Rachel; Cooke, Louise; Creaser, Claire

    2016-01-01

    Purpose – This paper aims to consider selected results from the Arts and Humanities Research Council (AHRC) funded “Managing Access to the internet in Public Libraries” (MAIPLE) project, from 2012-2014. MAIPLE has explored the ways in which public library services manage use of the internet connections that they provide for the public. This included the how public library services balance their legal obligations and the needs of their communities in a public space and the ethical dilemmas tha...

  5. Access Denied: Should Youth Access to the Internet Be Regulated? A Resource Guide for Teachers.

    Science.gov (United States)

    Parrini, Michelle

    Much of the current public discussion in the United States about the Internet and speech rights focuses on the array of materials (particularly sexually explicit materials) that are available on the Internet, the effect of exposure to them on youth development, and whether the material should be regulated. In exploring questions about youth access…

  6. Public Libraries and Internet Access across the United States: A Comparison by State 2004–2006

    Directory of Open Access Journals (Sweden)

    Paul T. Jaeger

    2007-06-01

    Full Text Available Drawing upon findings from a national survey of U.S. public libraries, this paper examines trends in Internet and public computing access in public libraries across states from 2004 to 2006. Based on library-supplied information about levels and types of Internet and public computing access, the authors offer insights into the network-based content and services that public libraries provide. Examining data from 2004 to 2006 reveals trends and accomplishments in certain states and geographic regions. This paper details and discusses the data, identifies and analyzes issues related to Internet access, and suggests areas for future research.

  7. Computer and internet access for long-term care residents: perceived benefits and barriers.

    Science.gov (United States)

    Tak, Sunghee H; Beck, Cornelia; McMahon, Ed

    2007-05-01

    In this study, the authors examined residents' computer and Internet access, as well as benefits and barriers to access in nursing homes. Administrators of 64 nursing homes in a national chain completed surveys. Fourteen percent of the nursing homes provided computers for residents to use, and 11% had Internet access. Some residents owned personal computers in their rooms. Administrators perceived the benefits of computer and Internet use for residents as facilitating direct communication with family and providing mental exercise, education, and enjoyment. Perceived barriers included cost and space for computer equipment and residents' cognitive and physical impairments. Implications of residents' computer activities were discussed for nursing care. Further research is warranted to examine therapeutic effects of computerized activities and their cost effectiveness.

  8. Development of a wireless protection against imitation system for identification and control of vehicle access

    Directory of Open Access Journals (Sweden)

    Aleksei A. Gavrishev

    2018-03-01

    Full Text Available This article deals with wireless systems for identification and control of vehicle access to protected objects. Known systems are considered. As a result, it has been established that one of the most promising approaches to identifying and controlling vehicle access to protected objects is the use of systems based on the "friend or foe" principle. Among these systems, there are "one-directional" and "bedirectional" identification and access control systems. "Bidirectional" systems are more preferable for questions of identification and access control. However, at present, these systems should have a reduced probability of recognizing the structure of the request and response signals because the potential attacker can easily perform unauthorized access to the radio channel of the system. On this basis, developed a wireless system identification and control vehicle access to protected objects based on the principle of "friend or foe", featuring increased protection from unauthorized access and jamming through the use of rewritable drives chaotic sequences. In addition, it’s proposed to use to identify the vehicle's RFID tag containing additional information about it. Are some specifications of the developed system (the possible frequency range of the request-response signals, the communication range, data rate, the size of the transmitted data, guidelines for choosing RFID. Also, with the help of fuzzy logic, was made the security assessment from unauthorized access request-response signals based on the system of "friend or foe", which are transferred via radio channel, developed systems and analogues. The security assessment of the developed system shows an adequate degree of protection against complex threats (view, spoofing, interception and jamming of traffic in comparison with known systems of this class. Among the main advantages of the developed system it’s necessary to mention increased security from unauthorized access and jamming

  9. Literacy disparities in patient access and health-related use of Internet and mobile technologies.

    Science.gov (United States)

    Bailey, Stacy C; O'Conor, Rachel; Bojarski, Elizabeth A; Mullen, Rebecca; Patzer, Rachel E; Vicencio, Daniel; Jacobson, Kara L; Parker, Ruth M; Wolf, Michael S

    2015-12-01

    Age and race-related disparities in technology use have been well documented, but less is known about how health literacy influences technology access and use. To assess the association between patients' literacy skills and mobile phone ownership, use of text messaging, Internet access, and use of the Internet for health-related purposes. A secondary analysis utilizing data from 1077 primary care patients enrolled in two, multisite studies from 2011-2013. Patients were administered an in-person, structured interview. Patients with adequate health literacy were more likely to own a mobile phone or smartphone in comparison with patients having marginal or low literacy (mobile phone ownership: 96.8 vs. 95.2 vs. 90.1%, respectively, P Internet from their home (92.1 vs. 74.7 vs. 44.9%, P Internet for email (93.0 vs. 75.7 vs. 38.5%, P technology access and use are widespread, with lower literate patients being less likely to own smartphones or to access and use the Internet, particularly for health reasons. Future interventions should consider these disparities and ensure that health promotion activities do not further exacerbate disparities. © 2014 John Wiley & Sons Ltd.

  10. Power Stabilization Strategy of Random Access Loads in Electric Vehicles Wireless Charging System at Traffic Lights

    Directory of Open Access Journals (Sweden)

    Linlin Tan

    2016-10-01

    Full Text Available An opportunity wireless charging system for electric vehicles when they stop and wait at traffic lights is proposed in this paper. In order to solve the serious power fluctuation caused by random access loads, this study presents a power stabilization strategy based on counting the number of electric vehicles in a designated area, including counting method, power source voltage adjustment strategy and choice of counting points. Firstly, the circuit model of a wireless power system with multi-loads is built and the equation of each load is obtained. Secondly, after the counting method of electric vehicles is stated, the voltage adjustment strategy, based on the number of electric vehicles when the system is at a steady state, is set out. Then, the counting points are chosen according to power curves when the voltage adjustment strategy is adopted. Finally, an experimental prototype is implemented to verify the power stabilization strategy. The experimental results show that, with the application of this strategy, the charging power is stabilized with the fluctuation of no more than 5% when loads access randomly.

  11. Performance Evaluation of TDMA Medium Access Control Protocol in Cognitive Wireless Networks

    Directory of Open Access Journals (Sweden)

    Muhammed Enes Bayrakdar

    2017-02-01

    Full Text Available Cognitive radio paradigm has been revealed as a new communication technology that shares channels in wireless networks. Channel assignment is a crucial issue in the field of cognitive wireless networks because of the spectrum scarcity. In this work, we have evaluated the performance of TDMA medium access control protocol. In our simulation scenarios, primary users and secondary users utilize TDMA as a medium access control protocol. We have designed a network environment in Riverbed simulation software that consists of primary users, secondary users, and base stations. In our system model, secondary users sense the spectrum and inform the base station about empty channels. Then, the base station decides accordingly which secondary user may utilize the empty channel. Energy detection technique is employed as a spectrum sensing technique because it is the best when information about signal of primary user is acquired. Besides, different number of users is selected in simulation scenarios in order to obtain accurate delay and throughput results. Comparing analytical model with simulation results, we have shown that performance analysis of our system model is consistent and accurate.

  12. Are nations so different as they access the internet?

    Directory of Open Access Journals (Sweden)

    Alexandre Cappellozza

    2014-04-01

    Full Text Available Abstract: This study analyzed the existence of a common prominence in the audience of websites in different groups of countries aiming at discover whether there is some kind of preferential pattern of access, regardless of the variety of endogenous and exogenous influences that might interfere in the audience of these portals. To appraise the overall popularity of websites, the study developed a Virtual Popularity Index – VPI and applied it with data obtained at the website Alexa (www.alexa.com which provides information about the access to different electronic portals. This information includes traffic, origin and access duration. Thus, through the development and use of this Index as applied to a sample of 2500 observations covering the 20 most visited websites in 125 countries, it was possible to identify that the first eight most accessed websites are the same in the African, American, Asian and European continents. The study also revealed that certain websites analyzed in different continents were able to reach an audience hegemony overcoming any barriers adopted by the users via the possibility of individual content customization.

  13. Internet access and use by COPD patients in the National Emphysema/COPD Association Survey

    Science.gov (United States)

    2014-01-01

    Background Technology offers opportunities to improve healthcare, but little is known about Internet use by COPD patients. We tested two hypotheses: Internet access is associated with socio-demographic disparities and frequency of use is related to perceived needs. Methods We analyzed data from a 2007–2008 national convenience sample survey of COPD patients to determine the relationship between Internet access and frequency of use with demographics, socio-economic status, COPD severity, and satisfaction with healthcare. Results Among survey respondents (response rate 7.2%; n = 914, 59.1% women, mean age 71.2 years), 34.2% reported lack of Internet access, and an additional 49% had access but used the Internet less than weekly. Multivariate models showed association between lack of access and older age (OR 1.10, 95% CI 1.07, 1.13), lower income (income below $30,000 OR 2.47, 95% CI 1.63, 3.73), less education (high school highest attainment OR 2.30, 95% CI 1.54, 3.45), comorbid arthritis or mobility-related disease (OR 1.56, 95% CI 1.05, 2.34). More frequent use (at least weekly) was associated with younger age (OR 0.95, 95% CI 0.93, 0.98), absence of cardiovascular disease (OR 0.48, 95% CI 0.29, 0.78), but with perception of needs insufficiently met by the healthcare system, including diagnostic delay (OR 1.72, 95% CI 1.06, 2.78), feeling treated poorly (OR 2.46, 95% CI 1.15, 5.24), insufficient physician time (OR 2.29, 95% CI 1.02, 5.13), and feeling their physician did not listen (OR 3.14, 95% CI 1.42, 6.95). Conclusions An analysis of the characteristics associated with Internet access and use among COPD patients identified two different patient populations. Lack of Internet access was a marker of socioeconomic disparity and mobility-associated diseases, while frequent Internet use was associated with less somatic disease but dissatisfaction with care. PMID:24755090

  14. Internet access and use by COPD patients in the National Emphysema/COPD Association Survey.

    Science.gov (United States)

    Martinez, Carlos H; St Jean, Beth L; Plauschinat, Craig A; Rogers, Barbara; Beresford, Julen; Martinez, Fernando J; Richardson, Caroline R; Han, Meilan K

    2014-04-22

    Technology offers opportunities to improve healthcare, but little is known about Internet use by COPD patients. We tested two hypotheses: Internet access is associated with socio-demographic disparities and frequency of use is related to perceived needs. We analyzed data from a 2007-2008 national convenience sample survey of COPD patients to determine the relationship between Internet access and frequency of use with demographics, socio-economic status, COPD severity, and satisfaction with healthcare. Among survey respondents (response rate 7.2%; n = 914, 59.1% women, mean age 71.2 years), 34.2% reported lack of Internet access, and an additional 49% had access but used the Internet less than weekly. Multivariate models showed association between lack of access and older age (OR 1.10, 95% CI 1.07, 1.13), lower income (income below $30,000 OR 2.47, 95% CI 1.63, 3.73), less education (high school highest attainment OR 2.30, 95% CI 1.54, 3.45), comorbid arthritis or mobility-related disease (OR 1.56, 95% CI 1.05, 2.34). More frequent use (at least weekly) was associated with younger age (OR 0.95, 95% CI 0.93, 0.98), absence of cardiovascular disease (OR 0.48, 95% CI 0.29, 0.78), but with perception of needs insufficiently met by the healthcare system, including diagnostic delay (OR 1.72, 95% CI 1.06, 2.78), feeling treated poorly (OR 2.46, 95% CI 1.15, 5.24), insufficient physician time (OR 2.29, 95% CI 1.02, 5.13), and feeling their physician did not listen (OR 3.14, 95% CI 1.42, 6.95). An analysis of the characteristics associated with Internet access and use among COPD patients identified two different patient populations. Lack of Internet access was a marker of socioeconomic disparity and mobility-associated diseases, while frequent Internet use was associated with less somatic disease but dissatisfaction with care.

  15. Resource and Traffic Management Techniques for Performance Optimization in Wireless Mesh Networks

    OpenAIRE

    D'Elia, Francesco Paolo

    2010-01-01

    Since Internet was born, it has steadily evolved. New devices, new needs, new applications, new protocols, and this evolution is not going to slow down in the near future. As a result of the introduction and standardization of wireless access technology, we are living through an inevitable replacement of the old wired technology. We are going through a wireless revolution, which brings with it new ways to access information: simply, anywhere, anytime. The new Internet challenge is to embo...

  16. Who's Connected? Trends from 1999 to 2011 in Home Internet Access in North Carolina

    Directory of Open Access Journals (Sweden)

    Kenneth Wilson

    2013-06-01

    Full Text Available Using the Internet has become an essential part of many people's daily life activities. In this information age, the Internet is an indispensible tool for communicating and sharing of information. This transformation of technological incorporation into every aspect of social life has been relatively swift, although not all-inclusive. Lack of access to the Internet produces and perpetuates social inequality. In this paper we present results of a unique data set compiled from six studies conducted across twelve years in the state of North Carolina. Our results show differences in home access to the Internet are associated with various aspects of social stratification. The findings reveal that digital divide persists over time. At least one quarter of respondents with one or more of the following sociodemographic characteristics reported not having home Internet access: African Americans, those with only a high school degree or less, those without school-age children in the home, those with a household income less than $30,000, people age 69 years and older, and rural residents. Future research and policy recommendations are provided.

  17. Reducing the MAC Latency for IEEE 802.11 Vehicular Internet Access

    Directory of Open Access Journals (Sweden)

    Kang Moonsoo

    2010-01-01

    Full Text Available In an intermittently connected environment, access points are sparsely distributed throughout an area. As mobile users travel along the roadway, they can opportunistically connect, albeit temporarily, to roadside 802.11 (Wi-Fi APs for Internet access. Net-working characteristics of vehicular Internet access in an intermittently connected envi ronment face numerous challenges, such as short periods of connectivity and unpredictable connection times. To meet these challenges, we propose an Access Point Report (APR protocol where mobile stations opportunistically collaborate by broadcasting an APR to other mobile stations to fully utilize the short-lived connection periods. APR can optimize the use of short connection periods by minimizing the scanning delay and also act as a hint that enables mobile users to predict when connection can be established.

  18. Access Routes of Internet Finance Dictionaries: Present Solutions and Future Opportunities

    Directory of Open Access Journals (Sweden)

    Deny Arnos Kwary

    2011-10-01

    Full Text Available

    ABSTRACT: Lexicographers working on finance dictionaries have not properly exploited the fast development of the Internet. This is revealed by the poor utilization of the access routes found in current Internet finance dictionaries. Consequently, users cannot effectively and efficiently find answers to their lexicographical problems. Firstly, there are Internet finance dictionaries which lack technological features and can simply be called meagre Internet dictionaries. Secondly, there are Internet finance dictionaries which utilize so many technological features that users incur high lexicographical information costs. In order to create better access routes, a sound theoretical foundation has to be established. This article shows that the implementation of the modern theory of lexicographical functions, which focuses on the users, results in a better design for future Internet finance dictionaries. With the proper theoretical basis, lexicographers will be able to create state-ofthe- art dictionaries that can provide effective and efficient solutions to lexicographical problems.

    OPSOMMING: Toegangsroetes van Internet- finansiële woordeboeke: Huidige oplossings en toekomstige geleenthede. Leksikograwe wat aan finansiële woordeboeke werk, het nie die vinnige ontwikkeling van die Internet behoorlik benut nie. Dit blyk uit die gebrekkige aanwending van die toegangsroetes wat in huidige Internet- finansiële woordeboeke aangetref word. Gevolglik kan gebruikers nie doeltreffend en doelmatig antwoorde kry op hul leksikografiese probleme nie. Eerstens is daar Internet- finansiële woordeboeke waarin tegnologiese kenmerke ontbreek en wat gewoon karige Internetwoordeboeke genoem kan word. Tweedens is daar Internet- finansiële woordeboeke wat so baie tegnologiese kenmerke aanwend dat gebruikers hoë leksikografiese inligtingskoste oploop. Om beter toegangsroetes te skep, moet 'n deeglike teoretiese grondslag gevestig word. Hierdie artikel toon

  19. A Federated Capability-based Access Control Mechanism for Internet of Things (IoTs)

    OpenAIRE

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-01-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, l...

  20. Implementing the Internet of Things vision in industrial wireless sensor networks

    CSIR Research Space (South Africa)

    Kruger, CP

    2014-07-01

    Full Text Available The authors of this paper explore the use of IPv6 over Low power Wireless Personal Area Networks (6LoWPAN), IPv6 Routing Protocol for Low power and Lossy Networks (RPL) and Constrained Application Protocol (CoAP) as a possible solution for realising...

  1. Whitepaper on New Localization Methods for 5G Wireless Systems and the Internet-of-Things

    DEFF Research Database (Denmark)

    Pedersen, Troels; Fleury, Bernard Henri

    2018-01-01

    Disruptive technologies proposed for 5G wireless systems and the IoT hold promise of providing unprecedented localization capabilities for a wide range of application scenarios and target environments. This whitepaper summarizes the expected features and resulting properties of upcoming localizat...

  2. Public Internet Access Points (PIAPs) and Their Social Impact: A Case Study from Turkey

    Science.gov (United States)

    Afacan, Gulgun; Er, Erkan; Arifoglu, Ali

    2013-01-01

    Building public Internet access points (PIAPs) is a significant contribution of governments towards achieving an information society. While many developing countries are investing great amounts to establish PIAPs today, people may not use PIAPs effectively. Yet, the successful implementation of PIAPs is the result of citizens' acceptance to use…

  3. Gender Differences in Availability, Internet Access and Rate of Usage of Computers among Distance Education Learners.

    Science.gov (United States)

    Atan, Hanafi; Sulaiman, Fauziah; Rahman, Zuraidah Abd; Idrus, Rozhan Mohammed

    2002-01-01

    Explores the level of availability of computers, Internet accessibility, and the rate of usage of computers both at home and at the workplace between distance education learners according to gender. Results of questionnaires completed at the Universiti Sains Malaysia indicate that distance education reduces the gender gap. (Author/LRW)

  4. Outsourcing a High Speed Internet Access Project: An Information Technology Class Case Study in Three Parts

    Science.gov (United States)

    Platt, Richard G.; Carper, William B.; McCool, Michael

    2010-01-01

    In early 2004, the Hilton Hotels Corporation (HHC) required that all of its hotels (both owned and franchised) install high-speed Internet access (HSIA) in all of their rooms by June 2004. This case focuses on how one of its franchise properties located on the northern gulf coast of Florida (the Hilton Sandestin Beach Golf Resort &…

  5. Internet Information-Seeking and Its Relation to Support for Access to Government Records

    Science.gov (United States)

    Cuillier, David; Piotrowski, Suzanne J.

    2009-01-01

    Public access to government records is essential for democratic self-governance, and attitudes toward that right can facilitate or hinder public policy regarding transparency. As more people use the internet for gathering information about their governments and communities, it is unknown whether such online information-seeking is related to…

  6. Global Market Access in the Internet Era: South Africa's Wood Furniture Industry.

    Science.gov (United States)

    Moodley, Sagren

    2002-01-01

    Explores the link between Internet connectivity and access to global markets, and uses the South African wood furniture producers as they are integrated into global value chains and exposed to the demands of more sophisticated markets. Articulates policy recommendations to promote greater diffusion of e-commerce technologies in the wood furniture…

  7. e-Portfolios for Learning and Development: without constant internet or electrical grid access

    NARCIS (Netherlands)

    Casey, John; Calverley, Gayle; Greller, Wolfgang; Uhomoibhi, James

    2011-01-01

    Casey, J., Calverley, G., Greller, W., & Uhomoibhi, J. (2010, 26-28 May). e-Portfolios for Learning and Development: without constant internet or electrical grid access. Presentation at the 5th International Conference on ICT for Development, Education, and Training - eLearning Africa, Lusaka,

  8. Towards a tangible web: using physical objects to access and manipulate the Internet of Things

    CSIR Research Space (South Africa)

    Smith, Andrew C

    2013-09-01

    Full Text Available . This additional step has resulted in the phenomenon commonly referred to as the Internet of Things (IoT). In order to realise the full potential of the IoT, individuals need a mechanism to access and manipulate it. A potential mechanism for achieving...

  9. An Ontology-Based Context Model for Wireless Sensor Network (WSN Management in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Adnan Al-Anbuky

    2013-09-01

    Full Text Available Wireless sensor networks (WSNs are an enabling technology of context-aware systems. The Internet of Things (IoT, which has attracted much attention in recent years, is an emerging paradigm where everyday objects and spaces are made context-aware and interconnected through heterogeneous networks on a global scale. However, the IoT system can suffer from poor performances when its underlying networks are not optimized. In this paper, an ontology model for representing and facilitating context sharing between network entities in WSNs is proposed for the first time. The context model aims to enable optimal context-aware management of WSNs in IoT, which will also harness the rich context knowledge of IoT systems.

  10. Wireless, battery-operated data acquisition system for mobile spectrometry applications and (potentially) for the Internet of things

    Science.gov (United States)

    Fitzgerald, Ryan; Karanassios, Vassili

    2017-05-01

    There are many applications requiring chemical analysis in the field and analytical results in (near) real-time. For example, when accidental spills occur. In others, collecting samples in the field followed by analysis in a lab increases costs and introduces time-delays. In such cases, "bring part of the lab to the sample" would be ideal. Toward this ideal (and to further reduce size and weight), we developed a relatively inexpensive, battery-operated, wireless data acquisition hardware system around an Arduino nano micro-controller and a 16-bit ADC (Analog-to- Digital Converter) with a max sampling rate of 860 samples/s. The hardware communicates the acquired data using low-power Bluetooth. Software for data acquisition and data display was written in Python. Potential ways of making the hardware-software approach described here a part of the Internet-of-Things (IoT) are presented.

  11. Revisiting of Channel Access Mechanisms in Mobile Wireless Networks through Exploiting Physical Layer Technologies

    Directory of Open Access Journals (Sweden)

    Junmei Yao

    2018-01-01

    Full Text Available The wireless local area networks (WLANs have been widely deployed with the rapid development of mobile devices and have further been brought into new applications with infrastructure mobility due to the growth of unmanned aerial vehicles (UAVs. However, the WLANs still face persistent challenge on increasing the network throughput to meet the customer’s requirement and fight against the node mobility. Interference is a well-known issue that would degrade the network performance due to the broadcast characteristics of the wireless signals. Moreover, with infrastructure mobility, the interference becomes the key obstacle in pursuing the channel capacity. Legacy interference management mechanism through the channel access control in the MAC layer design of the 802.11 standard has some well-known drawbacks, such as exposed and hidden terminal problems, inefficient rate adaptation, and retransmission schemes, making the efficient interference management an everlasting research topic over the years. Recently, interference management through exploiting physical layer mechanisms has attracted much research interest and has been proven to be a promising way to improve the network throughput, especially under the infrastructure mobility scenarios which provides more indicators for node dynamics. In this paper, we introduce a series of representative physical layer techniques and analyze how they are exploited for interference management to improve the network performance. We also provide some discussions about the research challenges and give potential future research topics in this area.

  12. QoS Differentiated and Fair Packet Scheduling in Broadband Wireless Access Networks

    Directory of Open Access Journals (Sweden)

    Zhang Yan

    2009-01-01

    Full Text Available This paper studies the packet scheduling problem in Broadband Wireless Access (BWA networks. The key difficulties of the BWA scheduling problem lie in the high variability of wireless channel capacity and the unknown model of packet arrival process. It is difficult for traditional heuristic scheduling algorithms to handle the situation and guarantee satisfying performance in BWA networks. In this paper, we introduce learning-based approach for a better solution. Specifically, we formulate the packet scheduling problem as an average cost Semi-Markov Decision Process (SMDP. Then, we solve the SMDP by using reinforcement learning. A feature-based linear approximation and the Temporal-Difference learning technique are employed to produce a near optimal solution of the corresponding SMDP problem. The proposed algorithm, called Reinforcement Learning Scheduling (RLS, has in-built capability of self-training. It is able to adaptively and timely regulate its scheduling policy according to the instantaneous network conditions. Simulation results indicate that RLS outperforms two classical scheduling algorithms and simultaneously considers: (i effective QoS differentiation, (ii high bandwidth utilization, and (iii both short-term and long-term fairness.

  13. Strategies for P2P connectivity in reconfigurable converged wired/wireless access networks.

    Science.gov (United States)

    Puerto, Gustavo; Mora, José; Ortega, Beatriz; Capmany, José

    2010-12-06

    This paper presents different strategies to define the architecture of a Radio-Over-Fiber (RoF) Access networks enabling Peer-to-Peer (P2P) functionalities. The architectures fully exploit the flexibility of a wavelength router based on the feedback configuration of an Arrayed Waveguide Grating (AWG) and an optical switch to broadcast P2P services among diverse infrastructures featuring dynamic channel allocation and enabling an optical platform for 3G and beyond wireless backhaul requirements. The first architecture incorporates a tunable laser to generate a dedicated wavelength for P2P purposes and the second architecture takes advantage of reused wavelengths to enable the P2P connectivity among Optical Network Units (ONUs) or Base Stations (BS). While these two approaches allow the P2P connectivity in a one at a time basis (1:1), the third architecture enables the broadcasting of P2P sessions among different ONUs or BSs at the same time (1:M). Experimental assessment of the proposed architecture shows approximately 0.6% Error Vector Magnitude (EVM) degradation for wireless services and 1 dB penalty in average for 1 x 10(-12) Bit Error Rate (BER) for wired baseband services.

  14. Combining wireless sensor networks and semantic middleware for an Internet of Things-based sportsman/woman monitoring application.

    Science.gov (United States)

    Rodríguez-Molina, Jesús; Martínez, José-Fernán; Castillejo, Pedro; López, Lourdes

    2013-01-31

    Wireless Sensor Networks (WSNs) are spearheading the efforts taken to build and deploy systems aiming to accomplish the ultimate objectives of the Internet of Things. Due to the sensors WSNs nodes are provided with, and to their ubiquity and pervasive capabilities, these networks become extremely suitable for many applications that so-called conventional cabled or wireless networks are unable to handle. One of these still underdeveloped applications is monitoring physical parameters on a person. This is an especially interesting application regarding their age or activity, for any detected hazardous parameter can be notified not only to the monitored person as a warning, but also to any third party that may be helpful under critical circumstances, such as relatives or healthcare centers. We propose a system built to monitor a sportsman/woman during a workout session or performing a sport-related indoor activity. Sensors have been deployed by means of several nodes acting as the nodes of a WSN, along with a semantic middleware development used for hardware complexity abstraction purposes. The data extracted from the environment, combined with the information obtained from the user, will compose the basis of the services that can be obtained.

  15. Combining Wireless Sensor Networks and Semantic Middleware for an Internet of Things-Based Sportsman/Woman Monitoring Application

    Science.gov (United States)

    Rodríguez-Molina, Jesús; Martínez, José-Fernán; Castillejo, Pedro; López, Lourdes

    2013-01-01

    Wireless Sensor Networks (WSNs) are spearheading the efforts taken to build and deploy systems aiming to accomplish the ultimate objectives of the Internet of Things. Due to the sensors WSNs nodes are provided with, and to their ubiquity and pervasive capabilities, these networks become extremely suitable for many applications that so-called conventional cabled or wireless networks are unable to handle. One of these still underdeveloped applications is monitoring physical parameters on a person. This is an especially interesting application regarding their age or activity, for any detected hazardous parameter can be notified not only to the monitored person as a warning, but also to any third party that may be helpful under critical circumstances, such as relatives or healthcare centers. We propose a system built to monitor a sportsman/woman during a workout session or performing a sport-related indoor activity. Sensors have been deployed by means of several nodes acting as the nodes of a WSN, along with a semantic middleware development used for hardware complexity abstraction purposes. The data extracted from the environment, combined with the information obtained from the user, will compose the basis of the services that can be obtained. PMID:23385405

  16. Combining Wireless Sensor Networks and Semantic Middleware for an Internet of Things-Based Sportsman/Woman Monitoring Application

    Directory of Open Access Journals (Sweden)

    Lourdes López

    2013-01-01

    Full Text Available Wireless Sensor Networks (WSNs are spearheading the efforts taken to build and deploy systems aiming to accomplish the ultimate objectives of the Internet of Things. Due to the sensors WSNs nodes are provided with, and to their ubiquity and pervasive capabilities, these networks become extremely suitable for many applications that so-called conventional cabled or wireless networks are unable to handle. One of these still underdeveloped applications is monitoring physical parameters on a person. This is an especially interesting application regarding their age or activity, for any detected hazardous parameter can be notified not only to the monitored person as a warning, but also to any third party that may be helpful under critical circumstances, such as relatives or healthcare centers. We propose a system built to monitor a sportsman/woman during a workout session or performing a sport-related indoor activity. Sensors have been deployed by means of several nodes acting as the nodes of a WSN, along with a semantic middleware development used for hardware complexity abstraction purposes. The data extracted from the environment, combined with the information obtained from the user, will compose the basis of the services that can be obtained.

  17. Local government broadband policies for areas with limited Internet access

    Directory of Open Access Journals (Sweden)

    Yoshio Arai

    2014-03-01

    Full Text Available Despite their wide diffusion in developed countries, broadband services are still limited in areas where providing them is not profitable for private telecom carriers. To address this, many local governments in Japan have implemented broadband deployment projects subsidized by the national government. In this paper, we discuss local government broadband policies based on survey data collected from municipalities throughout the country. With the support of national promotion policies, broadband services were rapidly introduced to most local municipalities in Japan during the 2000s. Local government deployment policies helped to reduce the number of areas with no broadband access. A business model based on the Indefeasible Right of Use (IRU contract between a private telecom carrier and a local government has been developed in recent years. Even local governments without the technical capacity to operate a broadband business can introduce broadband services into their territory using the IRU business model.

  18. Illegal "no prescription" internet access to narrow therapeutic index drugs.

    Science.gov (United States)

    Liang, Bryan A; Mackey, Tim K; Lovett, Kimberly M

    2013-05-01

    Narrow therapeutic index (NTI) drugs, because of proximity of therapeutic amounts to toxic amounts, require close professional oversight, particularly when switching formulations. However, safe use may be compromised by unsupervised switching through access to online "no prescription" Web sites. We assessed no prescription online availability of NTI drugs, using an academically published list (core NTI drugs). Using the Google search term "buy DRUG no prescription," we reviewed the first 5 search result pages for marketing of no prescription NTI drugs. We further assessed if National Association of Boards of Pharmacy (NABP) Not Recommended vendors were marketing NTI drugs. Searches were conducted from November 3, 2012 to January 3, 2013. For core NTI drugs, we found 13 of 14 NTI drugs (92%) marketed as available without prescription, all from NABP Not Recommended vendors. On the basis of these initial findings, we expanded our core list to 12 additional NTI drugs; 11 of 12 of these drugs (92%) were available from no prescription Web sites. Overall, 24 of 26 NTI drugs (92%) were illegally marketed as available online without the need for a prescription. Suspect online NTI drug access from no prescription vendors represents a significant patient safety risk because of potential patient drug switching and risk of counterfeit versions. Further, state health care exchanges with coverage limitations may drive patients to seek formulations online. Food and Drug Administration harmonization with tighter international NTI drug standards should be considered, and aggressive action against suspect online marketers should be a regulatory and public health priority. Copyright © 2013 Elsevier HS Journals, Inc. All rights reserved.

