WorldWideScience

Sample records for wireless internet access

  1. Wireless Multi Hop Access Networks and Protocols

    OpenAIRE

    Nilsson Plymoth, Anders

    2007-01-01

    As more and more applications and services in our society now depend on the Internet, it is important that dynamically deployed wireless multi hop networks are able to gain access to the Internet and other infrastructure networks and services. This thesis proposes and evaluates solutions for providing multi hop Internet Access. It investigates how ad hoc networks can be combined with wireless and mesh networks in order to create wireless multi hop access networks. When several access points t...

  2. Economics and Governance of the wireless Internet

    DEFF Research Database (Denmark)

    Falch, Morten; Henten, Anders; Tadayoni, Reza

    barriers of entry. In this paper three issues are discussed: 1) Developments in pricing schemes for Internet interconnection and Internet access with special focus on the role of wireless access. 2) Developments in supporting infrastructures with special focus on the increasing role of wireless......The Internet has undergone a growing diversification with regard to types of users, kinds of services and use of transmission technologies and infrastructures. Today, internet services are delivered by the use of many different wired and wireless communication technologies with different technical...... capabilities and limitations, and with different techno-economic characteristics. The question is whether these trends challenge the current mode of governance for the Internet. In the early days, the Internet was considered to be open, free, competitive, with a high level of entrepreneurialism, and with low...

  3. Evaluasi Pemanfaatan Wireless Internet Protocol Access System di Kota Malang

    Directory of Open Access Journals (Sweden)

    Ahmad Budi Setiawan

    2012-03-01

    Full Text Available WIPAS (Wireless Internet Protocol Accsess System adalah salah satu teknologi pita lebar (broadband yang terbaru. Teknologi tersebut dikembangkan berdasarkan model point-to-multipoint access system pada jaringan nirkabel tetap atau Fixed Wireless Access (FWA dengan memanfaatkan pita frekuensi 26-GHz. Dengan besarnya pita frekuensi yang digunakan, teknologi WIPAS dapat menampung kapasitas akses untuk lalu lintas jaringan yang sangat besar. Dalam penelitian ini akan dikaji dan dievaluasi efektifitas penggunaan teknologi WIPAS melalui kasus pemanfaatan teknologi WIPAS untuk pemberdayaan komunitas di kota Malang. Dalam penelitian ini juga akan dideskripsikan pemanfaatan teknologi WIPAS untuk melihat manfaat penggunaan teknologi tersebut. Penelitian ini dilakukan dengan metode kualitatif dengan melakukan evaluasi terhadap infrastruktur yang telah dibangun untuk melihat efektifitas pemanfaatan WIPAS. Hasil penelitian ini adalah sebuah kajian evaluatif tentang pemanfaatan WIPAS di kota Malang dan rekomendasi untuk implementasi lebih lanjut.

  4. Planning of Efficient Wireless Access with IEEE 802.16 for Connecting Home Network to the Internet

    Directory of Open Access Journals (Sweden)

    Pichet Ritthisoonthorn

    2010-01-01

    Full Text Available The emergence of IEEE802.16 wireless standard technology (WiMAX has significantly increased the choice to operators for the provisioning of wireless broadband access network. WiMAX is being deployed to compliment with xDSL in underserved or lack of the broadband network area, in both developed and developing countries. Many incumbent operators in developing countries are considering the deployment of WiMAX as part of their broadband access strategy. This paper presents an efficient and simple method for planning of broadband fixed wireless access (BFWA with IEEE802.16 standard to support home connection to Internet. The study formulates the framework for planning both coverage and capacity designs. The relationship between coverage area and access rate from subscriber in each environment area is presented. The study also presents the throughput and channel capacity of IEEE802.16 in different access rates. An extensive analysis is performed and the results are applied to the real case study to demonstrate the practicality of using IEEE 802.16 for connecting home to Internet. Using empirical data and original subscriber traffic from measurement, it is shown that the BFWA with IEEE802.16 standard is a capacity limited system. The capacity of IEEE802.16 is related to different factors including frequency bandwidth, spectrum allocation, estimation of traffic per subscriber, and choice of adaptive modulation from subscriber terminal. The wireless access methods and procedures evolved in this research work and set out in this paper are shown to be well suited for planning BFWA system based on IEEE802.16 which supports broadband home to Internet connections.

  5. Adoption of wireless internet parks: An empirical study in Qatar

    OpenAIRE

    Weerakkody, V

    2008-01-01

    This paper examines the adoption of free wireless internet parks (iPark) by Qatari citizens as means of accessing electronic services from public parks. The Qatar government has launched the iPark concept with a view of providing free internet access for all citizens while enjoying the outdoors. By offering free wireless Internet access, the Qatari government encourages its citizen's to actively participate in the global information society with a view of bridging the digital divide. Using a ...

  6. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  7. Architectural and Mobility Management Designs in Internet-Based Infrastructure Wireless Mesh Networks

    Science.gov (United States)

    Zhao, Weiyi

    2011-01-01

    Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. They have numerous applications, such as broadband Internet access, building automation, and intelligent transportation systems. One research challenge for Internet-based WMNs is to design efficient mobility…

  8. Wired or Wireless Internet?

    DEFF Research Database (Denmark)

    Gimpel, Gregory

    2010-01-01

    This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...... the speed of technological obsolescence, market share dominance, and the black boxing of technology influence consumer intention to adopt WiMax and 3G wireless internet for their laptop computers. The results, implications for industry, and areas for further research are discussed....

  9. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  10. Mobile access to the Internet: from personal bubble to satellites

    Science.gov (United States)

    Gerla, Mario

    2001-10-01

    Mobile, wireless access and networking has emerged in the last few years as one of the most important directions of Internet growth. The popularity of mobile, and, more generally, nomadic Internet access is due to many enabling factors including: (a) emergence of meaningful applications tailored to the individual on the move; (b) small form factor and long battery life; (c) efficient middleware designed to support mobility; and, (d) efficient wireless networking technologies. A key player in the mobile Internet access is the nomad, i.e. the individual equipped with various computing and I/O gadgets (cellular phone, earphones, GPS navigator, palm pilot, beeper, portable scanner, digital camera, etc.). These devices form his/her Personal Area Network or PAN or personal bubble. The connectivity within the bubble is wireless (using for example a low cost, low power wireless LAN such as Bluetooth). The bubble can expand and contract dynamically depending on needs. It may temporarily include sensors and actuators as the nomad walks into a new environment. In this paper, we identify the need for the interconnection of the PAN with other wireless networks in order to achieve costeffective mobile access to the Internet. We will overview some key networking technologies required to support the PAN (eg, Bluetooth). We will also discuss an emerging technology, Ad Hoc wireless networking which is the natural complement of the PAN in sparsely populated areas. Finally, we will identify the need for intelligent routers to assist the mobile user in the selection of the best Internet access strategy.

  11. Broadband wireless communications for railway applications for onboard internet access and other applications

    CERN Document Server

    Masson, Émilie

    2017-01-01

    This book focuses on the needs of railway operators in terms of wireless communications, divided in two main categories: the commercial services and the operational needs. Then, all available technologies that can be used to provide Internet access on board trains and all the other operational applications requiring high capacity are detailed. Finally, challenges and trends in railway telecommunications are highlighted, through the presentation of the future and emerging technologies, the current discussions and works in the different authorities, and the key challenges and scientific barriers.

  12. Wireless mobile Internet security

    CERN Document Server

    Rhee, Man Young

    2013-01-01

      The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr

  13. An Experimental Performance Measurement of Implemented Wireless Access Point for Interworking Wi-Fi and HSDPA Networks

    Science.gov (United States)

    Byun, Tae-Young

    This paper presents a prototype of WAP(Wireless Access Point) that provides the wireless Internet access anywhere. Implemented WAP can be equipped with various wireless WAN interfaces such as WCDMA and HSDPA. WAP in the IP mechanism has to process connection setup procedure to one wireless WAN. Also, WAP can provide connection management procedures to reconnect interrupted connection automatically. By using WAP, several mobile devices such as netbook, UMPC and smart-phone in a moving vehicle can access to HSDPA network simultaneously. So, it has more convenient for using the WAP when there are needs to access wireless Internet more than two mobile devices in restricted spaces such as car, train and ship.

  14. Wireless Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.

  15. Why People Aren't Using Wireless Internet

    DEFF Research Database (Denmark)

    Ahluwalia, Punit; Gimpel, Gregory; Varshney, Upkar

    2010-01-01

    This paper proposes a new model for understanding the adoption of internet services when competing technological standards can fulfil similar needs. Using prospect theory as its theoretical foundation, the model posits that reference prices, flat rate preference, and status quo bias constitute...... the perceived sacrifice when users consider adoption of new services such as wireless internet. Perceived sacrifice and perceived quality influence the perceived relative value, which in turn influences the intention to adopt wireless internet. The proposed model and related hypotheses are empirically confirmed...

  16. Using Internet of Things technologies for wireless sensor networks

    Science.gov (United States)

    Martinez, K.; Hart, J. K.; Basford, P. J.; Bragg, G. M.; Ward, T.

    2013-12-01

    Numerous authors have envisioned the future internet where anything will be connected: the Internet of Things (IoT). The idea is an extrapolation of the spread of networked devices such as phones, tablets etc. Each device is expected to have its own Internet address and thus be easy to access. The key building blocks of any IoT system are networking, hardware platforms and node software - so they are similar to wireless sensor network requirements. Most existing IoT demonstrators and applications have been gadget-style objects where power and connectivity problems are not too restricting. Environmental sensor networks can benefit from using some of the technologies involved in IoT development. However it is expected that tuning the networking and power management will be necessary to make them as efficient as state of the art wireless sensor networks. Some IoT assumptions such as always-connected nodes and full IP capability need to be considered. This paper will illustrate the advantages and disadvantages of IoT techniques for environment sensing drawing on a range of employment scenarios. We also describe a glacial 'Internet of things' project, which aims to monitor glacial processes. In particular we describe the IoT developments in a deployment in Iceland to examine glacier seismicity, velocity and provide camera images.

  17. Virtualization of Event Sources in Wireless Sensor Networks for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Néstor Lucas Martínez

    2014-12-01

    Full Text Available Wireless Sensor Networks (WSNs are generally used to collect information from the environment. The gathered data are delivered mainly to sinks or gateways that become the endpoints where applications can retrieve and process such data. However, applications would also expect from a WSN an event-driven operational model, so that they can be notified whenever occur some specific environmental changes instead of continuously analyzing the data provided periodically. In either operational model, WSNs represent a collection of interconnected objects, as outlined by the Internet of Things. Additionally, in order to fulfill the Internet of Things principles, Wireless Sensor Networks must have a virtual representation that allows indirect access to their resources, a model that should also include the virtualization of event sources in a WSN. Thus, in this paper a model for a virtual representation of event sources in a WSN is proposed. They are modeled as internet resources that are accessible by any internet application, following an Internet of Things approach. The model has been tested in a real implementation where a WSN has been deployed in an open neighborhood environment. Different event sources have been identified in the proposed scenario, and they have been represented following the proposed model.

  18. Virtualization of Event Sources in Wireless Sensor Networks for the Internet of Things

    Science.gov (United States)

    Martínez, Néstor Lucas; Martínez, José-Fernán; Díaz, Vicente Hernández

    2014-01-01

    Wireless Sensor Networks (WSNs) are generally used to collect information from the environment. The gathered data are delivered mainly to sinks or gateways that become the endpoints where applications can retrieve and process such data. However, applications would also expect from a WSN an event-driven operational model, so that they can be notified whenever occur some specific environmental changes instead of continuously analyzing the data provided periodically. In either operational model, WSNs represent a collection of interconnected objects, as outlined by the Internet of Things. Additionally, in order to fulfill the Internet of Things principles, Wireless Sensor Networks must have a virtual representation that allows indirect access to their resources, a model that should also include the virtualization of event sources in a WSN. Thus, in this paper a model for a virtual representation of event sources in a WSN is proposed. They are modeled as internet resources that are accessible by any internet application, following an Internet of Things approach. The model has been tested in a real implementation where a WSN has been deployed in an open neighborhood environment. Different event sources have been identified in the proposed scenario, and they have been represented following the proposed model. PMID:25470489

  19. Virtualization of event sources in wireless sensor networks for the internet of things.

    Science.gov (United States)

    Lucas Martínez, Néstor; Martínez, José-Fernán; Hernández Díaz, Vicente

    2014-12-01

    Wireless Sensor Networks (WSNs) are generally used to collect information from the environment. The gathered data are delivered mainly to sinks or gateways that become the endpoints where applications can retrieve and process such data. However, applications would also expect from a WSN an event-driven operational model, so that they can be notified whenever occur some specific environmental changes instead of continuously analyzing the data provided periodically. In either operational model, WSNs represent a collection of interconnected objects, as outlined by the Internet of Things. Additionally, in order to fulfill the Internet of Things principles, Wireless Sensor Networks must have a virtual representation that allows indirect access to their resources, a model that should also include the virtualization of event sources in a WSN. Thus, in this paper a model for a virtual representation of event sources in a WSN is proposed. They are modeled as internet resources that are accessible by any internet application, following an Internet of Things approach. The model has been tested in a real implementation where a WSN has been deployed in an open neighborhood environment. Different event sources have been identified in the proposed scenario, and they have been represented following the proposed model.

  20. Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT

    Directory of Open Access Journals (Sweden)

    Ming Luo

    2018-01-01

    Full Text Available Nowadays wireless sensor network (WSN is increasingly being used in the Internet of Things (IoT for data collection, and design of an access control scheme that allows an Internet user as part of IoT to access the WSN becomes a hot topic. A lot of access control schemes have been proposed for the WSNs in the context of the IoT. Nevertheless, almost all of these schemes assume that communication nodes in different network domains share common system parameters, which is not suitable for cross-domain IoT environment in practical situations. To solve this shortcoming, we propose a more secure and efficient access control scheme for wireless sensor networks in the cross-domain context of the Internet of Things, which allows an Internet user in a certificateless cryptography (CLC environment to communicate with a sensor node in an identity-based cryptography (IBC environment with different system parameters. Moreover, our proposed scheme achieves known session-specific temporary information security (KSSTIS that most of access control schemes cannot satisfy. Performance analysis is given to show that our scheme is well suited for wireless sensor networks in the cross-domain context of the IoT.

  1. Principles of wireless access and localization

    CERN Document Server

    Pahlavan, Kaveh

    2013-01-01

    A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless access and wireless localization techniques.  The book reflects principles of design and deployment of infrastructure for wireless access and localization for wide, local, and personal networking.   Description of wireless access methods includes design and deployment of traditional TDMA and CDMA technologies and emerging Long Term Evolution (LTE) techniques for wide area cellular networks, the

  2. Ubiquitous Wireless Sensor Networks and future “Internet of Things""

    OpenAIRE

    Vermesan, Ovidiu

    2009-01-01

    Overview of heterogeneous networks of embedded devices that can range from RFID, to smart identifiable systems with sensing and actuating capabilitie. Presentation of wireless sensor networks protocols and Internet of Things future technology. Bridging the real, virtual and digital worlds by using wireless connectivity. Application examples in automotive, aeronautics, healthcare, building, oil and gas industries. Ubiquitous Wireless Sensor Networks and future “Internet ...

  3. ICSW2AN : An Inter-vehicle Communication System Using Mobile Access Point over Wireless Wide Area Networks

    Science.gov (United States)

    Byun, Tae-Young

    This paper presents a prototype of inter-vehicle communication system using mobile access point that internetworks wired or wireless LAN and wireless WAN anywhere. Implemented mobile access point can be equipped with various wireless WAN interfaces such as WCDMA and HSDPA. Mobile access point in the IP mechanism has to process connection setup procedure to one wireless WAN. To show the applicability of the mobile access point to inter-vehicle communication, a simplified V2I2V-based car communication system called ICSW2AN is implemented to evaluate major performance metrics by road test. In addition, results of road test for traffic information service are investigated in view of RTT, latency and server processing time. The experimental result indicates that V2I2V-based car communication system sufficiently can provide time-tolerant traffic information to moving vehicles while more than two mobile devices in restricted spaces such as car, train and ship access wireless Internet simultaneously.

  4. The Making of a Sustainable Wireless City? Mapping Public Wi-Fi Access in Shanghai

    Directory of Open Access Journals (Sweden)

    Mingfeng Wang

    2016-01-01

    Full Text Available In the context of the global information economy, ready access to the Internet is critical to a city’s competitiveness, which has prompted a number of cities to launch plans to establish wireless networks. Most literature on the development of wireless cities focuses on cities in Western countries, and few have discussed how Chinese cities have adopted wireless technologies in their urban infrastructure development efforts. This paper examines recent development and spatial distribution of public Wi-Fi access in Shanghai, a leading business hub in China. We mapped Wi-Fi hotspots through the government sponsored “i-Shanghai” project and China Mobile Communications Corporation (CMCC. We find that while telecommunication providers have been proactively deploying WLAN (wireless local area network,a proxy of public Wi-Fi or wireless access hotspots in Shanghai, neither government sponsored WLAN hotspots nor facilities established by CMCC could cover the old traditional neighborhoods in the central city and sub-districts in remote rural areas. We also address the development of a more sustainable wireless city in Shanghai with a particular focus on digital divide and social equity issues.

  5. VT Wireless Internet Service Providers 2006

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) The VT Wireless Internet Service Provider (ISP) dataset (WISP2006) includes polygons depicting the extent of Vermont's WISP broadband system as of...

  6. VT Wireless Internet Service Providers 2007

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) The VT Wireless Internet Service Provider (ISP) dataset (WISP2007) includes polygons depicting the extent of Vermont's WISP broadband system as of...

  7. Photonic-assisted ultrafast THz wireless access

    DEFF Research Database (Denmark)

    Yu, Xianbin; Chen, Ying; Galili, Michael

    THz technology has been considered feasible for ultrafast wireless data communi- cation, to meet the increasing demand on next-generation fast wireless access, e.g., huge data file transferring and fast mobile data stream access. This talk reviews recent progress in high-speed THz wireless...

  8. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things.

    Science.gov (United States)

    Yi, Meng; Chen, Qingkui; Xiong, Neal N

    2016-11-03

    This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  9. An Internet of Things Example: Classrooms Access Control over Near Field Communication

    Science.gov (United States)

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-01-01

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks. PMID:24755520

  10. An internet of things example: classrooms access control over near field communication.

    Science.gov (United States)

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-04-21

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  11. An Internet of Things Example: Classrooms Access Control over Near Field Communication

    Directory of Open Access Journals (Sweden)

    Daniel Palma

    2014-04-01

    Full Text Available The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  12. Energy-efficient wireless mesh infrastructures

    OpenAIRE

    Al-Hazmi, Y.; de Meer, Hermann; Hummel, Karin Anna; Meyer, Harald; Meo, Michela; Remondo Bueno, David

    2011-01-01

    The Internet comprises access segments with wired and wireless technologies. In the future, we can expect wireless mesh infrastructures (WMIs) to proliferate in this context. Due to the relatively low energy efficiency of wireless transmission, as compared to wired transmission, energy consumption of WMIs can represent a significant part of the energy consumption of the Internet as a whole. We explore different approaches to reduce energy consumption in WMIs, taking into accoun...

  13. A Survey on Energy Conserving Mechanisms for the Internet of Things: Wireless Networking Aspects.

    Science.gov (United States)

    Abbas, Zeeshan; Yoon, Wonyong

    2015-09-25

    The Internet of Things (IoT) is an emerging key technology for future industries and everyday lives of people, where a myriad of battery operated sensors, actuators, and smart objects are connected to the Internet to provide services such as mobile healthcare, intelligent transport system, environmental monitoring, etc. Since energy efficiency is of utmost importance to these battery constrained IoT devices, IoT-related standards and research works have focused on the device energy conserving issues. This paper presents a comprehensive survey on energy conserving issues and solutions in using diverse wireless radio access technologies for IoT connectivity, e.g., the 3rd Generation Partnership Project (3GPP) machine type communications, IEEE 802.11ah, Bluetooth Low Energy (BLE), and Z-Wave. We look into the literature in broad areas of standardization, academic research, and industry development, and structurally summarize the energy conserving solutions based on several technical criteria. We also propose future research directions regarding energy conserving issues in wireless networking-based IoT.

  14. What is harmful for male fertility: cell phone or the wireless Internet?

    Science.gov (United States)

    Yildirim, Mehmet Erol; Kaynar, Mehmet; Badem, Huseyin; Cavis, Mucahıt; Karatas, Omer Faruk; Cimentepe, Ersın

    2015-09-01

    In this study, we aimed to assess the potential harmful effects of radiofrequency-electromagnetic radiation on sperm parameters. We requested semen for analyses from the male patients coming to our infertility division and also asked them to fill out an anonymous questionnaire. We queried their mobile phone and wireless Internet usage frequencies in order to determine their radiofrequency-electromagnetic radiation exposure. A total of 1082 patients filled the questionnaire but 51 of them were excluded from the study because of azoospermia. There was no significant difference between sperm counts and sperm morphology excluding sperm motility, due to mobile phone usage period, (p = 0.074, p = 0.909, and p = 0.05, respectively). The total motile sperm count and the progressive motile sperm count decreased due to the increase of internet usage (p = 0.032 and p = 0.033, respectively). In line with the total motile sperm count, progressive motile sperm count also decreased with wireless Internet usage compared with the wired Internet connection usage (p = 0.009 and p = 0.018, respectively). There was a negative correlation between wireless Internet usage duration and the total sperm count (r = -0.089, p = 0.039). We have also explored the negative effect of wireless Internet use on sperm motility according to our preliminary results. Copyright © 2015. Published by Elsevier Taiwan.

  15. 75 FR 55297 - Further Inquiry Into Two Under-Developed Issues in the Open Internet Proceeding

    Science.gov (United States)

    2010-09-10

    ...). The second is the application of open Internet rules to mobile wireless Internet access services...). The second is the application of open Internet rules to mobile wireless Internet access services... in the market. (B) Truth in Advertising: Prohibit broadband providers from marketing specialized...

  16. Getting ahead of the curve in wireless communications | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The demand for wireless communications is expected to increase significantly over ... would become more accessible to those without mobile phones, or Internet access. ... that will have a lasting impact on the field of wireless communications. ... problems: cooperative communication, coexistence of wireless systems, and ...

  17. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Meng Yi

    2016-11-01

    Full Text Available This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  18. Wireless sensor communications and internet connectivity for sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Dunbar, M. [Crossbow Technology, Inc., San Jose, CA (United States)

    2001-07-01

    A wireless sensor network architecture is an integrated hardware/software solution that has the potential to change the way sensors are used in a virtually unlimited range of industries and applications. By leveraging Bluetooth wireless technology for low-cost, short-range radio links, wireless sensor networks such as CrossNet{sup TM} enable users to create wireless sensor networks. These wireless networks can link dozens or hundreds of sensors of disparate types and brands with data acquisition/analysis systems, such as handheld devices, internet-enabled laptop or desktop PCs. The overwhelming majority of sensor applications are hard-wired at present, and since wiring is often the most time-consuming, tedious, trouble-prone and expensive aspect of sensor applications, users in many fields will find compelling reasons to adopt the wireless sensor network solution. (orig.)

  19. Wireless virtualization

    CERN Document Server

    Wen, Heming; Le-Ngoc, Tho

    2013-01-01

    This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless technologies by summarizing and comparing different architectures, techniques and technologies applicable to a future virtualized wireless network infrastructure. The readers are exposed to a short walkthrough of the future Internet initiative and network virtualization technologies in order to understand the potential role of wireless virtualization in the broader context of next-generation ubiq

  20. What is harmful for male fertility: Cell phone or the wireless internet?

    Directory of Open Access Journals (Sweden)

    Mehmet Erol Yildirim

    2015-09-01

    Full Text Available In this study, we aimed to assess the potential harmful effects of radiofrequency-electromagnetic radiation on sperm parameters. We requested semen for analyses from the male patients coming to our infertility division and also asked them to fill out an anonymous questionnaire. We queried their mobile phone and wireless internet usage frequencies in order to determine their radiofrequency-electromagnetic radiation exposure. A total of 1082 patients filled the questionnaire but 51 of them were excluded from the study because of azoospermia. There was no significant difference between sperm counts and sperm morphology excluding sperm motility, due to mobile phone usage period, (p = 0.074, p = 0.909, and p = 0.05, respectively. The total motile sperm count and the progressive motile sperm count decreased due to the increase of internet usage (p = 0.032 and p = 0.033, respectively. In line with the total motile sperm count, progressive motile sperm count also decreased with wireless internet usage compared with the wired internet connection usage (p = 0.009 and p = 0.018, respectively. There was a negative correlation between wireless internet usage duration and the total sperm count (r = −0.089, p = 0.039. We have also explored the negative effect of wireless internet use on sperm motility according to our preliminary results.

  1. EEM{sup TM} wireless supervision

    Energy Technology Data Exchange (ETDEWEB)

    Bilic, H. [Ericsson-Nikola Tesla d.d. Zagreb (Croatia)

    2000-07-01

    By adding the GSM network to the communication level of Energy Management systems, energy operating centres (EOC) can offer wireless access to the supervised equipment. Furthermore EOC can profit from rapid service development in the GSM networks. With implementation of GPRS to the GSM network EOC can instantly offer wireless access to external IP based networks such as Internet and corporate Intranets. The author describes architecture and key characteristic of Ericsson EnergyMaster{sup TM} (EEM{sup TM}) system for Energy Management, how and where to implement wireless supervision, wireless access to IP addresses and also how to implement new services provided by the GSM network. (orig.)

  2. Service Class Resource Management For Green Wireless-Optical Broadband Access NetworksWOBAN

    Directory of Open Access Journals (Sweden)

    SRUTHY.S

    2015-08-01

    Full Text Available Abstract-Broadband access networks have become an essential part of worldwide communication systems because of the exponential growth of broadband services such as video on demand high definition TV internet protocol TV and video conferencing. Exponential growth in the volume of wireless data boosted by the growing popularity of mobile devices such as smartphone and tablets has forced the telecommunication industries to rethink the way networks are currently designed and to focus on the development of high-capacity mobile broadband networks. In response to this challenge researchers have been working toward the development of an integrated wireless optical broadband access network. Two major candidate technologies which are currently known for their high capacity as well as quality of service QoS for multimedia traffic are passive optical networks PON and fourth generation 4G wireless networks. PON is a wired access technology well known for its cost efficiency and high capacity whereas 4G is a wireless broadband access technology which has achieved broad market acceptance because of its ease of deployment ability to offer mobility and its cost efficiency. Integration of PON and 4G technologies in the form of wireless-optical broadband access networks offers advantages such as extension of networks in rural areas support for mobile broadband services and quick deployment of broadband networks. These two technologies however have different design architectures for handling broadband services that require quality of service. For example 4G networks use traffic classification for supporting different QoS demands whereas the PON architecture has no such mechanism to differentiate between types of traffic. These two technologies also differ in their power saving mechanisms. Propose a service class mapping for the integrated PON-4G network which is based on the MG1 queuing model and class-based power saving mechanism which significantly improves the

  3. A Survey on Energy Conserving Mechanisms for the Internet of Things: Wireless Networking Aspects

    Directory of Open Access Journals (Sweden)

    Zeeshan Abbas

    2015-09-01

    Full Text Available The Internet of Things (IoT is an emerging key technology for future industries and everyday lives of people, where a myriad of battery operated sensors, actuators, and smart objects are connected to the Internet to provide services such as mobile healthcare, intelligent transport system, environmental monitoring, etc. Since energy efficiency is of utmost importance to these battery constrained IoT devices, IoT-related standards and research works have focused on the device energy conserving issues. This paper presents a comprehensive survey on energy conserving issues and solutions in using diverse wireless radio access technologies for IoT connectivity, e.g., the 3rd Generation Partnership Project (3GPP machine type communications, IEEE 802.11ah, Bluetooth Low Energy (BLE, and Z-Wave. We look into the literature in broad areas of standardization, academic research, and industry development, and structurally summarize the energy conserving solutions based on several technical criteria. We also propose future research directions regarding energy conserving issues in wireless networking-based IoT.

  4. A Survey on Energy Conserving Mechanisms for the Internet of Things: Wireless Networking Aspects

    Science.gov (United States)

    Abbas, Zeeshan; Yoon, Wonyong

    2015-01-01

    The Internet of Things (IoT) is an emerging key technology for future industries and everyday lives of people, where a myriad of battery operated sensors, actuators, and smart objects are connected to the Internet to provide services such as mobile healthcare, intelligent transport system, environmental monitoring, etc. Since energy efficiency is of utmost importance to these battery constrained IoT devices, IoT-related standards and research works have focused on the device energy conserving issues. This paper presents a comprehensive survey on energy conserving issues and solutions in using diverse wireless radio access technologies for IoT connectivity, e.g., the 3rd Generation Partnership Project (3GPP) machine type communications, IEEE 802.11ah, Bluetooth Low Energy (BLE), and Z-Wave. We look into the literature in broad areas of standardization, academic research, and industry development, and structurally summarize the energy conserving solutions based on several technical criteria. We also propose future research directions regarding energy conserving issues in wireless networking-based IoT. PMID:26404275

  5. A telemedicine system for wireless home healthcare based on Bluetooth and the Internet.

    Science.gov (United States)

    Zhao, Xiaoming; Fei, Ding-Yu; Doarn, Charles R; Harnett, Brett; Merrell, Ronald

    2004-01-01

    The VitalPoll Telemedicine System (VTS) was designed and developed for wireless home healthcare. The aims of this study were: to design the architecture and communication methods for a telemedicine system; to implement a physiologic routing hub to collect data from different medical devices and sensors; and to evaluate the feasibility of this system for applications in wireless home healthcare. The VTS was built using Bluetooth wireless and Internet technologies with client/server architecture. Several medical devices, which acquire vital signs, such as real-time electrocardiogram signals, heart rate, body temperature, and activity (physical motion), were integrated into the VTS. Medical information and data were transmitted over short-range interface (USB, RS232), wireless communication, and the Internet. The medical results were stored in a database and presented using a web browser. The patient's vital signals can be collected, transmitted, and displayed in real time by the VTS. The experiments verified no data loss during Bluetooth and Internet communication. Bluetooth and the Internet provide enough bandwidth channels to tranmit these vital signs. The experimental results show that VTS may be suitable for a practical telemedicine system in home healthcare.

  6. An Adaptive Channel Access Method for Dynamic Super Dense Wireless Sensor Networks.

    Science.gov (United States)

    Lei, Chunyang; Bie, Hongxia; Fang, Gengfa; Zhang, Xuekun

    2015-12-03

    Super dense and distributed wireless sensor networks have become very popular with the development of small cell technology, Internet of Things (IoT), Machine-to-Machine (M2M) communications, Vehicular-to-Vehicular (V2V) communications and public safety networks. While densely deployed wireless networks provide one of the most important and sustainable solutions to improve the accuracy of sensing and spectral efficiency, a new channel access scheme needs to be designed to solve the channel congestion problem introduced by the high dynamics of competing nodes accessing the channel simultaneously. In this paper, we firstly analyzed the channel contention problem using a novel normalized channel contention analysis model which provides information on how to tune the contention window according to the state of channel contention. We then proposed an adaptive channel contention window tuning algorithm in which the contention window tuning rate is set dynamically based on the estimated channel contention level. Simulation results show that our proposed adaptive channel access algorithm based on fast contention window tuning can achieve more than 95 % of the theoretical optimal throughput and 0 . 97 of fairness index especially in dynamic and dense networks.

  7. An Adaptive Channel Access Method for Dynamic Super Dense Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chunyang Lei

    2015-12-01

    Full Text Available Super dense and distributed wireless sensor networks have become very popular with the development of small cell technology, Internet of Things (IoT, Machine-to-Machine (M2M communications, Vehicular-to-Vehicular (V2V communications and public safety networks. While densely deployed wireless networks provide one of the most important and sustainable solutions to improve the accuracy of sensing and spectral efficiency, a new channel access scheme needs to be designed to solve the channel congestion problem introduced by the high dynamics of competing nodes accessing the channel simultaneously. In this paper, we firstly analyzed the channel contention problem using a novel normalized channel contention analysis model which provides information on how to tune the contention window according to the state of channel contention. We then proposed an adaptive channel contention window tuning algorithm in which the contention window tuning rate is set dynamically based on the estimated channel contention level. Simulation results show that our proposed adaptive channel access algorithm based on fast contention window tuning can achieve more than 95 % of the theoretical optimal throughput and 0 . 97 of fairness index especially in dynamic and dense networks.

  8. Revenue-Maximizing Radio Access Technology Selection with Net Neutrality Compliance in Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Elissar Khloussy

    2018-01-01

    Full Text Available The net neutrality principle states that users should have equal access to all Internet content and that Internet Service Providers (ISPs should not practice differentiated treatment on any of the Internet traffic. While net neutrality aims to restrain any kind of discrimination, it also grants exemption to a certain category of traffic known as specialized services (SS, by allowing the ISP to dedicate part of the resources for the latter. In this work, we consider a heterogeneous LTE/WiFi wireless network and we investigate revenue-maximizing Radio Access Technology (RAT selection strategies that are net neutrality-compliant, with exemption granted to SS traffic. Our objective is to find out how the bandwidth reservation for SS traffic would be made in a way that allows maximizing the revenue while being in compliance with net neutrality and how the choice of the ratio of reserved bandwidth would affect the revenue. The results show that reserving bandwidth for SS traffic in one RAT (LTE can achieve higher revenue. On the other hand, when the capacity is reserved across both LTE and WiFi, higher social benefit in terms of number of admitted users can be realized, as well as lower blocking probability for the Internet access traffic.