  19. A Lightweight Medium Access Protocol (LMAC) for Wireless Sensor Networks: Reducing Preamble Transmissions and Transceiver State Switches

    NARCIS (Netherlands)

    van Hoesel, L.F.W.; Havinga, Paul J.M.

    2004-01-01

    In this paper, we present an energy-efficient medium access protocol designed for wireless sensor networks. Although the protocol uses TDMA to give nodes in the WSN the opportunity to communicate collision-free, the network is self-organizing in terms of time slot assignment and synchronization. The

  20. Architectural Considerations of Fiber-Radio Millimeter-Wave Wireless Access Systems

    Science.gov (United States)

    Kitayama, Ken-Ichi

    The architecture of fiber-radio mm-wave wireless access systems critically depends upon the optical mm-wave generation and transport techniques. Four optical mm-wave generation and transport techniques: 1) optical self-heterodyning, 2) external modulation, 3) up- and downconversion, and 4) optical transceiver, will be assessed. From the technical viewpoints, their advantages and disadvantages are discussed. The economical assessment, focusing on the cost of a base station BS ( ), will suggest that the optical transceiver looks the most promising in the long run, but in the near future, however, the external modulation will be cost-effective. The experimental results of 60 GHz testbeds using the external modulation will support the conclusion.

  1. Access to Internet of People With Disabilities Engellilerin Internet'e Erişimi Üzerine

    Directory of Open Access Journals (Sweden)

    Fatoş Subaşıoğlu

    2000-06-01

    Full Text Available The last decade has producted a revolution in the world of Internet and computer technology for many disabled people. Especially, with the help of adaptive technology, for example, deaf-blind people can communicate over telephone networks and severely visaully impaired people can read a computer screen directly with the help of speech synthesis or automatically generated Braille displays. People with physical disabilities can use personel computers by blowing. If s even possible to control computers by using the voice. However, currently, the largest problem is that WWW pages are increasingly developed with pictures, images, audio and video clips carrying much of the information. For this reason, the aims of this article are twofold: first, to give some information about products of adaptive technologies for people with disabilities, and second, to give some design examples about Web pages for this people. Son 10 yıl içinde, engellilere yönelik Internet ve bilgisayar teknolojisi alanında yeni bir oluşum yaşanmaya başlandı. Özellikle uyarlanmış teknoloji yardımıyla örneğin, sağır-kör insanlar telefon ağları ile iletişim kurabilmekte ve birçok görme engelli insan konuşma sentezi aracılığı ile bir bilgisayar ekranını ya da otomatik olarak üretilmiş Braille görüntülerini okuyabilmektedir. Fiziksel engelliler, üfleyerek bilgisayarlarını kullanabilmekte, hatta ses ile bilgisayarı kullanmak mümkün olmaktadır. Ancak, günümüzde en büyük sorun, WWW say falarının yoğunlukla resimler, görüntüler, ses ve video küpleri ile geliştirilmekte olduğudur. Bu nedenle bu makalenin amacı, öncelikle engellilere yönelik uyarlanmış teknoloji ürünleri alanında bilgi vermek ve bu bireylere yönelik Web tasarım örnekleri sunmaktır.

  2. A Survey on Energy Conserving Mechanisms for the Internet of Things: Wireless Networking Aspects

    OpenAIRE

    Zeeshan Abbas; Wonyong Yoon

    2015-01-01

    The Internet of Things (IoT) is an emerging key technology for future industries and everyday lives of people, where a myriad of battery operated sensors, actuators, and smart objects are connected to the Internet to provide services such as mobile healthcare, intelligent transport system, environmental monitoring, etc. Since energy efficiency is of utmost importance to these battery constrained IoT devices, IoT-related standards and research works have focused on the device energy conserving...

  3. DWDM Fiber-Wireless Access System with Centralized Optical Frequency Comb-based RF Carrier Generation

    DEFF Research Database (Denmark)

    Pang, Xiaodan; Beltrán, Marta; Sánchez, José

    2013-01-01

    We propose and experimentally demonstrate an optical wireless DWDM system at 60 GHz with optical incoherent heterodyne up-conversion using an optical frequency comb. Multiple users with wireline and wireless services are simultaneously supported....

  4. Information Access Skills in Mothers as Containment of Internet Negative Impact

    Directory of Open Access Journals (Sweden)

    Putri Limilia

    2018-02-01

    Full Text Available Media and Information Literacy (MIL skills was one of the skills that must be possessed by netizens. These skills become important in the effort of coping with the negative impact of the internet. The high penetration of the internet is not followed by the high skill of MIL. Therefore, the writers are interested to know the skills of information and media literacy (access skills in mothers. This study uses descriptive quantitative method by using questionnaires as means of data collection. The result of the study shows that mothers tend to have moderate-level information access skills. The skills are reflected in the skills of mothers at moderate level in understanding the role of information, seeking sources of information, accessing information effectively and efficiently, and storing information.

  5. Data Transmission and Access Protection of Community Medical Internet of Things

    Directory of Open Access Journals (Sweden)

    Xunbao Wang

    2017-01-01

    Full Text Available On the basis of Internet of Things (IoT technologies, Community Medical Internet of Things (CMIoT is a new medical information system and generates massive multiple types of medical data which contain all kinds of user identity data, various types of medical data, and other sensitive information. To effectively protect users’ privacy, we propose a secure privacy data protection scheme including transmission protection and access control. For the uplink transmission data protection, bidirectional identity authentication and fragmented multipath data transmission are used, and for the downlink data protection, fine grained access control and dynamic authorization are used. Through theoretical analysis and experiment evaluation, it is proved that the community medical data can be effectively protected in the transmission and access process without high performance loss.

  6. Converged wireline and wireless signal transport over optical fibre access links

    DEFF Research Database (Denmark)

    Tafur Monroy, Idelfonso; Prince, Kamau; Osadchiy, Alexey Vladimirovich

    2009-01-01

    This article reviews emerging trends in converged optical-wireless communication systems and outline the role that photonic technologies are playing in making the vision of a wireline-wireless converged signal transport network a reality.......This article reviews emerging trends in converged optical-wireless communication systems and outline the role that photonic technologies are playing in making the vision of a wireline-wireless converged signal transport network a reality....

  7. Identity Establishment and Capability Based Access Control (IECAC) Scheme for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) become discretionary part of everyday life and could befall a threat if security is not considered before deployment. Authentication and access control in IoT is equally important to establish secure communication between devices. To protect IoT from man in middle, replay...... and denial of service attacks, the concept of capability for access control is introduced. This paper presents Identity establishment and capability based access control (IECAC) protocol using ECC (Elliptical Curve Cryptography) for IoT along with protocol evaluation, which protect against the aforementioned...

  8. An Access Control Protocol for Wireless Sensor Network Using Double Trapdoor Chameleon Hash Function

    Directory of Open Access Journals (Sweden)

    Tejeshwari Thakur

    2016-01-01

    Full Text Available Wireless sensor network (WSN, a type of communication system, is normally deployed into the unattended environment where the intended user can get access to the network. The sensor nodes collect data from this environment. If the data are valuable and confidential, then security measures are needed to protect them from the unauthorized access. This situation requires an access control protocol (ACP in the design of sensor network because of sensor nodes which are vulnerable to various malicious attacks during the authentication and key establishment and the new node addition phase. In this paper, we propose a secured ACP for such WSN. This protocol is based on Elliptic Curve Discrete Log Problem (ECDLP and double trapdoor chameleon hash function which secures the WSN from malicious attacks such as node masquerading attack, replay attack, man-in-the-middle attack, and forgery attacks. Proposed ACP has a special feature known as session key security. Also, the proposed ACP is more efficient as it requires only one modular multiplication during the initialization phase.

  9. Quality of Recovery Evaluation of the Protection Schemes for Fiber-Wireless Access Networks

    Science.gov (United States)

    Fu, Minglei; Chai, Zhicheng; Le, Zichun

    2016-03-01

    With the rapid development of fiber-wireless (FiWi) access network, the protection schemes have got more and more attention due to the risk of huge data loss when failures occur. However, there are few studies on the performance evaluation of the FiWi protection schemes by the unified evaluation criterion. In this paper, quality of recovery (QoR) method was adopted to evaluate the performance of three typical protection schemes (MPMC scheme, OBOF scheme and RPMF scheme) against the segment-level failure in FiWi access network. The QoR models of the three schemes were derived in terms of availability, quality of backup path, recovery time and redundancy. To compare the performance of the three protection schemes comprehensively, five different classes of network services such as emergency service, prioritized elastic service, conversational service, etc. were utilized by means of assigning different QoR weights. Simulation results showed that, for the most service cases, RPMF scheme was proved to be the best solution to enhance the survivability when planning the FiWi access network.

  10. Access for Internet of Things using Smartphone as a Gateway utilizing LTE and WiFi

    DEFF Research Database (Denmark)

    Mathur, Prateek; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2016-01-01

    Communicating the Internet of Things (IoT) data relying on Long-Term Evolution (LTE) and WiFi has been been presented in the relevant literature. However, this necessitates devices to have LTE/WiFi capability of their own, that has limitations in the form of power consumption, and radio access...... the data to the Internet. In this paper we present a system model wherein the smartphone functions as a gateway for the IoT devices operating on NFC, ZigBee and Bluetooth. The smartphone functioning as a gateway for transferring IoT data. The system modelled in the form of a Markov Chain based...

  11. Access to CERN from the Internet: termination of the VPN service - Reminder

    CERN Multimedia

    IT Department

    2008-01-01

    Due to the continued incidents and growing security risks associated with the service, access to CERN using the VPN (Virtual Private Network) service will be discontinued as of Tuesday, 29 January 2008. In addition, new registrations are no longer accepted. For further information see: http://cern.ch/security/vpn. Users are requested to stop using VPN immediately and to start to use the recommended alternative methods for connecting to CERN from the Internet. An outline of these methods and a set of FAQs are available at: http://cern.ch/security/Internet IT Department

  12. Access to CERN from the Internet: termination of the VPN service

    CERN Multimedia

    2007-01-01

    Due to the continued incidents and growing security risks from the service, access to CERN using the VPN (Virtual Private Network) service will be discontinued on Tuesday 29th January 2008. In addition, new registrations will no longer be accepted. Further information is linked from: http://cern.ch/security/vpn Users are requested to stop using VPN immediately and start using the recommended alternative methods for connecting to CERN from the Internet. These are outlined together with a set of FAQs at: http://cern.ch/security/Internet IT Department

  13. Channel capacity of TDD-OFDM-MIMO for multiple access points in a wireless single-frequency-network

    DEFF Research Database (Denmark)

    Takatori, Y.; Fitzek, Frank; Tsunekawa, K.

    2005-01-01

    MIMO data transmission scheme, which combines Single-Frequency-Network (SFN) with TDD-OFDM-MIMO applied for wireless LAN networks. In our proposal, we advocate to use SFN for multiple access points (MAP) MIMO data transmission. The goal of this approach is to achieve very high channel capacity in both......The multiple-input-multiple-output (MIMO) technique is the most attractive candidate to improve the spectrum efficiency in the next generation wireless communication systems. However, the efficiency of MIMO techniques reduces in the line of sight (LOS) environments. In this paper, we propose a new...

  14. Internet

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Internet. The latest communication revolution surrounds Internet. Some stats*:. 210 billion emails sent daily; 15 billion phone calls everyday; ~40 billion WWW links served everyday. * Source : The Radicati group.

  15. The digital divide: Trends in global mobile and broadband Internet access from 2000-2010.

    Science.gov (United States)

    Ronquillo, Charlene; Currie, Leanne

    2012-01-01

    The digital divide is described as the gap between those who do and do not have access to digital information and communications technologies (ICT). ICTs are viewed as an indicator of infrastructure and potential for development, and are a growing platform for health information and services delivery. This study compares the penetration of mobile and broadband Internet technologies by global region from 2000 to 2010. Results illustrate the rapid growth of mobile cellular telephone subscriptions in all global regions with trends suggesting a continued increase. Little to modest gains were made in fixed broadband Internet subscriptions globally. There is a growing popularity of mobile subscriptions with use of data communications, exceeding the numbers of fixed Internet subscriptions. This comparison reveals current strengths that can be built on and highlights the importance of awareness of global trends and using such knowledge to inform design and delivery of ICT-based health services.

  16. The digital divide: Trends in global mobile and broadband Internet access from 2000–2010

    Science.gov (United States)

    Ronquillo, Charlene; Currie, Leanne

    2012-01-01

    The digital divide is described as the gap between those who do and do not have access to digital information and communications technologies (ICT). ICTs are viewed as an indicator of infrastructure and potential for development, and are a growing platform for health information and services delivery. This study compares the penetration of mobile and broadband Internet technologies by global region from 2000 to 2010. Results illustrate the rapid growth of mobile cellular telephone subscriptions in all global regions with trends suggesting a continued increase. Little to modest gains were made in fixed broadband Internet subscriptions globally. There is a growing popularity of mobile subscriptions with use of data communications, exceeding the numbers of fixed Internet subscriptions. This comparison reveals current strengths that can be built on and highlights the importance of awareness of global trends and using such knowledge to inform design and delivery of ICT-based health services. PMID:24199118

  17. Identity driven Capability based Access Control (ICAC) Scheme for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) becomes discretionary part of everyday life. Scalability and manageability is daunting due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is equally important to establish secure communication between multiple...... devices and services. In this paper, the concept of capability for access control is introduced where the identities of the involved devices are entrenched in the access capabilities. Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related...... to complexity and dynamics of device identities. ICAC is implemented for 802.11 and results shows that ICAC has less scalability issues and better performance analysis compared with other access control schemes. The ICAC evaluation by using security protocol verification tool shows that ICAC is secure against...

  18. 60 GHz Wireless Propagation Channels: Characterization, Modeling and Evaluation

    OpenAIRE

    Gustafson, Carl

    2014-01-01

    To be able to connect wirelessly to the internet is nowadays a part of everyday life and the number of wireless devices accessing wireless networks worldwide are increasing rapidly. However, with the increasing number of wireless devices and applications and the amount available bandwidth, spectrum shortage is an issue. A promising way to increase the amount of available spectrum is to utilize frequency bands in the mm-wave range of 30-300 GHz that previously have not been used for typical co...

  19. TRICALCAR : Weaving Community Based Wireless Networks in ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... wireless champions by facilitating the exchange of knowledge between them and with other like-minded actors in the region. The training materials and knowledge gained during the experience will be documented and made available online. The idea is to improve Internet access in rural and urban marginalized areas at ...

  20. Directional Medium Access Control (MAC Protocols in Wireless Ad Hoc and Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    David Tung Chong Wong

    2015-06-01

    Full Text Available This survey paper presents the state-of-the-art directional medium access control (MAC protocols in wireless ad hoc and sensor networks (WAHSNs. The key benefits of directional antennas over omni-directional antennas are longer communication range, less multipath interference, more spatial reuse, more secure communications, higher throughput and reduced latency. However, directional antennas lead to single-/multi-channel directional hidden/exposed terminals, deafness and neighborhood, head-of-line blocking, and MAC-layer capture which need to be overcome. Addressing these problems and benefits for directional antennas to MAC protocols leads to many classes of directional MAC protocols in WAHSNs. These classes of directional MAC protocols presented in this survey paper include single-channel, multi-channel, cooperative and cognitive directional MACs. Single-channel directional MAC protocols can be classified as contention-based or non-contention-based or hybrid-based, while multi-channel directional MAC protocols commonly use a common control channel for control packets/tones and one or more data channels for directional data transmissions. Cooperative directional MAC protocols improve throughput in WAHSNs via directional multi-rate/single-relay/multiple-relay/two frequency channels/polarization, while cognitive directional MAC protocols leverage on conventional directional MAC protocols with new twists to address dynamic spectrum access. All of these directional MAC protocols are the pillars for the design of future directional MAC protocols in WAHSNs.

  1. A Fair Contention Access Scheme for Low-Priority Traffic in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Shagufta Henna

    2017-08-01

    Full Text Available Recently, wireless body area networks (WBANs have attracted significant consideration in ubiquitous healthcare. A number of medium access control (MAC protocols, primarily derived from the superframe structure of the IEEE 802.15.4, have been proposed in literature. These MAC protocols aim to provide quality of service (QoS by prioritizing different traffic types in WBANs. A contention access period (CAPwith high contention in priority-based MAC protocols can result in higher number of collisions and retransmissions. During CAP, traffic classes with higher priority are dominant over low-priority traffic; this has led to starvation of low-priority traffic, thus adversely affecting WBAN throughput, delay, and energy consumption. Hence, this paper proposes a traffic-adaptive priority-based superframe structure that is able to reduce contention in the CAP period, and provides a fair chance for low-priority traffic. Simulation results in ns-3 demonstrate that the proposed MAC protocol, called traffic- adaptive priority-based MAC (TAP-MAC, achieves low energy consumption, high throughput, and low latency compared to the IEEE 802.15.4 standard, and the most recent priority-based MAC protocol, called priority-based MAC protocol (PA-MAC.

  2. Accounting for Energy Cost When Designing Energy-Efficient Wireless Access Networks

    Directory of Open Access Journals (Sweden)

    Greta Vallero

    2018-03-01

    Full Text Available Because of the increase of the data traffic demand, wireless access networks, through which users access telecommunication services, have expanded, in terms of size and of capability and, consequently, in terms of power consumption. Therefore, costs to buy the necessary power for the supply of base stations of those networks is becoming very high, impacting the communication cost. In this study, strategies to reduce the amount of money spent for the purchase of the energy consumed by the base stations are proposed for a network powered by solar panels, energy batteries and the power grid. First, the variability of the energy prices is exploited. It provides a cost reduction of up to 30%, when energy is bought in advance. If a part of the base stations is deactivated when the energy price is higher than a given threshold, a compromise between the energy cost and the user coverage drop is needed. In the simulated scenario, the necessary energy cost can be reduced by more than 40%, preserving the user coverage by greater than 94%. Second, the network is introduced to the energy market: it buys and sells energy from/to the traditional power grid. Finally, costs are reduced by the reduction of power consumption of the network, achieved by using microcell base stations. In the considered scenario, up to a 31% cost reduction is obtained, without the deterioration of the quality of service, but a huge Capex expenditure is required.

  3. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    Science.gov (United States)

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  4. Evolution of Network Access Points (NAPs and agreements among Internet Service Providers (ISPs in South America

    Directory of Open Access Journals (Sweden)

    Fernando Beltrán

    2006-05-01

    Full Text Available Este artículo presenta los aspectos principales del desarrollo histórico y de asuntos actuales en el mercado suramericano de acceso a Internet: los acuerdos de interconexión para el intercambio de tráfico local y regional en Suramérica, los incentivos que tienen los proveedores de acceso a Internet para mantener o modificar la naturaleza de los acuerdos y los métodos de recuperación de costos en los puntos de intercambio de tráfico. El artículo también identifica algunas amenazas a la estabilidad de los puntos de intercambio de tráfico y las ilustra con dos casos. / This paper presents the main aspects of the historical development and the current issues at stake in the South American Internet access market: the interconnection schemes for the exchange of local and regional traffic in the South American region, the incentives Internet access providers have for keeping or modifying the nature of the agreements, and the cost recovery methods at the traffic exchange points. Some threats to the stability of the scheme for domestic traffic exchange adopted throughout the region are also identified and subsequently illustrated with country-cases.

  5. Security analysis and improvements of authentication and access control in the Internet of Things.

    Science.gov (United States)

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  6. Self-configuration without commissioning for wireless Internet of Things using subjective logic

    NARCIS (Netherlands)

    Ozcelebi, T.; Lukkien, J.; Kraaij, B. van; Brock, M.

    2018-01-01

    Internet of Things (IoT) applications need commissioning and configuring of the IoT infrastructure that is comprised of devices called `Things'. In some cases, e.g. for an intelligent street lighting infrastructure in a city, we are looking at tens of thousands of Things that need to be commissioned

  7. Self-configuration without commissioning for wireless Internet of Things using subjective logic

    NARCIS (Netherlands)

    Ozcelebi, Tanir; Lukkien, Johan; Van Kraaij, Bert; Brock, Maarten

    2018-01-01

    Internet of Things (IoT) applications need commissioning and configuring of the IoT infrastructure that is comprised of devices called 'Things'. In some cases, e.g. for an intelligent street lighting infrastructure in a city, we are looking at tens of thousands of Things that need to be commissioned

  8. Providing India with Internet access anywhere there is electricity - and Canada with commercial opportunity

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    Access to high-speed Internet service is booming all over the world but the cost of optic cable installation and other related broadband delivery technology is still too high for many developing countries to afford. A Canada-India R & D group is working on a broadband technology delivered over the power line in order to provide internet access wherever there is electricity. Moreover, the application of such a technology in rural India could also improve the distribution and management of India's national electrical grid, as the risk of electricity theft can be monitored by power assumption tracking. Since the required infrastructure is already in place across the country, this project could be deployed rapidly and in a cost-efficient manner, providing thousands of potential opportunities for rural dwellers as well as for Indian and international companies.

  9. Black Open Access in Ukraine: Analysis of Downloading Sci-Hub Publications by Ukrainian Internet Users

    OpenAIRE

    Nazarovets, Serhii

    2018-01-01

    Introduction. High subscription fees to scholarly research journals provoke researchers to use illegal channels of access to scientific information. Analysis of statistical data on downloads of scholarly research papers by Ukrainian Internet users from illegal web resource can help to define gaps in information provision at the institutional or the state level for each scientific field. Problem Statement. To conduct an analysis of behavior and geography of downloads of scholarly research p...

  10. SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet access

    OpenAIRE

    Boudguiga , Aymen; Quesnel , Flavien; Bouzerna , Nabil

    2017-01-01

    International audience; A blockchain infrastructure, combined with cryptographic signatures, can improve availability and accountability for the deployment of IoT updates.However, cars with limited or intermittent Internet access may have difficulties in downloading full updates fromthe blockchain. Therefore, we allow cars that successfully downloaded updates to share them with other cars by means of a Peer-to-Peer (P2P) mechanism.

  11. Opportunity for All: How the American Public Benefits from Internet Access at U.S. Libraries

    Science.gov (United States)

    Becker, Samantha; Crandall, Michael D.; Fisher, Karen E.; Kinney, Bo; Landry, Carol; Rocha, Anita

    2010-01-01

    Over the past decade and a half, free access to computers and the Internet in U.S. public libraries evolved from a rare commodity into a core service. Now, people from all walks of life rely on this service every day to look for jobs, find health care, and read the latest news. As the nation struggled through a historic recession, nearly one-third…

  12. Associations among Different Internet Access Time, Gender and Cyberbullying Behaviors in Taiwan?s Adolescents

    OpenAIRE

    Chao, Cheng-Min; Yu, Tai-Kuei

    2017-01-01

    With the increasing convenience of social networking sites and their interconnectedness with human interaction, verbal and image bullying have turned digital, making cyberbullying a new form of bullying attracting the attention of researchers, social workers, and schools. This study focuses on the status quo of attitude toward cyberbullying and cyberbullying behavior, explores associations of attitude toward behavior on cyberbullying behavior in gender and different internet access times. In ...

  13. An Internet of Things Based Multi-Level Privacy-Preserving Access Control for Smart Living

    Directory of Open Access Journals (Sweden)

    Usama Salama

    2018-05-01

    Full Text Available The presence of the Internet of Things (IoT in healthcare through the use of mobile medical applications and wearable devices allows patients to capture their healthcare data and enables healthcare professionals to be up-to-date with a patient’s status. Ambient Assisted Living (AAL, which is considered as one of the major applications of IoT, is a home environment augmented with embedded ambient sensors to help improve an individual’s quality of life. This domain faces major challenges in providing safety and security when accessing sensitive health data. This paper presents an access control framework for AAL which considers multi-level access and privacy preservation. We focus on two major points: (1 how to use the data collected from ambient sensors and biometric sensors to perform the high-level task of activity recognition; and (2 how to secure the collected private healthcare data via effective access control. We achieve multi-level access control by extending Public Key Infrastructure (PKI for secure authentication and utilizing Attribute-Based Access Control (ABAC for authorization. The proposed access control system regulates access to healthcare data by defining policy attributes over healthcare professional groups and data classes classifications. We provide guidelines to classify the data classes and healthcare professional groups and describe security policies to control access to the data classes.

  14. Accessing wound-care information on the Internet: the implications for patients.

    Science.gov (United States)

    Bovill, E S; Hormbrey, E; Gillespie, P H; Banwell, P E

    2001-02-01

    The Internet and the World Wide Web have revolutionised communication and provide a unique forum for the exchange of information. It has been proposed that the Internet has given the public more access to medical information resources and improved patient education. This study assessed the impact of the Internet on the availability of information on wound care management. The search phrases 'wound care', 'wound healing' and 'wounds' were analysed using a powerful Metacrawler search engine (www.go2net.com). Web site access was classified according to the target audience (wound-care specialists, other health professionals, patients) and the author (societies, institutions or commercial companies). The largest proportion of web sites were commercially based (32%). Of the total number, 23% specifically targeted patients, mostly by advertising. Only 20% were aimed at wound specialists. Extensive surfing was required to obtain wound-care information, and objective information sites were under-represented. Regulated, easily accessible, objective information sites on wound-healing topics are needed for improved patient education and to balance the existing commercial bias.

  15. Assessing internet access and use in a medically underserved population: implications for providing enhanced health information services.

    Science.gov (United States)

    Zach, Lisl; Dalrymple, Prudence W; Rogers, Michelle L; Williver-Farr, Heather

    2012-03-01

    The relationship between health information seeking, patient engagement and health literacy is not well understood. This is especially true in medically underserved populations, which are often viewed as having limited access to health information. To improve communication between an urban health centre and the community it serves, a team of library and information science researchers undertook an assessment of patients' level and methods of access to and use of the Internet. Data were collected in 53 face-to-face anonymous interviews with patients at the centre. Interviews were tape-recorded for referential accuracy, and data were analysed to identify patterns of access and use. Seventy-two percentage of study participants reported having access to the Internet through either computers or cell phones. Barriers to Internet access were predominantly lack of equipment or training rather than lack of interest. Only 21% of those with Internet access reported using the Internet to look for health information. The findings suggest that lack of access to the Internet in itself is not the primary barrier to seeking health information in this population and that the digital divide exists not at the level of information access but rather at the level of information use. © 2011 The authors. Health Information and Libraries Journal © 2011 Health Libraries Group.

  16. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2013-01-01

    In the last few years the Internet of Things (IoT) has seen widespread application and can be found in each field. Authentication and access control are important and critical functionalities in the context of IoT to enable secure communication between devices. Mobility, dynamic network topology...... and weak physical security of low power devices in IoT networks are possible sources for security vulnerabilities. It is promising to make an authentication and access control attack resistant and lightweight in a resource constrained and distributed IoT environment. This paper presents the Identity...... Authentication and Capability based Access Control (IACAC) model with protocol evaluation and performance analysis. To protect IoT from man-in-the-middle, replay and denial of service (Dos) attacks, the concept of capability for access control is introduced. The novelty of this model is that, it presents...

  17. Internet Of Things(IoTs) Enable Decoder Design For Wireless Sensor Network

    DEFF Research Database (Denmark)

    Madhok, Shivani; Mahajan, Ritika; Hussain, Dil muhammed Akbar

    2015-01-01

    temperature, heat sink profile and airflow then proceeding forward to plot the characteristics between power and ambient temperature, junction temperature and ambient temperature.As we are dealing with internet of things, we need an IP address to link with our decoder so in our code we have taken 2 inputs one...... for IPv6(Internet Protocol version 6) and other for a 6-bit input. Through IPv6 port, we can embed IP Address and can read it from our output pin that is IPAddress. We can allot an IP Address to our decoder and can command it’s working as we wish. There is 26-77% saving in power dissipation. In that way...

  18. Design and implementation of an Internet based effective controlling and monitoring system with wireless fieldbus communications technologies for process automation--an experimental study.

    Science.gov (United States)

    Cetinceviz, Yucel; Bayindir, Ramazan

    2012-05-01

    The network requirements of control systems in industrial applications increase day by day. The Internet based control system and various fieldbus systems have been designed in order to meet these requirements. This paper describes an Internet based control system with wireless fieldbus communication designed for distributed processes. The system was implemented as an experimental setup in a laboratory. In industrial facilities, the process control layer and the distance connection of the distributed control devices in the lowest levels of the industrial production environment are provided with fieldbus networks. In this paper, the Internet based control system that will be able to meet the system requirements with a new-generation communication structure, which is called wired/wireless hybrid system, has been designed on field level and carried out to cover all sectors of distributed automation, from process control, to distributed input/output (I/O). The system has been accomplished by hardware structure with a programmable logic controller (PLC), a communication processor (CP) module, two industrial wireless modules and a distributed I/O module, Motor Protection Package (MPP) and software structure with WinCC flexible program used for the screen of Scada (Supervisory Control And Data Acquisition), SIMATIC MANAGER package program ("STEP7") used for the hardware and network configuration and also for downloading control program to PLC. Copyright © 2012 ISA. Published by Elsevier Ltd. All rights reserved.

  19. Internet accessible hot cell with gamma spectroscopy at the Missouri S and T nuclear reactor

    Energy Technology Data Exchange (ETDEWEB)

    Grant, Edwin [Nuclear Engineering, Missouri University of Science and Technology, 203 Fulton Hall, 300 W. 13th St., Rolla, MO 65409 (United States); Mueller, Gary, E-mail: gmueller@mst.edu [Nuclear Engineering, Missouri University of Science and Technology, 203 Fulton Hall, 300 W. 13th St., Rolla, MO 65409 (United States); Castano, Carlos; Usman, Shoaib; Kumar, Arvind [Nuclear Engineering, Missouri University of Science and Technology, 203 Fulton Hall, 300 W. 13th St., Rolla, MO 65409 (United States)

    2011-08-15

    Highlights: > A dual-chambered internet-accessible heavily shielded facility has been built. > The facility allows distance users to analyze neutron irradiated samples remotely. > The Missouri S and T system uses computer automation with user feedback. > The system can analyze multiple samples and assist several researchers concurrently. - Abstract: A dual-chambered internet-accessible heavily shielded facility with pneumatic access to the University of Missouri Science and Technology (Missouri S and T) 200 kW Research Nuclear Reactor (MSTR) core has been built and is currently available for irradiation and analysis of samples. The facility allows authorized distance users engaged in collaborative activities with Missouri S and T to remotely manipulate and analyze neutron irradiated samples. The system consists of two shielded compartments, one for multiple sample storage, and the other dedicated exclusively for radiation measurements and spectroscopy. The second chamber has multiple detector ports, with graded shielding, and has the capability to support gamma spectroscopy using radiation detectors such as an HPGe detector. Both these chambers are connected though a rapid pneumatic system with access to the MSTR nuclear reactor core. This new internet-based system complements the MSTR's current bare pneumatic tube (BPT) and cadmium lined pneumatic tube (CPT) facilities. The total transportation time between the core and the hot cell, for samples weighing 10 g, irradiated in the MSTR core, is roughly 3.0 s. This work was funded by the DOE grant number DE-FG07-07ID14852 and expands the capabilities of teaching and research at the MSTR. It allows individuals who do not have on-site access to a nuclear reactor facility to remotely participate in research and educational activities.