  9. On the scalability of uncoordinated multiple access for the Internet of Things

    KAUST Repository

    Chisci, Giovanni

    2017-11-16

    The Internet of things (IoT) will entail massive number of wireless connections with sporadic traffic patterns. To support the IoT traffic, several technologies are evolving to support low power wide area (LPWA) wireless communications. However, LPWA networks rely on variations of uncoordinated spectrum access, either for data transmissions or scheduling requests, thus imposing a scalability problem to the IoT. This paper presents a novel spatiotemporal model to study the scalability of the ALOHA medium access. In particular, the developed mathematical model relies on stochastic geometry and queueing theory to account for spatial and temporal attributes of the IoT. To this end, the scalability of the ALOHA is characterized by the percentile of IoT devices that can be served while keeping their queues stable. The results highlight the scalability problem of ALOHA and quantify the extend to which ALOHA can support in terms of number of devices, traffic requirement, and transmission rate.

  10. Intrusion detection and monitoring for wireless networks.

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.; Stephano, Amanda (Indiana University); Tabriz, Parisa (University of Illinois at Urbana-Champaign); Pelon, Kristen (Cedarville University); McCoy, Damon (University of Colorado, Boulder); Lodato, Mark (Lafayette College); Hemingway, Franklin (University of New Mexico); Custer, Ryan P.; Averin, Dimitry (Polytechnic University); Franklin, Jason (Carnegie Mellon University); Kilman, Dominique Marie

    2005-11-01

    Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wireless networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more

  11. Cross-layer model design in wireless ad hoc networks for the Internet of Things.

    Science.gov (United States)

    Yang, Xin; Wang, Ling; Xie, Jian; Zhang, Zhaolin

    2018-01-01

    Wireless ad hoc networks can experience extreme fluctuations in transmission traffic in the Internet of Things, which is widely used today. Currently, the most crucial issues requiring attention for wireless ad hoc networks are making the best use of low traffic periods, reducing congestion during high traffic periods, and improving transmission performance. To solve these problems, the present paper proposes a novel cross-layer transmission model based on decentralized coded caching in the physical layer and a content division multiplexing scheme in the media access control layer. Simulation results demonstrate that the proposed model effectively addresses these issues by substantially increasing the throughput and successful transmission rate compared to existing protocols without a negative influence on delay, particularly for large scale networks under conditions of highly contrasting high and low traffic periods.

  12. Cross-layer model design in wireless ad hoc networks for the Internet of Things.

    Directory of Open Access Journals (Sweden)

    Xin Yang

    Full Text Available Wireless ad hoc networks can experience extreme fluctuations in transmission traffic in the Internet of Things, which is widely used today. Currently, the most crucial issues requiring attention for wireless ad hoc networks are making the best use of low traffic periods, reducing congestion during high traffic periods, and improving transmission performance. To solve these problems, the present paper proposes a novel cross-layer transmission model based on decentralized coded caching in the physical layer and a content division multiplexing scheme in the media access control layer. Simulation results demonstrate that the proposed model effectively addresses these issues by substantially increasing the throughput and successful transmission rate compared to existing protocols without a negative influence on delay, particularly for large scale networks under conditions of highly contrasting high and low traffic periods.

  13. Threats and risks to information security: a practical analysis of free access wireless networks

    Science.gov (United States)

    Quirumbay, Daniel I.; Coronel, Iván. A.; Bayas, Marcia M.; Rovira, Ronald H.; Gromaszek, Konrad; Tleshova, Akmaral; Kozbekova, Ainur

    2017-08-01

    Nowadays, there is an ever-growing need to investigate, consult and communicate through the internet. This need leads to the intensification of free access to the web in strategic and functional points for the benefit of the community. However, this open access is also related to the increase of information insecurity. The existing works on computer security primarily focus on the development of techniques to reduce cyber-attacks. However, these approaches do not address the sector of inexperienced users who have difficulty understanding browser settings. Two methods can solve this problem: first the development of friendly browsers with intuitive setups for new users and on the other hand, by implementing awareness programs on essential security without deepening on technical information. This article addresses an analysis of the vulnerabilities of wireless equipment that provides internet service in the open access zones and the potential risks that could be found when using these means.

  14. Wireless Broadband Access and Accounting Schemes

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    In this paper, we propose two wireless broadband access and accounting schemes. In both schemes, the accounting system adopts RADIUS protocol, but the access system adopts SSH and SSL protocols respectively.

  15. Rogue AP Detection in the Wireless LAN for Large Scale Deployment

    Directory of Open Access Journals (Sweden)

    Sang-Eon Kim

    2006-10-01

    Full Text Available The wireless LAN standard, also known as WiFi, has begun to use commercial purposes. This paper describes access network architecture of wireless LAN for large scale deployment to provide public service. A metro Ethernet and digital subscriber line access network can be used for wireless LAN with access point. In this network architecture, access point plays interface between wireless node and network infrastructure. It is important to maintain access point without any failure and problems to public users. This paper proposes definition of rogue access point and classifies based on functional problem to access the Internet. After that, rogue access point detection scheme is described based on classification over the wireless LAN. The rogue access point detector can greatly improve the network availability to network service provider of wireless LAN.

  16. Mobility support for ubiquitous Internet

    NARCIS (Netherlands)

    Karagiannis, Georgios; Heijenk, Geert

    2000-01-01

    This document describes an architecture that is providing Internet access to mobile hosts, by allowing them to access this architecture through various access points and using various wireless technologies. In particular, this deliverable focuses on QoS and mobility between various IP subnetworks

  17. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  18. A SURVEY on WIRELESS MESH NETWORKS, ROUTING METRICS and PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Safak DURUKAN ODABASI

    2013-01-01

    Full Text Available Today, Internet has become an indispensable part of our daily lives. It has a growing user community in many fields from banking transactions to online entertainment. It will be very efficient for users, as the next generation internet access becomes wireless like frequently used services such as cellular phones. But for providing this, a new network is needed to be designed or an existing network must be improved as well as making changes on infrastructure. At this point, mesh network infrastructure arises and offers more sophisticated internet access with less need. The most important advantage of mesh networks is the capability of working without infrastructure. Mesh networks are an additional access technology more than being a renewed one in the next generation wireless networks called 4G. In this study, wireless mesh networks and example applications are mentioned. Base architecture and design factors are emphasized, current routing protocols that are used on wireless mesh networks and routing metrics on which these protocols are based, are explained. Finally, the performance effects of these protocols and metrics on different network topologies are referred.

  19. Resource and Traffic Management Techniques for Performance Optimization in Wireless Mesh Networks

    OpenAIRE

    D'Elia, Francesco Paolo

    2010-01-01

    Since Internet was born, it has steadily evolved. New devices, new needs, new applications, new protocols, and this evolution is not going to slow down in the near future. As a result of the introduction and standardization of wireless access technology, we are living through an inevitable replacement of the old wired technology. We are going through a wireless revolution, which brings with it new ways to access information: simply, anywhere, anytime. The new Internet challenge is to embo...

  20. Access control mechanism of wireless gateway based on open flow

    Science.gov (United States)

    Peng, Rong; Ding, Lei

    2017-08-01

    In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.

  1. The challenges of M2M massive access in wireless cellular networks

    Directory of Open Access Journals (Sweden)

    Andrea Biral

    2015-02-01

    Full Text Available The next generation of communication systems, which is commonly referred to as 5G, is expected to support, besides the traditional voice and data services, new communication paradigms, such as Internet of Things (IoT and Machine-to-Machine (M2M services, which involve communication between Machine-Type Devices (MTDs in a fully automated fashion, thus, without or with minimal human intervention. Although the general requirements of 5G systems are progressively taking shape, the technological issues raised by such a vision are still partially unclear. Nonetheless, general consensus has been reached upon some specific challenges, such as the need for 5G wireless access networks to support massive access by MTDs, as a consequence of the proliferation of M2M services. In this paper, we describe the main challenges raised by the M2M vision, focusing in particular on the problems related to the support of massive MTD access in current cellular communication systems. Then we analyze the most common approaches proposed in the literature to enable the coexistence of conventional and M2M services in the current and next generation of cellular wireless systems. We finally conclude by pointing out the research challenges that require further investigation in order to provide full support to the M2M paradigm.

  2. Wireless Internet on Trains - Impact on Performance of Business Travelers

    NARCIS (Netherlands)

    Zhang, M.; Marchau, V.A.W.J.; Wee, B. van; Hoorn, T. van der

    2006-01-01

    Wireless Internet service (WIS) is finding increasing implementation in the Netherlands via several markets. Recently, the idea has emerged of providing WIS through public transport services. The impact of WIS on train travelers, particularly on business travelers, is, however, unknown. In a study

  3. On the scalability of uncoordinated multiple access for the Internet of Things

    KAUST Repository

    Chisci, Giovanni; Elsawy, Hesham; Conti, Andrea; Alouini, Mohamed-Slim; Win, Moe Z.

    2017-01-01

    The Internet of things (IoT) will entail massive number of wireless connections with sporadic traffic patterns. To support the IoT traffic, several technologies are evolving to support low power wide area (LPWA) wireless communications. However

  4. Enhancing Cellular Coverage Quality by Virtual Access Point and Wireless Power Transfer

    Directory of Open Access Journals (Sweden)

    Jinsong Gui

    2018-01-01

    Full Text Available The ultradensification deploying for cellular networks is a direct and effective method for the improvement of network capacity. However, the benefit is achieved at the cost of network infrastructure investment and operating overheads, especially when there is big gap between peak-hour Internet traffic and average one. Therefore, we put forward the concept of virtual cellular coverage area, where wireless terminals with high-end configuration are motivated to enhance cellular coverage quality by both providing RF energy compensation and rewarding free traffic access to Internet. This problem is formulated as the Stackelberg game based on three-party circular decision, where a Macro BS (MBS acts as the leader to offer a charging power to Energy Transferring Relays (ETRs, and the ETRs and their associating Virtual Access Points (VAPs act as the followers to make their decisions, respectively. According to the feedback from the followers, the leader may readjust its strategy. The circular decision is repeated until the powers converge. Also, the better response algorithm for each game player is proposed to iteratively achieve the Stackelberg-Nash Equilibrium (SNE. Theoretical analysis proves the convergence of the proposed game scheme, and simulation results demonstrate its effectiveness.

  5. Reliable low-power wireless networks over unstable transmission power

    NARCIS (Netherlands)

    Kotian, Roshan; Exarchakos, Georgios; Liotta, Antonio

    2017-01-01

    Internet of Things promises large scale interconnected sensing and actuation capabilities in domains, areas, applications and activities never accessed before by Internet. Besides other technical barriers, wireless network node lifetime impedes its applicability. To reduce the energy cost incurred

  6. Technological advancements and Internet sexuality: does private access to the Internet influence online sexual behavior?

    Science.gov (United States)

    Daneback, Kristian; Månsson, Sven-Axel; Ross, Michael W

    2012-08-01

    The aim of this study was to investigate whether demographic characteristics and sexual behavior online and offline were associated with private, respectively, nonprivate access to the Internet in a Web sample of people who use the Internet for sexual purposes. A total of 1,913 respondents completed an online questionnaire about Internet sexuality, and 1,614 reported using the Internet for sexual purposes. The majority of these respondents reported having access to an Internet-connected computer no one else had access to (62 percent women and 70 percent men). The results showed that it is possible to differentiate between those who have access to an Internet-connected computer no one else has access to and those who have shared access to an Internet-connected computer. Not only did they differ in demographic characteristics, but also in the sexual activities they engaged in on the Internet. Different patterns were found for women and men. For example, men who had private access to Internet-connected computers were more likely than those who had shared access to seek information about sexual issues. Thus, having access to Internet computers no one else has access to may promote sexual knowledge and health for men. The results of this study along with the technological development implies that in future research, attention should be paid to where and how people access the Internet in relation to online behavior in general and online sexual behavior in particular.

  7. Using the Internet to access information inflates future use of the Internet to access other information.

    Science.gov (United States)

    Storm, Benjamin C; Stone, Sean M; Benjamin, Aaron S

    2017-07-01

    The ways in which people learn, remember, and solve problems have all been impacted by the Internet. The present research explored how people become primed to use the Internet as a form of cognitive offloading. In three experiments, we show that using the Internet to retrieve information alters a person's propensity to use the Internet to retrieve other information. Specifically, participants who used Google to answer an initial set of difficult trivia questions were more likely to decide to use Google when answering a new set of relatively easy trivia questions than were participants who answered the initial questions from memory. These results suggest that relying on the Internet to access information makes one more likely to rely on the Internet to access other information.

  8. A Fuzzy Preprocessing Module for Optimizing the Access Network Selection in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Faisal Kaleem

    2013-01-01

    Full Text Available A heterogeneous wireless network is characterized by the presence of different wireless access technologies that coexist in an overlay fashion. These wireless access technologies usually differ in terms of their operating parameters. On the other hand, Mobile Stations (MSs in a heterogeneous wireless network are equipped with multiple interfaces to access different types of services from these wireless access technologies. The ultimate goal of these heterogeneous wireless networks is to provide global connectivity with efficient ubiquitous computing to these MSs based on the Always Best Connected (ABC principle. This is where the need for intelligent and efficient Vertical Handoffs (VHOs between wireless technologies in a heterogeneous environment becomes apparent. This paper presents the design and implementation of a fuzzy multicriteria based Vertical Handoff Necessity Estimation (VHONE scheme that determines the proper time for VHO, while considering the continuity and quality of the currently utilized service, and the end-users' satisfaction.

  9. Comparative study of internet cloud and cloudlet over wireless mesh networks for real-time applications

    Science.gov (United States)

    Khan, Kashif A.; Wang, Qi; Luo, Chunbo; Wang, Xinheng; Grecos, Christos

    2014-05-01

    Mobile cloud computing is receiving world-wide momentum for ubiquitous on-demand cloud services for mobile users provided by Amazon, Google etc. with low capital cost. However, Internet-centric clouds introduce wide area network (WAN) delays that are often intolerable for real-time applications such as video streaming. One promising approach to addressing this challenge is to deploy decentralized mini-cloud facility known as cloudlets to enable localized cloud services. When supported by local wireless connectivity, a wireless cloudlet is expected to offer low cost and high performance cloud services for the users. In this work, we implement a realistic framework that comprises both a popular Internet cloud (Amazon Cloud) and a real-world cloudlet (based on Ubuntu Enterprise Cloud (UEC)) for mobile cloud users in a wireless mesh network. We focus on real-time video streaming over the HTTP standard and implement a typical application. We further perform a comprehensive comparative analysis and empirical evaluation of the application's performance when it is delivered over the Internet cloud and the cloudlet respectively. The study quantifies the influence of the two different cloud networking architectures on supporting real-time video streaming. We also enable movement of the users in the wireless mesh network and investigate the effect of user's mobility on mobile cloud computing over the cloudlet and Amazon cloud respectively. Our experimental results demonstrate the advantages of the cloudlet paradigm over its Internet cloud counterpart in supporting the quality of service of real-time applications.

  10. A novel and efficient user access control scheme for wireless body area sensor networks

    Directory of Open Access Journals (Sweden)

    Santanu Chatterjee

    2014-07-01

    Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.

  11. Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network.

    Science.gov (United States)

    Omala, Anyembe Andrew; Mbandu, Angolo Shem; Mutiria, Kamenyi Domenic; Jin, Chunhua; Li, Fagen

    2018-04-28

    Wireless body area network (WBAN) provides a medium through which physiological information could be harvested and transmitted to application provider (AP) in real time. Integrating WBAN in a heterogeneous Internet of Things (IoT) ecosystem would enable an AP to monitor patients from anywhere and at anytime. However, the IoT roadmap of interconnected 'Things' is still faced with many challenges. One of the challenges in healthcare is security and privacy of streamed medical data from heterogeneously networked devices. In this paper, we first propose a heterogeneous signcryption scheme where a sender is in a certificateless cryptographic (CLC) environment while a receiver is in identity-based cryptographic (IBC) environment. We then use this scheme to design a heterogeneous access control protocol. Formal security proof for indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model is presented. In comparison with some of the existing access control schemes, our scheme has lower computation and communication cost.

  12. Internet-accessible real-time weather information system

    Digital Repository Service at National Institute of Oceanography (India)

    Desai, R.G.P.; Joseph, A.; Desa, E.; Mehra, P.; Desa, E.; Gouveia, A.D.

    An internet-accessible real-time weather information system has been developed. This system provides real-time accessibility to weather information from a multitude of spatially distributed weather stations. The Internet connectivity also offers...

  13. Internet Accessibility: Challenges before the African Nations

    African Journals Online (AJOL)

    Internet Accessibility: Challenges Before The African Nations. 207. Information ... increasing internet access in Africa (Jensen, ... bite, particularly in the area of policy ... especially the urban and rural poor. ... supply, but electricity power supply.

  14. An Internet of Energy Things Based on Wireless LPWAN

    Directory of Open Access Journals (Sweden)

    Yonghua Song

    2017-08-01

    Full Text Available Under intense environmental pressure, the global energy sector is promoting the integration of renewable energy into interconnected energy systems. The demand-side management (DSM of energy systems has drawn considerable industrial and academic attention in attempts to form new flexibilities to respond to variations in renewable energy inputs to the system. However, many DSM concepts are still in the experimental demonstration phase. One of the obstacles to DSM usage is that the current information infrastructure was mainly designed for centralized systems, and does not meet DSM requirements. To overcome this barrier, this paper proposes a novel information infrastructure named the Internet of Energy Things (IoET in order to make DSM practicable by basing it on the latest wireless communication technology: the low-power wide-area network (LPWAN. The primary advantage of LPWAN over general packet radio service (GPRS and area Internet of Things (IoT is its wide-area coverage, which comes with minimum power consumption and maintenance costs. Against this background, this paper briefly reviews the representative LPWAN technologies of narrow-band Internet of Things (NB-IoT and Long Range (LoRa technology, and compares them with GPRS and area IoT technology. Next, a wireless-to-cloud architecture is proposed for the IoET, based on the main technical features of LPWAN. Finally, this paper looks forward to the potential of IoET in various DSM application scenarios.

  15. High-Capacity Hybrid Optical Fiber-Wireless Communications Links in Access Networks

    DEFF Research Database (Denmark)

    Pang, Xiaodan

    of broadband services access. To realize the seamless convergence between the two network segments, the lower capacity of wireless systems need to be increased to match the continuously increasing bandwidth of fiber-optic systems. The research works included in this thesis are devoted to experimental...... investigations of photonic-wireless links with record high capacities to fulfill the requirements of next generation hybrid optical fiber-wireless access networks. The main contributions of this thesis have expanded the state-of-the-art in two main areas: high speed millimeter-wave (mm-wave) communication links......Integration between fiber-optic and wireless communications systems in the "last mile" access networks is currently considered as a promising solution for both service providers and users, in terms of minimizing deployment cost, shortening upgrading period and increasing mobility and flexibility...

  16. Remote Access Unit for Optic-to-Wireless Conversion

    DEFF Research Database (Denmark)

    Chorchos, Łukasz; Rommel, Simon; Turkiewicz, J. P.

    . Growing demand for high speed wireless data transmission and new wireless standards like 5G force network operators to find new solutions for backhaul networks. Presently, to meet this need, attention of many researchers and top network vendors has been directed towards millimeter wave radio links....... Operation in the millimeter wave range brings new possibilities for a channel allocation as well as allows wider radio channels to be used. Moreover this frequency range is lighter licensed than regular GSM. This clearly shows a huge potential of millimeter waves for a high speed wireless data transmission...... was proposed and research projects like IPHOBAC-NG were founded. The aim of the mentioned project is to employ novel RAUs featuring opticto-wireless and wireless-to-optic conversion with a speeds of 1-10Gbit/s for broadband wireless access and up to 3Gbit/s for mobile backhaul. The RAU proposed in this paper...

  17. 60 GHz Wireless Propagation Channels: Characterization, Modeling and Evaluation

    OpenAIRE

    Gustafson, Carl

    2014-01-01

    To be able to connect wirelessly to the internet is nowadays a part of everyday life and the number of wireless devices accessing wireless networks worldwide are increasing rapidly. However, with the increasing number of wireless devices and applications and the amount available bandwidth, spectrum shortage is an issue. A promising way to increase the amount of available spectrum is to utilize frequency bands in the mm-wave range of 30-300 GHz that previously have not been used for typical co...

  18. 78 FR 30226 - Accessibility Requirements for Internet Browsers

    Science.gov (United States)

    2013-05-22

    ... software, such as an Internet browser, that it provides. Among other things, this means that the functions... CG Docket No. 10-145; FCC 13-57] Accessibility Requirements for Internet Browsers AGENCY: Federal... Act requires Internet browsers built into mobile phones to be accessible to individuals who are blind...

  19. Access to the internet for knowledge dissemination: agricultural ...

    African Journals Online (AJOL)

    Access to agricultural information is a prerequisite for agricultural development. However, information on how agricultural scientists make use of the Internet to access agricultural information is limited. This study therefore investigated access to the Internet for knowledge dissemination by agricultural researchers in ...

  20. A Mobility-aware Broadcasting Infrastructure for a Wireless Internet with Hotspots

    NARCIS (Netherlands)

    Hesselman, C.E.W.; Eertink, Henk; Eertink, E.H.; Widya, I.A.; Huizer, E.; Kermani, P.

    In this paper, we consider the problem of adaptively delivering live multimedia broadcasts (e.g., for applications such as TV, radio, or e-cinema) to a potentially large number of mobile hosts that roam about in a wireless internet with hotspots. We take a user-oriented approach based on an

  1. Partial Interference and Its Performance Impact on Wireless Multiple Access Networks

    Directory of Open Access Journals (Sweden)

    Lau WingCheong

    2010-01-01

    Full Text Available To determine the capacity of wireless multiple access networks, the interference among the wireless links must be accurately modeled. In this paper, we formalize the notion of the partial interference phenomenon observed in many recent wireless measurement studies and establish analytical models with tractable solutions for various types of wireless multiple access networks. In particular, we characterize the stability region of IEEE 802.11 networks under partial interference with two potentially unsaturated links numerically. We also provide a closed-form solution for the stability region of slotted ALOHA networks under partial interference with two potentially unsaturated links and obtain a partial characterization of the boundary of the stability region for the general M-link case. Finally, we derive a closed-form approximated solution for the stability region for general M-link slotted ALOHA system under partial interference effects. Based on our results, we demonstrate that it is important to model the partial interference effects while analyzing wireless multiple access networks. This is because such considerations can result in not only significant quantitative differences in the predicted system capacity but also fundamental qualitative changes in the shape of the stability region of the systems.

  2. Towards Effective Intra-flow Network Coding in Software Defined Wireless Mesh Networks

    OpenAIRE

    Donghai Zhu; Xinyu Yang Yang; Peng Zhao; Wei Yu

    2016-01-01

    Wireless Mesh Networks (WMNs) have potential to provide convenient broadband wireless Internet access to mobile users.With the support of Software-Defined Networking (SDN) paradigm that separates control plane and data plane, WMNs can be easily deployed and managed. In addition, by exploiting the broadcast nature of the wireless medium and the spatial diversity of multi-hop wireless networks, intra-flow network coding has shown a greater benefit in comparison with traditional routing paradigm...

  3. Internet Addiction Risk in the Academic Environment

    Science.gov (United States)

    Ellis, William F.; McAleer, Brenda; Szakas, Joseph S.

    2015-01-01

    The Internet's effect on society is growing exponentially. One only has to look at the growth of e-commerce, social media, wireless data access, and mobile devices to see how communication is changing. The need and desire for the Internet, especially in such disciplines as Computer Science or Computer Information Systems, pose a unique risk for…

  4. Multigigabit W-Band (75–110 GHz) Bidirectional Hybrid Fiber-Wireless Systems in Access Networks

    DEFF Research Database (Denmark)

    Pang, Xiaodan; Lebedev, Alexander; Vegas Olmos, Juan José

    2014-01-01

    compare the transmission performances in terms of achievable wireless distances with and without using a high-frequency electrical power amplifier at the wireless transmitter. A downlink 16-Gbit/s QPSK signal and an uplink 1.25-Gbit/s ASK signal transmission over the two implementations are experimentally......We experimentally demonstrate multigigabit capacity bidirectional hybrid fiber-wireless systems with RF carrier frequencies at the W-band (75-110 GHz) that enables the seamless convergence between wireless and fiber-optic data transmission systems in access networks. In this study, we evaluate...... the transmission performances in two scenarios: a fiber-wireless access link that directly provide high-speed connections to wireless end users, and a fiber-wireless-fiber signal relay where a high capacity wireless link can be used to bridge two access fiber spans over physical obstacles. In both scenarios, we...

  5. [Differences in access to Internet and Internet-based information seeking according to the type of psychiatric disorder].

    Science.gov (United States)

    Brunault, P; Bray, A; Rerolle, C; Cognet, S; Gaillard, P; El-Hage, W

    2017-04-01

    Internet has become a major tool for patients to search for health-related information and to communicate on health. We currently lack data on how patients with psychiatric disorders access and use Internet to search for information on their mental health. This study aimed to assess, in patients followed for a psychiatric disorder (schizophrenia, bipolar disorder, mood and anxiety disorder, substance-related and addictive disorders and eating disorders), prevalence of Internet access and use, and patient expectations and needs regarding the use of Internet to search for mental-health information depending on the psychiatric disorder. We conducted this cross-sectional study between May 2013 and July 2013 in 648 patients receiving psychiatric care in 8 hospitals from the Region Centre, France. We used multivariate logistic regression adjusted for age, gender, socio-educational level and professional status to compare use, expectations and needs regarding Internet-based information about the patient's psychiatric disorder (65-items self-administered questionnaires) as a function of the psychiatric disorders. We identified patients clusters with multiple correspondence analysis and ascending hierarchical classification. Although 65.6% of our population accessed Internet at home, prevalence for Internet access varied depending on the type of psychiatric disorder and was much more related to limited access to a computer and low income than to a lack of interest in the Internet. Most of the patients who used Internet were interested in having access to reliable Internet-based information on their health (76.8%), and most used Internet to search for Internet based health-information about their psychiatric disorder (58.8%). We found important differences in terms of expectations and needs depending on the patient's psychiatric disorder (e.g., higher interest in Internet-based information among patients with bipolar disorder, substance-related and addictive disorders

  6. Multiple access protocol for supporting multimedia services in wireless ATM networks

    DEFF Research Database (Denmark)

    Liu, Hong; Dittmann, Lars; Gliese, Ulrik Bo

    1999-01-01

    The furture broadband wireless asynchronous transfer mode (ATM) networks must provide seamless extension of multimedia services from the wireline ATM networks. This requires an effecient wireless access protocol to fulfill varying Quality-og-Service (QoS) requirements for multimedia applications....... In this paper, we propose a multiple access protocol using centralized and distributed channel access control techniques to provide QoS guarantees for multimedia services by taking advantage of the characteristics of different kinds of ATM traffics. Multimedia traffic, including constant bit rate (CBR...

  7. Resilient Disaster Network Based on Software Defined Cognitive Wireless Network Technology

    Directory of Open Access Journals (Sweden)

    Goshi Sato

    2015-01-01

    Full Text Available In order to temporally recover the information network infrastructure in disaster areas from the Great East Japan Earthquake in 2011, various wireless network technologies such as satellite IP network, 3G, and Wi-Fi were effectively used. However, since those wireless networks are individually introduced and installed but not totally integrated, some of networks were congested due to the sudden network traffic generation and unbalanced traffic distribution, and eventually the total network could not effectively function. In this paper, we propose a disaster resilient network which integrates various wireless networks into a cognitive wireless network that users can use as an access network to the Internet at the serious disaster occurrence. We designed and developed the disaster resilient network based on software defined network (SDN technology to automatically select the best network link and route among the possible access networks to the Internet by periodically monitoring their network states and evaluate those using extended AHP method. In order to verify the usefulness of our proposed system, a prototype system is constructed and its performance is evaluated.

  8. On Radio over Fiber for Heterogeneous Wireless Networks

    DEFF Research Database (Denmark)

    Riaz, M. Tahir; Nielsen, Rasmus Hjorth; Pedersen, Jens Myrup

    2009-01-01

    The paper provides an overview of the radio over fiber (RoF) technology and its potential use in heterogeneous wireless networks. Wireless communications have seen a huge growth in the last decade. It has been estimated that five in every six people in the entire world will have a mobile phone...... in 2010. The vast growing use of Internet on the mobile devices has also been increased significantly. In order to provide a broadband access for mobile communications, a new wireless infrastructure (fiber optic networks for distributed, extendible heterogeneous radio architectures and service...... provisioning - FUTON) based on RoF technology has been introduced. The project adopts centralized processing of radio signals for number of wireless base stations can enhance the network performance in terms of bandwidth, and QoS parameters. The simplified remote access units (RAU) are expected to not only...

  9. Revocable Anonymous Access to the Internet?

    Science.gov (United States)

    Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos

    2003-01-01

    Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…

  10. Efficient scheduling request algorithm for opportunistic wireless access

    KAUST Repository

    Nam, Haewoon; Alouini, Mohamed-Slim

    2011-01-01

    An efficient scheduling request algorithm for opportunistic wireless access based on user grouping is proposed in this paper. Similar to the well-known opportunistic splitting algorithm, the proposed algorithm initially adjusts (or lowers

  11. Sustainable and Practical Firmware Upgrade for Wireless Access Point Using Password-Based Authentication

    Directory of Open Access Journals (Sweden)

    Jaejin Jang

    2016-08-01

    Full Text Available Wireless access points (WAPs are devices that provide Internet connectivity to devices such as desktops, laptops, smartphones, and tablets. Hence, it is important to provide sufficient availability to devices and security for the traffic that is routed by a WAP. However, attackers can decrease the network bandwidth or obtain the traffic including private data such as search histories, login information, and device usage patterns by exploiting the vulnerabilities in firmware upgrades to install malicious firmware. To address this problem, we propose a sustainable and practical firmware upgrade for a WAP using password-based authentication. The proposed upgrade protocol ensures security by adding freshness to the firmware whenever a firmware upgrade occurs. This freshness is different for each event and each firmware; therefore, even if the freshness of one firmware is exposed, the others are secure. In addition, confidentiality, integrity, and authentication are ensured. Furthermore, the proposed protocol can be easily implemented and adapted to WAPs. Experiments are performed to evaluate the upgrade time, resource usage, and code size in wired and wireless connected environments by implementing a prototype and analyzing the security of the protocol. The results show that the proposed upgrade is secure and practical.

  12. Cross-layer optimization of wireless multi-hop networks

    OpenAIRE

    Soldati, Pablo

    2007-01-01

    The interest in wireless communications has grown constantly for the past decades, leading to an enormous number of applications and services embraced by billions of users. In order to meet the increasing demand for mobile Internet access, several high data-rate radio networking technologies have been proposed to offer wide area high-speed wireless communications, eventually replacing fixed (wired) networks for many applications. This thesis considers cross-layer optimization of multi-hop rad...

  13. Secure Your Wireless Network: Going Wireless Comes with Its Own Special Set of Security Concerns

    Science.gov (United States)

    Bloomquist, Jane; Musa, Atif

    2004-01-01

    Imagine a completely wireless school, an open network in which all students and staff can roam around using laptops or handheld computers to browse the Internet, access files and applications on the school server, and communicate with each other and the world via e-mail. It's a great picture--and at some schools the future is already here. But…

  14. An Internet of Things based physiological signal monitoring and receiving system for virtual enhanced health care network.

    Science.gov (United States)

    Rajan, J Pandia; Rajan, S Edward

    2018-01-01

    Wireless physiological signal monitoring system designing with secured data communication in the health care system is an important and dynamic process. We propose a signal monitoring system using NI myRIO connected with the wireless body sensor network through multi-channel signal acquisition method. Based on the server side validation of the signal, the data connected to the local server is updated in the cloud. The Internet of Things (IoT) architecture is used to get the mobility and fast access of patient data to healthcare service providers. This research work proposes a novel architecture for wireless physiological signal monitoring system using ubiquitous healthcare services by virtual Internet of Things. We showed an improvement in method of access and real time dynamic monitoring of physiological signal of this remote monitoring system using virtual Internet of thing approach. This remote monitoring and access system is evaluated in conventional value. This proposed system is envisioned to modern smart health care system by high utility and user friendly in clinical applications. We claim that the proposed scheme significantly improves the accuracy of the remote monitoring system compared to the other wireless communication methods in clinical system.

  15. Knowledge-Based Multiple Access Protocol in Broadband Wireless ATM Networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    1999-01-01

    In this paper, we propose a knowledge-based multiple access protocol for the extension of wireline ATM to wireless networks. The objective is to enable effecient transmission of all kinds of ATM traffic in the wireless channel with guaranteed QoS.The proposed protocol utilixes knowledge of the main...... guaranteed QoS requirements to a variety of ATM applications....

  16. Design and Implementation of an IoT Access Point for Smart Home

    Directory of Open Access Journals (Sweden)

    Chih-Yung Chang

    2015-12-01

    Full Text Available Network communication and micro-electro-mechanical embedded technologies have attracted much attention in recent years. Through these technologies, the capabilities of sensing, identification, and communication can be embedded in various smart devices. These smart devices can automatically connect to the Internet and form an intelligent network called Internet of Things (IoT. However, these devices are embedded with different wireless communication interfaces such as Wi-Fi and ZigBee. This paper presents the design and implementation of an IoT access point that supports functionalities of coordination of various wireless transmission protocols. Based on the existing Wi-Fi access point, we have embedded a ZigBee module and implemented ZigBee and UPnP protocols into the designed IoT access point, which supports ZigBee communication capabilities over the Internet.

  17. IP communication optimization for 6LoWPAN-Based Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Li MA

    2014-07-01

    Full Text Available The emergence of 6LoWPAN makes it possible that Wireless Sensor Networks access to the Internet. However, the cost of IP communication between 6LoWPAN wireless sensor node and external internet node is still relatively high. This paper proposed a new addressing configuration and compression scheme in 6LoWPAN network called IPHC-NAT, which largely reduced the proportion of the IP header in 6LoWPAN packet, designed and constructed a bidirectional data transmission gateway to connect 6LoWPAN wireless sensor node with IPv6 client. The experimental results show the feasibility of the design of IPHC-NAT and the data transmission efficiency has significantly been improved compared to the original 6LoWPAN network.