  20. Internet accessible hot cell with gamma spectroscopy at the Missouri S and T nuclear reactor

    International Nuclear Information System (INIS)

    Grant, Edwin; Mueller, Gary; Castano, Carlos; Usman, Shoaib; Kumar, Arvind

    2011-01-01

    Highlights: → A dual-chambered internet-accessible heavily shielded facility has been built. → The facility allows distance users to analyze neutron irradiated samples remotely. → The Missouri S and T system uses computer automation with user feedback. → The system can analyze multiple samples and assist several researchers concurrently. - Abstract: A dual-chambered internet-accessible heavily shielded facility with pneumatic access to the University of Missouri Science and Technology (Missouri S and T) 200 kW Research Nuclear Reactor (MSTR) core has been built and is currently available for irradiation and analysis of samples. The facility allows authorized distance users engaged in collaborative activities with Missouri S and T to remotely manipulate and analyze neutron irradiated samples. The system consists of two shielded compartments, one for multiple sample storage, and the other dedicated exclusively for radiation measurements and spectroscopy. The second chamber has multiple detector ports, with graded shielding, and has the capability to support gamma spectroscopy using radiation detectors such as an HPGe detector. Both these chambers are connected though a rapid pneumatic system with access to the MSTR nuclear reactor core. This new internet-based system complements the MSTR's current bare pneumatic tube (BPT) and cadmium lined pneumatic tube (CPT) facilities. The total transportation time between the core and the hot cell, for samples weighing 10 g, irradiated in the MSTR core, is roughly 3.0 s. This work was funded by the DOE grant number DE-FG07-07ID14852 and expands the capabilities of teaching and research at the MSTR. It allows individuals who do not have on-site access to a nuclear reactor facility to remotely participate in research and educational activities.

  1. An orthogonal wavelet division multiple-access processor architecture for LTE-advanced wireless/radio-over-fiber systems over heterogeneous networks

    Science.gov (United States)

    Mahapatra, Chinmaya; Leung, Victor CM; Stouraitis, Thanos

    2014-12-01

    The increase in internet traffic, number of users, and availability of mobile devices poses a challenge to wireless technologies. In long-term evolution (LTE) advanced system, heterogeneous networks (HetNet) using centralized coordinated multipoint (CoMP) transmitting radio over optical fibers (LTE A-ROF) have provided a feasible way of satisfying user demands. In this paper, an orthogonal wavelet division multiple-access (OWDMA) processor architecture is proposed, which is shown to be better suited to LTE advanced systems as compared to orthogonal frequency division multiple access (OFDMA) as in LTE systems 3GPP rel.8 (3GPP, http://www.3gpp.org/DynaReport/36300.htm). ROF systems are a viable alternative to satisfy large data demands; hence, the performance in ROF systems is also evaluated. To validate the architecture, the circuit is designed and synthesized on a Xilinx vertex-6 field-programmable gate array (FPGA). The synthesis results show that the circuit performs with a clock period as short as 7.036 ns (i.e., a maximum clock frequency of 142.13 MHz) for transform size of 512. A pipelined version of the architecture reduces the power consumption by approximately 89%. We compare our architecture with similar available architectures for resource utilization and timing and provide performance comparison with OFDMA systems for various quality metrics of communication systems. The OWDMA architecture is found to perform better than OFDMA for bit error rate (BER) performance versus signal-to-noise ratio (SNR) in wireless channel as well as ROF media. It also gives higher throughput and mitigates the bad effect of peak-to-average-power ratio (PAPR).

  2. Access Selection Algorithm of Heterogeneous Wireless Networks for Smart Distribution Grid Based on Entropy-Weight and Rough Set

    Science.gov (United States)

    Xiang, Min; Qu, Qinqin; Chen, Cheng; Tian, Li; Zeng, Lingkang

    2017-11-01

    To improve the reliability of communication service in smart distribution grid (SDG), an access selection algorithm based on dynamic network status and different service types for heterogeneous wireless networks was proposed. The network performance index values were obtained in real time by multimode terminal and the variation trend of index values was analyzed by the growth matrix. The index weights were calculated by entropy-weight and then modified by rough set to get the final weights. Combining the grey relational analysis to sort the candidate networks, and the optimum communication network is selected. Simulation results show that the proposed algorithm can implement dynamically access selection in heterogeneous wireless networks of SDG effectively and reduce the network blocking probability.

  3. 36 CFR 1254.32 - What rules apply to public access use of the Internet on NARA-supplied computers?

    Science.gov (United States)

    2010-07-01

    ... access use of the Internet on NARA-supplied computers? 1254.32 Section 1254.32 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION PUBLIC AVAILABILITY AND USE USING RECORDS AND DONATED... for Internet use in all NARA research rooms. The number of workstations varies per location. We...

  4. Parity-Check Network Coding for Multiple Access Relay Channel in Wireless Sensor Cooperative Communications

    Directory of Open Access Journals (Sweden)

    Du Bing

    2010-01-01

    Full Text Available A recently developed theory suggests that network coding is a generalization of source coding and channel coding and thus yields a significant performance improvement in terms of throughput and spatial diversity. This paper proposes a cooperative design of a parity-check network coding scheme in the context of a two-source multiple access relay channel (MARC model, a common compact model in hierarchical wireless sensor networks (WSNs. The scheme uses Low-Density Parity-Check (LDPC as the surrogate to build up a layered structure which encapsulates the multiple constituent LDPC codes in the source and relay nodes. Specifically, the relay node decodes the messages from two sources, which are used to generate extra parity-check bits by a random network coding procedure to fill up the rate gap between Source-Relay and Source-Destination transmissions. Then, we derived the key algebraic relationships among multidimensional LDPC constituent codes as one of the constraints for code profile optimization. These extra check bits are sent to the destination to realize a cooperative diversity as well as to approach MARC decode-and-forward (DF capacity.

  5. Intrusion detection and monitoring for wireless networks.

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.; Stephano, Amanda (Indiana University); Tabriz, Parisa (University of Illinois at Urbana-Champaign); Pelon, Kristen (Cedarville University); McCoy, Damon (University of Colorado, Boulder); Lodato, Mark (Lafayette College); Hemingway, Franklin (University of New Mexico); Custer, Ryan P.; Averin, Dimitry (Polytechnic University); Franklin, Jason (Carnegie Mellon University); Kilman, Dominique Marie

    2005-11-01

    Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wireless networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more

  6. Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things

    Directory of Open Access Journals (Sweden)

    Anup Kumar Maurya

    2017-10-01

    Full Text Available To improve the quality of service and reduce the possibility of security attacks, a secure and efficient user authentication mechanism is required for Wireless Sensor Networks (WSNs and the Internet of Things (IoT. Session key establishment between the sensor node and the user is also required for secure communication. In this paper, we perform the security analysis of A.K.Das’s user authentication scheme (given in 2015, Choi et al.’s scheme (given in 2016, and Park et al.’s scheme (given in 2016. The security analysis shows that their schemes are vulnerable to various attacks like user impersonation attack, sensor node impersonation attack and attacks based on legitimate users. Based on the cryptanalysis of these existing protocols, we propose a secure and efficient authenticated session key establishment protocol which ensures various security features and overcomes the drawbacks of existing protocols. The formal and informal security analysis indicates that the proposed protocol withstands the various security vulnerabilities involved in WSNs. The automated validation using AVISPA and Scyther tool ensures the absence of security attacks in our scheme. The logical verification using the Burrows-Abadi-Needham (BAN logic confirms the correctness of the proposed protocol. Finally, the comparative analysis based on computational overhead and security features of other existing protocol indicate that the proposed user authentication system is secure and efficient. In future, we intend to implement the proposed protocol in real-world applications of WSNs and IoT.

  7. A federated capability-based access control mechanism for internet of things (IoTs)

    Science.gov (United States)

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-05-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.

  8. Medium access control and network layer design for 60 GHz wireless personal area networks

    NARCIS (Netherlands)

    An, X.

    2010-01-01

    The unlicensed frequency band around 60 GHz is a very promising spectrum due to its potential to provide multiple gigabits per second based data rates for short range wireless communication. Hence, 60 GHz radio is an attractive candidate to enable ultra high rate Wireless Personal Area Networks

  9. Secure Your Wireless Network: Going Wireless Comes with Its Own Special Set of Security Concerns

    Science.gov (United States)

    Bloomquist, Jane; Musa, Atif

    2004-01-01

    Imagine a completely wireless school, an open network in which all students and staff can roam around using laptops or handheld computers to browse the Internet, access files and applications on the school server, and communicate with each other and the world via e-mail. It's a great picture--and at some schools the future is already here. But…

  10. Data Access Based on a Guide Map of the Underwater Wireless Sensor Network.

    Science.gov (United States)

    Wei, Zhengxian; Song, Min; Yin, Guisheng; Song, Houbing; Wang, Hongbin; Ma, Xuefei; Cheng, Albert M K

    2017-10-17

    Underwater wireless sensor networks (UWSNs) represent an area of increasing research interest, as data storage, discovery, and query of UWSNs are always challenging issues. In this paper, a data access based on a guide map (DAGM) method is proposed for UWSNs. In DAGM, the metadata describes the abstracts of data content and the storage location. The center ring is composed of nodes according to the shortest average data query path in the network in order to store the metadata, and the data guide map organizes, diffuses and synchronizes the metadata in the center ring, providing the most time-saving and energy-efficient data query service for the user. For this method, firstly the data is stored in the UWSN. The storage node is determined, the data is transmitted from the sensor node (data generation source) to the storage node, and the metadata is generated for it. Then, the metadata is sent to the center ring node that is the nearest to the storage node and the data guide map organizes the metadata, diffusing and synchronizing it to the other center ring nodes. Finally, when there is query data in any user node, the data guide map will select a center ring node nearest to the user to process the query sentence, and based on the shortest transmission delay and lowest energy consumption, data transmission routing is generated according to the storage location abstract in the metadata. Hence, specific application data transmission from the storage node to the user is completed. The simulation results demonstrate that DAGM has advantages with respect to data access time and network energy consumption.

  11. An Efficient Radio Access Control Mechanism for Wireless Network-On-Chip Architectures

    Directory of Open Access Journals (Sweden)

    Maurizio Palesi

    2015-03-01

    Full Text Available Modern systems-on-chip (SoCs today contain hundreds of cores, and this number is predicted to reach the thousands by the year 2020. As the number of communicating elements increases, there is a need for an efficient, scalable and reliable communication infrastructure. As technology geometries shrink to the deep submicron regime, however, the communication delay and power consumption of global interconnections become the major bottleneck. The network-on-chip (NoC design paradigm, based on a modular packet-switched mechanism, can address many of the on-chip communication issues, such as the performance limitations of long interconnects and integration of large number of cores on a chip. Recently, new communication technologies based on the NoC concept have emerged with the aim of improving the scalability limitations of conventional NoC-based architectures. Among them, wireless NoCs (WiNoCs use the radio medium for reducing the performance and energy penalties of long-range and multi-hop communications. As the radio medium can be accessed by a single transmitter at a time, a radio access control mechanism (RACM is needed. In this paper, we present a novel RACM, which allows one to improve both the performance and energy figures of the WiNoC. Experiments, carried out on both synthetic and real traffic scenarios, have shown the effectiveness of the proposed RACM. On average, a 30% reduction in communication delay and a 25% energy savings have been observed when the proposed RACM is applied to a known WiNoC architecture.

  12. Insecurity of Wireless Networks

    Energy Technology Data Exchange (ETDEWEB)

    Sheldon, Frederick T [ORNL; Weber, John Mark [Dynetics, Inc.; Yoo, Seong-Moo [University of Alabama, Huntsville; Pan, W. David [University of Alabama, Huntsville

    2012-01-01

    Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA, allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.

  13. Increasing operations profitability using an end-to-end, wireless internet, gas monitoring system

    Energy Technology Data Exchange (ETDEWEB)

    McDougall, M. [Northrock Resources Ltd., AB (Canada); Benterud, K. [zed.i solutions, inc., Calgary, AB (Canada)

    2004-10-01

    Implementation by Northrock Resources Ltd., a wholly-owned subsidiary of Unocal Corporation, of a fully integrated end-to-end gas measurement and production analysis system, is discussed. The system, dubbed Smart-Alek(TM), utilizes public wireless communications and a web browser only delivery system to provide seamless well visibility to a desk-top computer. Smart-Alek(TM) is an example of a new type of end-to-end electronic gas flow measurement system, known as FINE(TM), which is an acronym for Field Intelligence Network and End-User Interface. The system delivers easy-to-use, complete, reliable and cost effective production information, far more effective than is possible to obtain with conventional SCADA technology. By installing the system, Northrock was able to increase gas volumes with more accurate electronic flow measurement in place of mechanical charts, with very low technical maintenance, and at a reduced operating cost. It is emphasized that deploying the technology alone will produce only partial benefits; to realize full benefits it is also essential to change grass roots operating practices, aiming at timely decision-making at the field level. 5 refs., 5 figs.

  14. Performance evaluation of modulation and multiple access schemes in ultraviolet optical wireless connections for two atmosphere thickness cases.

    Science.gov (United States)

    Raptis, Nikos; Pikasis, Evangelos; Syvridis, Dimitris

    2016-08-01

    The exploitation of optical wireless communication channels in a non-line-of-sight regime is studied for point-to-point and networking configurations considering the use of light-emitting diodes. Two environments with different scattering center densities are considered, assuming operation at 265 nm. The bit error rate performance of both pulsed and multicarrier modulation schemes is examined, using numerical approaches. In the networking scenario, a central node only receives data, one node transmits useful data, and the rest of them act as interferers. The performance of the desirable node's transmissions is evaluated. The access to the medium is controlled by a code division multiple access scheme.

  15. Wireless robot teleoperation via internet using IPv6 over a bluetooth personal area network

    Directory of Open Access Journals (Sweden)

    Carlos Araque Rodríguez

    2010-01-01

    Full Text Available En este artículo se presenta el diseño, construcción y pruebas de un sistema que permite la manipulación y visualización del robot Microbot Teachmover usando una conexión inalámbrica Bluetooth con dirección IPv6, brindando la posibilidad de manejar el robot desde diferentes escenarios: desde un dispositivo móvil que se encuentra en la misma piconet del robot; desde un computador que se encuentre en la misma piconet del robot y desde un computador que se encuentre conectado a Internet con una dirección IPv6.

  16. Data security issues arising from integration of wireless access into healthcare networks.

    Science.gov (United States)

    Frenzel, John C

    2003-04-01

    The versatility of having Ethernet speed connectivity without wires is rapidly driving adoption of wireless data networking by end users across all types of industry. Designed to be easy to configure and work among diverse platforms, wireless brings online data to mobile users. This functionality is particularly useful in modern clinical medicine. Wireless presents operators of networks containing or transmitting sensitive and confidential data with several new types of security vulnerabilities, and potentially opens previously protected core network resources to outside attack. Herein, we review the types of vulnerabilities, the tools necessary to exploit them, and strategies to thwart a successful attack.

  17. Cross-layer optimization of wireless multi-hop networks

    OpenAIRE

    Soldati, Pablo

    2007-01-01

    The interest in wireless communications has grown constantly for the past decades, leading to an enormous number of applications and services embraced by billions of users. In order to meet the increasing demand for mobile Internet access, several high data-rate radio networking technologies have been proposed to offer wide area high-speed wireless communications, eventually replacing fixed (wired) networks for many applications. This thesis considers cross-layer optimization of multi-hop rad...

  18. Seamless and secure communications over heterogeneous wireless networks

    CERN Document Server

    Cao, Jiannong

    2014-01-01

    This brief provides an overview of the requirements, challenges, design issues and major techniques for seamless and secure communications over heterogeneous wireless networks. It summarizes and provides detailed insights into the latest research on handoff management, mobility management, fast authentication and security management to support seamless and secure roaming for mobile clients. The reader will also learn about the challenges in developing relevant technologies and providing ubiquitous Internet access over heterogeneous wireless networks. The authors have extensive experience in im

  19. Medium access control and hardware prototype designs for low-energy wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Kohvakka, M.

    2009-07-01

    A Wireless Sensor Network (WSN) is an emerging technology consisting of small, cheap, and ultra-low energy sensor nodes, which cooperatively monitor physical quantities, actuate, and perform data processing tasks. A deployment may comprise thousands of randomly distributed autonomous nodes, which must self-configure and create a multi-hop network topology.This thesis focuses on low-energy WSNs targeting to long network lifetime. The main research problem is the combination of adaptive and scalable multi-hop networking with constrained energy budget, processing power, and communication bandwidth. The research problem is approached by energy-efficient protocols and low-power sensor node platforms. The main contribution of this thesis is an energy-efficient Medium Access Control (MAC) design for TUTWSN (Tampere University of Technology Wireless Sensor Network). The design comprises channel access and networking mechanisms, which specify data exchange, link synchronization, network self-configuration, and neighbor discovery operations. The second outcome are several low-power sensor node platforms, which have been designed and implemented to evaluate the performance of the MAC design and hardware components in real deployments. The third outcome are the performance models and analysis of several MAC designs including TUTWSN, IEEE 802.15.4, and the most essential research proposals.The results and conclusion of this Thesis indicate that it is possible to implement multi-hop WSNs in harsh and dynamic operation conditions with years of lifetime using current low-cost components and batteries. Energy analysis results indicate that the lowest energy consumption is achieved by using simple and high data-rate transceivers. It is also critical to minimize sleep mode power consumption of all components and to use accurate wake-up timers. However, the selection of components constitutes only a minor part of the solution, and an energy-efficient MAC layer design being able to

  20. Prospective evaluation of an internet-linked handheld computer critical care knowledge access system.

    Science.gov (United States)

    Lapinsky, Stephen E; Wax, Randy; Showalter, Randy; Martinez-Motta, J Carlos; Hallett, David; Mehta, Sangeeta; Burry, Lisa; Stewart, Thomas E

    2004-12-01

    Critical care physicians may benefit from immediate access to medical reference material. We evaluated the feasibility and potential benefits of a handheld computer based knowledge access system linking a central academic intensive care unit (ICU) to multiple community-based ICUs. Four community hospital ICUs with 17 physicians participated in this prospective interventional study. Following training in the use of an internet-linked, updateable handheld computer knowledge access system, the physicians used the handheld devices in their clinical environment for a 12-month intervention period. Feasibility of the system was evaluated by tracking use of the handheld computer and by conducting surveys and focus group discussions. Before and after the intervention period, participants underwent simulated patient care scenarios designed to evaluate the information sources they accessed, as well as the speed and quality of their decision making. Participants generated admission orders during each scenario, which were scored by blinded evaluators. Ten physicians (59%) used the system regularly, predominantly for nonmedical applications (median 32.8/month, interquartile range [IQR] 28.3-126.8), with medical software accessed less often (median 9/month, IQR 3.7-13.7). Eight out of 13 physicians (62%) who completed the final scenarios chose to use the handheld computer for information access. The median time to access information on the handheld handheld computer was 19 s (IQR 15-40 s). This group exhibited a significant improvement in admission order score as compared with those who used other resources (P = 0.018). Benefits and barriers to use of this technology were identified. An updateable handheld computer system is feasible as a means of point-of-care access to medical reference material and may improve clinical decision making. However, during the study, acceptance of the system was variable. Improved training and new technology may overcome some of the barriers we

  1. [Exploration of the design of media access control layer of wireless body area network for medical healthcare].

    Science.gov (United States)

    Liu, Xuemei; Ge, Baofeng

    2012-04-01

    This paper proposes a media access control (MAC) layer design for wireless body area network (WBAN) systems. WBAN is a technology that targets for wireless networking of wearable and implantable body sensors which monitor vital body signs, such as heart-rate, body temperature, blood pressure, etc. It has been receiving attentions from international organizations, e. g. the Institute of Electrical and Electronics Engineers (IEEE), due to its capability of providing efficient healthcare services and clinical management. This paper reviews the standardization procedure of WBAN and summarizes the challenge of the MAC layer design. It also discusses the methods of improving power consumption performance, which is one of the major issues of WBAN systems.

  2. Consumer access to health information on the internet: health policy implications.

    Science.gov (United States)

    Scott, W Guy; Scott, Helen M; Auld, Terry S

    2005-06-28

    Providers of health care usually have much better information about health and health care interventions than do consumers. The internet is an important and rapidly evolving source of global health-related information and could provide a means of correcting for asymmetric information. However, little is known about who accesses this information and how it is used in New Zealand. The aims of this research were to: determine the nature of the health information sought, how respondents use the information, how helpful they perceive the information to be, and the self-assessed value of such information. The researchers conducted an anonymous five minute telephone and mall intercept survey of randomly selected Wellington residents who had searched for health-related information on the internet. Investigators entered the data into an Excel spreadsheet and transferred it to SPSS for data cleaning, data exploration and statistical analysis. Search time costs were based on the opportunity cost of income foregone and respondents were asked to provide a money value for the information found. Eighty-three percent of respondents accessed the internet from home, and 87% conducted the search for themselves. Forty-five percent of people were looking for general health and nutrition information, 42% for data about a specific illness and 40% for a medicine. After finding the information, 58% discussed it with a family member/friend/workmate, 36% consulted a general practitioner, 33% changed their eating or drinking habits, and 13% did nothing. Respondents found the information very quick to find and useful. It took them on average 0.47 hours and cost $12 (opportunity cost of time) to find the information. The average value of the data found was $60 and the net benefit to the consumer was $48 ($60 - $12). The results of this research could assist providers of health information via the internet to tailor their websites to better suit users' needs. Given the high perceived value of

  3. Associations among Different Internet Access Time, Gender and Cyberbullying Behaviors in Taiwan’s Adolescents

    Science.gov (United States)

    Chao, Cheng-Min; Yu, Tai-Kuei

    2017-01-01

    With the increasing convenience of social networking sites and their interconnectedness with human interaction, verbal and image bullying have turned digital, making cyberbullying a new form of bullying attracting the attention of researchers, social workers, and schools. This study focuses on the status quo of attitude toward cyberbullying and cyberbullying behavior, explores associations of attitude toward behavior on cyberbullying behavior in gender and different internet access times. In a cross-sectional survey, adolescents were surveyed through self-report questionnaires, 13,864 respondents were received among 150 high schools in Taiwan. Statistical analyses were performed using structural equation modeling (SEM). The study revealed that attitude toward cyberbullying has a direct effect on cyberbullying behavior; among the greatest direct impact were when students use the Internet during the time frame 10:00–14:00. Parents and schoolteachers pay special attention to students using the Internet during this time frame 10:00–14:00 and give guidance, express care, and help those being bullied to communicate and use the Internet in a correct manner. Among genders, male student attitude toward behavior has a greater effect than those of female students. Both male and female students know what cyberbullying is and have witnessed, heard of, or personally encountered cyberbullying behavior. We recommend students talk to parents or teachers or other people who care to reduce the negative effects of cyberbullying. We hopeful that the conceptualization model presented in this study serves as an activator for researches on attitude toward cyberbullying and cyberbullying behavior, and serves a guide and a call to attract more researches in this area. PMID:28713309

  4. Associations among Different Internet Access Time, Gender and Cyberbullying Behaviors in Taiwan’s Adolescents

    Directory of Open Access Journals (Sweden)

    Cheng-Min Chao

    2017-06-01

    Full Text Available With the increasing convenience of social networking sites and their interconnectedness with human interaction, verbal and image bullying have turned digital, making cyberbullying a new form of bullying attracting the attention of researchers, social workers, and schools. This study focuses on the status quo of attitude toward cyberbullying and cyberbullying behavior, explores associations of attitude toward behavior on cyberbullying behavior in gender and different internet access times. In a cross-sectional survey, adolescents were surveyed through self-report questionnaires, 13,864 respondents were received among 150 high schools in Taiwan. Statistical analyses were performed using structural equation modeling (SEM. The study revealed that attitude toward cyberbullying has a direct effect on cyberbullying behavior; among the greatest direct impact were when students use the Internet during the time frame 10:00–14:00. Parents and schoolteachers pay special attention to students using the Internet during this time frame 10:00–14:00 and give guidance, express care, and help those being bullied to communicate and use the Internet in a correct manner. Among genders, male student attitude toward behavior has a greater effect than those of female students. Both male and female students know what cyberbullying is and have witnessed, heard of, or personally encountered cyberbullying behavior. We recommend students talk to parents or teachers or other people who care to reduce the negative effects of cyberbullying. We hopeful that the conceptualization model presented in this study serves as an activator for researches on attitude toward cyberbullying and cyberbullying behavior, and serves a guide and a call to attract more researches in this area.

  5. Internet

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    微软想要统治Internet,Windows XP就是这个计划中的一个组成部分。微软已经努力争取提供连接Internet的最方便、最完整的方法。新的操作系统含有Internet Explorer 6(IE6)、新的保密功能以及防火墙保护。Windows XP甚至包含有一个Macromedia Flash播放器插件。但是对Sun微系统公司的打击就是

  6. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    Science.gov (United States)

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  7. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    Science.gov (United States)

    Razaque, Abdul; Elleithy, Khaled M

    2014-03-12

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  8. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Abdul Razaque

    2014-03-01

    Full Text Available This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC for wireless sensor networks (WSNs, which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN, which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS, which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS, which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  9. Using Internet of Things inspired wireless sensor networks to monitor cryospheric processes

    Science.gov (United States)

    Hart, J. K.; Martinez, K.

    2017-12-01

    In order to understand how modern climate change is effecting cryospheric environments we need to monitor these remote environments. There are few measurements of current day conditions because of the logistical difficulties. In particular, the whole year needs to be monitored, as well as accessing challenging environments (such as beneath the glacier). We demonstrate from Norway, Iceland and Scotland how embedded sensors along with geophysical (GPR)and surveying data (dGPS, TLS, UAV and time-lapse photography) can be used to investigate recent dramatic environmental changes associated with climate change. This includes: i) a comparison between stable and unstable glacier retreat (the subglacial hydrology, glacier motion, englacial structure and till behaviour of a rapid subaqueous glacier break-up compared with slower terrestrial retreat); and iii) an investigation of future ground stability and greenhouse gas release associated with periglacial conditions.

  10. Accessing suicide-related information on the internet: a retrospective observational study of search behavior.

    Science.gov (United States)

    Wong, Paul Wai-Ching; Fu, King-Wa; Yau, Rickey Sai-Pong; Ma, Helen Hei-Man; Law, Yik-Wa; Chang, Shu-Sen; Yip, Paul Siu-Fai

    2013-01-11

    The Internet's potential impact on suicide is of major public health interest as easy online access to pro-suicide information or specific suicide methods may increase suicide risk among vulnerable Internet users. Little is known, however, about users' actual searching and browsing behaviors of online suicide-related information. To investigate what webpages people actually clicked on after searching with suicide-related queries on a search engine and to examine what queries people used to get access to pro-suicide websites. A retrospective observational study was done. We used a web search dataset released by America Online (AOL). The dataset was randomly sampled from all AOL subscribers' web queries between March and May 2006 and generated by 657,000 service subscribers. We found 5526 search queries (0.026%, 5526/21,000,000) that included the keyword "suicide". The 5526 search queries included 1586 different search terms and were generated by 1625 unique subscribers (0.25%, 1625/657,000). Of these queries, 61.38% (3392/5526) were followed by users clicking on a search result. Of these 3392 queries, 1344 (39.62%) webpages were clicked on by 930 unique users but only 1314 of those webpages were accessible during the study period. Each clicked-through webpage was classified into 11 categories. The categories of the most visited webpages were: entertainment (30.13%; 396/1314), scientific information (18.31%; 240/1314), and community resources (14.53%; 191/1314). Among the 1314 accessed webpages, we could identify only two pro-suicide websites. We found that the search terms used to access these sites included "commiting suicide with a gas oven", "hairless goat", "pictures of murder by strangulation", and "photo of a severe burn". A limitation of our study is that the database may be dated and confined to mainly English webpages. Searching or browsing suicide-related or pro-suicide webpages was uncommon, although a small group of users did access websites that contain

  11. Accessing data transfer reliability for duty cycled mobile wireless sensor network

    International Nuclear Information System (INIS)

    Shaikh, F.K.

    2014-01-01

    Mobility in WSNs (Wireless Sensor Networks) introduces significant challenges which do not arise in static WSNs. Reliable data transport is an important aspect of attaining consistency and QoS (Quality of Service) in several applications of MWSNs (Mobile Wireless Sensor Networks). It is important to understand how each of the wireless sensor networking characteristics such as duty cycling, collisions, contention and mobility affects the reliability of data transfer. If reliability is not managed well, the MWSN can suffer from overheads which reduce its applicability in the real world. In this paper, reliability assessment is being studied by deploying MWSN in different indoor and outdoor scenarios with various duty cycles of the motes and speeds of the mobile mote. Results show that the reliability is greatly affected by the duty cycled motes and the mobility using inherent broadcast mechanisms. (author)

  12. Hands-On Open Access Broadband Wireless Technology Lab Mapping Course Outcomes to Lab Experiments

    Directory of Open Access Journals (Sweden)

    Yazan Alqudah

    2012-10-01

    Full Text Available The unprecedented growth in wireless communication is offering opportunities and challenges for educators. Thanks to technology advances and job opportunities, more and more students are interested in wireless communications courses. However, bridging the gap between classroom and real-world experience remains a challenge. Advanced undergraduate communications courses typically focus more on theory. Some courses are given online, and lack hands-on experiments. Driven by feedback from industry and students, we propose practical laboratory experiments that attempt to bridge the gap between classroom and real world. The laboratory exercises take advantage of the infrastructure of deployed wireless networks and allow students to measure, and analyze data, as well as to interact. The proposed labs can be used even in online courses. This paper describes the experiments proposed, the procedures and typical results. The experiments are tied to course objective.

  13. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    Science.gov (United States)

    Ray, Surjya Sarathi

    One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period

  14. Web based dosimetry system for reading and monitoring dose through internet access

    International Nuclear Information System (INIS)

    Perle, S.C.; Bennett, K.; Kahilainen, J.; Vuotila, M.