  18. Heterogeneous wireless/wireline optical access networks with the R-EAT as backend component

    Science.gov (United States)

    Hagedorn, Klaus; Gindera, Ralf; Stohr, Andreas; Jager, Dieter

    2004-09-01

    A heterogeneous wireless/wireline optical transmission link using a reflection type electroabsorption transceiver (R-EAT) is presented. Simultaneous transmission of full-duplex broadband wireless LAN (WLAN) channels and 1Gb/s base band data is experimentally demonstrated. The system link employs sub-carrier multiplexing (SCM) and two optical channels for full duplex transmission of various analog WLAN channels and downlink digital base band data. The developed link architecture is suitable for simultaneous transmission of broadband wireline and wireless signals, it enables the coexistence and interoperability between wireline and wireless access technologies. The developed R-EAT component employed in this wireline/wireless access system, features "single-chip-component" base stations in access networks with star type topology where only a single optical fiber is used for bidirectional optical transmission. The R-EAT can be used within the optical C-band (1530- 1560nm) and is suitable for (D)WDM networks. Bit error rate measurements demonstrate the capabilities of the R-EAT for 1Gb/s base band transmission. The analog performance for WLAN transmission is characterised by a spurious free dynamic range (SFDR) of more than 75dB and 90dB for uplink and downlink transmission, respectively. The link gain for uplink and downlink transmission is -42dB and -37dB, respectively. The demonstrates the analog performances of the R-EAT for being used in wireless access networks such as W-LAN.

  19. Wireless access to a pharmaceutical database: A demonstrator for data driven Wireless Application Prorocol (WAP) applications in medical information processing

    DEFF Research Database (Denmark)

    Hansen, Michael Schacht; Dørup, Jens

    2001-01-01

    script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2......) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. RESULTS: A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol...... service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. CONCLUSIONS: We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further...

  20. Internet Access from CERN GSM subscriptions

    CERN Multimedia

    IT Department

    2008-01-01

    The data service on GSM subscriptions has been improved, allowing CERN users to access the Internet directly. A CERN GSM subscription with data option now allows you to connect to the Internet from a mobile phone or a PC equipped with a GSM modem. The previous access (CERN intranet) still exists. To get access to the new service, you will find all the information on configurations at: http://cern.ch/gprs The use of this service on the Sunrise network is charged on a flat-rate basis (no extra charge related to the volume of downloaded data). Depending on your CERN subscription type (standard or master), you can also connect to foreign GSM data networks (roaming), but this is strongly discouraged, except where absolutely necessary, due to international roaming charges. Telecom Section, IT/CS

  1. Integrated Coherent Radio-over-Fiber Units for Millimeter-Wave Wireless Access

    DEFF Research Database (Denmark)

    Stöhr, A.; Babiel, S.; Chuenchom, M.

    2015-01-01

    For providing wireless access as a complementary access technology to direct optical access, supporting 1–10 Gb/s per client, we propose a novel scheme based upon the transparent integration of coherent Radio-over-Fiber (CRoF) units with next generation optical access (NGOA) networks using dense ...

  2. TRICALCAR : Weaving Community Based Wireless Networks in ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... wireless champions by facilitating the exchange of knowledge between them and with other like-minded actors in the region. The training materials and knowledge gained during the experience will be documented and made available online. The idea is to improve Internet access in rural and urban marginalized areas at ...

  3. What drives individuals to access the internet mostly using a cell phone?

    OpenAIRE

    Yook, Seungyun; Jung, Yumi

    2012-01-01

    Mobile Internet users can access content, applications, and services using their cell phones. Recent PEW Internet research shows that more than half of U.S. cell phone owners have smartphones. Among them, some people have adopted a mobile phone and use it as a major Internet access medium; they may use other devices such as a desktop computer, notebook, netbook, or tablet PC, but those are not included in their Internet access medium repertoire. This paper examines who accesses the Internet m...

  4. Combined single-mode/multimode fiber link supporting simplified in-building 60-GHz gigabit wireless access

    DEFF Research Database (Denmark)

    Pham, Tien Thang; Lebedev, Alexander; Beltrán, Marta

    2012-01-01

    In this paper, we propose and experimentally demonstrate a simple, cost-effective hybrid gigabit fiber-wireless system for in-building wireless access. Simplicity and cost-effectiveness are achieved in all parts of the system by utilizing direct laser modulation, optical frequency up-conversion, ......In this paper, we propose and experimentally demonstrate a simple, cost-effective hybrid gigabit fiber-wireless system for in-building wireless access. Simplicity and cost-effectiveness are achieved in all parts of the system by utilizing direct laser modulation, optical frequency up...

  5. Seamless and secure communications over heterogeneous wireless networks

    CERN Document Server

    Cao, Jiannong

    2014-01-01

    This brief provides an overview of the requirements, challenges, design issues and major techniques for seamless and secure communications over heterogeneous wireless networks. It summarizes and provides detailed insights into the latest research on handoff management, mobility management, fast authentication and security management to support seamless and secure roaming for mobile clients. The reader will also learn about the challenges in developing relevant technologies and providing ubiquitous Internet access over heterogeneous wireless networks. The authors have extensive experience in im

  6. Household computer and Internet access: The digital divide in a pediatric clinic population

    Science.gov (United States)

    Carroll, Aaron E.; Rivara, Frederick P.; Ebel, Beth; Zimmerman, Frederick J.; Christakis, Dimitri A.

    2005-01-01

    Past studies have noted a digital divide, or inequality in computer and Internet access related to socioeconomic class. This study sought to measure how many households in a pediatric primary care outpatient clinic had household access to computers and the Internet, and whether this access differed by socio-economic status or other demographic information. We conducted a phone survey of a population-based sample of parents with children ages 0 to 11 years old. Analyses assessed predictors of having home access to a computer, the Internet, and high-speed Internet service. Overall, 88.9% of all households owned a personal computer, and 81.4% of all households had Internet access. Among households with Internet access, 48.3% had high speed Internet at home. There were statistically significant associations between parental income or education and home computer ownership and Internet access. However, the impact of this difference was lessened by the fact that over 60% of families with annual household income of $10,000–$25,000, and nearly 70% of families with only a high-school education had Internet access at home. While income and education remain significant predictors of household computer and internet access, many patients and families at all economic levels have access, and might benefit from health promotion interventions using these modalities. PMID:16779012

  7. Centralized optical-frequency-comb-based RF carrier generator for DWDM fiber-wireless access systems

    DEFF Research Database (Denmark)

    Pang, Xiaodan; Beltran, Marta; Sanchez, Jose

    2014-01-01

    In this paper, we report on a gigabit capacity fiber-wireless system that enables smooth integration between high-speed wireless networks and dense wavelength-division-multiplexing (DWDM) access networks. By employing a centralized optical frequency comb, both the wireline and the wireless services...

  8. Internet Access Practices and Employee Attitudes toward Internet Usage Policy Implementation in Selected Philippines Financial Institutions

    Directory of Open Access Journals (Sweden)

    Maria Sagrario R. Simbulan

    2004-06-01

    Full Text Available This study explores the employees’ concept of appropriate use of Internet facilities as well as their perception of the rights and liabilities, both of the individual and of the organization, associated with the grant of Internet access privileges in the workplace. It further examines how employees perceive their organization’s monitoring of employees online activities and the use of an Internet Usage Policy, whether these are seen as monitoring and control mechanisms or as ways to ensure that Internet access facilities are shared equitably and used responsibly. While the issue of the impact of Internet access on employee productivity will not directly be tackled, the study will provide insights into the frequency and type of usage of Internet facilities in the workplace. Considering the sizeable investment that an organization makes to provide Internet facilities, determining how employees use these facilities to achieve the goals of the organization is, in the very least, interesting and for most organizations concerned with their survival in difficult times, critically important.

  9. Millimeter Wave Hybrid Photonic Wireless Links for High-Speed Wireless Access and Mobile Fronthaul

    DEFF Research Database (Denmark)

    Rommel, Simon

    As the introduction of the fifth generation of mobile services (5G) is set to revolutionize the way people, devices and machines connect, the changes to the underlying networks and technologies are no less drastic. The massive increase in user and data capacity, as well as the decrease in latency...... networks. In summary, the work presented in this thesis has regarded a multitude of aspects of millimeter wave hybrid photonic wireless links, expanding upon the state of the art and showing their feasibility for use in fifth generation mobile and high speed wireless access networks – hopefully bringing...

  10. Browsing for the Best Internet Access Provider?

    Science.gov (United States)

    Weil, Marty

    1996-01-01

    Highlights points to consider when choosing an Internet Service Provider. Serial Line Internet Protocol (SLIP) and Point to Point Protocol (PPP) are compared regarding price, performance, bandwidth, speed, and technical support. Obtaining access via local, national, consumer online, and telephone-company providers is discussed. A pricing chart and…

  11. Joint estimation and contention-resolution protocol for wireless random access

    DEFF Research Database (Denmark)

    Stefanovic, Cedomir; Trillingsgaard, Kasper Fløe; Kiilerich Pratas, Nuno

    2013-01-01

    We propose a contention-based random-access protocol, designed for wireless networks where the number of users is not a priori known. The protocol operates in rounds divided into equal-duration slots, performing at the same time estimation of the number of users and resolution of their transmissi......We propose a contention-based random-access protocol, designed for wireless networks where the number of users is not a priori known. The protocol operates in rounds divided into equal-duration slots, performing at the same time estimation of the number of users and resolution...... successive interference cancellation which, coupled with the use of the optimized access probabilities, enables throughputs that are substantially higher than the traditional slotted ALOHA-like protocols. The key feature of the proposed protocol is that the round durations are not a priori set...

  12. Wireless-accessible sensor populations for monitoring biological variables

    NARCIS (Netherlands)

    Mazzu, Marco; Scalvini, Simonetta; Giordano, A.; Frumento, E.; Wells, Hannah; Lokhorst, C.; Glisenti, Fulvio

    2008-01-01

    The current health-care infrastructure is generally considered to be inadequate to meet the needs of an increasingly older population. We have investigated the feasibility of a passive in-home monitoring system based on wireless accessible sensor populations (WASP). In an EU-funded project we have

  13. An Introduction to Services Accessible on the Internet.

    Science.gov (United States)

    Giguere, Marlene

    1992-01-01

    Provides an overview of the INTERNET and INTERNET services of interest to libraries, including electronic mail, bulletin boards, electronic publishing, online public access catalogs and databases, and downloaded texts and software. (16 references) (MES)

  14. Delay-aware adaptive sleep mechanism for green wireless-optical broadband access networks

    Science.gov (United States)

    Wang, Ruyan; Liang, Alei; Wu, Dapeng; Wu, Dalei

    2017-07-01

    Wireless-Optical Broadband Access Network (WOBAN) is capacity-high, reliable, flexible, and ubiquitous, as it takes full advantage of the merits from both optical communication and wireless communication technologies. Similar to other access networks, the high energy consumption poses a great challenge for building up WOBANs. To shot this problem, we can make some load-light Optical Network Units (ONUs) sleep to reduce the energy consumption. Such operation, however, causes the increased packet delay. Jointly considering the energy consumption and transmission delay, we propose a delay-aware adaptive sleep mechanism. Specifically, we develop a new analytical method to evaluate the transmission delay and queuing delay over the optical part, instead of adopting M/M/1 queuing model. Meanwhile, we also analyze the access delay and queuing delay of the wireless part. Based on such developed delay models, we mathematically derive ONU's optimal sleep time. In addition, we provide numerous simulation results to show the effectiveness of the proposed mechanism.

  15. Computer access and Internet use by urban and suburban emergency department customers.

    Science.gov (United States)

    Bond, Michael C; Klemt, Ryan; Merlis, Jennifer; Kopinski, Judith E; Hirshon, Jon Mark

    2012-07-01

    Patients are increasingly using the Internet (43% in 2000 vs. 70% in 2006) to obtain health information, but is there a difference in the ability of urban and suburban emergency department (ED) customers to access the Internet? To assess computer and Internet resources available to and used by people waiting to be seen in an urban ED and a suburban ED. Individuals waiting in the ED were asked survey questions covering demographics, type of insurance, access to a primary care provider, reason for their ED visit, computer access, and ability to access the Internet for health-related matters. There were 304 individuals who participated, 185 in the urban ED and 119 in the suburban ED. Urban subjects were more likely than suburban to be women, black, have low household income, and were less likely to have insurance. The groups were similar in regard to average age, education, and having a primary care physician. Suburban respondents were more likely to own a computer, but the majority in both groups had access to computers and the Internet. Their frequency of accessing the Internet was similar, as were their reasons for using it. Individuals from the urban ED were less willing to schedule appointments via the Internet but more willing to contact their health care provider via e-mail. The groups were equally willing to use the Internet to fill prescriptions and view laboratory results. Urban and suburban ED customers had similar access to the Internet. Both groups were willing to use the Internet to access personal health information. Copyright © 2012 Elsevier Inc. All rights reserved.

  16. Approximate Networking for Universal Internet Access

    Directory of Open Access Journals (Sweden)

    Junaid Qadir

    2017-12-01

    Full Text Available Despite the best efforts of networking researchers and practitioners, an ideal Internet experience is inaccessible to an overwhelming majority of people the world over, mainly due to the lack of cost-efficient ways of provisioning high-performance, global Internet. In this paper, we argue that instead of an exclusive focus on a utopian goal of universally accessible “ideal networking” (in which we have a high throughput and quality of service as well as low latency and congestion, we should consider providing “approximate networking” through the adoption of context-appropriate trade-offs. In this regard, we propose to leverage the advances in the emerging trend of “approximate computing” that rely on relaxing the bounds of precise/exact computing to provide new opportunities for improving the area, power, and performance efficiency of systems by orders of magnitude by embracing output errors in resilient applications. Furthermore, we propose to extend the dimensions of approximate computing towards various knobs available at network layers. Approximate networking can be used to provision “Global Access to the Internet for All” (GAIA in a pragmatically tiered fashion, in which different users around the world are provided a different context-appropriate (but still contextually functional Internet experience.

  17. Internet access and usage by staff and students: a case study of ...

    African Journals Online (AJOL)

    This study focused on Internet access and usage by staff and students in the University of Jos Main Library. It investigated monthly number of users that queued to access Internet monthly and the number of users who actually had access to use the Internet between January – December 2006. Other things investigated ...

  18. On the Security of Data Collection and Transmission from Wireless Sensor Networks in the Context of Internet of Things

    OpenAIRE

    Yu, Hong; He, Jingsha; Liu, Ruohong; Ji, Dajie

    2013-01-01

    In the context of Internet of Things (IoT), multiple cooperative nodes in wireless sensor networks (WSNs) can be used to monitor an event, jointly generate a report and then send it to one or more Internet nodes for further processing. A primary security requirement in such applications is that every event data report be authenticated to intended Internet users and effectively filtered on its way to the Internet users to realize the security of data collection and transmission from the WSN. H...

  19. How Much Is Too Much to Pay for Internet Access? A Behavioral Economic Analysis of Internet Use.

    Science.gov (United States)

    Broadbent, Julie; Dakki, Michelle A

    2015-08-01

    The popularity of online recreational activities, such as social networking, has dramatically increased the amount of time spent on the Internet. Excessive or inappropriate use of the Internet can result in serious adverse consequences. The current study used a behavioral economic task to determine if the amount of time spent online by problematic and nonproblematic users can be modified by price. The Internet Purchase Task was used to determine how much time undergraduate students (N=233) would spend online at 13 different prices. Despite high demand for Internet access when access was free, time spent online by both problematic and nonproblematic users decreased dramatically, even at low prices. These results suggest that the amount of time spent online may be modified by having a tangible cost associated with use, whereas having free access to the Internet may encourage excessive, problematic use.

  20. Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview

    Science.gov (United States)

    Zhang, Junqing; Duong, Trung; Woods, Roger; Marshall, Alan

    2017-08-01

    The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of key generation and physical layer encryption. These schemes can be implemented and are lightweight, and thus offer practical solutions for providing effective IoT wireless security. Future research to make IoT-based physical layer security more robust and pervasive is also covered.

  1. Impact of the Internet on Academic Performance of Students in ...

    African Journals Online (AJOL)

    was also revealed that Power outage, slow internet speed, lack of computer ... mail, online chat, file transfer, the interlinked Web pages and other documents of the World ..... If cybercafés are provided with wireless access points, it will become ...

  2. A Survey of Internet Access and Use by Students of Library and ...

    African Journals Online (AJOL)

    A Survey of Internet Access and Use by Students of Library and Information Science ... access and utilize Internet facilities, level of search skills, reasons for use of Internet, ... Data collected for the study was analyzed using descriptive statistics.

  3. Access Control with RFID in the Internet of Things

    DEFF Research Database (Denmark)

    Jensen, Steffen Elstrøm Holst; Jacobsen, Rune Hylsberg

    2013-01-01

    , to the Internet is suggested. The solution uses virtual representations of objects by using low-cost, passive RFID tags to give objects identities on the Internet. A prototype that maps an RFID identity into an IPv6 address is constructed. It is illustrated how this approach can be used in access control systems......Future Internet research is needed to bring the Internet and the Things closer to each other to form the Internet of Things. As objects in our daily life gradually become smarter, there is an increasing benefit of networking these objects. In this article, a method to couple objects, the Things...... based on open network protocols and packet filtering. The solution includes a novel RFID reader architecture that supports the internetworking of components of a future access control system based on network layer technology....

  4. Medium Access Control in Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon

    Focusing on Wireless Sensor Networks (WSN) that are powered by energy harvesting, this dissertation focuses on energy-efficient communication links between senders and receivers that are alternating between active and sleeping states of operation. In particular, the focus lies on Medium Access...

  5. Analysis of the Decoupled Access for Downlink and Uplink in Wireless Heterogeneous Networks

    DEFF Research Database (Denmark)

    Smiljkovikj, K.; Popovski, Petar; Gavrilovska, L.

    2015-01-01

    Wireless cellular networks evolve towards a heterogeneous infrastructure, featuring multiple types of Base Stations (BSs), such as Femto BSs (FBSs) and Macro BSs (MBSs). A wireless device observes multiple points (BSs) through which it can access the infrastructure and it may choose to receive th...

  6. Access Routes of Internet Finance Dictionaries: Present Solutions ...

    African Journals Online (AJOL)

    Lexicographers working on finance dictionaries have not properly exploited the fast development of the Internet. This is revealed by the poor utilization of the access routes found in current Internet finance dictionaries. Consequently, users cannot effectively and efficiently find answers to their lexicographical problems. Firstly ...

  7. Adaptive Code Division Multiple Access Protocol for Wireless Network-on-Chip Architectures

    Science.gov (United States)

    Vijayakumaran, Vineeth

    Massive levels of integration following Moore's Law ushered in a paradigm shift in the way on-chip interconnections were designed. With higher and higher number of cores on the same die traditional bus based interconnections are no longer a scalable communication infrastructure. On-chip networks were proposed enabled a scalable plug-and-play mechanism for interconnecting hundreds of cores on the same chip. Wired interconnects between the cores in a traditional Network-on-Chip (NoC) system, becomes a bottleneck with increase in the number of cores thereby increasing the latency and energy to transmit signals over them. Hence, there has been many alternative emerging interconnect technologies proposed, namely, 3D, photonic and multi-band RF interconnects. Although they provide better connectivity, higher speed and higher bandwidth compared to wired interconnects; they also face challenges with heat dissipation and manufacturing difficulties. On-chip wireless interconnects is one other alternative proposed which doesn't need physical interconnection layout as data travels over the wireless medium. They are integrated into a hybrid NOC architecture consisting of both wired and wireless links, which provides higher bandwidth, lower latency, lesser area overhead and reduced energy dissipation in communication. However, as the bandwidth of the wireless channels is limited, an efficient media access control (MAC) scheme is required to enhance the utilization of the available bandwidth. This thesis proposes using a multiple access mechanism such as Code Division Multiple Access (CDMA) to enable multiple transmitter-receiver pairs to send data over the wireless channel simultaneously. It will be shown that such a hybrid wireless NoC with an efficient CDMA based MAC protocol can significantly increase the performance of the system while lowering the energy dissipation in data transfer. In this work it is shown that the wireless NoC with the proposed CDMA based MAC protocol

  8. Convergence of broadband optical and wireless access networks

    Science.gov (United States)

    Chang, Gee-Kung; Jia, Zhensheng; Chien, Hung-Chang; Chowdhury, Arshad; Hsueh, Yu-Ting; Yu, Jianjun

    2009-01-01

    This paper describes convergence of optical and wireless access networks for delivering high-bandwidth integrated services over optical fiber and air links. Several key system technologies are proposed and experimentally demonstrated. We report here, for the first ever, a campus-wide field trial demonstration of radio-over-fiber (RoF) system transmitting uncompressed standard-definition (SD) high-definition (HD) real-time video contents, carried by 2.4-GHz radio and 60- GHz millimeter-wave signals, respectively, over 2.5-km standard single mode fiber (SMF-28) through the campus fiber network at Georgia Institute of Technology (GT). In addition, subsystem technologies of Base Station and wireless tranceivers operated at 60 GHz for real-time video distribution have been developed and tested.

  9. Answers at your fingertips: Access to the Internet influences willingness to answer questions.

    Science.gov (United States)

    Ferguson, Amanda M; McLean, David; Risko, Evan F

    2015-12-01

    Recent technological advances have given rise to an information-gathering tool unparalleled by any in human history-the Internet. Understanding how access to such a powerful informational tool influences how we think represents an important question for psychological science. In the present investigation we examined the impact of access to the Internet on the metacognitive processes that govern our decisions about what we "know" and "don't know." Results demonstrated that access to the Internet influenced individuals' willingness to volunteer answers, which led to fewer correct answers overall but greater accuracy when an answer was offered. Critically, access to the Internet also influenced feeling-of-knowing, and this accounted for some (but not all) of the effect on willingness to volunteer answers. These findings demonstrate that access to the Internet can influence metacognitive processes, and contribute novel insights into the operation of the transactive memory system formed by people and the Internet. Copyright © 2015 Elsevier Inc. All rights reserved.

  10. M2M massive wireless access

    DEFF Research Database (Denmark)

    Zanella, Andrea; Zorzi, Michele; Santos, André F.

    2013-01-01

    In order to make the Internet of Things a reality, ubiquitous coverage and low-complexity connectivity are required. Cellular networks are hence the most straightforward and realistic solution to enable a massive deployment of always connected Machines around the globe. Nevertheless, a paradigm...... shift in the conception and design of future cellular networks is called for. Massive access attempts, low-complexity and cheap machines, sporadic transmission and correlated signals are among the main properties of this new reality, whose main consequence is the disruption of the development...... Access Reservation, Coded Random Access and the exploitation of multiuser detection in random access. Additionally, we will show how the properties of machine originated signals, such as sparsity and spatial/time correlation can be exploited. The end goal of this paper is to provide motivation...

  11. Wireless and wireline service convergence in next generation optical access networks - the FP7 WISCON project

    DEFF Research Database (Denmark)

    Vegas Olmos, Juan José; Pang, Xiaodan; Lebedev, Alexander

    2014-01-01

    The next generation of information technology demands both high capacity and mobility for applications such as high speed wireless access capable of supporting broadband services. The transport of wireless and wireline signals is converging into a common telecommunication infrastructure....... In this paper, we will present the Marie Curie Framework Program 7 project “Wireless and wireline service convergence in next generation optical access networks” (WISCON), which focuses on the conception and study of novel architectures for wavelength-division-multiplexing (WDM) optical multi-modulation format...

  12. Digital Divide: How Do Home Internet Access and Parental Support Affect Student Outcomes?

    Directory of Open Access Journals (Sweden)

    Jing Lei

    2012-03-01

    Full Text Available This study examined the relationship between home Internet access/parental support and student outcomes. Survey data were collected from 1,576 middle school students in China. Data were analyzed using descriptive analysis, independent-samples T-test, and regression analysis. Results indicate that students who had home Internet access reported higher scores than those without home Internet on all three dimensions: Computer and Internet self-efficacy, Attitudes towards technology and Developmental outcomes. Home Internet access and parental support were significantly positively associated with technology self-efficacy, interest in technology, perceived importance of the Internet, and perceived impact of the Internet on learning. Findings from this study have significant implications for research and practice on how to narrow down the digital divide.

  13. A Multifactor Secure Authentication System for Wireless Payment

    Science.gov (United States)

    Sanyal, Sugata; Tiwari, Ayu; Sanyal, Sudip

    Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. The vulnerability is that access is based on only single factor authentication which is not secure to protect user data, there is a need of multifactor authentication. This paper proposes a new protocol based on multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce another security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy with in a limited resources that does not require any change in infrastructure or underline protocol of wireless network. This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases faith of the user and business organizations on wireless financial transaction using mobile devices.

  14. Internet access and online cancer information seeking among Latino immigrants from safety net clinics.

    Science.gov (United States)

    Selsky, Claire; Luta, George; Noone, Anne-Michelle; Huerta, Elmer E; Mandelblatt, Jeanne S

    2013-01-01

    Internet use is widespread, but little is known about Internet use for cancer information among Latinos, especially those who rely on safety net clinics. The authors investigated access to and intended use of the Internet for cancer information among low income, immigrant Latinos predominately from Central and South America. A cross-sectional study of 1,273 Latinos 21 years and older attending safety net clinics or health fairs was conducted from June 2007 to November 2008. The authors used logistic regression models to evaluate associations of age, acculturation, psychosocial factors and other covariates with Internet access and intended use of the Internet for cancer information among those with access. Of the sample, 44% reported Internet access. Higher information self-efficacy and greater trust in the Internet were independently associated with Internet access (p = .05 and p Internet use for cancer information, considering covariates. In addition, those with high (vs. low) perceived risk of cancer (OR = 1.76; 95% CI [1.14, 2.73]; p = .01) and higher levels of trust in online health information (OR = 1.47 per one-point increase; 95% [CI 1.19, 1.82]; p = .0004) were more likely to intend to seek cancer information online. These findings that Internet access is fairly high in the immigrant Latino population and that the Internet is a trusted source of cancer information suggest that the Internet may be a channel for cancer control interventions.

  15. Energy efficiency in hybrid mobile and wireless networks

    Energy Technology Data Exchange (ETDEWEB)

    Abbas, Ziaul Haq

    2012-07-01

    Wireless Internet access is almost pervasive nowadays, and many types of wireless networks can be used to access the Internet. However, along with this growth, there is an even greater concern about the energy consumption and efficiency of mobile devices as well as of the supporting networks, triggering the appearance of the concept of green communication. While some efforts have been made towards this direction, challenges still exist and need to be tackled from diverse perspectives. Cellular networks, WLANs, and ad hoc networks in the form of wireless mesh networks are the most popular technologies for wireless Internet access. The availability of such a variety of access networks has also paved the way to explore synergistic approaches for Internet access, leading to the concept of hybrid networks and relay communications. In addition, many mobile devices are being equipped with multiple interfaces, enabling them to operate in hybrid networks. In contrast, the improvements in the battery technology itself have not matched the pace of the emerging mobile applications. The situation becomes more sophisticated when a mobile device functions also as a relay node to forward other station's data. In the literature, energy efficiency of mobile devices has been addressed from various perspectives such as protocol-level efforts, battery management efforts, etc. However, there is little work on energy efficiency in hybrid mobile and wireless networks and devices with heterogeneous connections. For example, when there are multiple networks available to a mobile device, how to achieve optimum long-term energy consumption of such a device is an open question. Furthermore, in today's cellular networks, micro-, pico-, and femto-cells are the most popular network topologies in order to support high data rate services and high user density. With the growth of such small-cell solutions, the energy consumption of these networks is also becoming an important concern for operators

  16. Preservice Teachers' Internet Addiction in Terms of Gender, Internet Access, Loneliness and Life Satisfaction

    Science.gov (United States)

    Demirer, Veysel; Bozoglan, Bahadir; Sahin, Ismail

    2013-01-01

    The aim of this study is to investigate pre-service teachers' Internet addiction in terms of gender, Internet accessibility, loneliness and life satisfaction. Statistical analyses were completed on the data by the 247 preservice teachers that filled the surveys completely. According to findings, pre-service teachers' level of loneliness and…

  17. EAP-Kerberos: A Low Latency EAP Authentication Method for Faster Handoffs in Wireless Access Networks

    Science.gov (United States)

    Zrelli, Saber; Okabe, Nobuo; Shinoda, Yoichi

    The wireless medium is a key technology for enabling ubiquitous and continuous network connectivity. It is becoming more and more important in our daily life especially with the increasing adoption of networking technologies in many fields such as medical care and transportation systems. Although most wireless technologies nowadays provide satisfying bandwidth and higher speeds, several of these technologies still lack improvements with regard to handoff performance. In this paper, we focus on wireless network technologies that rely on the Extensible Authentication Protocol for mutual authentication between the station and the access network. Such technologies include local area wireless networks (IEEE 802.11) as well as broadband wireless networks (IEEE 802.16). We present a new EAP authentication method based on a three party authentication scheme, namely Kerberos, that considerably shortens handoff delays. Compared to other methods, the proposed method has the advantage of not requiring any changes on the access points, making it readily deployable at reasonable costs.

  18. Advanced routing protocols for wireless networks

    CERN Document Server

    Campista , Miguel Elias Mitre

    2014-01-01

    This text introduces the principles of routing protocols and metrics as they affect wireless networking environments, specifically in urban areas. Timely because of the recent rise in small city life, this topic includes the consideration of ad hoc, mesh, vehicular, sensor, and delay tolerant networks. These approaches are each unique, and author Miguel Mitre Campista provides a thorough, but accessible, explanation of their individual characteristics for engineers, computer scientists, IT professionals, and curious Internet users.

  19. Upper bound for energy efficiency in multi-cell fibre-wireless access systems

    NARCIS (Netherlands)

    Koonen, A.M.J.; Popov, M.; Wessing, H.

    2013-01-01

    Bringing radio access points closer to the end-users improves radio energy efficiency. However, taking into account both the radio and the optical parts of a fibre-wireless access system, the overall system energy efficiency has an upper bound determined by the relation between the energy

  20. Upper bound for energy efficiency in multi-cell fibre-wireless access systems

    DEFF Research Database (Denmark)

    Koonen, A.M.J.; Popov, M.; Wessing, Henrik

    2013-01-01

    Bringing radio access points closer to the end-users improves radio energy efficiency. However, taking into account both the radio and the optical parts of a fibre-wireless access system, the overall system energy efficiency has an upper bound determined by the relation between the energy...

  1. Cognitive radio networks medium access control for coexistence of wireless systems

    CERN Document Server

    Bian, Kaigui; Gao, Bo

    2014-01-01

    This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing.  From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources.  Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.   • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...

  2. Wireless Sensor Network for Indoor Air Quality Monitoring

    Directory of Open Access Journals (Sweden)

    Jun Li

    2014-06-01

    Full Text Available Indoor air quality monitoring system consists of wireless sensor device, nRF24L01 wireless transceiver modules, C8051MCU, STM32103 remote monitoring platform, alarm device and data server. Distributed in the interior space of wireless sensors measure parameters of the local air quality, wireless transceiver module of the MCU to transmit data to the remote monitoring platform for analysis which displayed and stored field environment data or charts. The data collecting from wireless sensors to be send by wireless Access Point to the remote data server based on B/S architecture, intelligent terminals such as mobile phone, laptop, tablet PC on the Internet monitor indoor air quality in real-time. When site environment air quality index data exceeds the threshold in the monitoring device, the remote monitoring platform sends out the alarm SMS signal to inform user by GSM module. Indoor air quality monitoring system uses modular design method, has the portability and scalability has the low manufacture cost, real-time monitoring data and man-machine interaction.

  3. Use of a wireless local area network in an orthodontic clinic.

    Science.gov (United States)

    Mupparapu, Muralidhar; Binder, Robert E; Cummins, John M

    2005-06-01

    Radiographic images and other patient records, including medical histories, demographics, and health insurance information, can now be stored digitally and accessed via patient management programs. However, digital image acquisition and diagnosis and treatment planning are independent tasks, and each is time consuming, especially when performed at different computer workstations. Networking or linking the computers in an office enhances access to imaging and treatment planning tools. Access can be further enhanced if the entire network is wireless. Thanks to wireless technology, stand-alone, desk-bound personal computers have been replaced with mobile, hand-held devices that can communicate with each other and the rest of the world via the Internet. As with any emerging technology, some issues should be kept in mind when adapting to the wireless environment. Foremost is network security. Second is the choice of mobile hardware devices that are used by the orthodontist, office staff, and patients. This article details the standards and choices in wireless technology that can be implemented in an orthodontic clinic and suggests how to select suitable mobile hardware for accessing or adding data to a preexisting network. The network security protocols discussed comply with HIPAA regulations and boost the efficiency of a modern orthodontic clinic.

  4. Mobility management techniques for the next-generation wireless networks

    Science.gov (United States)

    Sun, Junzhao; Howie, Douglas P.; Sauvola, Jaakko J.

    2001-10-01

    The tremendous demands from social market are pushing the booming development of mobile communications faster than ever before, leading to plenty of new advanced techniques emerging. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Mobility management is an important issue in the area of mobile communications, which can be best solved at the network layer. One of the key features of the next generation wireless networks is all-IP infrastructure. This paper discusses the mobility management schemes for the next generation mobile networks through extending IP's functions with mobility support. A global hierarchical framework model for the mobility management of wireless networks is presented, in which the mobility management is divided into two complementary tasks: macro mobility and micro mobility. As the macro mobility solution, a basic principle of Mobile IP is introduced, together with the optimal schemes and the advances in IPv6. The disadvantages of the Mobile IP on solving the micro mobility problem are analyzed, on the basis of which three main proposals are discussed as the micro mobility solutions for mobile communications, including Hierarchical Mobile IP (HMIP), Cellular IP, and Handoff-Aware Wireless Access Internet Infrastructure (HAWAII). A unified model is also described in which the different micro mobility solutions can coexist simultaneously in mobile networks.