    2010-01-01

    The Instadose TM dosemeter from Mirion Technologies is a small, rugged device based on patented direct ion storage technology and is accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) through NIST, bringing radiation monitoring into the digital age. Smaller than a flash drive, this dosemeter provides an instant read-out when connected to any computer with internet access and a USB connection. Instadose devices provide radiation workers with more flexibility than today's dosemeters. Non Volatile Analog Memory Cell surrounded by a Gas Filled Ion Chamber. Dose changes the amount of Electric Charge in the DIS Analog Memory. The total charge storage capacity of the memory determines the available dose range. The state of the Analog Memory is determined by measuring the voltage across the memory cell. AMP (Account Management Program) provides secure real time access to account details, device assignments, reports and all pertinent account information. Access can be restricted based on the role assignment assigned to an individual. A variety of reports are available for download and customizing. The Advantages of the Instadose dosemeter are: - Unlimited reading capability, - Concerns about a possible exposure can be addressed immediately, - Re-readability without loss of exposure data, with cumulative exposure maintained. (authors)

  15. Web based dosimetry system for reading and monitoring dose through internet access

    Energy Technology Data Exchange (ETDEWEB)

    Perle, S.C.; Bennett, K.; Kahilainen, J.; Vuotila, M. [Mirion Technologies (United States); Mirion Technologies (Finland)

    2010-07-01

    The Instadose{sup TM} dosemeter from Mirion Technologies is a small, rugged device based on patented direct ion storage technology and is accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) through NIST, bringing radiation monitoring into the digital age. Smaller than a flash drive, this dosemeter provides an instant read-out when connected to any computer with internet access and a USB connection. Instadose devices provide radiation workers with more flexibility than today's dosemeters. Non Volatile Analog Memory Cell surrounded by a Gas Filled Ion Chamber. Dose changes the amount of Electric Charge in the DIS Analog Memory. The total charge storage capacity of the memory determines the available dose range. The state of the Analog Memory is determined by measuring the voltage across the memory cell. AMP (Account Management Program) provides secure real time access to account details, device assignments, reports and all pertinent account information. Access can be restricted based on the role assignment assigned to an individual. A variety of reports are available for download and customizing. The Advantages of the Instadose dosemeter are: - Unlimited reading capability, - Concerns about a possible exposure can be addressed immediately, - Re-readability without loss of exposure data, with cumulative exposure maintained. (authors)

  16. Opportunistic-harvesting: RF wireless power transfer scheme for multiple access relays system

    NARCIS (Netherlands)

    Rajaram, A.; Jayakody, D.N.K.; Srinivasan, K.; Chen, B.; Sharma, V.

    2017-01-01

    Wireless communications have become one of the main stake holders on which our contemporary world relies for carrying out many daily activities. In this era, the number of connected devices is increasing rapidly, contemplating not only smart phone, but also growing connectivity of machines, sensors,

  17. Sensors on speaking terms: Schedule-based medium access control protocols for wireless sensor networks

    NARCIS (Netherlands)

    van Hoesel, L.F.W.

    2007-01-01

    Wireless sensor networks make the previously unobservable, observable. The basic idea behind these networks is straightforward: all wires are cut in traditional sensing systems and the sensors are equipped with batteries and radio's to virtually restore the cut wires. The resulting sensors can be

  18. [Readability and internet accessibility of informative documents for spinal cord injury patients in Spanish].

    Science.gov (United States)

    Bea-Muñoz, M; Medina-Sánchez, M; Flórez-García, M T

    2015-01-01

    Patients with spinal cord injuries and their carers have access to leaflets on Internet that they can use as educational material to complement traditional forms of education. The aim of this study is to evaluate the readability of informative documents in Spanish, obtained from Internet and aimed at patients with spinal cord injuries. A search was made with the Google search engine using the following key words: recommendation, advice, guide, manual, self-care, education and information, adding spinal cord injury, paraplegia and tetraplegia to each of the terms. We analyzed the first 50 results of each search. The readability of the leaflets was studied with the Flesch-Szigriszt index and the INFLESZ scale, both available on the INFLESZ program. Also indicated were year of publication, country and number of authors of the documents obtained. We obtained 16 documents, developed between 2001 and 2011. Readability oscillated between 43.34 (some-what difficult) and 62 (normal), with an average value of 51.56 (somewhat difficult). Only 4 pamphlets (25%) showed a Flesch-Szigriszt index of ≥ 55 (normal). There was no difference in readability by year, authors or country of publication. The readability of 75% of the documents studied was "somewhat difficult" according to the INFLESZ scale. These results coincide with previous studies, in both Spanish and English. If the readability of this type of documents is improved, it will be easier to achieve their educational goal.

  19. The Digital Divide and Patient Portals: Internet Access Explained Differences in Patient Portal Use for Secure Messaging by Age, Race, and Income.

    Science.gov (United States)

    Graetz, Ilana; Gordon, Nancy; Fung, Vick; Hamity, Courtnee; Reed, Mary E

    2016-08-01

    Online access to health records and the ability to exchange secure messages with physicians can improve patient engagement and outcomes; however, the digital divide could limit access to web-based portals among disadvantaged groups. To understand whether sociodemographic differences in patient portal use for secure messaging can be explained by differences in internet access and care preferences. Cross-sectional survey to examine the association between patient sociodemographic characteristics and internet access and care preferences; then, the association between sociodemographic characteristics and secure message use with and without adjusting for internet access and care preference. One thousand forty-one patients with chronic conditions in a large integrated health care delivery system (76% response rate). Internet access, portal use for secure messaging, preference for in-person or online care, and sociodemographic and health characteristics. Internet access and preference mediated some of the differences in secure message use by age, race, and income. For example, using own computer to access the internet explained 52% of the association between race and secure message use and 60% of the association between income and use (Sobel-Goodman mediation test, Pdifferences in portal use remained statistically significant when controlling for internet access and preference. As the availability and use of patient portals increase, it is important to understand which patients have limited access and the barriers they may face. Improving internet access and making portals available across multiple platforms, including mobile, may reduce some disparities in secure message use.

  20. Collaborative Virtual 3D Environment for Internet-Accessible Physics Experiments

    Directory of Open Access Journals (Sweden)

    Bettina Scheucher

    2009-08-01

    Full Text Available Abstract—Immersive 3D worlds have increasingly raised the interest of researchers and practitioners for various learning and training settings over the last decade. These virtual worlds can provide multiple communication channels between users and improve presence and awareness in the learning process. Consequently virtual 3D environments facilitate collaborative learning and training scenarios. In this paper we focus on the integration of internet-accessible physics experiments (iLabs combined with the TEALsim 3D simulation toolkit in Project Wonderland, Sun's toolkit for creating collaborative 3D virtual worlds. Within such a collaborative environment these tools provide the opportunity for teachers and students to work together as avatars as they control actual equipment, visualize physical phenomenon generated by the experiment, and discuss the results. In particular we will outline the steps of integration, future goals, as well as the value of a collaboration space in Wonderland's virtual world.

  1. Menores y acceso a Internet en el hogar: las normas familiares Internet Access by Minors at Home: Usage Norms Imposed by Parents

    Directory of Open Access Journals (Sweden)

    Mercè Morey López

    2010-03-01

    Full Text Available Este artículo analiza el establecimiento de normas por parte de los progenitores a sus hijos sobre la utilización de Internet en los hogares. Los datos se han obtenido mediante encuestación sobre una muestra representativa de los menores de las Islas Baleares de entre 6 y 16 años, habiéndose analizado las siguientes dimensiones: acceso de los menores a Internet desde el hogar; grado de autonomía o acompañamiento en la navegación; normativización impuesta en el hogar por parte de sus padres y madres; tipos de normas impuestas; relación entre normas y género; valoración de los menores de los conocimientos y habilidades de sus progenitores para navegar por Internet y, finalmente, el acompañamiento de los padres y madres a la hora de navegar por Internet. Se constata que poco más del 53% de los menores de entre 6 y 14 años, y del 62% de los de 15 y 16 años navegan a través de Internet sin que sus progenitores les establezcan limitaciones. Cuando establecen algún tipo de normas, éstas se refieren, principalmente, a restricciones de carácter temporal. Por tanto, se infiere que los padres y madres no son conscientes de los peligros de la Red o que, al menos, actúan de forma poco razonable. Ello muestra la necesidad de sensibilizar y formar a las familias para que asuman su responsabilidad educativa.This paper examines and discusses the rules and standards set by parents for their children on Internet usage at home. Data that supports the paper have been obtained by surveying a representative sample of children in the Balearic Islands aged between 6 and 16 years; the analysis dimensions are: access by minors to the Internet from home; location of the computer from which have online access; level of autonomy or accompaniment while surfing the Net; norms imposed by their parents; types of rules imposed; relationship between norms and gender; the minors’ opinion and assessment of the knowledge and abilities of their parents on use of

  2. www.mydrugdealer.com: Ethics and legal implications of Internet-based access to substances of abuse.

    Science.gov (United States)

    Klein, Carolina A; Kandel, Surendra

    2011-01-01

    The Internet has increasingly become an intrinsic part of everyday life, offering countless possibilities for education, services, recreation, and more. In fact, an entire virtual life within the digitalized World Wide Web is possible and common among many Internet users. Today's psychiatrists must therefore incorporate this dimension of human life into clinical practice, to achieve an adequate assessment of the tools and risks available to the patient. We focus on the Internet as a portal for the trade of and access to substances of abuse. We review the legal regulations that may inform care and standards of practice and analyze the difficulties that arise in assessment and monitoring of the current situation. We consider the potential impact of Internet-based narcotics trade on addiction morbidities and the practice of clinical psychiatry, as well as on the potential legal implications that the forensic expert may face.

  3. Universal data access for run-time resource management in resource constrained wireless networks

    OpenAIRE

    Rerkrai, Krisakorn

    2012-01-01

    Resource-constrainedwireless networks, e.g.wireless sensor networks (WSNs), small embedded devices with limited computational power and energy, have been the subject of intense research in the past decade. Moreover, recent technological advances and growing demand for better efficiency have led to a great number of link and network protocols for WSNs. The protocols depend on specific interfaces to exchange necessary information. Unfortunately these interfaces are often proprietary and highly ...

  4. Energy efficient medium access protocol for wireless medical body area sensor networks.

    Science.gov (United States)

    Omeni, O; Wong, A; Burdett, A J; Toumazou, C

    2008-12-01

    This paper presents a novel energy-efficient MAC Protocol designed specifically for wireless body area sensor networks (WBASN) focused towards pervasive healthcare applications. Wireless body area networks consist of wireless sensor nodes attached to the human body to monitor vital signs such as body temperature, activity or heart-rate. The network adopts a master-slave architecture, where the body-worn slave node periodically sends sensor readings to a central master node. Unlike traditional peer-to-peer wireless sensor networks, the nodes in this biomedical WBASN are not deployed in an ad hoc fashion. Joining a network is centrally managed and all communications are single-hop. To reduce energy consumption, all the sensor nodes are in standby or sleep mode until the centrally assigned time slot. Once a node has joined a network, there is no possibility of collision within a cluster as all communication is initiated by the central node and is addressed uniquely to a slave node. To avoid collisions with nearby transmitters, a clear channel assessment algorithm based on standard listen-before-transmit (LBT) is used. To handle time slot overlaps, the novel concept of a wakeup fallback time is introduced. Using single-hop communication and centrally controlled sleep/wakeup times leads to significant energy reductions for this application compared to more ldquoflexiblerdquo network MAC protocols such as 802.11 or Zigbee. As duty cycle is reduced, the overall power consumption approaches the standby power. The protocol is implemented in hardware as part of the Sensiumtrade system-on-chip WBASN ASIC, in a 0.13- mum CMOS process.

  5. Dynamic Spectrum Access for Internet of Things Service in Cognitive Radio-Enabled LPWANs.

    Science.gov (United States)

    Moon, Bongkyo

    2017-12-05

    In this paper, we focus on a dynamic spectrum access strategy for Internet of Things (IoT) applications in two types of radio systems: cellular networks and cognitive radio-enabled low power wide area networks (CR-LPWANs). The spectrum channel contention between the licensed cellular networks and the unlicensed CR-LPWANs, which work with them, only takes place within the cellular radio spectrum range. Our aim is to maximize the spectrum capacity for the unlicensed users while ensuring that it never interferes with the licensed network. Therefore, in this paper we propose a dynamic spectrum access strategy for CR-LPWANs operating in both licensed and unlicensed bands. The simulation and the numerical analysis by using a matrix geometric approach for the strategy are presented. Finally, we obtain the blocking probability of the licensed users, the mean dwell time of the unlicensed user, and the total carried traffic and combined service quality for the licensed and unlicensed users. The results show that the proposed strategy can maximize the spectrum capacity for the unlicensed users using IoT applications as well as keep the service quality of the licensed users independent of them.

  6. Accessing Suicide-Related Information on the Internet: A Retrospective Observational Study of Search Behavior

    Science.gov (United States)

    2013-01-01

    Background The Internet’s potential impact on suicide is of major public health interest as easy online access to pro-suicide information or specific suicide methods may increase suicide risk among vulnerable Internet users. Little is known, however, about users’ actual searching and browsing behaviors of online suicide-related information. Objective To investigate what webpages people actually clicked on after searching with suicide-related queries on a search engine and to examine what queries people used to get access to pro-suicide websites. Methods A retrospective observational study was done. We used a web search dataset released by America Online (AOL). The dataset was randomly sampled from all AOL subscribers’ web queries between March and May 2006 and generated by 657,000 service subscribers. Results We found 5526 search queries (0.026%, 5526/21,000,000) that included the keyword "suicide". The 5526 search queries included 1586 different search terms and were generated by 1625 unique subscribers (0.25%, 1625/657,000). Of these queries, 61.38% (3392/5526) were followed by users clicking on a search result. Of these 3392 queries, 1344 (39.62%) webpages were clicked on by 930 unique users but only 1314 of those webpages were accessible during the study period. Each clicked-through webpage was classified into 11 categories. The categories of the most visited webpages were: entertainment (30.13%; 396/1314), scientific information (18.31%; 240/1314), and community resources (14.53%; 191/1314). Among the 1314 accessed webpages, we could identify only two pro-suicide websites. We found that the search terms used to access these sites included “commiting suicide with a gas oven”, “hairless goat”, “pictures of murder by strangulation”, and “photo of a severe burn”. A limitation of our study is that the database may be dated and confined to mainly English webpages. Conclusions Searching or browsing suicide-related or pro-suicide webpages was

  7. Use of internet for accessing healthcare information among patients in an outpatient department of a Tertiary Care Center

    Directory of Open Access Journals (Sweden)

    Lakshmi Renganathan

    2017-01-01

    Full Text Available Background: Health information is one of the most accessed topics online. Worldwide, about 4.5% of all Internet searches are for health-related informationand more than 70, 000 websites disseminate health information. However, critics question the quality and credibility of online health information as contents are mostly a result of limited research or are commercialised. There is a need to train people to locate relevant websites where they can efficiently retrieve evidence based information and evaluate the same. The study was conducted with the objectives of determining the prevalence of use of internet for accessing healthcare information amongst literate adult population in an urban area and to assess the association between the demography and the reasons of internet use. Methodology: We used an anonymous, cross sectional survey completed by a sample of out patients of 408 individuals who came to a tertiary care centre at Pune during the year 2015. The survey consisted of 17 questions related to behavioural, attitudinal and demographic items. Results: Out of the total of 408 individuals, 256 (63.2% individuals used internet for health information though 332 (82.4% of them were aware of authorised websites for health information and 69 (16.9% thought information available in the internet can be harmful. Also, 63 out of 256 (24.6% agreed to the fact that they ask questions to their doctors based on the information that they acquired from internet while surfing about that particular disease/ ailment. More individuals (p<0.05 who were working and who were educated, graduates and above, were using internet for health information. Conclusion: Our results suggest the great potential for using the internet to disseminate the information and awareness to the public about health and healthcare facilities. However, it is important to disseminate credible information from reliable and authorised websites assigned for health since online healthcare

  8. Examining Stakeholder Perceptions of Accessibility and Utilization of Computer and Internet Technology in the Selinsgrove Area School District

    Science.gov (United States)

    Krause, Lorinda M.

    2014-01-01

    This study utilized a mixed methods approach to examine the issue of how parents, students, and teachers (stakeholders) perceive accessibility and the utilization of computer and Internet technology within the Selinsgrove, Pennsylvania Area School District. Quantitative data was collected through the use of questionnaires distributed to the…

  9. Filtering Access to Internet Content at Higher Education Institutions: Stakeholder Perceptions and Their Impact on Research and Academic Freedom

    Science.gov (United States)

    Orenstein, David I.

    2009-01-01

    Hardware and software filters, which sift through keywords placed in Internet search engines and online databases, work to limit the return of information from these sources. By their very purpose, filters exist to decrease the amount of information researchers can access. The purpose of this study is to gain insight into the perceptions key…

  10. Energy-Efficiency Analysis of a Distributed Queuing Medium Access Control Protocol for Biomedical Wireless Sensor Networks in Saturation Conditions

    Directory of Open Access Journals (Sweden)

    Christos Verikoukis

    2011-01-01

    Full Text Available The aging population and the high quality of life expectations in our society lead to the need of more efficient and affordable healthcare solutions. For this reason, this paper aims for the optimization of Medium Access Control (MAC protocols for biomedical wireless sensor networks or wireless Body Sensor Networks (BSNs. The hereby presented schemes always have in mind the efficient management of channel resources and the overall minimization of sensors’ energy consumption in order to prolong sensors’ battery life. The fact that the IEEE 802.15.4 MAC does not fully satisfy BSN requirements highlights the need for the design of new scalable MAC solutions, which guarantee low-power consumption to the maximum number of body sensors in high density areas (i.e., in saturation conditions. In order to emphasize IEEE 802.15.4 MAC limitations, this article presents a detailed overview of this de facto standard for Wireless Sensor Networks (WSNs, which serves as a link for the introduction and initial description of our here proposed Distributed Queuing (DQ MAC protocol for BSN scenarios. Within this framework, an extensive DQ MAC energy-consumption analysis in saturation conditions is presented to be able to evaluate its performance in relation to IEEE 802.5.4 MAC in highly dense BSNs. The obtained results show that the proposed scheme outperforms IEEE 802.15.4 MAC in average energy consumption per information bit, thus providing a better overall performance that scales appropriately to BSNs under high traffic conditions. These benefits are obtained by eliminating back-off periods and collisions in data packet transmissions, while minimizing the control overhead.

  11. Open Access to Multi-Domain Collaborative Analysis of Geospatial Data Through the Internet

    Science.gov (United States)

    Turner, A.

    2009-12-01

    The internet has provided us with a high bandwidth, low latency, globally connected network in which to rapidly share realtime data from sensors, reports, and imagery. In addition, the availability of this data is even easier to obtain, consume and analyze. Another aspect of the internet has been the increased approachability of complex systems through lightweight interfaces - with additional complex services able to provide more advanced connections into data services. These analyses and discussions have primarily been siloed within single domains, or kept out of the reach of amateur scientists and interested citizens. However, through more open access to analytical tools and data, experts can collaborate with citizens to gather information, provide interfaces for experimenting and querying results, and help make improved insights and feedback for further investigation. For example, farmers in Uganda are able to use their mobile phones to query, analyze, and be alerted to banana crop disease based on agriculture and climatological data. In the U.S., local groups use online social media sharing sites to gather data on storm-water runoff and stream siltation in order to alert wardens and environmental agencies. This talk will present various web-based geospatial visualization and analysis techniques and tools such as Google Earth and GeoCommons that have emerged that provide for a collaboration between experts of various domains as well as between experts, government, and citizen scientists. Through increased communication and the sharing of data and tools, it is possible to gain broad insight and development of joint, working solutions to a variety of difficult scientific and policy related questions.

  12. Advanced routing protocols for wireless networks

    CERN Document Server

    Campista , Miguel Elias Mitre

    2014-01-01

    This text introduces the principles of routing protocols and metrics as they affect wireless networking environments, specifically in urban areas. Timely because of the recent rise in small city life, this topic includes the consideration of ad hoc, mesh, vehicular, sensor, and delay tolerant networks. These approaches are each unique, and author Miguel Mitre Campista provides a thorough, but accessible, explanation of their individual characteristics for engineers, computer scientists, IT professionals, and curious Internet users.

  13. On Radio over Fiber for Heterogeneous Wireless Networks

    DEFF Research Database (Denmark)

    Riaz, M. Tahir; Nielsen, Rasmus Hjorth; Pedersen, Jens Myrup

    2009-01-01

    The paper provides an overview of the radio over fiber (RoF) technology and its potential use in heterogeneous wireless networks. Wireless communications have seen a huge growth in the last decade. It has been estimated that five in every six people in the entire world will have a mobile phone...... in 2010. The vast growing use of Internet on the mobile devices has also been increased significantly. In order to provide a broadband access for mobile communications, a new wireless infrastructure (fiber optic networks for distributed, extendible heterogeneous radio architectures and service...... provisioning - FUTON) based on RoF technology has been introduced. The project adopts centralized processing of radio signals for number of wireless base stations can enhance the network performance in terms of bandwidth, and QoS parameters. The simplified remote access units (RAU) are expected to not only...

  14. Real-time Measurements of an Optical Reconfigurable Radio Access Unit for 5G Wireless Access Networks

    DEFF Research Database (Denmark)

    Rodríguez, Sebastián; Morales Vicente, Alvaro; Rommel, Simon

    2017-01-01

    A reconfigurable radio access unit able to switch wavelength, RF carrier frequency and optical path is experimentally demonstrated. The system is able to do the switching processes correctly, while achieving BER values below FEC limit.......A reconfigurable radio access unit able to switch wavelength, RF carrier frequency and optical path is experimentally demonstrated. The system is able to do the switching processes correctly, while achieving BER values below FEC limit....

  15. Impact of language anxiety and self-efficacy on accessing Internet sites.

    Science.gov (United States)

    Yang, Hui-Jen; Lay, Yun-Long; Tsao, Wen-Yu; Liou, Yi-Chin; Lin, Cheng-Kun

    2007-04-01

    Language interface plays a critical role as the foundation of communication. Possessing greater fluency in the host language can lead to increased opportunities for interaction with host members. This research is to examine the impact of language and Internet usage anxiety and self-efficacy on the intended uses of Internet sites, respectively. By the same token, whether Internet/language self-efficacy would mediate the effects of Internet/language anxiety on the intention of the Internet site use is also examined. A valid sample of 368 undergraduates was tested in this study. The path analysis results mostly supported the model tested. The results display that the anxiety of language and Internet use have significantly influenced self-efficacy of Internet use and language, respectively. Anxiety about language and Internet use have also significantly influenced the intention to use Internet sites individually. Furthermore, language self-efficacy has significantly influenced the intention to use Internet sites, but Internet self-efficacy has not. The implications are discussed at the end of the paper.

  16. Internet Use and Access Among Pregnant Women via Computer and Mobile Phone: Implications for Delivery of Perinatal Care.

    Science.gov (United States)

    Peragallo Urrutia, Rachel; Berger, Alexander A; Ivins, Amber A; Beckham, A Jenna; Thorp, John M; Nicholson, Wanda K

    2015-03-30

    The use of Internet-based behavioral programs may be an efficient, flexible method to enhance prenatal care and improve pregnancy outcomes. There are few data about access to, and use of, the Internet via computers and mobile phones among pregnant women. We describe pregnant women's access to, and use of, computers, mobile phones, and computer technologies (eg, Internet, blogs, chat rooms) in a southern United States population. We describe the willingness of pregnant women to participate in Internet-supported weight-loss interventions delivered via computers or mobile phones. We conducted a cross-sectional survey among 100 pregnant women at a tertiary referral center ultrasound clinic in the southeast United States. Data were analyzed using Stata version 10 (StataCorp) and R (R Core Team 2013). Means and frequency procedures were used to describe demographic characteristics, access to computers and mobile phones, and use of specific Internet modalities. Chi-square testing was used to determine whether there were differences in technology access and Internet modality use according to age, race/ethnicity, income, or children in the home. The Fisher's exact test was used to describe preferences to participate in Internet-based postpartum weight-loss interventions via computer versus mobile phone. Logistic regression was used to determine demographic characteristics associated with these preferences. The study sample was 61.0% white, 26.0% black, 6.0% Hispanic, and 7.0% Asian with a mean age of 31.0 (SD 5.1). Most participants had access to a computer (89/100, 89.0%) or mobile phone (88/100, 88.0%) for at least 8 hours per week. Access remained high (>74%) across age groups, racial/ethnic groups, income levels, and number of children in the home. Internet/Web (94/100, 94.0%), email (90/100, 90.0%), and Facebook (50/100, 50.0%) were the most commonly used Internet technologies. Women aged less than 30 years were more likely to report use of Twitter and chat rooms

  17. Internet Use and Access Among Pregnant Women via Computer and Mobile Phone: Implications for Delivery of Perinatal Care

    Science.gov (United States)

    Peragallo Urrutia, Rachel; Berger, Alexander A; Ivins, Amber A; Beckham, A Jenna; Thorp Jr, John M

    2015-01-01

    Background The use of Internet-based behavioral programs may be an efficient, flexible method to enhance prenatal care and improve pregnancy outcomes. There are few data about access to, and use of, the Internet via computers and mobile phones among pregnant women. Objective We describe pregnant women’s access to, and use of, computers, mobile phones, and computer technologies (eg, Internet, blogs, chat rooms) in a southern United States population. We describe the willingness of pregnant women to participate in Internet-supported weight-loss interventions delivered via computers or mobile phones. Methods We conducted a cross-sectional survey among 100 pregnant women at a tertiary referral center ultrasound clinic in the southeast United States. Data were analyzed using Stata version 10 (StataCorp) and R (R Core Team 2013). Means and frequency procedures were used to describe demographic characteristics, access to computers and mobile phones, and use of specific Internet modalities. Chi-square testing was used to determine whether there were differences in technology access and Internet modality use according to age, race/ethnicity, income, or children in the home. The Fisher’s exact test was used to describe preferences to participate in Internet-based postpartum weight-loss interventions via computer versus mobile phone. Logistic regression was used to determine demographic characteristics associated with these preferences. Results The study sample was 61.0% white, 26.0% black, 6.0% Hispanic, and 7.0% Asian with a mean age of 31.0 (SD 5.1). Most participants had access to a computer (89/100, 89.0%) or mobile phone (88/100, 88.0%) for at least 8 hours per week. Access remained high (>74%) across age groups, racial/ethnic groups, income levels, and number of children in the home. Internet/Web (94/100, 94.0%), email (90/100, 90.0%), and Facebook (50/100, 50.0%) were the most commonly used Internet technologies. Women aged less than 30 years were more likely to

  18. M2M massive wireless access: Challenges, research issues, and ways forward

    NARCIS (Netherlands)

    Zanella, A.; Zorzi, M.; Dos Santos, A.F.; Popovski, P.; Pratas, N.; Stefanovic, C.; Dekorsy, A.; Bockelmann, C.; Busropan, B.; Norp, A.H.J.

    2013-01-01

    In order to make the Internet of Things a reality, ubiquitous coverage and low-complexity connectivity are required. Cellular networks are hence the most straightforward and realistic solution to enable a massive deployment of always connected Machines around the globe. Nevertheless, a paradigm

  19. Impact of the Internet on Academic Performance of Students in ...

    African Journals Online (AJOL)

    was also revealed that Power outage, slow internet speed, lack of computer ... mail, online chat, file transfer, the interlinked Web pages and other documents of the World ..... If cybercafés are provided with wireless access points, it will become ...

  20. The digital divide: Examining socio-demographic factors associated with health literacy, access and use of internet to seek health information.

    Science.gov (United States)

    Estacio, Emee Vida; Whittle, Rebecca; Protheroe, Joanne

    2017-02-01

    This article aims to examine the socio-demographic characteristics associated with access and use of Internet for health-related purposes and its relationship with health literacy. Data were drawn from a health literacy survey ( N = 1046) and analysed using logistic regression. Results show a strong association between health literacy, internet access and use. Socio-demographic characteristics particularly age, education, income, perceived health and social isolation also predict internet access. Thus, in addition to widening access, the movement towards digitisation of health information and services should also consider digital skills development to enable people to utilise digital technology more effectively, especially among traditionally hard-to-reach communities.

  1. Cross-layer design for radio resource allocation based on priority scheduling in OFDMA wireless access network

    Directory of Open Access Journals (Sweden)

    Chen Yen-Wen

    2011-01-01

    Full Text Available Abstract The orthogonal frequency-division multiple access (OFDMA system has the advantages of flexible subcarrier allocation and adaptive modulation with respect to channel conditions. However, transmission overhead is required in each frame to broadcast the arrangement of radio resources to all mobile stations within the coverage of the same base station. This overhead greatly affects the utilization of valuable radio resources. In this paper, a cross layer scheme is proposed to reduce the number of traffic bursts at the downlink of an OFDMA wireless access network so that the overhead of the media access protocol (MAP field can be minimized. The proposed scheme considers the priorities and the channel conditions of quality of service (QoS traffic streams to arrange for them to be sent with minimum bursts in a heuristic manner. In addition, the trade-off between the degradation of the modulation level and the reduction of traffic bursts is investigated. Simulation results show that the proposed scheme can effectively reduce the traffic bursts and, therefore, increase resource utilization.

  2. Warming Up to Wireless

    Science.gov (United States)

    Milner, Jacob

    2005-01-01

    In districts big and small across the U.S., students, teachers, and administrators alike have come to appreciate the benefits of wireless technology. Because the technology delivers Internet signals on airborne radio frequencies, wireless networking allows users of all portable devices to move freely on a school's campus and stay connected to the…

  3. Multiple Access Techniques for Next Generation Wireless: Recent Advances and Future Perspectives

    Directory of Open Access Journals (Sweden)

    Shree Krishna Sharma

    2016-01-01

    Full Text Available The advances in multiple access techniques has been one of the key drivers in moving from one cellular generation to another. Starting from the first generation, several multiple access techniques have been explored in different generations and various emerging multiplexing/multiple access techniques are being investigated for the next generation of cellular networks. In this context, this paper first provides a detailed review on the existing Space Division Multiple Access (SDMA related works. Subsequently, it highlights the main features and the drawbacks of various existing and emerging multiplexing/multiple access techniques. Finally, we propose a novel concept of clustered orthogonal signature division multiple access for the next generation of cellular networks. The proposed concept envisions to employ joint antenna coding in order to enhance the orthogonality of SDMA beams with the objective of enhancing the spectral efficiency of future cellular networks.

  4. From Access to Collaboration: Four African Pathologists Profile Their Use of the Internet and Social Media.

    Science.gov (United States)

    Royall, Julia; Isyagi, Micongwe Moses; Iliyasu, Yawale; Lukande, Robert; Vuhahula, Edda

    2018-03-01

    The shared practice of pathology via the Internet holds great potential for pathologists in sub-Saharan Africa (SSA) and their global partners. Application of the Internet is constrained by issues of bandwidth, cost, and power. The penetration of mobile telephony and the arrival of smartphones have changed the use of Internet and social media in Africa and therefore the work of the 4 African pathologists featured in this article. As pathology in SSA struggles for visibility and usefulness, the Internet and its electronic applications provide a critical infrastructure as well as a podium for pathologists across the continent. Copyright © 2017 Elsevier Inc. All rights reserved.

  5. Neurofeedback Control in Parkinsonian Patients Using Electrocorticography Signals Accessed Wirelessly With a Chronic, Fully Implanted Device.

    Science.gov (United States)

    Khanna, Preeya; Swann, Nicole C; de Hemptinne, Coralie; Miocinovic, Svjetlana; Miller, Andrew; Starr, Philip A; Carmena, Jose M

    2017-10-01

    Parkinson's disease (PD) is characterized by motor symptoms such as rigidity and bradykinesia that prevent normal movement. Beta band oscillations (13-30 Hz) in neural local field potentials (LFPs) have been associated with these motor symptoms. Here, three PD patients implanted with a therapeutic deep brain neural stimulator that can also record and wirelessly stream neural data played a neurofeedback game where they modulated their beta band power from sensorimotor cortical areas. Patients' beta band power was streamed in real-time to update the position of a cursor that they tried to drive into a cued target. After playing the game for 1-2 hours each, all three patients exhibited above chance-level performance regardless of subcortical stimulation levels. This study, for the first time, demonstrates using an invasive neural recording system for at-home neurofeedback training. Future work will investigate chronic neurofeedback training as a potentially therapeutic tool for patients with neurological disorders.

  6. Flexible and Lightweight Access Control for Online Healthcare Social Networks in the Context of the Internet of Things

    Directory of Open Access Journals (Sweden)

    Zhen Qin

    2017-01-01

    Full Text Available Online healthcare social networks (OHSNs play an essential role in sharing information among medical experts and patients who are equipped with similar experiences. To access other patients’ data or experts’ diagnosis anywhere and anytime, it is necessary to integrate the OHSN into the Internet as part of the Internet of Things (IoT. Therefore, it is crucial to design an efficient and versatile access control scheme that can grant and revoke a user to access the OHSN. In this paper, we propose novel attribute-based encryption (ABE features with user revocation and verifiable decryption outsourcing to control the access privilege of the users. The security of the proposed ABE scheme is given in the well-studied random oracle model. With the proposed ABE scheme, the malicious users can be excluded from the system and the user can offload most of the overhead in the decryption to an untrusted cloud server in a verifiable manner. An access control scheme for the OHSN has been given in the context of the IoT based on the proposed ABE scheme. The simulation demonstrates that our access control mechanism is practical.

  7. Traffic-Adaptive, Flow-Specific Medium Access for Wireless Networks

    Science.gov (United States)

    2009-09-01

    51 b. Carrier Sense Multiple Access (CSMA).................................52 c. MACA and MACAW...Figure 17. Comparison of collision avoidance techniques proposed in MACA , MACAW, and MACA -BI (From [132...low power listening lrd ......................long range dependent MAC .................medium access control MACA

  8. Information Security and Wireless: Alternate Approaches for Controlling Access to Critical Information

    National Research Council Canada - National Science Library

    Nandram, Winsome

    2004-01-01

    .... Typically, network managers implement countermeasures to augment security. The goal of this thesis is to research approaches that compliment existing security measures with fine grain access control measures. The Extensible Markup Language (XML) is adopted to accommodate such granular access control as it provides the mechanisms for scaling security down to the document content level.

  9. A Reinforcement Learning Approach to Access Management in Wireless Cellular Networks

    Directory of Open Access Journals (Sweden)

    Jihun Moon

    2017-01-01

    Full Text Available In smart city applications, huge numbers of devices need to be connected in an autonomous manner. 3rd Generation Partnership Project (3GPP specifies that Machine Type Communication (MTC should be used to handle data transmission among a large number of devices. However, the data transmission rates are highly variable, and this brings about a congestion problem. To tackle this problem, the use of Access Class Barring (ACB is recommended to restrict the number of access attempts allowed in data transmission by utilizing strategic parameters. In this paper, we model the problem of determining the strategic parameters with a reinforcement learning algorithm. In our model, the system evolves to minimize both the collision rate and the access delay. The experimental results show that our scheme improves system performance in terms of the access success rate, the failure rate, the collision rate, and the access delay.

  10. Searching for Suicide Methods: Accessibility of Information About Helium as a Method of Suicide on the Internet.

    Science.gov (United States)

    Gunnell, David; Derges, Jane; Chang, Shu-Sen; Biddle, Lucy

    2015-01-01

    Helium gas suicides have increased in England and Wales; easy-to-access descriptions of this method on the Internet may have contributed to this rise. To investigate the availability of information on using helium as a method of suicide and trends in searching about this method on the Internet. We analyzed trends in (a) Google searching (2004-2014) and (b) hits on a Wikipedia article describing helium as a method of suicide (2013-2014). We also investigated the extent to which helium was described as a method of suicide on web pages and discussion forums identified via Google. We found no evidence of rises in Internet searching about suicide using helium. News stories about helium suicides were associated with increased search activity. The Wikipedia article may have been temporarily altered to increase awareness of suicide using helium around the time of a celebrity suicide. Approximately one third of the links retrieved using Google searches for suicide methods mentioned helium. Information about helium as a suicide method is readily available on the Internet; the Wikipedia article describing its use was highly accessed following celebrity suicides. Availability of online information about this method may contribute to rises in helium suicides.

  11. Towards Internet of Things (IOTS):Integration of Wireless Sensor Network to Cloud Services for Data Collection and Sharing

    OpenAIRE

    Piyare, Rajeev; Lee, Seong Ro

    2013-01-01

    Cloud computing provides great benefits for applications hosted on the Web that also have special computational and storage requirements. This paper proposes an extensible and flexible architecture for integrating Wireless Sensor Networks with the Cloud. We have used REST based Web services as an interoperable application layer that can be directly integrated into other application domains for remote monitoring such as e-health care services, smart homes, or even vehicular area networks (VAN)...

  12. Internet sites of public utilities. Customers wish for interactive access; Die Internetauftritte der Versorger. Kunden wuenschen interaktive Anbindung

    Energy Technology Data Exchange (ETDEWEB)

    Knechtel, Karsten [Process Management Consulting GmbH, Muenchen (Germany)

    2010-11-15

    Electric and gas utilities all have internet sites for private customers. Many of them provide interactive access to all relevant services for both regular and interested new customers. To the end users, innovative aspects of energy supply in the deregulated market are currently of increasing interest. A recent industry barometer shows the extent to which utilities have installed interactive integration of both their current and prospective private customers in their business processes. Especially multimedia criteria are gaining increasing importance. (orig.)

  13. High mobile phone ownership but low internet access and use among Young adults attending an Urban HIV clinic in Uganda.

    OpenAIRE

    Parkes-Ratanshi, Rosalind; Namukasa Wanyama, Jane

    2018-01-01

    Whilst there is increasing interest in the use of mobile phones and other technology (mHealth) for improving health outcomes; limited data exists on how young people living with HIV use mhealth technologies to get information and to support their health. We sought to assess access and use of mobile phones and the Internet among young adults living with HIV attending the Infectious Diseases Institute (IDI) clinic, Kampala. Data collection took place between March 2014 and January 2016 among yo...

  14. The influence of the digital divide on face preferences in El Salvador: people without internet access prefer more feminine men, more masculine women, and women with higher adiposity.

    Science.gov (United States)

    Batres, Carlota; Perrett, David I

    2014-01-01

    Previous studies on face preferences have found that online and laboratory experiments yield similar results with samples from developed countries, where the majority of the population has internet access. No study has yet explored whether the same holds true in developing countries, where the majority of the population does not have internet access. This gap in the literature has become increasingly important given that several online studies are now using cross-country comparisons. We therefore sought to determine if an online sample is representative of the population in the developing country of El Salvador. In studies of Hispanic men and women aged 18-25, we tested facial masculinity and adiposity preferences by collecting data in person as well as online. Our results showed that there were no differences in preferences between people who reported having internet access, whether they were tested online or in person. This provides evidence that testing style does not bias preferences among the same population. On the other hand, our results showed multiple differences in preferences between people who reported having internet access and people who reported not having internet access. More specifically, we found that people without internet access preferred more feminine men, more masculine women, and women with higher adiposity than people with internet access. We also found that people without internet access had fewer resources (e.g. running water) than people with internet access, suggesting that harshness in the environment may be influencing face preferences. These findings suggest that online studies may provide a distorted perspective of the populations in developing countries.

  15. The influence of the digital divide on face preferences in El Salvador: people without internet access prefer more feminine men, more masculine women, and women with higher adiposity.

    Directory of Open Access Journals (Sweden)

    Carlota Batres

    Full Text Available Previous studies on face preferences have found that online and laboratory experiments yield similar results with samples from developed countries, where the majority of the population has internet access. No study has yet explored whether the same holds true in developing countries, where the majority of the population does not have internet access. This gap in the literature has become increasingly important given that several online studies are now using cross-country comparisons. We therefore sought to determine if an online sample is representative of the population in the developing country of El Salvador. In studies of Hispanic men and women aged 18-25, we tested facial masculinity and adiposity preferences by collecting data in person as well as online. Our results showed that there were no differences in preferences between people who reported having internet access, whether they were tested online or in person. This provides evidence that testing style does not bias preferences among the same population. On the other hand, our results showed multiple differences in preferences between people who reported having internet access and people who reported not having internet access. More specifically, we found that people without internet access preferred more feminine men, more masculine women, and women with higher adiposity than people with internet access. We also found that people without internet access had fewer resources (e.g. running water than people with internet access, suggesting that harshness in the environment may be influencing face preferences. These findings suggest that online studies may provide a distorted perspective of the populations in developing countries.

  16. Internet access, awareness and utilisation of web based evidence: a survey of ANZ and Singaporean radiation oncology registrars in 2003

    International Nuclear Information System (INIS)

    Wong, K.; Veness, M.

    2003-01-01

    The past decade has seen an 'explosion' in electronically archived evidence available on the Internet. Access to, and awareness of, pre-appraised web based evidence such as is available at the Cochrane Library, and more recently the Cancer Library, is now easily accessible to both clinicians and patients. A postal survey was recently sent out to all Radiation Oncology registrars in Australia, New Zealand and Singapore. The aim of the survey was to ascertain previous training in literature searching and critical appraisal, the extent of Internet access and use of web based evidence and awareness of databases including the Cochrane Library. Sixty six (66) out of ninety (90) registrars responded (73% response rate). Fifty five percent of respondents had previously undertaken some form of training related to literature searching or critical appraisal. The majority (68%) felt confident in performing a literature search, although 80% of respondents indicated interest in obtaining further training. The majority (68%) reported accessing web-based evidence for literature searching in the previous week, and 92% in the previous month. Nearly all respondents (89%) accessed web-based evidence at work. Most (94%) were aware of the Cochrane Library with 48% of respondents having used this database. Sixty-eight percent were aware of the Cancer Library. In 2000 a similar survey revealed only 68% of registrars aware and 30% having used the Cochrane Library. These findings reveal almost universal access to the Internet and use of web-based evidence amongst Radiation Oncology registrars. There has been a marked increase in awareness and use of the Cochrane Library with the majority also aware of the recently introduced Cancer Library

  17. DESIGN OF CAUCUS MEDIUM ACCESS CONTROL (C-MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS IN SMART GRIDS

    Directory of Open Access Journals (Sweden)

    JEETU SHARMA

    2017-10-01

    Full Text Available A Caucus-based medium access control protocol (C-MAC is proposed to reduce the end to end delay and battery consumption of the sensor nodes deployed in the monitoring of various smart grid regions, such as substation, pole and wires, perimeter security, real time and non-real-time monitoring using wireless sensor networks. The objective is to prolong the network lifetime and to reduce the end to end delay by mitigating the energy-hole problem and by eliminating bottlenecks significantly by using caucus based efficient synchronization techniques in multi-hop square grid topology of the wireless sensor networks (WSNs. The protocol self-reliantly and adaptively schedules node’s wake-up times, decreases idle listening and collisions, increases network throughput, and extends network lifetime. It induces a low duty cycle for adjusting wake-up times of sensor nodes. The appropriate selection of active and sleep time slots and next hop relay nodes are proposed to minimize the data transmission latency and to reduce battery consumption to increase the network lifetime. The uniform and synchronized transmission of the data packets is of prime importance to improve the network performance. Simulation results justify that the proposed C-MAC protocol increases the network lifetime, successful data transmission ratio along-with the reduction in end to end delay. The objective of this paper is to envisage benefits and utilization of C-MAC protocol for WSNs deployed in smart grids and to draw the attention of researchers in this area.

  18. A SURVEY on WIRELESS MESH NETWORKS, ROUTING METRICS and PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Safak DURUKAN ODABASI

    2013-01-01

    Full Text Available Today, Internet has become an indispensable part of our daily lives. It has a growing user community in many fields from banking transactions to online entertainment. It will be very efficient for users, as the next generation internet access becomes wireless like frequently used services such as cellular phones. But for providing this, a new network is needed to be designed or an existing network must be improved as well as making changes on infrastructure. At this point, mesh network infrastructure arises and offers more sophisticated internet access with less need. The most important advantage of mesh networks is the capability of working without infrastructure. Mesh networks are an additional access technology more than being a renewed one in the next generation wireless networks called 4G. In this study, wireless mesh networks and example applications are mentioned. Base architecture and design factors are emphasized, current routing protocols that are used on wireless mesh networks and routing metrics on which these protocols are based, are explained. Finally, the performance effects of these protocols and metrics on different network topologies are referred.

  19. On the Impact of Closed Access and Users Identities in Spectrum-Shared Overlaid Wireless Networks

    KAUST Repository

    Radaydeh, Redha M.; Gaaloul, Fakhreddine; Alouini, Mohamed-Slim

    2016-01-01

    © 2015 IEEE. This paper develops analytical models to investigate the impact of various operation terms and parameters on the downlink performance of spectrum-shared overlaid networks under closed-access small cells deployment. It is considered

  20. The impact of Internet access for people with spinal cord injuries: a descriptive analysis of a pilot study.

    Science.gov (United States)

    Houlihan, Bethlyn Vergo; Drainoni, Mari-Lynn; Warner, Grace; Nesathurai, Shanker; Wierbicky, Jane; Williams, Steven

    2003-04-22

    A pilot study was undertaken regarding the effect of Internet access on health-related quality of life (HRQoL) and self-reported impact for people with spinal cord injuries (SCI). This study is unique in providing free Internet access and looking at benefits for people with disabilities. HRQoL was measured using indicators of global health and social isolation at baseline and after 6 to 19 months of use via telephone interviews on a convenience sample of 23 adults with SCI. Additionally, monthly telephone surveys measured usage patterns, recreation, and self-reported impact. Both quantitative and qualitative analyses were conducted. Bivariate tests for differences in proportions and paired T-tests were conducted. Qualitatively, conceptual categories of impact were created using the Constant Comparative Method. Qualitatively, the predominant benefit was quality of life, mentioned by 61% of participants 46% of months surveyed, with quantitative trends towards improved emotional health. Ease of access to information, social connection, and quality of information were also frequently reported, with modest support from quantitative data. The study's persuasive qualitative results suggest the Internet has particular benefit to people with disabilities and that rehabilitation goals should include leisure. Further scientific research is strongly warranted.

  1. Distributed Database Semantic Integration of Wireless Sensor Network to Access the Environmental Monitoring System

    Directory of Open Access Journals (Sweden)

    Ubaidillah Umar

    2018-06-01

    Full Text Available A wireless sensor network (WSN works continuously to gather information from sensors that generate large volumes of data to be handled and processed by applications. Current efforts in sensor networks focus more on networking and development services for a variety of applications and less on processing and integrating data from heterogeneous sensors. There is an increased need for information to become shareable across different sensors, database platforms, and applications that are not easily implemented in traditional database systems. To solve the issue of these large amounts of data from different servers and database platforms (including sensor data, a semantic sensor web service platform is needed to enable a machine to extract meaningful information from the sensor’s raw data. This additionally helps to minimize and simplify data processing and to deduce new information from existing data. This paper implements a semantic web data platform (SWDP to manage the distribution of data sensors based on the semantic database system. SWDP uses sensors for temperature, humidity, carbon monoxide, carbon dioxide, luminosity, and noise. The system uses the Sesame semantic web database for data processing and a WSN to distribute, minimize, and simplify information processing. The sensor nodes are distributed in different places to collect sensor data. The SWDP generates context information in the form of a resource description framework. The experiment results demonstrate that the SWDP is more efficient than the traditional database system in terms of memory usage and processing time.

  2. Channel access delay and buffer distribution of two-user opportunistic scheduling schemes in wireless networks

    KAUST Repository

    Hossain, Md Jahangir

    2010-07-01

    In our earlier works, we proposed rate adaptive hierarchical modulation-assisted two-best user opportunistic scheduling (TBS) and hybrid two-user scheduling (HTS) schemes. The proposed schemes are innovative in the sense that they include a second user in the transmission opportunistically using hierarchical modulations. As such the frequency of information access of the users increases without any degradation of the system spectral efficiency (SSE) compared to the classical opportunistic scheduling scheme. In this paper, we analyze channel access delay of an incoming packet at the base station (BS) buffer when our proposed TBS and HTS schemes are employed at the BS. Specifically, using a queuing analytic model we derive channel access delay as well as buffer distribution of the packets that wait at BS buffer for down-link (DL) transmission. We compare performance of the TBS and HTS schemes with that of the classical single user opportunistic schemes namely, absolute carrier-to-noise ratio (CNR)-based single user scheduling (ASS) and normalized CNR-based single user scheduling (NSS). For an independent and identically distributed (i.i.d.) fading environment, our proposed scheme can improve packet\\'s access delay performance compared to the ASS. Selected numerical results in an independent but non-identically distributed (i.n.d.) fading environment show that our proposed HTS achieves overall good channel access delay performance. © 2010 IEEE.

  3. Multihoming for Mobile Internet of Multimedia Things

    OpenAIRE

    Balan, Titus; Robu, Dan; Sandu, Florin

    2017-01-01

    Mobility, redundancy, and bandwidth requirements are transforming the communication models used for IoT, mainly in case of Critical Communications and multimedia streaming (“IoMT, Internet of Multimedia Things”), as wireless video traffic is expected to be 60–75% of the global mobile traffic by 2020. One of the characteristics of 5G networks will be the proliferation of different/heterogeneous radio networks (virtualized radio access networks, RAN, new energy-efficient radios, femtocells, and...

  4. Design of pulse waveform for waveform division multiple access UWB wireless communication system.

    Science.gov (United States)

    Yin, Zhendong; Wang, Zhirui; Liu, Xiaohui; Wu, Zhilu

    2014-01-01

    A new multiple access scheme, Waveform Division Multiple Access (WDMA) based on the orthogonal wavelet function, is presented. After studying the correlation properties of different categories of single wavelet functions, the one with the best correlation property will be chosen as the foundation for combined waveform. In the communication system, each user is assigned to different combined orthogonal waveform. Demonstrated by simulation, combined waveform is more suitable than single wavelet function to be a communication medium in WDMA system. Due to the excellent orthogonality, the bit error rate (BER) of multiuser with combined waveforms is so close to that of single user in a synchronous system. That is to say, the multiple access interference (MAI) is almost eliminated. Furthermore, even in an asynchronous system without multiuser detection after matched filters, the result is still pretty ideal and satisfactory by using the third combination mode that will be mentioned in the study.

  5. Optimal Plant Growth in Smart Farm Hydroponics System using the Integration of Wireless Sensor Networks into Internet of Things

    Directory of Open Access Journals (Sweden)

    Nathaphon Boonnam

    2017-07-01

    Full Text Available Greenhouse cultivation is easy to keep up and control important factors such as light, temperature, and humidity. Using of sensors and actuators in the greenhouse to capture different values allows for the control of the equipment, it can also be optimized for growth at optimal temperature and humidity of various crops planted. We use wireless sensor networks’ system by sending results to the cloud service, monitoring values, and devices’s controlling via smart phone. The results of this study are useful for growing crops not only in technical parts, but also in physical part; it was evaluated by questionnaire using technology acceptance model.

  6. Psychotropics without borders: ethics and legal implications of internet-based access to psychiatric medications.

    Science.gov (United States)

    Klein, Carolina A

    2011-01-01

    Medical practitioners are revisiting many of the ethics and the legal implications surrounding the clinical frameworks within which we operate. In today's world, distinguishing between virtual and physical reality continues to be increasingly difficult. The physician may be found grappling with the decision of whether to continue to treat a patient who may be obtaining psychotropic medications through the Internet. This article approaches some of the clinical and legal implications and the ethics regarding the availability of prescription psychotropics over the Internet.

  7. Do Internet Credit Markets Improve Access to Credit for Female Business Owners?

    OpenAIRE

    Barasinska, Nataliya; Schäfer, Dorothea

    2010-01-01

    Business owners and founders are a minority of any bank's business clients. Scientific studies of traditional credit markets often show a lower probability of loan approval or higher loan costs for female business owners compared to male business owners. With this background the question arises whether female business owners have to struggle with this problem less on Internet credit markets. In this current study, DIW Berlin investigated business loans on the largest German Internet platform,...

  8. ICT Adoption in Micro and Small Firms: Can Internet Access Improve Labour Productivity?

    OpenAIRE

    Viollaz, Mariana

    2018-01-01

    The rapid spread of information and communication technologies may increase firms’ productivity with important consequences for job creation and for economic growth. This article contributes to this discussion by analysing the impact of internet adoption on labour productivity and the mechanisms shaping this relationship in Peruvian micro and small manufacturing firms over the period 2011-2013. The article estimates a reduced form where labour productivity is a function of internet adoptio...

  9. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  10. Dynamic optical fiber delivery of Ka-band packet transmissions for wireless access networks

    DEFF Research Database (Denmark)

    Rodríguez Páez, Juan Sebastián; Madsen, Peter; Tafur Monroy, Idelfonso

    2017-01-01

    A Reconfigurable Radio Access Unit is presented and experimentally demonstrated. In the unit, an optical switching system is set to dynamically deliver different packets to different points in the network. The packets are transmitted wirelesslty on the Ka-band (26–40 GHz), achieving BER values...

  11. On the Need of Novel Medium Access Control Schemes for Network Coding enabled Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Paramanathan, Achuthan; Pahlevani, Peyman; Roetter, Daniel Enrique Lucani

    2013-01-01

    that network coding will improve the throughput in such systems, but our novel medium access scheme improves the performance in the cross topology by another 66 % for network coding and 150 % for classical forwarding in theory. These gains translate in a theoretical gain of 33 % of network coding over...

  12. Chromhome: a rich internet application for accessing comparative chromosome homology maps.

    Science.gov (United States)

    Nagarajan, Sridevi; Rens, Willem; Stalker, James; Cox, Tony; Ferguson-Smith, Malcolm A

    2008-03-26

    Comparative genomics has become a significant research area in recent years, following the availability of a number of sequenced genomes. The comparison of genomes is of great importance in the analysis of functionally important genome regions. It can also be used to understand the phylogenetic relationships of species and the mechanisms leading to rearrangement of karyotypes during evolution. Many species have been studied at the cytogenetic level by cross species chromosome painting. With the large amount of such information, it has become vital to computerize the data and make them accessible worldwide. Chromhome http://www.chromhome.org is a comprehensive web application that is designed to provide cytogenetic comparisons among species and to fulfil this need. The Chromhome application architecture is multi-tiered with an interactive client layer, business logic and database layers. Enterprise java platform with open source framework OpenLaszlo is used to implement the Rich Internet Chromhome Application. Cross species comparative mapping raw data are collected and the processed information is stored into MySQL Chromhome database. Chromhome Release 1.0 contains 109 homology maps from 51 species. The data cover species from 14 orders and 30 families. The homology map displays all the chromosomes of the compared species as one image, making comparisons among species easier. Inferred data also provides maps of homologous regions that could serve as a guideline for researchers involved in phylogenetic or evolution based studies. Chromhome provides a useful resource for comparative genomics, holding graphical homology maps of a wide range of species. It brings together cytogenetic data of many genomes under one roof. Inferred painting can often determine the chromosomal homologous regions between two species, if each has been compared with a common third species. Inferred painting greatly reduces the need to map entire genomes and helps focus only on relevant

  13. Chromhome: A rich internet application for accessing comparative chromosome homology maps

    Directory of Open Access Journals (Sweden)

    Cox Tony

    2008-03-01

    Full Text Available Abstract Background Comparative genomics has become a significant research area in recent years, following the availability of a number of sequenced genomes. The comparison of genomes is of great importance in the analysis of functionally important genome regions. It can also be used to understand the phylogenetic relationships of species and the mechanisms leading to rearrangement of karyotypes during evolution. Many species have been studied at the cytogenetic level by cross species chromosome painting. With the large amount of such information, it has become vital to computerize the data and make them accessible worldwide. Chromhome http://www.chromhome.org is a comprehensive web application that is designed to provide cytogenetic comparisons among species and to fulfil this need. Results The Chromhome application architecture is multi-tiered with an interactive client layer, business logic and database layers. Enterprise java platform with open source framework OpenLaszlo is used to implement the Rich Internet Chromhome Application. Cross species comparative mapping raw data are collected and the processed information is stored into MySQL Chromhome database. Chromhome Release 1.0 contains 109 homology maps from 51 species. The data cover species from 14 orders and 30 families. The homology map displays all the chromosomes of the compared species as one image, making comparisons among species easier. Inferred data also provides maps of homologous regions that could serve as a guideline for researchers involved in phylogenetic or evolution based studies. Conclusion Chromhome provides a useful resource for comparative genomics, holding graphical homology maps of a wide range of species. It brings together cytogenetic data of many genomes under one roof. Inferred painting can often determine the chromosomal homologous regions between two species, if each has been compared with a common third species. Inferred painting greatly reduces the need to

  14. Mobility management techniques for the next-generation wireless networks

    Science.gov (United States)

    Sun, Junzhao; Howie, Douglas P.; Sauvola, Jaakko J.

    2001-10-01

    The tremendous demands from social market are pushing the booming development of mobile communications faster than ever before, leading to plenty of new advanced techniques emerging. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Mobility management is an important issue in the area of mobile communications, which can be best solved at the network layer. One of the key features of the next generation wireless networks is all-IP infrastructure. This paper discusses the mobility management schemes for the next generation mobile networks through extending IP's functions with mobility support. A global hierarchical framework model for the mobility management of wireless networks is presented, in which the mobility management is divided into two complementary tasks: macro mobility and micro mobility. As the macro mobility solution, a basic principle of Mobile IP is introduced, together with the optimal schemes and the advances in IPv6. The disadvantages of the Mobile IP on solving the micro mobility problem are analyzed, on the basis of which three main proposals are discussed as the micro mobility solutions for mobile communications, including Hierarchical Mobile IP (HMIP), Cellular IP, and Handoff-Aware Wireless Access Internet Infrastructure (HAWAII). A unified model is also described in which the different micro mobility solutions can coexist simultaneously in mobile networks.

  15. When Whereabouts is No Longer Thereabouts: Location Privacy in Wireless Networks

    OpenAIRE

    Freudiger, Julien

    2011-01-01

    Modern mobile devices are fast, programmable and feature localization and wireless capabilities. These technological advances notably facilitate mobile access to Internet, development of mobile applications and sharing of personal information, such as location information. Cell phone users can for example share their whereabouts with friends on online social networks. Following this trend, the field of ubiquitous computing foresees communication netwo...

  16. Evaluation of an open-access CBT-based Internet program for social anxiety: Patterns of use, retention, and outcomes.

    Science.gov (United States)

    Dryman, M Taylor; McTeague, Lisa M; Olino, Thomas M; Heimberg, Richard G

    2017-10-01

    Internet-delivered cognitive-behavioral therapy (ICBT) has been established as both efficacious and effective in reducing symptoms of social anxiety. However, most research has been conducted in controlled settings, and little is known regarding the utility of such programs in an open-access format. The present study examined the use, adherence, and effectiveness of Joyable, an open-access, Internet-delivered, coach-supported CBT-based intervention for social anxiety. Participants were 3,384 registered users (Mage [SD] = 29.82 [7.89]; 54% male) that created an account between 2014 and 2016. Characteristics of use, factors related to attrition and adherence, and within-group outcomes were examined. The primary outcome measure was the Social Phobia Inventory. On average, participants remained in the program for 81.02 days (SD = 60.50), during which they completed 12.14 activities (SD = 11.09) and 1.53 exposures (SD = 3.18). About half (57%) had contact with a coach. Full adherence to the program was achieved by 16% of participants, a rate higher than previously published open-access studies of ICBT. Social anxiety symptoms were significantly reduced for participants that engaged in the program, with medium within-group effects from baseline through the cognitive restructuring module (d = 0.63-0.76) and large effects from baseline through the exposure module (d = 1.40-1.83). Response rates were high (72%). Exposures and coach contact were significant predictors of retention and outcome. This open-access online CBT-based program is effective in reducing social anxiety symptoms and has the potential to extend Internet-based mental health services to socially anxious individuals unwilling or unable to seek face-to-face evidence-based therapy. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  17. Electromagnetic interference-aware transmission scheduling and power control for dynamic wireless access in hospital environments.

    Science.gov (United States)

    Phunchongharn, Phond; Hossain, Ekram; Camorlinga, Sergio

    2011-11-01

    We study the multiple access problem for e-Health applications (referred to as secondary users) coexisting with medical devices (referred to as primary or protected users) in a hospital environment. In particular, we focus on transmission scheduling and power control of secondary users in multiple spatial reuse time-division multiple access (STDMA) networks. The objective is to maximize the spectrum utilization of secondary users and minimize their power consumption subject to the electromagnetic interference (EMI) constraints for active and passive medical devices and minimum throughput guarantee for secondary users. The multiple access problem is formulated as a dual objective optimization problem which is shown to be NP-complete. We propose a joint scheduling and power control algorithm based on a greedy approach to solve the problem with much lower computational complexity. To this end, an enhanced greedy algorithm is proposed to improve the performance of the greedy algorithm by finding the optimal sequence of secondary users for scheduling. Using extensive simulations, the tradeoff in performance in terms of spectrum utilization, energy consumption, and computational complexity is evaluated for both the algorithms.

  18. Accessible Internet-of-Things and Internet-of-Content Services for All in the Home or on the Move

    Directory of Open Access Journals (Sweden)

    Dimitris Tektonidis

    2012-10-01

    Full Text Available Public authorities and national healthcare service providers across the European Union and beyond are increasingly under pressure to deliver better services with diminishing resources. Users, quite rightly, demand a high standard of service and increasingly also convenience focused on the needs of the users rather than how the services are organised to deliver them. Users, on the whole, also prefer to be supported in their homes, and be free to move as much as possible. While users without impairments and generally well provided for, there are increasingly also users who have special needs, including the aged and those with a range of physical and mental disabilities who are unable to make effective use of such services from their homes due to the lack of proactive and accessible services. The idea we promote in the chapter is to provide better support to users with disabilities and impairments from the comfort of their home by means of providing them with a set of scalable services which can be either offered for free or purchased through some central form of a marketplace repository.

  19. Wireless Technology in K-12 Education

    Science.gov (United States)

    Walery, Darrell

    2004-01-01

    Many schools begin implementing wireless technology slowly by creating wireless "hotspots" on the fly. This is accomplished by putting a wireless access point on a cart along with a set of wireless laptop computers. A teacher can then wheel the cart anywhere in the school that has a network drop, plug the access point in and have an…

  20. Energy Efficient Medium Access Control Protocol for Clustered Wireless Sensor Networks with Adaptive Cross-Layer Scheduling.