  5. Do We Really Have an Internet Problem? Statistics, Credibility and Issues Concerning Public Internet Access in Academic Libraries.

    Science.gov (United States)

    Cubbage, Charlotte

    2002-01-01

    Discusses problems with patron Internet access in academic libraries and describes a study conducted at Northwestern University (Illinois) that used Internet tracking software to assess user Internet behavior. Topics include Internet use policies; pornography; and loss of control over library services and information content that is provided. (LRW)

  6. Receiver-initiated medium access control protocols for wireless sensor networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Di Mauro, Alessio; Vithanage, Madava D.

    2015-01-01

    One of the fundamental building blocks of a Wireless Sensor Network (WSN) is the Medium Access Control (MAC) protocol, that part of the system governing when and how two independent neighboring nodes activate their respective transceivers to directly interact. Historically, data exchange has always...

  7. Internet and Social Media Access Among Youth Experiencing Homelessness: Mixed-Methods Study.

    Science.gov (United States)

    VonHoltz, Lauren A Houdek; Frasso, Rosemary; Golinkoff, Jesse M; Lozano, Alicia J; Hanlon, Alexandra; Dowshen, Nadia

    2018-05-22

    Youth experiencing homelessness are at a risk for a variety of adverse outcomes. Given the widespread use of the internet and social media, these new technologies may be used to address their needs and for outreach purposes. However, little is known about how this group uses these resources. This study investigated how homeless adolescents use these technologies for general and health-related purposes, whether the scope of their use changes with housing status, and their interest in a website dedicated to youth experiencing homelessness. A convenience sample of youth aged 18 to 21 years was recruited from a youth-specific homeless shelter. All participants completed a 47-item survey, with 10 individuals completing a semistructured interview. Descriptive statistics, exact testing, logistic regression, and generalized estimating equation modeling was performed for quantitative data analysis. Interviews were transcribed verbatim, and NVivo 10 (QSR International) was employed to facilitate double coding and thematic analysis. A total of 87 participants completed the survey with a mean age of 19.4 (SD 1.1) years. While experiencing homelessness, 56% (49/87) accessed the internet at least once a day, with 86% (75/87) accessing once a week. Access to a smartphone was associated with a 3.03 greater odds of accessing the internet and was the most frequently used device (66% of participants, 57/87). While experiencing homelessness, subjects reported a 68% decreased odds in internet access frequency (odds ratio [OR] 0.32, Psocial media use (OR 0.13, P=.01). Ten participants completed the semistructured interview. Several themes were identified, including (1) changes in internet behaviors while experiencing homelessness, (2) health status as a major concern and reason for Internet use, and (3) interest in a website dedicated to youth experiencing homelessness. While experiencing homelessness, participants indicated their behaviors were more goal-oriented and less focused on

  8. A 15-meter Multi-Gigabit W-band Bidirectional Wireless Bridge in Fiber-Optic Access Networks

    DEFF Research Database (Denmark)

    Pang, Xiaodan; Vegas Olmos, Juan José; Lebedev, Alexander

    2013-01-01

    . The down-converted signal is re-modulated on to the lightwave and transmit further through the fiber-optic system. In the uplink, both up-and down-conversion are performed by electrical means. Furthermore, we investigate both passive and active wireless transmitters in this work for both downlink......We present a bidirectional wireless bridge in the W-band enabling the seamless convergence between the wireless and fiber-optic access networks. In the downlink, a 16 Gbit/s QPSK signal is photonically up-converted at the wireless transmitter and electrically down-converted at the wireless receiver...... and uplink transmissions. With an active wireless transmitter, up to 15 meters wireless transmission is successfully achieved with a BER below the 7% FEC limit in the downlink....

  9. Managing healthcare information using short message service (SMS) in wireless broadband networks

    Science.gov (United States)

    Documet, Jorge; Tsao, Sinchai; Documet, Luis; Liu, Brent J.; Zhou, Zheng; Joseph, Anika O.

    2007-03-01

    Due to the ubiquity of cell phones, SMS (Short Message Service) has become an ideal means to wirelessly manage a Healthcare environment and in particular PACS (Picture Archival and Communications System) data. SMS is a flexible and mobile method for real-time access and control of Healthcare information systems such as HIS (Hospital Information System) or PACS. Unlike conventional wireless access methods, SMS' mobility is not limited by the presence of a WiFi network or any other localized signal. It provides a simple, reliable yet flexible method to communicate with an information system. In addition, SMS services are widely available for low costs from cellular phone service providers and allows for more mobility than other services such as wireless internet. This paper aims to describe a use case of SMS as a means of remotely communicating with a PACS server. Remote access to a PACS server and its Query-Retrieve services allows for a more convenient, flexible and streamlined radiology workflow. Wireless access methods such as SMS will increase dedicated PACS workstation availability for more specialized DICOM (Digital Imaging and Communications in Medicine) workflow management. This implementation will address potential security, performance and cost issues of applying SMS as part of a healthcare information management system. This is in an effort to design a wireless communication system with optimal mobility and flexibility at minimum material and time costs.

  10. Digital predistortion of 75–110 GHz W-band frequency multiplier for fiber wireless short range access systems

    DEFF Research Database (Denmark)

    Zhao, Ying; Deng, Lei; Pang, Xiaodan

    2011-01-01

    be effectively pre-compensated. Without using costly W-band components, a transmission system with 26km fiber and 4m wireless transmission operating at 99.6GHz is experimentally validated. Adjacent-channel power ratio (ACPR) improvements for IQ-modulated vector signals are guaranteed and transmission......We present a W-band fiber-wireless transmission system based on a nonlinear frequency multiplier for high-speed wireless short range access applications. By implementing a baseband digital signal predistortion scheme, intensive nonlinear distortions induced in a sextuple frequency multiplier can...... performances for fiber and wireless channels are studied. This W-band predistortion technique is a promising candidate for applications in high capacity wireless-fiber access systems....

  11. QoS Provisioning Techniques for Future Fiber-Wireless (FiWi Access Networks

    Directory of Open Access Journals (Sweden)

    Martin Maier

    2010-04-01

    Full Text Available A plethora of enabling optical and wireless access-metro network technologies have been emerging that can be used to build future-proof bimodal fiber-wireless (FiWi networks. Hybrid FiWi networks aim at providing wired and wireless quad-play services over the same infrastructure simultaneously and hold great promise to mitigate the digital divide and change the way we live and work by replacing commuting with teleworking. After overviewing enabling optical and wireless network technologies and their QoS provisioning techniques, we elaborate on enabling radio-over-fiber (RoF and radio-and-fiber (R&F technologies. We describe and investigate new QoS provisioning techniques for future FiWi networks, ranging from traffic class mapping, scheduling, and resource management to advanced aggregation techniques, congestion control, and layer-2 path selection algorithms.

  12. Converged wireline and wireless signal distribution in optical fiber access networks

    DEFF Research Database (Denmark)

    Prince, Kamau

    This thesis presents results obtained during the course of my doctoral studies into the transport of fixed and wireless signaling over a converged otpical access infrastructure. In the formulation, development and assessment of a converged paradigma for multiple-services delivery via optical access...... networking infrastructure, I have demonstrated increased functionalities with existing optical technologies and commercially available optoelectronic devices. I have developed novel systems for extending the range of optical access systems, and have demonstrated the repurposing of standard digital devices...

  13. Insecurity of Wireless Networks

    Energy Technology Data Exchange (ETDEWEB)

    Sheldon, Frederick T [ORNL; Weber, John Mark [Dynetics, Inc.; Yoo, Seong-Moo [University of Alabama, Huntsville; Pan, W. David [University of Alabama, Huntsville

    2012-01-01

    Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA, allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.

  14. Adaptive Media Access Control for Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Dragoni, Nicola

    2012-01-01

    ODMAC (On-Demand Media Access Control) is a recently proposed MAC protocol designed to support individual duty cycles for Energy Harvesting — Wireless Sensor Networks (EH-WSNs). Individual duty cycles are vital for EH-WSNs, because they allow nodes to adapt their energy consumption to the ever-ch...

  15. A Low Collision and High Throughput Data Collection Mechanism for Large-Scale Super Dense Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chunyang Lei

    2016-07-01

    Full Text Available Super dense wireless sensor networks (WSNs have become popular with the development of Internet of Things (IoT, Machine-to-Machine (M2M communications and Vehicular-to-Vehicular (V2V networks. While highly-dense wireless networks provide efficient and sustainable solutions to collect precise environmental information, a new channel access scheme is needed to solve the channel collision problem caused by the large number of competing nodes accessing the channel simultaneously. In this paper, we propose a space-time random access method based on a directional data transmission strategy, by which collisions in the wireless channel are significantly decreased and channel utility efficiency is greatly enhanced. Simulation results show that our proposed method can decrease the packet loss rate to less than 2 % in large scale WSNs and in comparison with other channel access schemes for WSNs, the average network throughput can be doubled.

  16. A Low Collision and High Throughput Data Collection Mechanism for Large-Scale Super Dense Wireless Sensor Networks.

    Science.gov (United States)

    Lei, Chunyang; Bie, Hongxia; Fang, Gengfa; Gaura, Elena; Brusey, James; Zhang, Xuekun; Dutkiewicz, Eryk

    2016-07-18

    Super dense wireless sensor networks (WSNs) have become popular with the development of Internet of Things (IoT), Machine-to-Machine (M2M) communications and Vehicular-to-Vehicular (V2V) networks. While highly-dense wireless networks provide efficient and sustainable solutions to collect precise environmental information, a new channel access scheme is needed to solve the channel collision problem caused by the large number of competing nodes accessing the channel simultaneously. In this paper, we propose a space-time random access method based on a directional data transmission strategy, by which collisions in the wireless channel are significantly decreased and channel utility efficiency is greatly enhanced. Simulation results show that our proposed method can decrease the packet loss rate to less than 2 % in large scale WSNs and in comparison with other channel access schemes for WSNs, the average network throughput can be doubled.

  17. Evaluation of internet access and utilization by medical students in Lahore, Pakistan

    Science.gov (United States)

    2011-01-01

    Background The internet is increasingly being used worldwide in imparting medical education and improving its delivery. It has become an important tool for healthcare professionals training but the data on its use by medical students in developing countries is lacking with no study on the subject from Pakistan. This study was, therefore, carried out with an aim to evaluate the pattern of internet access and utilization by medical students in Pakistan. Methods A structured pre-tested questionnaire was administered to a group of 750 medical students in clinical years studying at various public and private medical colleges in Lahore. The questions were related to patterns of internet access, purpose of use and self reported confidence in performing various internet related tasks, use of health related websites to supplement learning and the problems faced by students in using internet at the institution. Results A total of 532 medical students (70.9%) returned the questionnaire. The mean age of study participants was 21.04 years (SD 1.96 years). Majority of the respondents (84.0%) reported experience with internet use. About half of the students (42.1%) were using internet occasionally with 23.1%, 20.9% and 13.9% doing so frequently, regularly and rarely respectively. About two third of the students (61.0%) stated that they use internet for both academic and professional activities. Most of the participants preferred to use internet at home (70.5%). Self reported ability to search for required article from PubMed and PakMedinet was reported by only 34.0% of the entire sample. Students were moderately confident in performing various internet related tasks including downloading medical books from internet, searching internet for classification of diseases and downloading full text article. Health related websites were being accessed by 55.1% students to supplement their learning process. Lack of time, inadequate number of available computers and lack of support from

  18. Wireless ad hoc networks access for aeronautical communications

    OpenAIRE

    Besse , Frédéric; Garcia , Fabien; Pirovano , Alain; Radzik , José

    2010-01-01

    International audience; There is an increasing interest in the current aeronautical context to offer new services for civil aircraft passengers. For example, airlines want to offer their customers the opportunity to access the Internet, to manage their mails, to watch video on demand, to access corporate VPNs.... All these services represent a new type of air-ground communications called APC (Aeronautical Passenger Communications) in the ATN (Aeronautical Telecommunication Network) context. I...

  19. Internet-accessible radiographic database of Vietnam War casualties for medical student education.

    Science.gov (United States)

    Critchley, Eric P; Smirniotopoulos, James G

    2003-04-01

    The purpose of this study was to determine the feasibility of archiving radiographic images from Vietnam era conflict casualties into a personal computer-based electronic database of text and images and displaying the data using an Internet-accessible database for preservation and educational purposes. Thirty-two patient cases were selected at random from a pool of 1,000 autopsy reports in which radiographs were available. A total of 74 radiographs from these cases were digitized using a commercial image scanner and then uploaded into an Internet accessible database. The quality of the digitized images was assessed by administering an image-based test to a group of 12 medical students. No statistically significant (p > 0.05) differences were found between test scores when using the original radiographs versus using the digitized radiographs on the Internet-accessible database. An Internet-accessible database is capable of effectively archiving Vietnam era casualty radiographs for educational purposes.

  20. Propagation Characteristics in an Underground Shopping Area for 5GHz-band Wireless Access Systems

    Science.gov (United States)

    Itokawa, Kiyohiko; Kita, Naoki; Sato, Akio; Matsue, Hideaki; Mori, Daisuke; Watanabe, Hironobu

    5-GHz band wireless access systems, such as the RLAN (Radio Local Area Network) system of IEEE802.11a, HiperLAN/2, HiSWANa and AWA, are developed and provide transmission rates over 20 Mbps for indoor use. Those 5-GHz access systems are expected to extend service areas from the office to the so-called “hot-spot" in public areas. Underground shopping malls are one of the anticipated service areas for such a nomadic wireless access service. Broadband propagation characteristics are required for radio zone design in an underground mall environment despite previous results obtained by narrow band measurements. This paper presents results of an experimental study on the propagation characteristics for broadband wireless access systems in an underground mall environment. First, broadband propagation path loss is measured and formulated considering human body shadowing. A ray trace simulation is used to clarify the basic propagation mechanism in such a closed environment. Next, a distance dependency of the delay spread during a crowded time period, rush hour, is found to be at most 65 nsec, which is under the permitted maximum value of the present 5-GHz systems. Finally, above propagation characteristics support the result of transmission test carried out by using AWA equipment.

  1. Internet pharmacy: issues of access, quality, costs, and regulation.

    Science.gov (United States)

    Crawford, Stephanie Y

    2003-02-01

    Internet pharmacy has been the focus of heightened interest over the past 3 years since the first major Web site was introduced in the United States. This paper addresses issues pertaining to Internet pharmacies that sell prescriptions and other products to consumers at the retail level. The Internet pharmacy industry has shifted rapidly in the short time span. This paper begins with a summary of historical considerations and the shifting organization of Internet pharmacy. The advantages and disadvantages of online pharmacy practice are listed. Issues of access, quality, and cost are described. The challenges in regulation at the state and federal levels are presented. Advice to consumers is offered regarding the use of Internet pharmacy sites for purchasing prescription drug products.

  2. Reconfigurable Radio Access Unit for DWDM to W-Band Wireless Conversion

    DEFF Research Database (Denmark)

    Chorchos, Łukasz; Rommel, Simon; Turkiewicz, Jarosław P.

    2017-01-01

    In this letter a reconfigurable Remote Access Unit (RAU) is proposed and demonstrated, interfacing dense wavelength division multiplexed (DWDM) optical and W-band wireless links. The RAU is composed of a tunable local oscillator, a narrow optical filter and a control unit, making it reconfigurable...

  3. Incentive Mechanism for P2P Content Sharing over Heterogenous Access Networks

    Science.gov (United States)

    Sato, Kenichiro; Hashimoto, Ryo; Yoshino, Makoto; Shinkuma, Ryoichi; Takahashi, Tatsuro

    In peer-to-peer (P2P) content sharing, users can share their content by contributing their own resources to one another. However, since there is no incentive for contributing contents or resources to others, users may attempt to obtain content without any contribution. To motivate users to contribute their resources to the service, incentive-rewarding mechanisms have been proposed. On the other hand, emerging wireless technologies, such as IEEE 802.11 wireless local area networks, beyond third generation (B3G) cellular networks and mobile WiMAX, provide high-speed Internet access for wireless users. Using these high-speed wireless access, wireless users can use P2P services and share their content with other wireless users and with fixed users. However, this diversification of access networks makes it difficult to appropriately assign rewards to each user according to their contributions. This is because the cost necessary for contribution is different in different access networks. In this paper, we propose a novel incentive-rewarding mechanism called EMOTIVER that can assign rewards to users appropriately. The proposed mechanism uses an external evaluator and interactive learning agents. We also investigate a way of appropriately controlling rewards based on the system service's quality and managing policy.