    Science.gov (United States)

    Sefuba, Maria; Walingo, Tom; Takawira, Fambirai

    2015-09-18

    This paper presents an Energy Efficient Medium Access Control (MAC) protocol for clustered wireless sensor networks that aims to improve energy efficiency and delay performance. The proposed protocol employs an adaptive cross-layer intra-cluster scheduling and an inter-cluster relay selection diversity. The scheduling is based on available data packets and remaining energy level of the source node (SN). This helps to minimize idle listening on nodes without data to transmit as well as reducing control packet overhead. The relay selection diversity is carried out between clusters, by the cluster head (CH), and the base station (BS). The diversity helps to improve network reliability and prolong the network lifetime. Relay selection is determined based on the communication distance, the remaining energy and the channel quality indicator (CQI) for the relay cluster head (RCH). An analytical framework for energy consumption and transmission delay for the proposed MAC protocol is presented in this work. The performance of the proposed MAC protocol is evaluated based on transmission delay, energy consumption, and network lifetime. The results obtained indicate that the proposed MAC protocol provides improved performance than traditional cluster based MAC protocols.

  1. Access Point Backhaul Resource Aggregation as a Many-to-One Matching Game in Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Kawther Hassine

    2017-01-01

    Full Text Available This paper studies backhaul bandwidth aggregation in the context of a wireless local area network composed of two different types of access points: those with spare backhaul capacity (which we term providers and those in shortage of it (beneficiaries; the aim is to transfer excess capacity from providers to beneficiaries. We model the system as a matching game with many-to-one setting wherein several providers can be matched to one beneficiary and adopt the so-called deferred acceptance algorithm to reach an optimal and stable solution. We consider two flavors, when the beneficiaries are limited in their resource demands and when they are not, and two scenarios, when resources are abundant and when they are scarce. Our results show that the many-to-one setting outperforms the one-to-one case in terms of overall throughput gain, resource usage, and individual beneficiaries satisfaction by up to 50%, whether resources are scarce or abundant. As of the limited versus nonlimited case, the former ensures more fair sharing of spectral resources and higher satisfaction percentage between beneficiaries.

  2. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things

    Directory of Open Access Journals (Sweden)

    José L. Hernández-Ramos

    2015-07-01

    Full Text Available As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.

  3. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things

    Science.gov (United States)

    Hernández-Ramos, José L.; Bernabe, Jorge Bernal; Moreno, M. Victoria; Skarmeta, Antonio F.

    2015-01-01

    As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things. PMID:26140349

  4. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things.

    Science.gov (United States)

    Hernández-Ramos, José L; Bernabe, Jorge Bernal; Moreno, M Victoria; Skarmeta, Antonio F

    2015-07-01

    As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.

  5. Internet Use and Access, Behavior, Cyberbullying, and Grooming: Results of an Investigative Whole City Survey of Adolescents

    Science.gov (United States)

    Toaff, Joseph; Pulvirenti, Giuliana; Settanni, Chiara; Colao, Emma; Lavano, Serena Marianna; Cemicetti, Riccardo; Cotugno, David; Perrotti, Giuseppe; Meschesi, Viviana; Montera, Roberto; Zepponi, Barbara

    2017-01-01

    Background According to the Digital Agenda for Europe, the way children use the Internet and mobile technologies has changed dramatically in the past years. Objective The aims of this study were to: (1) breakdown the modalities of access and use of the Internet by teenagers to assess risks and risky behaviors; and (2) provide scientific data to evaluate and counsel safe use of the Internet and new technologies by teenagers. Methods The study was conducted under the program “Strategies for a Better Internet for Children” started in May 2012 by the European Commission. It represents the main result of the project launched by Telecom Italia, “Anche io ho qualcosa da dire” (I too have something to say), thanks to which many contributions were collected and used to develop a survey. The questionnaire was structured in 45 questions, covering three macro areas of interest. It was approved by the Department Board at University of Magna Graecia’s School of Medicine. After authorization from the regional high school authority, it was administered to all 1534 students (aged 13-19 years) in the city of Catanzaro, Italy. Results The data was broken down into three main groups: (1) describing education and access to the Internet; (2) methods of use and social networking; and (3) perception and evaluation of risk and risky behaviors. Among noteworthy results in the first group, we can mention that the average age of first contact with information technologies was around 9 years. Moreover, 78.87% (1210/1534) of the interviewed students reported having access to a smartphone or a tablet. Among the results of the second group, we found that the most used social networks were Facebook (85.78%, 1316/1534), YouTube (61.14%, 938/1534), and Google+ (51.56%, 791/1534). About 71.31% (1094/1534) of the interviewed teenagers use their name and surname on social networks, and 40.09% (615/1534) of them knew all their Facebook contacts personally. Among the results of the third group

  6. Internet Use and Access, Behavior, Cyberbullying, and Grooming: Results of an Investigative Whole City Survey of Adolescents.

    Science.gov (United States)

    Vismara, Marco Flavio Michele; Toaff, Joseph; Pulvirenti, Giuliana; Settanni, Chiara; Colao, Emma; Lavano, Serena Marianna; Cemicetti, Riccardo; Cotugno, David; Perrotti, Giuseppe; Meschesi, Viviana; Montera, Roberto; Zepponi, Barbara; Rapetto, Umberto; Marotta, Rosa

    2017-08-29

    According to the Digital Agenda for Europe, the way children use the Internet and mobile technologies has changed dramatically in the past years. The aims of this study were to: (1) breakdown the modalities of access and use of the Internet by teenagers to assess risks and risky behaviors; and (2) provide scientific data to evaluate and counsel safe use of the Internet and new technologies by teenagers. The study was conducted under the program "Strategies for a Better Internet for Children" started in May 2012 by the European Commission. It represents the main result of the project launched by Telecom Italia, "Anche io ho qualcosa da dire" (I too have something to say), thanks to which many contributions were collected and used to develop a survey. The questionnaire was structured in 45 questions, covering three macro areas of interest. It was approved by the Department Board at University of Magna Graecia's School of Medicine. After authorization from the regional high school authority, it was administered to all 1534 students (aged 13-19 years) in the city of Catanzaro, Italy. The data was broken down into three main groups: (1) describing education and access to the Internet; (2) methods of use and social networking; and (3) perception and evaluation of risk and risky behaviors. Among noteworthy results in the first group, we can mention that the average age of first contact with information technologies was around 9 years. Moreover, 78.87% (1210/1534) of the interviewed students reported having access to a smartphone or a tablet. Among the results of the second group, we found that the most used social networks were Facebook (85.78%, 1316/1534), YouTube (61.14%, 938/1534), and Google+ (51.56%, 791/1534). About 71.31% (1094/1534) of the interviewed teenagers use their name and surname on social networks, and 40.09% (615/1534) of them knew all their Facebook contacts personally. Among the results of the third group, we found that 7.69% (118/1534) of the

  7. A novel PON based UMTS broadband wireless access network architecture with an algorithm to guarantee end to end QoS

    Science.gov (United States)

    Sana, Ajaz; Hussain, Shahab; Ali, Mohammed A.; Ahmed, Samir

    2007-09-01

    In this paper we proposes a novel Passive Optical Network (PON) based broadband wireless access network architecture to provide multimedia services (video telephony, video streaming, mobile TV, mobile emails etc) to mobile users. In the conventional wireless access networks, the base stations (Node B) and Radio Network Controllers (RNC) are connected by point to point T1/E1 lines (Iub interface). The T1/E1 lines are expensive and add up to operating costs. Also the resources (transceivers and T1/E1) are designed for peak hours traffic, so most of the time the dedicated resources are idle and wasted. Further more the T1/E1 lines are not capable of supporting bandwidth (BW) required by next generation wireless multimedia services proposed by High Speed Packet Access (HSPA, Rel.5) for Universal Mobile Telecommunications System (UMTS) and Evolution Data only (EV-DO) for Code Division Multiple Access 2000 (CDMA2000). The proposed PON based back haul can provide Giga bit data rates and Iub interface can be dynamically shared by Node Bs. The BW is dynamically allocated and the unused BW from lightly loaded Node Bs is assigned to heavily loaded Node Bs. We also propose a novel algorithm to provide end to end Quality of Service (QoS) (between RNC and user equipment).The algorithm provides QoS bounds in the wired domain as well as in wireless domain with compensation for wireless link errors. Because of the air interface there can be certain times when the user equipment (UE) is unable to communicate with Node B (usually referred to as link error). Since the link errors are bursty and location dependent. For a proposed approach, the scheduler at the Node B maps priorities and weights for QoS into wireless MAC. The compensations for errored links is provided by the swapping of services between the active users and the user data is divided into flows, with flows allowed to lag or lead. The algorithm guarantees (1)delay and throughput for error-free flows,(2)short term fairness

  8. Apparatus and method supporting wireless access to multiple security layers in an industrial control and automation system or other system

    Science.gov (United States)

    Chen, Yu-Gene T.

    2013-04-16

    A method includes receiving a message at a first wireless node. The first wireless node is associated with a first wired network, and the first wired network is associated with a first security layer. The method also includes transmitting the message over the first wired network when at least one destination of the message is located in the first security layer. The method further includes wirelessly transmitting the message for delivery to a second wireless node when at least one destination of the message is located in a second security layer. The second wireless node is associated with a second wired network, and the second wired network is associated with the second security layer. The first and second security layers may be associated with different security paradigms and/or different security domains. Also, the message could be associated with destinations in the first and second security layers.

  9. Internet and Archival Science: archival institutions, users and Access to Information Act

    OpenAIRE

    Mariz, Anna Carla Almeida

    2012-01-01

    Breve abordagem sobre aspectos teóricos e técnicos que caracterizam os processos de transferência da informação difundida pelas instituições arquivísticas públicas brasileiras na internet. Para tal, foram empreendidas pesquisas empíricas com o objetivo de verificar as relações da internet com os arquivos públicos, com seus usuários e com a Lei de Acesso à Informação. Foram utilizadas consultas aos sites de instituições arquivísticas públicas brasileiras na internet e entrevistas com usuários ...

  10. Media Access Time-Rearrangement of Wireless LAN for a Multi-Radio Collocated Platform

    Science.gov (United States)

    Shin, Sang-Heon; Kim, Chul; Park, Sang Kyu

    With the advent of new Radio Access Technologies (RATs), it is inevitable that several RATs will co-exist, especially in the license-exempt band. In this letter, we present an in-depth adaptation of the proactive time-rearrangement (PATRA) scheme for IEEE 802.11 WLAN. The PATRA is a time division approach for reducing interference from a multi-radio device. Because IEEE 802.11 is based on carrier sensing and contention mechanism, it is the most suitable candidate to adapt the PATRA.

  11. Broadband Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Broadband Access. Worldwide market for broadband access $30 Billion! Over 200 million broadband subscribers worldwide! Various Competing Broadband access. Digital Subscriber line; Wireless; Optical Fiber.

  12. Increasing gas producer profitability with virtual well visibility via an end-to-end wireless Internet gas monitoring system

    Energy Technology Data Exchange (ETDEWEB)

    McDougall, M. [Northrock Resources Ltd., Calgary, AB (Canada); Benterud, K. [Zed.i solutions, Calgary, AB (Canada)

    2003-07-01

    This PowerPoint presentation describes how Northrock Resources Ltd. increased profitability using Smart-Alek{sup TM} while avoiding high implementation costs. Smart-Alek is a new type of fully integrated end-to-end electronic gas flow measurement (GFM) system based on Field Intelligence Network and End User Interference (FINE). Smart-Alek can analyze gas production through public wireless communications and a web-browser delivery system. The system has enabled Northrock to increase gas volumes with more accurate measurement and reduced downtime. In addition, operating costs have decreased because the frequency of well visits has been reduced and the administrative procedures of data collection is more efficient. The real-time well visibility of the tool has proven to be very effective in optimizing business profitability. 7 figs.

  13. An Adaptive Time-Spread Multiple-Access Policy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Konstantinos Oikonomou

    2007-05-01

    Full Text Available Sensor networks require a simple and efficient medium access control policy achieving high system throughput with no or limited control overhead in order to increase the network lifetime by minimizing the energy consumed during transmission attempts. Time-spread multiple-access (TSMA policies that have been proposed for ad hoc network environments, can also be employed in sensor networks, since no control overhead is introduced. However, they do not take advantage of any cross-layer information in order to exploit the idiosyncrasies of the particular sensor network environment such as the presence of typically static nodes and a common destination for the forwarded data. An adaptive probabilistic TSMA-based policy, that is proposed and analyzed in this paper, exploits these idiosyncrasies and achieves higher system throughput than the existing TSMA-based policies without any need for extra control overhead. As it is analytically shown in this paper, the proposed policy always outperforms the existing TSMA-based policies, if certain parameter values are properly set; the analysis also provides for these proper values. It is also shown that the proposed policy is characterized by a certain convergence period and that high system throughput is achieved for long convergence periods. The claims and expectations of the provided analysis are supported by simulation results presented in this paper.

  14. A Seamless Handoff Scheme with Access Point Load Balance for Real-Time Services Support in 802.11 Wireless LANs

    Science.gov (United States)

    Manodham, Thavisak; Loyola, Luis; Miki, Tetsuya

    IEEE 802.11 wirelesses LANs (WLANs) have been rapidly deployed in enterprises, public areas, and households. Voice-over-IP (VoIP) and similar applications are now commonly used in mobile devices over wireless networks. Recent works have improved the quality of service (QoS) offering higher data rates to support various kinds of real-time applications. However, besides the need for higher data rates, seamless handoff and load balancing among APs are key issues that must be addressed in order to continue supporting real-time services across wireless LANs and providing fair services to all users. In this paper, we introduce a novel access point (AP) with two transceivers that improves network efficiency by supporting seamless handoff and traffic load balancing in a wireless network. In our proposed scheme, the novel AP uses the second transceiver to scan and find neighboring STAs in the transmission range and then sends the results to neighboring APs, which compare and analyze whether or not the STA should perform a handoff. The initial results from our simulations show that the novel AP module is more effective than the conventional scheme and a related work in terms of providing a handoff process with low latency and sharing traffic load with neighbor APs.

  15. Persistent digital divide in access to and use of the Internet as a resource for health information: Results from a California population-based study.

    Science.gov (United States)

    Nguyen, Amy; Mosadeghi, Sasan; Almario, Christopher V

    2017-07-01

    Access to the Internet has grown dramatically over the past two decades. Using data from a population-based survey, we aimed to determine the prevalence and predictors of (i) access to the Internet, and (ii) use of the Internet to search for health information. We analyzed data from the 2011-12 California Health Interview Survey (CHIS) and included all individuals 18 years of age and older. Our outcomes were (i) prior use of the Internet, and (ii) use of the Internet to find health or medical information within the past year. We performed survey-weighted logistic regression models on our outcomes to adjust for potentially confounding demographic and socioeconomic factors. Our study included an unweighted and survey-weighted sample of 42,935 and 27,796,484 individuals, respectively. We found that 81.5% of the weighted sample reported having previously used the Internet. Among Internet users, 64.5% stated that they used the Internet within the past year to find health or medical information. Racial/ethnic minorities, older individuals, and those who lived in lower income households and rural areas were less likely to have access to and use the Internet to search for health information. Conversely, English-proficiency and increasing levels of education were positively associated with online health information-seeking. We found that most Californians have access to and use the Internet to search for health information, but still noted a persistent digital divide. Interventions to narrow the divide are needed, otherwise this may lead to a continued widening of existing healthcare disparities. Copyright © 2017 Elsevier B.V. All rights reserved.

  16. Wired and wireless convergent extended-reach optical access network using direct-detection of all-optical OFDM super-channel signal.

    Science.gov (United States)

    Chow, C W; Yeh, C H; Sung, J Y; Hsu, C W

    2014-12-15

    We propose and demonstrate the feasibility of using all-optical orthogonal frequency division multiplexing (AO-OFDM) for the convergent optical wired and wireless access networks. AO-OFDM relies on all-optically generated orthogonal subcarriers; hence, high data rate (> 100 Gb/s) can be easily achieved without hitting the speed limit of electronic digital-to-analog and analog-to-digital converters (DAC/ADC). A proof-of-concept convergent access network using AO-OFDM super-channel (SC) is demonstrated supporting 40 - 100 Gb/s wired and gigabit/s 100 GHz millimeter-wave (MMW) ROF transmissions.

  17. Design of handoff procedures for broadband wireless access IEEE 802.16 based networks

    Directory of Open Access Journals (Sweden)

    V. Rangel–Licea

    2008-01-01

    Full Text Available IEEE 802.16 is a protocol for fixed broad band wire less access that is currently trying to add mobility among mobile users in the standard. However, mobility adds some technical barriers that should be solved first, this is the case of HO "handoff" (change of connection between two base stations "BS" by a mobile user. In this paper, the problem of HO in IEEE 802.16 is approached try ing to maintain the quality of service (QoS of mobile users. A mechanism for changing connection during HO is pre sented. A simulation model based on OPNET MODELER1 was developed to evaluate the performance of the proposed HO mechanism. Finally, this paper demonstrates that it is possible to implement a seam less HO mech a nism over IEEE 802.16 even for users with de manding applications such as voice over IP.

  18. An examination of the patterns of access and use of the internet by ...

    African Journals Online (AJOL)

    The findings of the study revealed that the low use of the Internet for business, education and e-commerce can be improved through development of human resource. ICT infrastructure should be developed in different socio-economic sectors and that Kiswahili should be used in designing local websites so as to enable ...

  19. Internet Access and Youth of Yakutia Awareness on the Health-Promotion Factor

    Science.gov (United States)

    Barakhsanova, Elizabeth Afanasyevna; Ignatyev, Vladimir Petrovich; Savvinov, Vasily Mikhaylovich; Olesova, Sargulana Gavrilievna

    2016-01-01

    Thematic justification is determined by the fact that in the conditions of the steady growth of mobile technology the youth accurately does not represent health promotion value when using the Internet at home, at school and other entertainment leisure recreation. With respect thereto this paper is aimed at monitoring general awareness of seniors…

  20. Toward a Multifaceted Model of Internet Access for Understanding Digital Divides: An Empirical Investigation

    NARCIS (Netherlands)

    van Deursen, Alexander Johannes Aloysius Maria; van Dijk, Johannes A.G.M.

    2015-01-01

    In this investigation, a multifaceted model of Internet appropriation that encompasses four types of access—motivational, material, skills, and usage—is tested with a representative sample of the Dutch population. The analysis indicates that while the digital divide policies' focus has moved to

  1. [Access to the internet among nurses and type of information sought].

    Science.gov (United States)

    Muñoz-Izquierdo, Amparo; Puchades-Simó, Amparo; Marco-Gisbert, Amparo; Piquer-Bosca, Cecilia; Ferrer-Casares, Elena; Canela-Ferrer, Amparo; Gómez-Muñoz, Neus; Costa-Pastrana, M Carmen

    2008-01-01

    To identify how nurses use the Internet through a survey performed in May 2005. A descriptive cross-sectional study was performed. The information source was a survey sent electronically and through surface mail. The study population consisted of nursing professionals from distinct autonomous regions. The overall response rate was 40% (444 of 1,100). A total of 38.6% (184) of the nursing professionals used the Internet continually, especially men and nursing staff with a high level of English. The 5 most frequent reasons for surfing the net were searching for nursing literature (63% [264]), consulting the web pages of nursing journals (58.6% [256]), seeking information on drugs (55% [230]), seeking protocol manuals (50% [204]), and consulting the web pages of colleges of nursing (48). The behavior of nursing professionals is similar to that found among the general population in the "BBVA Foundation study of the Internet in Spain". Most nursing professionals are women. Male nursing professionals more frequently search for subjects related to nursing theory. Nurses use the Internet to search for nursing literature and consult journals, protocol manuals, and colleges of nursing, as well as to be familiar with the information aimed at patients.

  2. A Study of Internet Access and Usage among Students in the ...

    African Journals Online (AJOL)

    The study recommended upgrade of bandwidth and provision of alternative power supply. For enhanced excellent library service the study suggest university library to seize the opportunity by providing adequate internet services and so be business conscious for this is an avenue of generating income for the library.

  3. Characterizing Computer Access Using a One-Channel EEG Wireless Sensor.

    Science.gov (United States)

    Molina-Cantero, Alberto J; Guerrero-Cubero, Jaime; Gómez-González, Isabel M; Merino-Monge, Manuel; Silva-Silva, Juan I

    2017-06-29

    This work studies the feasibility of using mental attention to access a computer. Brain activity was measured with an electrode placed at the Fp1 position and the reference on the left ear; seven normally developed people and three subjects with cerebral palsy (CP) took part in the experimentation. They were asked to keep their attention high and low for as long as possible during several trials. We recorded attention levels and power bands conveyed by the sensor, but only the first was used for feedback purposes. All of the information was statistically analyzed to find the most significant parameters and a classifier based on linear discriminant analysis (LDA) was also set up. In addition, 60% of the participants were potential users of this technology with an accuracy of over 70%. Including power bands in the classifier did not improve the accuracy in discriminating between the two attentional states. For most people, the best results were obtained by using only the attention indicator in classification. Tiredness was higher in the group with disabilities (2.7 in a scale of 3) than in the other (1.5 in the same scale); and modulating the attention to access a communication board requires that it does not contain many pictograms (between 4 and 7) on screen and has a scanning period of a relatively high t s c a n ≈ 10 s. The information transfer rate (ITR) is similar to the one obtained by other brain computer interfaces (BCI), like those based on sensorimotor rhythms (SMR) or slow cortical potentials (SCP), and makes it suitable as an eye-gaze independent BCI.

  4. Increasing Public Awareness of Direct-to-Consumer Genetic Tests: Health Care Access, Internet Use, and Population Density Correlates

    International Nuclear Information System (INIS)

    Rutten, L. J. F.; Gollust, S. E.; Naveed, S.; Moser, R. P.

    2012-01-01

    Uncertainty around the value of and appropriate regulatory models for direct-to-consumer (DTC) genetic testing underscores the importance of tracking public awareness of these services. We analyzed nationally representative, cross-sectional data from the Health Information National Trends Survey in 2008 (n=7, 674) and 2011 (n=3, 959) to assess population-level changes in awareness of DTC genetic testing in the U.S. and to explore socio demographic, health care, Internet use, and population density correlates. Overall, awareness increased significantly from 29% in 2008 to 37% in 2011. The observed increase in awareness from 2008 to 2011 remained significant (OR=1.39) even when adjusted for socio demographic variables, health care access, Internet use, and population density. Independent of survey year, the odds of awareness of DTC genetic tests were significantly higher for those aged 50-64 (OR=1.64), and 65-74 (O R=1.60); college graduates (OR=2.02 ); those with a regular source of health care (OR=1.27); those with a prior cancer diagnosis (OR=1.24); those who use the Internet (OR=1.27); and those living in urban areas ( OR=1.25). Surveillance of awareness-along with empirical data on use of and response to genetic risk information-can inform public health and policy efforts to maximize benefits and minimize risks of DTC genetic testing.

  5. Increasing Public Awareness of Direct-to-Consumer Genetic Tests: Health Care Access, Internet Use, and Population Density Correlates

    Directory of Open Access Journals (Sweden)

    Lila J. Finney Rutten

    2012-01-01

    Full Text Available Uncertainty around the value of and appropriate regulatory models for direct-to-consumer (DTC genetic testing underscores the importance of tracking public awareness of these services. We analyzed nationally representative, cross-sectional data from the Health Information National Trends Survey in 2008 (n=7,674 and 2011 (n=3,959 to assess population-level changes in awareness of DTC genetic testing in the U.S. and to explore sociodemographic, health care, Internet use, and population density correlates. Overall, awareness increased significantly from 29% in 2008 to 37% in 2011. The observed increase in awareness from 2008 to 2011 remained significant (OR=1.39 even when adjusted for sociodemographic variables, health care access, Internet use, and population density. Independent of survey year, the odds of awareness of DTC genetic tests were significantly higher for those aged 50–64 (OR=1.64, and 65–74 (OR=1.60; college graduates (OR=2.02; those with a regular source of health care (OR=1.27; those with a prior cancer diagnosis (OR=1.24; those who use the Internet (OR=1.27; and those living in urban areas (OR=1.25. Surveillance of awareness—along with empirical data on use of and response to genetic risk information—can inform public health and policy efforts to maximize benefits and minimize risks of DTC genetic testing.

  6. Increasing Public Awareness of Direct-to-Consumer Genetic Tests: Health Care Access, Internet Use, and Population Density Correlates.

    Science.gov (United States)

    Finney Rutten, Lila J; Gollust, Sarah E; Naveed, Sana; Moser, Richard P

    2012-01-01

    Uncertainty around the value of and appropriate regulatory models for direct-to-consumer (DTC) genetic testing underscores the importance of tracking public awareness of these services. We analyzed nationally representative, cross-sectional data from the Health Information National Trends Survey in 2008 (n = 7, 674) and 2011 (n = 3, 959) to assess population-level changes in awareness of DTC genetic testing in the U.S. and to explore sociodemographic, health care, Internet use, and population density correlates. Overall, awareness increased significantly from 29% in 2008 to 37% in 2011. The observed increase in awareness from 2008 to 2011 remained significant (OR = 1.39) even when adjusted for sociodemographic variables, health care access, Internet use, and population density. Independent of survey year, the odds of awareness of DTC genetic tests were significantly higher for those aged 50-64 (OR = 1.64), and 65-74 (OR = 1.60); college graduates (OR = 2.02); those with a regular source of health care (OR = 1.27); those with a prior cancer diagnosis (OR = 1.24); those who use the Internet (OR = 1.27); and those living in urban areas (OR = 1.25). Surveillance of awareness-along with empirical data on use of and response to genetic risk information-can inform public health and policy efforts to maximize benefits and minimize risks of DTC genetic testing.

  7. Increasing gas producer profitability with virtual well visibility via an end-to-end, wireless Internet gas monitoring system

    Energy Technology Data Exchange (ETDEWEB)

    McDougall, M.; Coleman, K.; Beck, R.; Lyon, R.; Potts, R. [Northrock Resources Ltd., Calgary, AB (Canada); Benterud, K. [Zed.i solutions, Calgary, AB (Canada)

    2003-07-01

    Most gas producing companies still use 100-year old technology to measure gas volumes because of the prohibitive costs of implementing corporate wide electronic information systems to replace circular mechanical chart technology. This paper describes how Northrock Resources Ltd. increased profitability using Smart-Alek{sup TM} while avoiding high implementation costs. Smart-Alek is a new type of fully integrated end-to-end electronic gas flow measurement (GFM) system based on Field Intelligence Network and End User Interference (FINE). Smart-Alek can analyze gas production through public wireless communications and a web-browser delivery system. The system has enabled Northrock to increase gas volumes with more accurate measurement and reduced downtime. In addition, operating costs were also decreased because the frequency of well visits was reduced and the administrative procedures of data collection was more efficient. The real-time well visibility of the tool has proven to be very effective in optimizing business profitability. 9 refs., 1 tab., 9 figs.

  8. Sustains--direct access for the patient to the medical record over the Internet.

    Science.gov (United States)

    Eklund, Benny; Joustra-Enquist, Ingrid

    2004-01-01

    The basic idea of Sustains III is to emulate the Internet banking for Health Care. Instead of an "Internet Bank Account" the user has a "Health Care Account". The user logs in using a One Time Password which is sent to the user's mobile phone as an SMS, three seconds after the PIN code is entered. Thus personal information can be transferred both ways in a secure way, with acceptable privacy. The user can then explore the medical record in detail. Also get full and complete list of prescriptions, lab-result etc. It's also an easy way of exchange written information between the doctor and the patient. So far Sustains has showed that patients are very satisfied and is also beneficial for the physicians.

  9. "La Comunidad Habla": Using Internet Community-Based Information Interventions to Increase Empowerment and Access to Health Care of Low Income Latino/a Immigrants

    Science.gov (United States)

    Ginossar, Tamar; Nelson, Sara

    2010-01-01

    The innovative educational communication interventions described in this paper include the use of bi-lingual, low literacy level websites and training created by low income Latina women to increase access to health care, health information, and the internet. We focus on one grassroots intervention, aimed at increasing access to health care for…

  10. Internet: An Innovative Environment for Information Dissemination, Access, and Retrieval in Distance Education

    OpenAIRE

    Tonta, Yaşar

    1995-01-01

    Information sources available through the networks such as the Internet and Bitnet have proliferated and diversified in recent years. Nowadays, in addition to textual information, multimedia databases containing `documents' with graphics, images, sound and animation can often be found on the network. Government agencies, various institutions, commercial companies, and, more recently, individuals themselves, can disseminate information and open their own databases to the use of others who have...

  11. New Paradigms in Access to Scientific Information and the Role of the Internet

    Directory of Open Access Journals (Sweden)

    Bülent Karasözen

    1996-09-01

    Full Text Available The Internet transforms the scholarly communication world-wide. Electronic pre­print archives, electronic journals, discussion groups are some of the new ways to get acccss to information. This paper discusses some of these new developments from the perspective of scholarly communication. Among the topics covered are quality control of scientif ic publications in the electronic world, information overload, the impact of electronic publishing on librai'ies and publishers, and the economics of electronic publishing.

  12. Infoscience technology: the impact of internet accessible melanoid data on health issues

    Directory of Open Access Journals (Sweden)

    J W Grzymała-Busse

    2006-01-01

    Full Text Available In this paper the development of a new internet information system for analyzing and classifying melanocytic dat, is briefly described. This system also has some teaching functions, improves the analysis of datasets based on calculating the values of the TDS (Total Dermatoscopy Score (Braun-Falco, Stolz, Bilek, Merkle, & Landthaler, 1990; Hippe, Bajcar, Blajdo, Grzymala-Busse, Grzymala-Busse, & Knap, et al., 2003 parameter. Calculations are based on two methods: the classical ABCD formula (Braun-Falco et al., 1990 and the optimized ABCD formula (Alvarez, Bajcar, Brown, Grzymala-Busse, & Hippe, 2003. A third method of classification is devoted to quasi-optimal decision trees (Quinlan, 1993. The developed internet-based tool enables users to make an early, non-invasive diagnosis of melanocytic lesions. This is possible using a built-in set of instructions that animates the diagnosis of the four basic lesions types: benign nevus, blue nevus, suspicious nevus and melanoma malignant. This system is available on the Internet website: http://www.wsiz.rzeszow.pl/ksesi.

  13. Breast cancer information on the internet: analysis of accessibility and accuracy.

    LENUS (Irish Health Repository)

    Quinn, E M

    2012-02-18

    Studies show internet sourced information often has poor accuracy. However, it is rapidly becoming a major source of patient information. Our aim was to assess accuracy of breast cancer-related information on the internet. The top five breast cancer-related search terms were identified using the commercial program "Wordtracker". These terms were searched using the search-engine "Google" and the top 100 webpages per topic analysed for applicability and accuracy of information. Overall 500 webpages were analysed. 42% were inapplicable to the question asked. Applicable accuracy rates were variable amongst the five terms: "breast cancer symptoms" 84%, "breast cancer care" 87%, "breast cancer stage" 88%, "breast cancer survival" 91% and "breast cancer signs" 78%. Educational websites were more likely to be accurate(p < 0.001) and interest group administered websites less likely to be accurate(p = 0.018) than other websites. Finding accurate breast cancer information on the internet is difficult due to large numbers of inapplicable unregulated websites preferentially returned via search engines.

  14. A randomized study of internet parent training accessed from community technology centers.

    Science.gov (United States)

    Irvine, A Blair; Gelatt, Vicky A; Hammond, Michael; Seeley, John R

    2015-05-01

    Behavioral parent training (BPT) has been shown to be efficacious to improve parenting skills for problematic interactions with adolescents displaying oppositional and antisocial behaviors. Some research suggests that support group curricula might be transferred to the Internet, and some studies suggest that other curriculum designs might also be effective. In this research, a BPT program for parents of at-risk adolescents was tested on the Internet in a randomized trial (N = 307) from computer labs at six community technology centers in or near large metropolitan areas. The instructional design was based on asynchronous scenario-based e-learning, rather than a traditional parent training model where presentation of course material builds content sequentially over multiple class sessions. Pretest to 30-day follow-up analyses indicated significant treatment effects on parent-reported discipline style (Parenting Scale, Adolescent version), child behavior (Eyberg Child Behavior Inventory), and on social cognitive theory constructs of intentions and self-efficacy. The effect sizes were small to medium. These findings suggest the potential to provide effective parent training programs on the Internet.

  15. Multi-Channel Multi-Radio Using 802.11 Based Media Access for Sink Nodes in Wireless Sensor Networks

    OpenAIRE

    Campbell, Carlene E.-A.; Khan, Shafiullah; Singh, Dhananjay; Loo, Kok-Keong

    2011-01-01

    The next generation surveillance and multimedia systems will become increasingly deployed as wireless sensor networks in order to monitor parks, public places and for business usage. The convergence of data and telecommunication over IP-based networks has paved the way for wireless networks. Functions are becoming more intertwined by the compelling force of innovation and technology. For example, many closed-circuit TV premises surveillance systems now rely on transmitting their images and da...

  16. Evaluation of an Affordable Wireless Node Sensor (Mote69) Designed for Internet of Thing (IoT) Device

    Science.gov (United States)

    Ruhiyat, Z. F.; Somantri, Y.; Wahyudin, D.; Hakim, D. L.

    2018-02-01

    This research aims to determine the student’s response to the implementation of Internet of Things (IoT) device based on RFM69, called Mote69, for practical work of Aircraft Electronic Circuits and Controllers. Participants in this study were students of a vocational high school of Aircraft Electronics which consisted of three groups. The first group is the students who have grades above the average class. The second group is the students who have grade the average class. The third group is the students who have grades below the average class. The research phase consisted of (1). Observation and Assessment of Empirical Issues; (2). Testing of Media Feasibility and Research Instruments; (3). Accumulate and Processing of Field Data; and (4). Results and Data Conclusions. The result of media feasibility showed that Mote69 is appropriate to be used in practical work of Aircraft Electronic Circuits and Controllers subject.

  17. Testing the associations between different aspects of seafarers' employment contract and on-board internet access and their job and life satisfaction and health.

    Science.gov (United States)

    Slišković, Ana; Penezić, Zvjezdan

    2016-12-01

    The aim of this study was to test for associations between different aspects of contract and on-board internet access and seafarers' satisfaction and health. Altogether 298 Croatian seafarers, all officers, employed on cargo ships, with a minimum work experience of two years with their current shipping company, participated in an online survey. The questionnaire included sociodemographic items, questions relating to their employment contract and internet access, and measures of job satisfaction, life satisfaction, mental health, and gastrointestinal and cardiovascular symptoms. Their job- and lifesatisfaction levels were higher for shorter duration on board, favourable ratio of work to non-work days, and compliance with the employment contract regarding the changes to work and non-work days. Mental health differed likewise but only in relation to two aspects of the contract: on-board duration and compliance with the contract. The level of gastrointestinal symptoms was lower in cases of shorter on-board duration and compliance with the contract, and in seafarers who have free, unlimited internet access on board. Lower level of cardiovascular symptoms was found in seafarers with free, unlimited internet access on board. Our findings suggest that in promoting satisfaction and health in seafaring, attention should be given to reducing on-board duration, compliance with the contract, and internet accessibility on board.

  18. Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture

    Science.gov (United States)

    McCown, Steven H [Rigby, ID; Derr, Kurt W [Idaho Falls, ID; Rohde, Kenneth W [Idaho Falls, ID

    2012-05-08

    Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.

  19. An Internet of Things Based Multi-Level Privacy-Preserving Access Control for Smart Living

    OpenAIRE

    Usama Salama; Lina Yao; Hye-young Paik

    2018-01-01

    The presence of the Internet of Things (IoT) in healthcare through the use of mobile medical applications and wearable devices allows patients to capture their healthcare data and enables healthcare professionals to be up-to-date with a patient’s status. Ambient Assisted Living (AAL), which is considered as one of the major applications of IoT, is a home environment augmented with embedded ambient sensors to help improve an individual’s quality of life. This domain faces major cha...

  20. PERANCANGAN DAN IMPLEMENTASI SERVER VOICE OVER INTERNET PROTOKAL (VOIP DENGAN TRIXBOX PADA WIRELESS LOCAL AREA NETWORK MENGGUNAKAN SMARTPHONE

    Directory of Open Access Journals (Sweden)

    Muhammad Iqbal Nahwi

    2014-06-01

    Full Text Available At this time telecommunications data is very important in human life , both in terms of the relationship between the human being and the fulfillment of information and entertainment . While obviously, a current cost of communication in the country including Indonesia is still expensive . The utilization of VoIP technology in communication cheap , safe with good enough quality is very appropriate to be applied in this country . In this VoIP technology to communicate over the phone not only can be done by relying on a conventional telephone or mobile phone , but through the Internet can also be done . In this study, the methodology used is to implement Trixbox VoIP system on linux . VoIP network infrastructure protocols designed using SIP (session initiation protocol as the communication protocol , making use of free software as the operating system Linux Trixbox , asterisk as application servers , and on the client side using the X - Lite softphone Keyyo VoIP application used for client on smartphone.

  1. A Calibrated Test-Set for Measurement of Access-Point Time Specifications in Hybrid Wired/Wireless Industrial Communication †

    Directory of Open Access Journals (Sweden)

    Federico Tramarin

    2018-05-01

    Full Text Available In factory automation and process control systems, hybrid wired/wireless networks are often deployed to connect devices of difficult reachability such as those mounted on mobile equipment. A widespread implementation of these networks makes use of Access Points (APs to implement wireless extensions of Real-Time Ethernet (RTE networks via the IEEE 802.11 Wireless LAN (WLAN. Unfortunately, APs may introduce random delays in frame forwarding, mainly related to their internal behavior (e.g., queue management, processing times, that clearly impact the overall worst case execution time of real-time tasks involved in industrial process control systems. As a consequence, the knowledge of such delays becomes a crucial design parameter, and their estimation is definitely of utter importance. In this scenario, the paper presents an original and effective method to measure the aforementioned delays introduced by APs, exploiting a hybrid loop-back link and a simple, yet accurate set-up with moderate instrumentation requirements. The proposed method, which requires an initial calibration phase by means of a reference AP, has been successfully tested on some commercial APs to prove its effectiveness. The proposed measurement procedure is proven to be general and, as such, can be profitably adopted in even different scenarios.

  2. Analysis of the Main Access Municipal Project Free and Free Internet in Public Squares: Digital Inclusion in the Present Corporate Information Globalized

    Directory of Open Access Journals (Sweden)

    Anderson Nogueira Oliveira

    2015-12-01

    Full Text Available The present study has as its theme the role of municipalities in the current global information society. So it has the general objective analysis on the free access to the internet in public places as a means of digital inclusion, with such spaces known as digital o hotspots squares. In this case we will present concepts, definitions and brief historical development of the objects of study of this research, namely, globalization, the information society and digital inclusion. We emphasize that this research will analyze recent data on internet access in Brazil, and will check the key municipal projects freely and free internet access in public squares. For this research we use the hypothetical-deductive method by the methodology of analysis of books, scientific papers and official data by renamed institutions to present a scientifically valid conclusion.

  3. Towards Controlling Latency in Wireless Networks

    KAUST Repository

    Bouacida, Nader

    2017-04-24

    Wireless networks are undergoing an unprecedented revolution in the last decade. With the explosion of delay-sensitive applications in the Internet (i.e., online gaming and VoIP), latency becomes a major issue for the development of wireless technology. Taking advantage of the significant decline in memory prices, industrialists equip the network devices with larger buffering capacities to improve the network throughput by limiting packets drops. Over-buffering results in increasing the time that packets spend in the queues and, thus, introducing more latency in networks. This phenomenon is known as “bufferbloat”. While throughput is the dominant performance metric, latency also has a huge impact on user experience not only for real-time applications but also for common applications like web browsing, which is sensitive to latencies in order of hundreds of milliseconds. Concerns have arisen about designing sophisticated queue management schemes to mitigate the effects of such phenomenon. My thesis research aims to solve bufferbloat problem in both traditional half-duplex and cutting-edge full-duplex wireless systems by reducing delay while maximizing wireless links utilization and fairness. Our work shed lights on buffer management algorithms behavior in wireless networks and their ability to reduce latency resulting from excessive queuing delays inside oversized static network buffers without a significant loss in other network metrics. First of all, we address the problem of buffer management in wireless full-duplex networks by using Wireless Queue Management (WQM), which is an active queue management technique for wireless networks. Our solution is based on Relay Full-Duplex MAC (RFD-MAC), an asynchronous media access control protocol designed for relay full-duplexing. Compared to the default case, our solution reduces the end-to-end delay by two orders of magnitude while achieving similar throughput in most of the cases. In the second part of this thesis

  4. Digital Predistortion of 75-110GHzW-Band Frequency Multiplier for Fiber Wireless Short Range Access Systems

    DEFF Research Database (Denmark)

    Zhao, Ying; Pang, Xiaodan; Deng, Lei

    2011-01-01

    We present a digital predistortion technique to effectively compensate high nonlinearity of a sextuple multiplier operating at 99.6GHz. An 18.9dB adjacent-channel power ratio (ACPR) improvement is guaranteed and a W-band fiber-wireless system is experimentally investigated.......We present a digital predistortion technique to effectively compensate high nonlinearity of a sextuple multiplier operating at 99.6GHz. An 18.9dB adjacent-channel power ratio (ACPR) improvement is guaranteed and a W-band fiber-wireless system is experimentally investigated....

  5. Social disparities in internet patient portal use in diabetes: evidence that the digital divide extends beyond access.

    Science.gov (United States)

    Sarkar, Urmimala; Karter, Andrew J; Liu, Jennifer Y; Adler, Nancy E; Nguyen, Robert; López, Andrea; Schillinger, Dean

    2011-05-01

    The authors investigated use of the internet-based patient portal, kp.org, among a well-characterized population of adults with diabetes in Northern California. Among 14,102 diverse patients, 5671 (40%) requested a password for the patient portal. Of these, 4311 (76%) activated their accounts, and 3922 (69%), logged on to the patient portal one or more times; 2990 (53%) participants viewed laboratory results, 2132 (38%) requested medication refills, 2093 (37%) sent email messages, and 835 (15%) made medical appointments. After adjustment for age, gender, race/ethnicity, immigration status, educational attainment, and employment status, compared to non-Hispanic Caucasians, African-Americans and Latinos had higher odds of never logging on (OR 2.6 (2.3 to 2.9); OR 2.3 (1.9 to 2.6)), as did those without an educational degree (OR compared to college graduates, 2.3 (1.9 to 2.7)). Those most at risk for poor diabetes outcomes may fall further behind as health systems increasingly rely on the internet and limit current modes of access and communication.

  6. Internet Access, Use and Sharing Levels among Students during the Teaching-Learning Process

    Science.gov (United States)

    Tutkun, Omer F.

    2011-01-01

    The purpose of this study was to determine the awareness among students and levels regarding student access, use, and knowledge sharing during the teaching-learning process. The triangulation method was utilized in this study. The population of the research universe was 21,747. The student sample population was 1,292. Two different data collection…

  7. Who is NOT likely to access the Internet for health information? Findings from first-time mothers in southwest Sydney, Australia.

    Science.gov (United States)

    Wen, Li Ming; Rissel, Chris; Baur, Louise A; Lee, Eric; Simpson, Judy M

    2011-06-01

    This study aimed to explore inequities in access to online health information and its relation to socioeconomic status, and to inform the development of the use of the Internet for health promotion. We analyzed cross-sectional baseline survey data for 664 first-time mothers from the Healthy Beginnings Trial conducted in Southwest Sydney, Australia during 2007-2010. First-time mothers' reports of their computer ownership, sources of health information including Internet access and self-rated health as well as demographic data were collected through face-to-face interviews. Multivariate analysis was performed using log-binomial regression. We found that 37% of first-time mothers reported not using the Internet for health information. Maternal education level, household income level and having a computer at home were significant factors associated with the use of the Internet for health information after adjusting for other factors. Mothers who only had school certificate or lower were 1.5 times more likely not to use the Internet for health information than those with university/tertiary education [adjusted risk ratio (ARR) 1.50, 95% CI 1.06-2.12, P=0.03]. Mothers with a household income of less than $40,000 per year were 1.7 times more likely not to use the Internet for health information than those with a household income over $80,000 per year (ARR 1.66, 95% CI 1.24-2.12, P=0.001). These findings have important implications for using the Internet for health promotion among young women. A substantial number of first-time mothers do not access the Internet for health information, in particular among those with lower levels of education, lower household income and without a computer at home. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  8. Wireless Sensor Network for Indoor Air Quality Monitoring

    Directory of Open Access Journals (Sweden)

    Jun Li

    2014-06-01

    Full Text Available Indoor air quality monitoring system consists of wireless sensor device, nRF24L01 wireless transceiver modules, C8051MCU, STM32103 remote monitoring platform, alarm device and data server. Distributed in the interior space of wireless sensors measure parameters of the local air quality, wireless transceiver module of the MCU to transmit data to the remote monitoring platform for analysis which displayed and stored field environment data or charts. The data collecting from wireless sensors to be send by wireless Access Point to the remote data server based on B/S architecture, intelligent terminals such as mobile phone, laptop, tablet PC on the Internet monitor indoor air quality in real-time. When site environment air quality index data exceeds the threshold in the monitoring device, the remote monitoring platform sends out the alarm SMS signal to inform user by GSM module. Indoor air quality monitoring system uses modular design method, has the portability and scalability has the low manufacture cost, real-time monitoring data and man-machine interaction.

  9. 30-Gb/s bidirectional transparent optical transmission with an MMF access and an indoor optical wireless link

    NARCIS (Netherlands)

    Chen, H.; Boom, van den H.P.A.; Tangdiongga, E.; Koonen, A.M.J.

    2012-01-01

    This letter describes a 30-Gb/s bidirectional transparent optical transmission, over a 4.4-km multimode fiber (MMF) in combination with an indoor optical wireless (OW) link, which could provide limited mobility. Due to MMF's advantages, such as lower installation costs and easy maintenance, it is

  10. 2x2 MIMO-OFDM Gigabit fiber-wireless access system based on polarization division multiplexed WDM-PON

    DEFF Research Database (Denmark)

    Deng, Lei; Pang, Xiaodan; Zhao, Ying

    2012-01-01

    We propose a spectral efficient radio over wavelength division multiplexed passive optical network (WDM-PON) system by combining optical polarization division multiplexing (PDM) and wireless multiple input multiple output (MIMO) spatial multiplexing techniques. In our experiment, a training-based...

  11. Consumer informatics: helping patients to access health information via the Internet.

    Science.gov (United States)

    Rhodes, E

    2000-01-01

    Now that many patients independently access health information on the World Wide Web (WWW), healthcare professionals are becoming concerned with control and quality of information available there. The technology has the potential to help patients to become more self-sufficient in managing their own health care and outcomes. This paper examines the importance of developing mechanisms to assess the quality and content of health information websites.

  12. U.S. Government Open Internet Access to Sub-meter Satellite Data

    Science.gov (United States)

    Neigh, Christopher S. R> Masek, Jeffery G.; Nickeson, Jaime E.

    2012-01-01

    The National Geospatial-Intelligence Agency (NGA) has contracted United States commercial remote sensing companies GeoEye and Digital Globe to provide very high resolution commercial quality satellite imagery to federal/state government agencies and those projects/people who support government interests. Under NextView contract terms, those engaged in official government programs/projects can gain online access to NGA's vast global archive. Additionally, data from vendor's archives of IKONOS-2 (IK-2), OrbView-3 (OB-3), GeoEye-1 (GE-1), QuickBird-1 (QB-1), WorldView-1 (WV-1), and WorldView-2 (WV-2), sensors can also be requested under these agreements. We report here the current extent of this archive, how to gain access, and the applications of these data by Earth science investigators to improve discoverability and community use of these data. Satellite commercial quality imagery (CQI) at very high resolution (source to U.S. federal, state, and local governments for many different purposes. The rapid growth of free global CQI data has been slow to disseminate to NASA Earth Science community and programs such as the Land-Cover Land-Use Change (LCLUC) program which sees potential benefit from unprecedented access. This article evolved from a workshop held on February 23rd, 2012 between representatives from NGA, NASA, and NASA LCLUC Scientists discussion on how to extend this resource to a broader license approved community. Many investigators are unaware of NGA's archive availability or find it difficult to access CQI data from NGA. Results of studies, both quality and breadth, could be improved with CQI data by combining them with other moderate to coarse resolution passive optical Earth observation remote sensing satellites, or with RADAR or LiDAR instruments to better understand Earth system dynamics at the scale of human activities. We provide the evolution of this effort, a guide for qualified user access, and describe current to potential use of these data in

  13. IP communication optimization for 6LoWPAN-Based Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Li MA

    2014-07-01

    Full Text Available The emergence of 6LoWPAN makes it possible that Wireless Sensor Networks access to the Internet. However, the cost of IP communication between 6LoWPAN wireless sensor node and external internet node is still relatively high. This paper proposed a new addressing configuration and compression scheme in 6LoWPAN network called IPHC-NAT, which largely reduced the proportion of the IP header in 6LoWPAN packet, designed and constructed a bidirectional data transmission gateway to connect 6LoWPAN wireless sensor node with IPv6 client. The experimental results show the feasibility of the design of IPHC-NAT and the data transmission efficiency has significantly been improved compared to the original 6LoWPAN network.

  14. Remote Internet access to advanced analytical facilities: a new approach with Web-based services.

    Science.gov (United States)

    Sherry, N; Qin, J; Fuller, M Suominen; Xie, Y; Mola, O; Bauer, M; McIntyre, N S; Maxwell, D; Liu, D; Matias, E; Armstrong, C

    2012-09-04

    Over the past decade, the increasing availability of the World Wide Web has held out the possibility that the efficiency of scientific measurements could be enhanced in cases where experiments were being conducted at distant facilities. Examples of early successes have included X-ray diffraction (XRD) experimental measurements of protein crystal structures at synchrotrons and access to scanning electron microscopy (SEM) and NMR facilities by users from institutions that do not possess such advanced capabilities. Experimental control, visual contact, and receipt of results has used some form of X forwarding and/or VNC (virtual network computing) software that transfers the screen image of a server at the experimental site to that of the users' home site. A more recent development is a web services platform called Science Studio that provides teams of scientists with secure links to experiments at one or more advanced research facilities. The software provides a widely distributed team with a set of controls and screens to operate, observe, and record essential parts of the experiment. As well, Science Studio provides high speed network access to computing resources to process the large data sets that are often involved in complex experiments. The simple web browser and the rapid transfer of experimental data to a processing site allow efficient use of the facility and assist decision making during the acquisition of the experimental results. The software provides users with a comprehensive overview and record of all parts of the experimental process. A prototype network is described involving X-ray beamlines at two different synchrotrons and an SEM facility. An online parallel processing facility has been developed that analyzes the data in near-real time using stream processing. Science Studio and can be expanded to include many other analytical applications, providing teams of users with rapid access to processed results along with the means for detailed

  15. Artificial intelligence, neural network, and Internet tool integration in a pathology workstation to improve information access

    Science.gov (United States)

    Sargis, J. C.; Gray, W. A.

    1999-03-01

    The APWS allows user friendly access to several legacy systems which would normally each demand domain expertise for proper utilization. The generalized model, including objects, classes, strategies and patterns is presented. The core components of the APWS are the Microsoft Windows 95 Operating System, Oracle, Oracle Power Objects, Artificial Intelligence tools, a medical hyperlibrary and a web site. The paper includes a discussion of how could be automated by taking advantage of the expert system, object oriented programming and intelligent relational database tools within the APWS.

  16. Development of a functional, internet-accessible department of surgery outcomes database.

    Science.gov (United States)

    Newcomb, William L; Lincourt, Amy E; Gersin, Keith; Kercher, Kent; Iannitti, David; Kuwada, Tim; Lyons, Cynthia; Sing, Ronald F; Hadzikadic, Mirsad; Heniford, B Todd; Rucho, Susan

    2008-06-01

    The need for surgical outcomes data is increasing due to pressure from insurance companies, patients, and the need for surgeons to keep their own "report card". Current data management systems are limited by inability to stratify outcomes based on patients, surgeons, and differences in surgical technique. Surgeons along with research and informatics personnel from an academic, hospital-based Department of Surgery and a state university's Department of Information Technology formed a partnership to develop a dynamic, internet-based, clinical data warehouse. A five-component model was used: data dictionary development, web application creation, participating center education and management, statistics applications, and data interpretation. A data dictionary was developed from a list of data elements to address needs of research, quality assurance, industry, and centers of excellence. A user-friendly web interface was developed with menu-driven check boxes, multiple electronic data entry points, direct downloads from hospital billing information, and web-based patient portals. Data were collected on a Health Insurance Portability and Accountability Act-compliant server with a secure firewall. Protected health information was de-identified. Data management strategies included automated auditing, on-site training, a trouble-shooting hotline, and Institutional Review Board oversight. Real-time, daily, monthly, and quarterly data reports were generated. Fifty-eight publications and 109 abstracts have been generated from the database during its development and implementation. Seven national academic departments now use the database to track patient outcomes. The development of a robust surgical outcomes database requires a combination of clinical, informatics, and research expertise. Benefits of surgeon involvement in outcomes research include: tracking individual performance, patient safety, surgical research, legal defense, and the ability to provide accurate information

  17. Identity Management Framework for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.

    -configuring capability and is termed as Internet of Things (IoT). The vision of IoT is to connect every object with computing, communication and sensing ability to the Internet. IoT contains varied range of devices from RFID tags, sensor nodes to the even shoes. Thus, IoT enable nomadic collaboration and communication...... between users and devices, between devices themselves and devices to services. Due to rapid technological advancements in the wireless communications, information coming from uncountable applications and services converged on user devices, communication infrastructure and the Internet are integral part...... that are public can be part of the personal space of multiple users at the same time. Secure interaction in and with IoT, secure data management and exchange, authentication, distributed access control and IdM of the devices are the main challenges. The work carried out in the scope of this thesis addresses...

  18. Medication errors with the use of allopurinol and colchicine : A retrospective study of a national, anonymous Internet-accessible error reporting system

    NARCIS (Netherlands)

    Mikuls, TR; Curtis, [No Value; Allison, JJ; Hicks, RW; Saag, KG

    Objectives. To more closely assess medication errors in gout care, we examined data from a national, Internet-accessible error reporting program over a 5-year reporting period. Methods. We examined data from the MEDMARX (TM) database, covering the period from January 1, 1999 through December 31,

  19. Examining Internet Access and Social Media Application Use for Online Nutrition Education in SNAP-Ed Participants in Rural Illinois.

    Science.gov (United States)

    Loehmer, Emily; Smith, Sylvia; McCaffrey, Jennifer; Davis, Jeremy

    2018-01-01

    To examine Internet access and interest in receiving nutrition education via social media applications among low-income adults participating in the Supplemental Nutrition Assistance Program Education (SNAP-Ed). A cross-sectional survey was distributed during 25 SNAP-Ed classes throughout the 16 southernmost counties of Illinois. From 188 responses, the majority of participants had Internet access (76%). Among participants aged 18-32 years (n = 51), 92% owned a smartphone with Internet access and 57% indicated that they would use online nutrition education, with most interest in e-mail (41%), Facebook (40%), and text messaging (35%). There was little interest in using blogs, Vine, Twitter, Tumblr, and Pinterest. Overall, 49% of middle-aged adults aged 33-64 years and 87% of seniors aged ≥65 years reported they would not use online nutrition education. Results indicated similar Internet accessibility in southern Illinois among low-income populations compared with national rural rates. Interest in using online nutrition education varied among SNAP-Ed participants according to age. Young adults appeared to be the most captive audience regarding online nutrition education. Results may be useful to agencies implementing SNAP-Ed to supplement current curriculum with online nutrition education for audiences aged ≤32 years. Copyright © 2017 Society for Nutrition Education and Behavior. Published by Elsevier Inc. All rights reserved.

  20. VoIP Accessibility: A Usability Study of Voice over Internet Protocol (VoIP) Systems and A Survey of VoIP Users with Vision Loss

    Science.gov (United States)

    Packer, Jaclyn; Reuschel, William

    2018-01-01

    Introduction: Accessibility of Voice over Internet Protocol (VoIP) systems was tested with a hands-on usability study and an online survey of VoIP users who are visually impaired. The survey examined the importance of common VoIP features, and both methods assessed difficulty in using those features. Methods: The usability test included four paid…

  1. A Low Collision and High Throughput Data Collection Mechanism for Large-Scale Super Dense Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chunyang Lei

    2016-07-01

    Full Text Available Super dense wireless sensor networks (WSNs have become popular with the development of Internet of Things (IoT, Machine-to-Machine (M2M communications and Vehicular-to-Vehicular (V2V networks. While highly-dense wireless networks provide efficient and sustainable solutions to collect precise environmental information, a new channel access scheme is needed to solve the channel collision problem caused by the large number of competing nodes accessing the channel simultaneously. In this paper, we propose a space-time random access method based on a directional data transmission strategy, by which collisions in the wireless channel are significantly decreased and channel utility efficiency is greatly enhanced. Simulation results show that our proposed method can decrease the packet loss rate to less than 2 % in large scale WSNs and in comparison with other channel access schemes for WSNs, the average network throughput can be doubled.

  2. A Low Collision and High Throughput Data Collection Mechanism for Large-Scale Super Dense Wireless Sensor Networks.

    Science.gov (United States)

    Lei, Chunyang; Bie, Hongxia; Fang, Gengfa; Gaura, Elena; Brusey, James; Zhang, Xuekun; Dutkiewicz, Eryk

    2016-07-18

    Super dense wireless sensor networks (WSNs) have become popular with the development of Internet of Things (IoT), Machine-to-Machine (M2M) communications and Vehicular-to-Vehicular (V2V) networks. While highly-dense wireless networks provide efficient and sustainable solutions to collect precise environmental information, a new channel access scheme is needed to solve the channel collision problem caused by the large number of competing nodes accessing the channel simultaneously. In this paper, we propose a space-time random access method based on a directional data transmission strategy, by which collisions in the wireless channel are significantly decreased and channel utility efficiency is greatly enhanced. Simulation results show that our proposed method can decrease the packet loss rate to less than 2 % in large scale WSNs and in comparison with other channel access schemes for WSNs, the average network throughput can be doubled.

  3. 10 years experience with pioneering open access publishing in health informatics: the Journal of Medical Internet Research (JMIR).

    Science.gov (United States)

    Eysenbach, Gunther

    2010-01-01

    Peer-reviewed journals remain important vehicles for knowledge transfer and dissemination in health informatics, yet, their format, processes and business models are changing only slowly. Up to the end of last century, it was common for individual researchers and scientific organizations to leave the business of knowledge transfer to professional publishers, signing away their rights to the works in the process, which in turn impeded wider dissemination. Traditional medical informatics journals are poorly cited and the visibility and uptake of articles beyond the medical informatics community remain limited. In 1999, the Journal of Medical Internet Research (JMIR; http://www.jmir.org) was launched, featuring several innovations including 1) ownership and copyright retained by the authors, 2) electronic-only, "lean" non-for-profit publishing, 3) openly accessible articles with a reversed business model (author pays instead of reader pays), 4) technological innovations such as automatic XML tagging and reference checking, on-the-fly PDF generation from XML, etc., enabling wide distribution in various bibliographic and full-text databases. In the past 10 years, despite limited resources, the journal has emerged as a leading journal in health informatics, and is presently ranked the top journal in the medical informatics and health services research categories by impact factor. The paper summarizes some of the features of the Journal, and uses bibliometric and access data to compare the influence of the Journal on the discipline of medical informatics and other disciplines. While traditional medical informatics journals are primarily cited by other Medical Informatics journals (33%-46% of citations), JMIR papers are to a more often cited by "end-users" (policy, public health, clinical journals), which may be partly attributable to the "open access advantage".

  4. Multi-Channel Multi-Radio Using 802.11 Based Media Access for Sink Nodes in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kok-Keong Loo

    2011-05-01

    Full Text Available The next generation surveillance and multimedia systems will become increasingly deployed as wireless sensor networks in order to monitor parks, public places and for business usage. The convergence of data and telecommunication over IP-based networks has paved the way for wireless networks. Functions are becoming more intertwined by the compelling force of innovation and technology. For example, many closed-circuit TV premises surveillance systems now rely on transmitting their images and data over IP networks instead of standalone video circuits. These systems will increase their reliability in the future on wireless networks and on IEEE 802.11 networks. However, due to limited non-overlapping channels, delay, and congestion there will be problems at sink nodes. In this paper we provide necessary conditions to verify the feasibility of round robin technique in these networks at the sink nodes by using a technique to regulate multi-radio multichannel assignment. We demonstrate through simulations that dynamic channel assignment scheme using multi-radio, and multichannel configuration at a single sink node can perform close to optimal on the average while multiple sink node assignment also performs well. The methods proposed in this paper can be a valuable tool for network designers in planning network deployment and for optimizing different performance objectives.

  5. Multi-channel multi-radio using 802.11 based media access for sink nodes in wireless sensor networks.

    Science.gov (United States)

    Campbell, Carlene E-A; Khan, Shafiullah; Singh, Dhananjay; Loo, Kok-Keong

    2011-01-01

    The next generation surveillance and multimedia systems will become increasingly deployed as wireless sensor networks in order to monitor parks, public places and for business usage. The convergence of data and telecommunication over IP-based networks has paved the way for wireless networks. Functions are becoming more intertwined by the compelling force of innovation and technology. For example, many closed-circuit TV premises surveillance systems now rely on transmitting their images and data over IP networks instead of standalone video circuits. These systems will increase their reliability in the future on wireless networks and on IEEE 802.11 networks. However, due to limited non-overlapping channels, delay, and congestion there will be problems at sink nodes. In this paper we provide necessary conditions to verify the feasibility of round robin technique in these networks at the sink nodes by using a technique to regulate multi-radio multichannel assignment. We demonstrate through simulations that dynamic channel assignment scheme using multi-radio, and multichannel configuration at a single sink node can perform close to optimal on the average while multiple sink node assignment also performs well. The methods proposed in this paper can be a valuable tool for network designers in planning network deployment and for optimizing different performance objectives.

  6. Data converters for wireless standards

    CERN Document Server

    Shi, Chunlei

    2002-01-01

    Wireless communication is witnessing tremendous growth with proliferation of different standards covering wide, local and personal area networks (WAN, LAN and PAN). The trends call for designs that allow 1) smooth migration to future generations of wireless standards with higher data rates for multimedia applications, 2) convergence of wireless services allowing access to different standards from the same wireless device, 3) inter-continental roaming. This requires designs that work across multiple wireless standards, can easily be reused, achieve maximum hardware share at a minimum power consumption levels particularly for mobile battery-operated devices.

  7. Wireless sensor networks architectures and protocols

    CERN Document Server

    Callaway, Jr, Edgar H

    2003-01-01

    Introduction to Wireless Sensor NetworksApplications and MotivationNetwork Performance ObjectivesContributions of this BookOrganization of this BookThe Development of Wireless Sensor NetworksEarly Wireless NetworksWireless Data NetworksWireless Sensor and Related NetworksConclusionThe Physical LayerSome Physical Layer ExamplesA Practical Physical Layer for Wireless Sensor NetworksSimulations and ResultsConclusionThe Data Link LayerMedium Access Control TechniquesThe Mediation DeviceSystem Analysis and SimulationConclusionThe Network LayerSome Network Design ExamplesA Wireless Sensor Network De

  8. A Multifactor Secure Authentication System for Wireless Payment

    Science.gov (United States)

    Sanyal, Sugata; Tiwari, Ayu; Sanyal, Sudip

    Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. The vulnerability is that access is based on only single factor authentication which is not secure to protect user data, there is a need of multifactor authentication. This paper proposes a new protocol based on multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce another security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy with in a limited resources that does not require any change in infrastructure or underline protocol of wireless network. This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases faith of the user and business organizations on wireless financial transaction using mobile devices.

  9. DiffServ resource management in IP-based radio access networks

    NARCIS (Netherlands)

    Heijenk, Geert; Karagiannis, Georgios; Rexhepi, Vlora; Westberg, Lars; prof.dr. Prasad, R.; prof.dr. Bach Andersen, J.

    2001-01-01

    The increasing popularity of the Internet, the flexibility of IP, and the wide deployment of IP technologies, as well as the growth of mobile communications have driven the development of IP-based solutions for wireless networking. The introduction of IP-based transport in Radio Access Networks

  10. Internet Addiction among Adolescence

    Science.gov (United States)

    Sargin, Nurten

    2012-01-01

    Each innovation brings along many risks. One of the risks related with the Internet use is Internet addiction. The aim of this study is to examine Internet addiction in adolescence in terms of gender, Internet access at home and grades. The research design used was survey method. The study population consisted of second stage students attending…

  11. NOAH--New York Online Access to Health: library collaboration for bilingual consumer health information on the Internet.

    Science.gov (United States)

    Voge, S

    1998-07-01

    New York Online Access to Health (NOAH) is a Web site that provides accurate, timely, relevant, and unbiased full-text health information in both English and Spanish. A joint project of The City University of New York Office of Library Services, The New York Academy of Medicine Library, the Metropolitan New York Library Council, and The New York Public Library, NOAH brings consumer health information to the public in New York City and around the world via the Internet. NOAH is an example of a successful collaboration among different types of libraries (academic, public, medical society) and voluntary health agencies to use new technologies to reach a very broad public. This paper discusses the involvement of the library partners in terms of the management and funding of the site. Web site construction is described including how the information is gathered and organized. Future plans and funding issues for NOAH are considered in terms of the expected increase in the need for consumer health information. NOAH can be reached at: www.noah.cuny.edu.

  12. Influence of Internet Accessibility and Demographic factors on utilization of Web-based Health Information Resources by Resident Doctors in Nigeria.

    Science.gov (United States)

    Ajuwon, G A; Popoola, S O

    2014-09-01

    The internet is a huge library with avalanche of information resources including healthcare information. There are numerous studies on use of electronic resources by healthcare providers including medical practitioners however, there is a dearth of information on the patterns of use of web-based health information resource by resident doctors in Nigeria. This study therefore investigates the influence of internet accessibility and demographic factors on utilization of web-based health information resources by resident doctors in tertiary healthcare institutions in Nigeria. Descriptive survey design was adopted for this study. The population of study consisted of medical doctors undergoing residency training in 13 tertiary healthcare institutions in South-West Nigeria. The tertiary healthcare institutions were Federal Medical Centres, University Teaching Hospitals and Specialist Hospitals (Neuropsychiatric and Orthopaedic). A pre-tested, self-administered questionnaire was used for data collection. The Statistical Package for the Social Sciences (SPSS) was used for data analysis. Data were analyzed using descriptive statistics, Pearson Product Moment correlation and multiple regression analysis. The mean age of the respondents was 34 years and males were in the majority (69.0%). A total of 96.1% respondents had access to the Internet. E-mail (X̄=5.40, SD=0.91), Google (X̄=5.26, SD=1.38), Yahoo (X̄=5.15, SD=4.44) were used weekly by the respondents. Preparation for Seminar/Grand Round presentation (X̄=8.4, SD=1.92), research (X̄=7.8, SD=2.70) and communication (X̄=7.6, SD=2.60) were ranked high as purposes for use of web-based information resources. There is a strong, positive and significant relationship between internet accessibility and utilization of web-based health information resources (r=0.628, pdesignation (B=-0.343) educational qualification (B=2.411) significantly influence utilization of web-based health information resources of the respondents. A

  13. Design and Implementation of an IoT Access Point for Smart Home

    Directory of Open Access Journals (Sweden)

    Chih-Yung Chang

    2015-12-01

    Full Text Available Network communication and micro-electro-mechanical embedded technologies have attracted much attention in recent years. Through these technologies, the capabilities of sensing, identification, and communication can be embedded in various smart devices. These smart devices can automatically connect to the Internet and form an intelligent network called Internet of Things (IoT. However, these devices are embedded with different wireless communication interfaces such as Wi-Fi and ZigBee. This paper presents the design and implementation of an IoT access point that supports functionalities of coordination of various wireless transmission protocols. Based on the existing Wi-Fi access point, we have embedded a ZigBee module and implemented ZigBee and UPnP protocols into the designed IoT access point, which supports ZigBee communication capabilities over the Internet.

  14. Managing healthcare information using short message service (SMS) in wireless broadband networks

    Science.gov (United States)

    Documet, Jorge; Tsao, Sinchai; Documet, Luis; Liu, Brent J.; Zhou, Zheng; Joseph, Anika O.

    2007-03-01

    Due to the ubiquity of cell phones, SMS (Short Message Service) has become an ideal means to wirelessly manage a Healthcare environment and in particular PACS (Picture Archival and Communications System) data. SMS is a flexible and mobile method for real-time access and control of Healthcare information systems such as HIS (Hospital Information System) or PACS. Unlike conventional wireless access methods, SMS' mobility is not limited by the presence of a WiFi network or any other localized signal. It provides a simple, reliable yet flexible method to communicate with an information system. In addition, SMS services are widely available for low costs from cellular phone service providers and allows for more mobility than other services such as wireless internet. This paper aims to describe a use case of SMS as a means of remotely communicating with a PACS server. Remote access to a PACS server and its Query-Retrieve services allows for a more convenient, flexible and streamlined radiology workflow. Wireless access methods such as SMS will increase dedicated PACS workstation availability for more specialized DICOM (Digital Imaging and Communications in Medicine) workflow management. This implementation will address potential security, performance and cost issues of applying SMS as part of a healthcare information management system. This is in an effort to design a wireless communication system with optimal mobility and flexibility at minimum material and time costs.

  15. Security in Internet of Things

    OpenAIRE

    Mohar, Matej

    2017-01-01

    The Internet of Things (IoT) is emerging the Internet and other networks with wireless technologies to make physical objects interact online. The IoT has developed to become a promising technology and receives significant research attention in recent years because of the development of wireless communications and micro-electronics.  Like other immature technological inventions, although IoT will promise their users a better life in the near future, it is a security risk, especially today the ...

  16. Internet Access, Use and Gratification among University Students: A Case Study of the Islamia University of Bahawalpur, Pakistan

    Directory of Open Access Journals (Sweden)

    Shakeel Ahmad Khan

    2011-12-01

    Full Text Available This study aims to investigate the attitude s of students at the Islamia University of Bahawalpur, Pakistan towards learning through the Internet. A structured questionnaire was used for data collection. It was found that a vast majority of the students learnt how to use the Internet by themselves or with the assistance of their friends. The findings showed that their attitude towards the Internet was very positive and they used it mainly for study purpose. They used online databases, dictionaries, encyclopedias and online courses. Google was the most popular search engine for retrieving information on the Internet. However, the use of free database services provide d by the Higher Education Commission (HEC of Pakistan was not satisfactory. The respondents were also dissatisfied with the Internet service provision, slow speed of the Internet connection and inadequate number of computers in computer labs.

  17. Internet-accessed sexually transmitted infection (e-STI testing and results service: A randomised, single-blind, controlled trial.

    Directory of Open Access Journals (Sweden)

    Emma Wilson

    2017-12-01

    Full Text Available Internet-accessed sexually transmitted infection testing (e-STI testing is increasingly available as an alternative to testing in clinics. Typically this testing modality enables users to order a test kit from a virtual service (via a website or app, collect their own samples, return test samples to a laboratory, and be notified of their results by short message service (SMS or telephone. e-STI testing is assumed to increase access to testing in comparison with face-to-face services, but the evidence is unclear. We conducted a randomised controlled trial to assess the effectiveness of an e-STI testing and results service (chlamydia, gonorrhoea, HIV, and syphilis on STI testing uptake and STI cases diagnosed.The study took place in the London boroughs of Lambeth and Southwark. Between 24 November 2014 and 31 August 2015, we recruited 2,072 participants, aged 16-30 years, who were resident in these boroughs, had at least 1 sexual partner in the last 12 months, stated willingness to take an STI test, and had access to the internet. Those unable to provide consent and unable to read English were excluded. Participants were randomly allocated to receive 1 text message with the web link of an e-STI testing and results service (intervention group or to receive 1 text message with the web link of a bespoke website listing the locations, contact details, and websites of 7 local sexual health clinics (control group. Participants were free to use any other services or interventions during the study period. The primary outcomes were self-reported STI testing at 6 weeks, verified by patient record checks, and self-reported STI diagnosis at 6 weeks, verified by patient record checks. Secondary outcomes were the proportion of participants prescribed treatment for an STI, time from randomisation to completion of an STI test, and time from randomisation to treatment of an STI. Participants were sent a £10 cash incentive on submission of self-reported data. We

  18. Access to care and use of the Internet to search for health information: results from the US National Health Interview Survey.

    Science.gov (United States)

    Amante, Daniel J; Hogan, Timothy P; Pagoto, Sherry L; English, Thomas M; Lapane, Kate L

    2015-04-29

    The insurance mandate of the Affordable Care Act has increased the number of people with health coverage in the United States. There is speculation that this increase in the number of insured could make accessing health care services more difficult. Those who are unable to access care in a timely manner may use the Internet to search for information needed to answer their health questions. The aim was to determine whether difficulty accessing health care services for reasons unrelated to insurance coverage is associated with increased use of the Internet to obtain health information. Survey data from 32,139 adults in the 2011 National Health Interview Study (NHIS) were used in this study. The exposure for this analysis was reporting difficulty accessing health care services or delaying getting care for a reason unrelated to insurance status. To define this exposure, we examined 8 questions that asked whether different access problems occurred during the previous 12 months. The outcome for this analysis, health information technology (HIT) use, was captured by examining 2 questions that asked survey respondents if they used an online health chat room or searched the Internet to obtain health information in the previous 12 months. Several multinomial logistic regressions estimating the odds of using HIT for each reported access difficulty were conducted to accomplish the study objective. Of a survey population of 32,139 adults, more than 15.90% (n=5109) reported experiencing at least one access to care barrier, whereas 3.63% (1168/32,139) reported using online health chat rooms and 43.55% (13,997/32,139) reported searching the Internet for health information. Adults who reported difficulty accessing health care services for reasons unrelated to their health insurance coverage had greater odds of using the Internet to obtain health information. Those who reported delaying getting care because they could not get an appointment soon enough (OR 2.2, 95% CI 1.9-2.5), were

  19. The Lure of Wireless Encryption

    CERN Multimedia

    Computer Security Team

    2013-01-01

    Following our article entitled “Jekyll or Hyde? Better browse securely” in the last issue of the Bulletin, some people wondered why the CERN wireless network is not encrypted…   There are many arguments why it is not. The simplest is usability: the communication and management of the corresponding access keys would be challenging given the sheer number of wireless devices the CERN network hosts. Keys would quickly become public, e.g. at conferences, and might be shared, written on whiteboards, etc. Then there are all the devices which cannot be easily configured to use encryption protocols - a fact which would create plenty of calls to the CERN Service Desk… But our main argument is that wireless encryption is DECEPTIVE. Wireless encryption is deceptive as it only protects the wireless network against unauthorised access (and the CERN network already has other means to protect against that). Wireless encryption however, does not really help you. You ...

  20. Science and Technology Undergraduate Students' Use of the Internet, Cell Phones and Social Networking Sites to Access Library Information

    Science.gov (United States)

    Salisbury, Lutishoor; Laincz, Jozef; Smith, Jeremy J.

    2012-01-01

    Many academic libraries and publishers have developed mobile-optimized versions of their web sites and catalogs. Almost all database vendors and major journal publishers have provided a way to connect to their resources via the Internet and the mobile web. In light of this pervasive use of the Internet, mobile devices and social networking, this…

  1. An ultra low-power and traffic-adaptive medium access control protocol for wireless body area network.

    Science.gov (United States)

    Ullah, Sana; Kwak, Kyung Sup

    2012-06-01

    Wireless Body Area Network (WBAN) consists of low-power, miniaturized, and autonomous wireless sensor nodes that enable physicians to remotely monitor vital signs of patients and provide real-time feedback with medical diagnosis and consultations. It is the most reliable and cheaper way to take care of patients suffering from chronic diseases such as asthma, diabetes and cardiovascular diseases. Some of the most important attributes of WBAN is low-power consumption and delay. This can be achieved by introducing flexible duty cycling techniques on the energy constraint sensor nodes. Stated otherwise, low duty cycle nodes should not receive frequent synchronization and control packets if they have no data to send/receive. In this paper, we introduce a Traffic-adaptive MAC protocol (TaMAC) by taking into account the traffic information of the sensor nodes. The protocol dynamically adjusts the duty cycle of the sensor nodes according to their traffic-patterns, thus solving the idle listening and overhearing problems. The traffic-patterns of all sensor nodes are organized and maintained by the coordinator. The TaMAC protocol is supported by a wakeup radio that is used to accommodate emergency and on-demand events in a reliable manner. The wakeup radio uses a separate control channel along with the data channel and therefore it has considerably low power consumption requirements. Analytical expressions are derived to analyze and compare the performance of the TaMAC protocol with the well-known beacon-enabled IEEE 802.15.4 MAC, WiseMAC, and SMAC protocols. The analytical derivations are further validated by simulation results. It is shown that the TaMAC protocol outperforms all other protocols in terms of power consumption and delay.

  2. Wireless Network Security Vulnerabilities and Concerns

    Science.gov (United States)

    Mushtaq, Ahmad

    The dilemma of cyber communications insecurity has existed all the times since the beginning of the network communications. The problems and concerns of unauthorized access and hacking has existed form the time of introduction of world wide web communication and Internet's expansion for popular use in 1990s, and has remained till present time as one of the most important issues. The wireless network security is no exception. Serious and continuous efforts of investigation, research and development has been going on for the last several decades to achieve the goal of provision of 100 percent or full proof security for all the protocols of networking architectures including the wireless networking. Some very reliable and robust strategies have been developed and deployed which has made network communications more and more secure. However, the most desired goal of complete security has yet to see the light of the day. The latest Cyber War scenario, reported in the media of intrusion and hacking of each other's defense and secret agencies between the two super powers USA and China has further aggravated the situation. This sort of intrusion by hackers between other countries such as India and Pakistan, Israel and Middle East countries has also been going on and reported in the media frequently. The paper reviews and critically examines the strategies already in place, for wired network. Wireless Network Security and also suggests some directions and strategies for more robust aspects to be researched and deployed.

  3. Over-the-horizon, connected home/office (OCHO): situation management of environmental, medical, and security conditions at remote premises via broadband wireless access

    Science.gov (United States)

    Hortos, William S.

    2010-04-01

    Broadband wireless access standards, together with advances in the development of commercial sensing and actuator devices, enable the feasibility of a consumer service for a multi-sensor system that monitors the conditions within a residence or office: the environment/infrastructure, patient-occupant health, and physical security. The proposed service is a broadband reimplementation and combination of existing services to allow on-demand reports on and management of the conditions by remote subscribers. The flow of on-demand reports to subscribers and to specialists contracted to mitigate out-of-tolerance conditions is the foreground process. Service subscribers for an over-the-horizon connected home/office (OCHO) monitoring system are the occupant of the premises and agencies, contracted by the service provider, to mitigate or resolve any observed out-of-tolerance condition(s) at the premises. Collectively, these parties are the foreground users of the OCHO system; the implemented wireless standards allow the foreground users to be mobile as they request situation reports on demand from the subsystems on remote conditions that comprise OCHO via wireless devices. An OCHO subscriber, i.e., a foreground user, may select the level of detail found in on-demand reports, i.e., the amount of information displayed in the report of monitored conditions at the premises. This is one context of system operations. While foreground reports are sent only periodically to subscribers, the information generated by the monitored conditions at the premises is continuous and is transferred to a background configuration of servers on which databases reside. These databases are each used, generally, in non-real time, for the assessment and management of situations defined by attributes like those being monitored in the foreground by OCHO. This is the second context of system operations. Context awareness and management of conditions at the premises by a second group of analysts and

  4. Wireless home networking for dummies

    CERN Document Server

    Briere, Danny; Ferris, Edward

    2010-01-01

    The perennial bestseller shows you how share your files and Internet connection across a wireless network. Fully updated for Windows 7 and Mac OS X Snow Leopard, this new edition of this bestseller returns with all the latest in wireless standards and security. This fun and friendly guide shows you how to integrate your iPhone, iPod touch, smartphone, or gaming system into your home network. Veteran authors escort you through the various financial and logisitical considerations that you need to take into account before building a wireless network at home.: Covers the basics of planning, instal

  5. An Analysis Of Wireless Security

    OpenAIRE

    Salendra Prasad

    2017-01-01

    The WLAN security includes Wired Equivalent Primary WEP and WI-FI protected Access WPA. Today WEP is regarded as very poor security standard. WEP was regarded as very old security standard and has many security issues which users need to be addressed. In this Paper we will discuss Wireless Security and ways to improve on wireless security.

  6. Towards Controlling Latency in Wireless Networks

    KAUST Repository

    Bouacida, Nader

    2017-01-01

    Wireless networks are undergoing an unprecedented revolution in the last decade. With the explosion of delay-sensitive applications in the Internet (i.e., online gaming and VoIP), latency becomes a major issue for the development of wireless

  7. Wireless telecommunication systems

    CERN Document Server

    Terré, Michel; Vivier, Emmanuelle

    2013-01-01

    Wireless telecommunication systems generate a huge amount of interest. In the last two decades, these systems have experienced at least three major technological leaps, and it has become impossible to imagine how society was organized without them. In this book, we propose a macroscopic approach on wireless systems, and aim at answering key questions about power, data rates, multiple access, cellular engineering and access networks architectures.We present a series of solved problems, whose objective is to establish the main elements of a global link budget in several radiocommunicati

  8. An Internet of Things based physiological signal monitoring and receiving system for virtual enhanced health care network.

    Science.gov (United States)

    Rajan, J Pandia; Rajan, S Edward

    2018-01-01

    Wireless physiological signal monitoring system designing with secured data communication in the health care system is an important and dynamic process. We propose a signal monitoring system using NI myRIO connected with the wireless body sensor network through multi-channel signal acquisition method. Based on the server side validation of the signal, the data connected to the local server is updated in the cloud. The Internet of Things (IoT) architecture is used to get the mobility and fast access of patient data to healthcare service providers. This research work proposes a novel architecture for wireless physiological signal monitoring system using ubiquitous healthcare services by virtual Internet of Things. We showed an improvement in method of access and real time dynamic monitoring of physiological signal of this remote monitoring system using virtual Internet of thing approach. This remote monitoring and access system is evaluated in conventional value. This proposed system is envisioned to modern smart health care system by high utility and user friendly in clinical applications. We claim that the proposed scheme significantly improves the accuracy of the remote monitoring system compared to the other wireless communication methods in clinical system.

  9. A USER-DEPENDENT PERFECT-SCHEDULING MULTIPLE ACCESS PROTOCOL FOR VOICE-DATA INTEGRATION IN WIRELESS NETWORKDS

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    A novel Multiple Access Control(MAC) protocol-User-dependent Perfect-scheduling Multiple Access(UPMA) protocol,which supports joint transmission of voice and data packets,is proposed.By this protocol,the bandwidth can be allocated dynamically to the uplink and downlink traffic with on-demand assignment and the transmission of Mobile Terminals(MTs) can be perfectly scheduled by means of polling.Meanwhile.a unique frame stucture is designed to guarantee Quality of Service(QoS) in voice traffic supporting.An effective colision resolution algorthm is also proposed to guarantee rapid channel access for activated MTs.Finally,performance of UPMA protocol is evaluated by simulation and compared with MPRMA protocol.Simulation results show that UPMA protocol has better performance.

  10. A USER-DEPENDENT PERFECT-SCHEDULING MULTIPLE ACCESS PROTOCOL FOR VOICE-DATA INTEGRATION IN WIRELESS NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Zhou Yajian; Li Jiandong; Liu Kai

    2002-01-01

    A novel Multiple Access Control (MAC) protocol - User-dependent Perfect-scheduling Multiple Access (UPMA) protocol, which supports joint transmission of voice and data packets,is proposed. By this protocol, the bandwidth can be allocated dynamically to the uplink and downlink traffic with on-demand assignment and the transmission of Mobile Terminals (MTs)can be perfectly scheduled by means of polling. Meanwhile, a unique frame structure is designed to guarantee Quality of Service (QoS) in voice traffic supporting. An effective collision resolution algorithm is also proposed to guarantee rapid channel access for activated MTs. Finally, performance of UPMA protocol is evaluated by simulation and compared with MPRMA protocol.Simulation results show that UPMA protocol has better performance.

  11. Performance of Non-Orthogonal Multiple Access (NOMA) in mmWave wireless communications for 5G networks

    DEFF Research Database (Denmark)

    Marcano, Andrea; Christiansen, Henrik Lehrmann

    2017-01-01

    Among the key technologies that have been identified as capacity boosters for fifth generation - 5G - mobile networks, are millimeter wave (mmWave) transmissions and non-orthogonal multiple access (NOMA). The large amount of spectrum available at mmWave frequencies combined with a more effective...... use of available resources, helps improving the overall capacity. NOMA, unlike orthogonal multiple access (OMA) methods, allows sharing the same frequency resources at the same time, by implementing adaptive power allocation. In this paper we present a performance analysis of NOMA in mmWave cells...

  12. Resilient Disaster Network Based on Software Defined Cognitive Wireless Network Technology

    Directory of Open Access Journals (Sweden)

    Goshi Sato

    2015-01-01

    Full Text Available In order to temporally recover the information network infrastructure in disaster areas from the Great East Japan Earthquake in 2011, various wireless network technologies such as satellite IP network, 3G, and Wi-Fi were effectively used. However, since those wireless networks are individually introduced and installed but not totally integrated, some of networks were congested due to the sudden network traffic generation and unbalanced traffic distribution, and eventually the total network could not effectively function. In this paper, we propose a disaster resilient network which integrates various wireless networks into a cognitive wireless network that users can use as an access network to the Internet at the serious disaster occurrence. We designed and developed the disaster resilient network based on software defined network (SDN technology to automatically select the best network link and route among the possible access networks to the Internet by periodically monitoring their network states and evaluate those using extended AHP method. In order to verify the usefulness of our proposed system, a prototype system is constructed and its performance is evaluated.

  13. Internet Shopping

    Institute of Scientific and Technical Information of China (English)

    刘洪毓

    2004-01-01

    Nowadays you no longer need to walk round hundreds of shops looking for the items you need. You can shop for just about anything from your armchair. All you need is a computer and access(进入) to the Internet.

  14. Multistandard wireless transmission over SSMF and large-core POF for access and in-home networks

    NARCIS (Netherlands)

    Shi, Y.; Morant, M.; Okonkwo, C.M.; Llorente, R.; Tangdiongga, E.; Koonen, A.M.J.

    2012-01-01

    An end-to-end transmission of coexisting multistandard radio (LTE, WiMAX, and UWB) signals is demonstrated for the first time with the transmission over a combined access and in-home networks consisting of 25-km SSMF, 25-m large-core diameter polymethylmethacrylate graded-index plastic optical fiber

  15. A Multimetric Approach for Handoff Decision in Heterogeneous Wireless Networks

    Science.gov (United States)

    Kustiawan, I.; Purnama, W.

    2018-02-01

    Seamless mobility and service continuity anywhere at any time are an important issue in the wireless Internet. This research proposes a scheme to make handoff decisions effectively in heterogeneous wireless networks using a fuzzy system. Our design lies in an inference engine which takes RSS (received signal strength), data rate, network latency, and user preference as strategic determinants. The logic of our engine is realized on a UE (user equipment) side in faster reaction to network dynamics while roaming across different radio access technologies. The fuzzy system handles four metrics jointly to deduce a moderate decision about when to initiate handoff. The performance of our design is evaluated by simulating move-out mobility scenarios. Simulation results show that our scheme outperforms other approaches in terms of reducing unnecessary handoff.

  16. OPTICAL WIRELESS COMMUNICATION SYSTEM

    Directory of Open Access Journals (Sweden)

    JOSHUA L.Y. CHIENG

    2016-02-01

    Full Text Available The growing demand of bandwidth in this modern internet age has been testing the existing telecommunication infrastructures around the world. With broadband speeds moving towards the region of Gbps and Tbps, many researches have begun on the development of using optical wireless technology as feasible and future methods to the current wireless technology. Unlike the existing radio frequency wireless applications, optical wireless uses electromagnetic spectrums that are unlicensed and free. With that, this project aim to understand and gain better understanding of optical wireless communication system by building an experimental and simulated model. The quality of service and system performance will be investigated and reviewed. This project employs laser diode as the propagation medium and successfully transferred audio signals as far as 15 meters. On its quality of service, results of the project model reveal that the bit error rate increases, signal-to-noise ratio and quality factor decreases as the link distance between the transmitter and receiver increases. OptiSystem was used to build the simulated model and MATLAB was used to assist signal-to-noise ratio calculations. By comparing the simulated and experimental receiver’s power output, the experimental model’s efficiency is at 66.3%. Other than the system’s performance, challenges and factors affecting the system have been investigated and discussed. Such challenges include beam divergence, misalignment and particle absorption.

  17. SMART HOME SECURITY SOLUTIONS BASED ON INTERNET OF THINGS (IOT) USING WIFI INTERFACE

    OpenAIRE

    Bhavna1, Dr. Neetu Sharma2

    2018-01-01

    Smart home system is very popular in modern days that give many kind of application that make everything is simple and easy to control. In modern day, home appliances are using wireless technology and can be accessed by internet that will make residents life easier and organized. IoT-based Home Automation System is designed to assist the people with physical disabilities and elderly to provide support as well as to control the electrical appliances and monitor the room temperature using mobil...

  18. Internet access is NOT restricted globally to high income countries: so why are evidenced based prevention and treatment programs for mental disorders so rare?

    Science.gov (United States)

    Watts, Sarah E; Andrews, Gavin

    2014-08-01

    Mental disorders are widespread and universal. They are frequently accompanied by considerable harmful consequences for the individual and come at a significant economic cost to a community. Yet while effective evidence based prevention and treatment exists, there are a number of barriers to access, implement and disseminate. Cognitive behavior therapy programs, such as those available at www.thiswayup.com.au are widely available using the Internet in high income countries, such as Australia. With the ubiquitous uptake of Internet users globally, it is suggested that low and middle income countries should consider ways to embrace and scale up these cost effective programs. An explanation of why and some suggestions as to how this can be done are presented. Crown Copyright © 2014. Published by Elsevier B.V. All rights reserved.

  19. A wireless smart sensor network for automated monitoring of cable tension

    International Nuclear Information System (INIS)

    Sim, Sung-Han; Cho, Soojin; Li, Jian; Jo, Hongki; Park, Jong-Woong; Jung, Hyung-Jo; Spencer Jr, Billie F

    2014-01-01

    As cables are primary load carrying members in cable-stayed bridges, monitoring the tension forces of the cables provides valuable information regarding structural soundness. Incorporating wireless smart sensors with vibration-based tension estimation methods provides an efficient means of autonomous long-term monitoring of cable tensions. This study develops a wireless cable tension monitoring system using MEMSIC’s Imote2 smart sensors. The monitoring system features autonomous operation, sustainable energy harvesting and power consumption, and remote access using the internet. To obtain the tension force, an in-network data processing strategy associated with the vibration-based tension estimation method is implemented on the Imote2-based sensor network, significantly reducing the wireless data transmission and the power consumption. The proposed monitoring system has been deployed and validated on the Jindo Bridge, a cable-stayed bridge located in South Korea. (paper)

  20. A wireless smart sensor network for automated monitoring of cable tension

    Science.gov (United States)

    Sim, Sung-Han; Li, Jian; Jo, Hongki; Park, Jong-Woong; Cho, Soojin; Spencer, Billie F., Jr.; Jung, Hyung-Jo

    2014-02-01

    As cables are primary load carrying members in cable-stayed bridges, monitoring the tension forces of the cables provides valuable information regarding structural soundness. Incorporating wireless smart sensors with vibration-based tension estimation methods provides an efficient means of autonomous long-term monitoring of cable tensions. This study develops a wireless cable tension monitoring system using MEMSIC’s Imote2 smart sensors. The monitoring system features autonomous operation, sustainable energy harvesting and power consumption, and remote access using the internet. To obtain the tension force, an in-network data processing strategy associated with the vibration-based tension estimation method is implemented on the Imote2-based sensor network, significantly reducing the wireless data transmission and the power consumption. The proposed monitoring system has been deployed and validated on the Jindo Bridge, a cable-stayed bridge located in South Korea.