  4. Pengembangan Wireless Sensor Network Berbasis Internet of Things untuk Sistem Pemantauan Kualitas Air dan Tanah Pertanian

    Directory of Open Access Journals (Sweden)

    Ummi Syafiqoh

    2018-05-01

    Full Text Available Water and soil quality is very important in agriculture. The level of acidity (pH and soil temperature is one of the things that affect the fertility of plants. Therefore the quality of water and soil on agricultural land is one of the important things that need special attention in its management. One solution to water and soil quality can be monitored and managed efficiently is by utilizing the Wireless Sensor Network based on the Internet of Things (IoT. Use of ESP8266 Module as a WIFI module, widely used by Internet-based applications of Things because the price is cheap, thus reducing many costs and have a pretty good speed of 80 MHz. This research aims to develop the concept of Wireless Sensor Network by utilizing ESP8266 module to monitor pH value using pH Meter Analog Kit sensor and temperature of agricultural land using DS18B20 Waterproof sensor. The result of temperature measurement accuracy using DS18B20 Waterproof sensor of the designed system is 99.09% while the pH measurement using pH Meter Analog Kit sensor is 91.33%.

  5. When Whereabouts is No Longer Thereabouts: Location Privacy in Wireless Networks

    OpenAIRE

    Freudiger, Julien

    2011-01-01

    Modern mobile devices are fast, programmable and feature localization and wireless capabilities. These technological advances notably facilitate mobile access to Internet, development of mobile applications and sharing of personal information, such as location information. Cell phone users can for example share their whereabouts with friends on online social networks. Following this trend, the field of ubiquitous computing foresees communication netwo...

  6. Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture

    Science.gov (United States)

    McCown, Steven H [Rigby, ID; Derr, Kurt W [Idaho Falls, ID; Rohde, Kenneth W [Idaho Falls, ID

    2012-05-08

    Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.

  7. IPTV technology for the wireless Internet service provider (WISP

    Directory of Open Access Journals (Sweden)

    Mitchell Vásquez Bermúdez

    2018-02-01

    Full Text Available This article describes the implementation of the IPTV technology through an open source system for the wireless Internet service provider (WISP in the Cerecita site, located in the province of Guayas, Ecuador. The feasibility of implementing the IPTV technology is given through the use of the Emby Server application, in addition to the use of an operating system such as CentOS 7, which are open source and have the necessary requirements for the creation of this service. The analysis of data tra c generated on the WISP network, which will establish the advantages and disadvantages generated by the transmission of this technology, created to VOD multimedia content server that allows the video signal to be sent to users Finally, a feasibility study was carried out to analyze the advantages and disadvantages that exist in the implementation of this IPTV technology.

  8. Towards convergence of wireless and wireline signal transport in broadband access networks

    DEFF Research Database (Denmark)

    Yu, Xianbin; Prince, Kamau; Tafur Monroy, Idelfonso

    2010-01-01

    Hybrid optical wireless access networks are to play an important role in the realization of the vision of delivery of broadband services to the end-user any time, anywhere and at affordable costs. We present results of experiments conducted over a field deployed optical fibre links we successfull...... demonstrated converged wireless and wireline signal transport over a common fibre infrastructure. The type of signal used in this field deployed experiments cover WiMax, Impulse-radio ultra-wideband (UWB) and coherent transmission of baseband QPSK and radio-over-fibre signals....

  9. Open-Source tools: Incidence in the wireless security of the Technical University of Babahoyo

    Directory of Open Access Journals (Sweden)

    Joffre León-Acurio

    2018-02-01

    Full Text Available Computer security is a fundamental part of an organization, especially in Higher Education institutions, where there is very sensitive information, capable of being vulnerable by diffeerent methods of intrusion, the most common being free access through wireless points. The main objective of this research is to analyze the impact of the open source tools in charge of managing the security information of the wireless network, such as OSSIM, a set of active and passive components used to manage events that generate tra c within the network. net. This research exposes the use of free software as a viable option of low cost to solve the problems that a ict student sta , such as lack of access to academic services, problems of wireless interconnectivity, with the purpose to restore confidence in students in the Use of the services offered by the institution for research-related development, guaranteeing free and free access to the internet. The level of dissatisfaction on the part of the students con rms the problem presented at the Technical University of Babahoyo, thus confirming the positive influence of the Open-Source tools for the institution’s wireless security.

  10. Cellular 5G Access for Massive Internet of Things

    DEFF Research Database (Denmark)

    Madueño, Germán Corrales; Pratas, Nuno; Stefanovic, Cedomir

    2017-01-01

    The Internet of Things (IoT) refers to the paradigm of physical and virtual “things” that communicate and collaborate over the Internet, with minimal or no human intervention. There are multiple ways in which an IoT device can be connected to the Internet. Cellular technologies are seen as viable...... candidates in this respect, due to their maturity, worldwide availability and the use of reserved spectrum. However, current cellular systems are not well-equipped to efficiently and reliably support IoT traffic, particularly in the radio access part, as they are designed for low number of high......-rate connections and not for high number of low-rate IoT connections. In this chapter we outline the main features of the IoT traffic types, review operation of the current cellular access and provide some guidelines how to address its shortcomings and evolve it in order to support IoT services. However...

  11. Building secure wireless access point based on certificate authentication and firewall captive portal

    Directory of Open Access Journals (Sweden)

    Soewito B.

    2014-03-01

    Full Text Available Wireless local area network or WLAN more vulnerability than wired network even though WLAN has many advantages over wired. Wireless networks use radio transmissions to carry data between end users and access point. Therefore, it is possible for someone to sit in your office building's lobby or parking lot or parking lot to eavesdrop on the wireless network communication. This paper discussed securing wires local area network used WPA2 Enterprise based PEAP MS-CHAP and Captive portal firewall. We also divided the network for employer and visitor to increase the level of security. Our experiment showed that the WLAN could be broken using the attacker tool such as airodump, aireply, and aircrack.

  12. Effect Through Broadcasting System Access Point For Video Transmission

    Directory of Open Access Journals (Sweden)

    Leni Marlina

    2015-08-01

    Full Text Available Most universities are already implementing wired and wireless network that is used to access integrated information systems and the Internet. At present it is important to do research on the influence of the broadcasting system through the access point for video transmitter learning in the university area. At every university computer network through the access point must also use the cable in its implementation. These networks require cables that will connect and transmit data from one computer to another computer. While wireless networks of computers connected through radio waves. This research will be a test or assessment of how the influence of the network using the WLAN access point for video broadcasting means learning from the server to the client. Instructional video broadcasting from the server to the client via the access point will be used for video broadcasting means of learning. This study aims to understand how to build a wireless network by using an access point. It also builds a computer server as instructional videos supporting software that can be used for video server that will be emitted by broadcasting via the access point and establish a system of transmitting video from the server to the client via the access point.

  13. DiffServ resource management in IP-based radio access networks

    NARCIS (Netherlands)

    Heijenk, Geert; Karagiannis, Georgios; Rexhepi, Vlora; Westberg, Lars; prof.dr. Prasad, R.; prof.dr. Bach Andersen, J.

    2001-01-01

    The increasing popularity of the Internet, the flexibility of IP, and the wide deployment of IP technologies, as well as the growth of mobile communications have driven the development of IP-based solutions for wireless networking. The introduction of IP-based transport in Radio Access Networks

  14. The Effect of Information Access Strategy on Power Consumption and Reliability in Wireless Sensor Network

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2013-01-01

    This paper examines the effect of different information access strategies on power consumption and information reliability, considering the wireless sensor network as the source of information. Basically, the paper explores three different access strategies, namely; reactive, periodic and hybrid...

  15. Prescription for trouble: Medicare Part D and patterns of computer and internet access among the elderly.

    Science.gov (United States)

    Wright, David W; Hill, Twyla J

    2009-01-01

    The Medicare Prescription Drug, Improvement, and Modernization Act of 2003 specifically encourages Medicare enrollees to use the Internet to obtain information regarding the new prescription drug insurance plans and to enroll in a plan. This reliance on computer technology and the Internet leads to practical questions regarding implementation of the insurance coverage. For example, it seems unlikely that all Medicare enrollees have access to computers and the Internet or that they are all computer literate. This study uses the 2003 Current Population Survey to examine the effects of disability and income on computer access and Internet use among the elderly. Internet access declines with age and is exacerbated by disabilities. Also, decreases in income lead to decreases in computer ownership and use. Therefore, providing prescription drug coverage primarily through the Internet seems likely to maintain or increase stratification of access to health care, especially for low-income, disabled elderly, who are also a group most in need of health care access.

  16. Internet access and use by COPD patients in the National Emphysema/COPD Association Survey

    Science.gov (United States)

    2014-01-01

    Background Technology offers opportunities to improve healthcare, but little is known about Internet use by COPD patients. We tested two hypotheses: Internet access is associated with socio-demographic disparities and frequency of use is related to perceived needs. Methods We analyzed data from a 2007–2008 national convenience sample survey of COPD patients to determine the relationship between Internet access and frequency of use with demographics, socio-economic status, COPD severity, and satisfaction with healthcare. Results Among survey respondents (response rate 7.2%; n = 914, 59.1% women, mean age 71.2 years), 34.2% reported lack of Internet access, and an additional 49% had access but used the Internet less than weekly. Multivariate models showed association between lack of access and older age (OR 1.10, 95% CI 1.07, 1.13), lower income (income below $30,000 OR 2.47, 95% CI 1.63, 3.73), less education (high school highest attainment OR 2.30, 95% CI 1.54, 3.45), comorbid arthritis or mobility-related disease (OR 1.56, 95% CI 1.05, 2.34). More frequent use (at least weekly) was associated with younger age (OR 0.95, 95% CI 0.93, 0.98), absence of cardiovascular disease (OR 0.48, 95% CI 0.29, 0.78), but with perception of needs insufficiently met by the healthcare system, including diagnostic delay (OR 1.72, 95% CI 1.06, 2.78), feeling treated poorly (OR 2.46, 95% CI 1.15, 5.24), insufficient physician time (OR 2.29, 95% CI 1.02, 5.13), and feeling their physician did not listen (OR 3.14, 95% CI 1.42, 6.95). Conclusions An analysis of the characteristics associated with Internet access and use among COPD patients identified two different patient populations. Lack of Internet access was a marker of socioeconomic disparity and mobility-associated diseases, while frequent Internet use was associated with less somatic disease but dissatisfaction with care. PMID:24755090

  17. Internet access and use by COPD patients in the National Emphysema/COPD Association Survey.

    Science.gov (United States)

    Martinez, Carlos H; St Jean, Beth L; Plauschinat, Craig A; Rogers, Barbara; Beresford, Julen; Martinez, Fernando J; Richardson, Caroline R; Han, Meilan K

    2014-04-22

    Technology offers opportunities to improve healthcare, but little is known about Internet use by COPD patients. We tested two hypotheses: Internet access is associated with socio-demographic disparities and frequency of use is related to perceived needs. We analyzed data from a 2007-2008 national convenience sample survey of COPD patients to determine the relationship between Internet access and frequency of use with demographics, socio-economic status, COPD severity, and satisfaction with healthcare. Among survey respondents (response rate 7.2%; n = 914, 59.1% women, mean age 71.2 years), 34.2% reported lack of Internet access, and an additional 49% had access but used the Internet less than weekly. Multivariate models showed association between lack of access and older age (OR 1.10, 95% CI 1.07, 1.13), lower income (income below $30,000 OR 2.47, 95% CI 1.63, 3.73), less education (high school highest attainment OR 2.30, 95% CI 1.54, 3.45), comorbid arthritis or mobility-related disease (OR 1.56, 95% CI 1.05, 2.34). More frequent use (at least weekly) was associated with younger age (OR 0.95, 95% CI 0.93, 0.98), absence of cardiovascular disease (OR 0.48, 95% CI 0.29, 0.78), but with perception of needs insufficiently met by the healthcare system, including diagnostic delay (OR 1.72, 95% CI 1.06, 2.78), feeling treated poorly (OR 2.46, 95% CI 1.15, 5.24), insufficient physician time (OR 2.29, 95% CI 1.02, 5.13), and feeling their physician did not listen (OR 3.14, 95% CI 1.42, 6.95). An analysis of the characteristics associated with Internet access and use among COPD patients identified two different patient populations. Lack of Internet access was a marker of socioeconomic disparity and mobility-associated diseases, while frequent Internet use was associated with less somatic disease but dissatisfaction with care.

  18. XACML to build access control policies for Internet of Things

    OpenAIRE

    Atlam, Hany F.; Alassafi, Madini, Obad; Alenezi, Ahmed; Walters, Robert; Wills, Gary

    2018-01-01

    Although the Internet of things (IoT) brought unlimited benefits, it also brought many security issues. The access control is one of the main elements to address these issues. It provides the access to system resources only to authorized users and ensures that they behave in an authorized manner during their access sessions. One of the significant components of any access control model is access policies. They are used to build the criteria to permit or deny any access request. Building an ef...

  19. Polarization division multiple access with polarization modulation for LOS wireless communications

    Directory of Open Access Journals (Sweden)

    Cao Bin

    2011-01-01

    Full Text Available Abstract In this paper, we discuss a potential multiple access and modulation scheme based on polarized states (PS of electromagnetic (EM waves for line-of-sight (LOS communications. The proposed scheme is theoretic different from the existing polar modulation for EDGE and WCDMA systems. We propose the detailed bit representation (modulation and multiple access scheme using PS. Because of the inflexibility of polarization information in the time and frequency domains, as well as independence of frequency and space, the polarization information can be used independently for wireless communications, i.e., another independent resource domain that can be utilized. Due to the independence between the PS and the specific features of signals (such as waveform, bandwidth and data rate, the discussed polarization division multiple access (PDMA and polarization modulation (PM are expected to improve the spectrum utilization effectively. It is proved that the polarization filtering technique can be adopted in the PDMA-PM wireless communications to separate the multiuser signals and demodulate the bit information representing by PS for desired user. Some theoretical analysis is done to demonstrate the feasibility of the proposed scheme, and the simulation results are made to evaluate the performance of the suggested system.

  20. Internet skill-related problems in accessing online health information and services

    NARCIS (Netherlands)

    van Deursen, Alexander Johannes Aloysius Maria

    2012-01-01

    Purpose Despite the amount of health information available online, there are several barriers that limit the Internet from being adopted as a source of health information. The purpose of this study was to identify individual skill-related problems that users experience when accessing the Internet

  1. Multiple wireless protocol advertising system, enabling automatic access selection and local services

    NARCIS (Netherlands)

    Houben, S.A.; Baken, N.; Herve, P.; Smets, R.

    2006-01-01

    We examined efficiency within wireless access options for mobile devices and discovered that a classic pitfall is revisited. As with the proliferation of services in incumbents’ portfolios, leading to a number of coexisting so-called ‘stove-pipes’, we see an isomorphic phenomenon evolving in

  2. Multihoming for Mobile Internet of Multimedia Things

    OpenAIRE

    Balan, Titus; Robu, Dan; Sandu, Florin

    2017-01-01

    Mobility, redundancy, and bandwidth requirements are transforming the communication models used for IoT, mainly in case of Critical Communications and multimedia streaming (“IoMT, Internet of Multimedia Things”), as wireless video traffic is expected to be 60–75% of the global mobile traffic by 2020. One of the characteristics of 5G networks will be the proliferation of different/heterogeneous radio networks (virtualized radio access networks, RAN, new energy-efficient radios, femtocells, and...

  3. Reducing the MAC Latency for IEEE 802.11 Vehicular Internet Access

    Directory of Open Access Journals (Sweden)

    Kang Moonsoo

    2010-01-01

    Full Text Available In an intermittently connected environment, access points are sparsely distributed throughout an area. As mobile users travel along the roadway, they can opportunistically connect, albeit temporarily, to roadside 802.11 (Wi-Fi APs for Internet access. Net-working characteristics of vehicular Internet access in an intermittently connected envi ronment face numerous challenges, such as short periods of connectivity and unpredictable connection times. To meet these challenges, we propose an Access Point Report (APR protocol where mobile stations opportunistically collaborate by broadcasting an APR to other mobile stations to fully utilize the short-lived connection periods. APR can optimize the use of short connection periods by minimizing the scanning delay and also act as a hint that enables mobile users to predict when connection can be established.

  4. Beyond access: barriers to internet health information seeking among the urban poor.

    Science.gov (United States)

    McCloud, Rachel F; Okechukwu, Cassandra A; Sorensen, Glorian; Viswanath, K

    2016-11-01

    Communication inequalities deepen health disparities even when internet access is achieved. The goal of this study is to understand how a range of barriers may inhibit individuals from low socioeconomic position (SEP) from engaging with online health information even when it is freely available. Detailed data were collected from 118 low-SEP individuals from a randomized controlled trial providing internet access. Measures triangulated the health-seeking experience through internet use tracked in real-time, call log data, and self-reported barriers. Negative binomial regression models were fitted with technology and perceived predictors, and our outcome, health information seeking, and then stratified by medical status. Participants experienced a median of two computer issues (median 6 days) and two internet issues (median 6.5 days). Duration of internet problems was associated with a decrease in the rate of internet health information seeking by a factor of 0.990 (P = .03) for each additional day. Participants with a medical problem who were frustrated in their search for health information had half the rate of health information seeking of those who were not frustrated (incidence rate ratio = 0.395, P = .030). Despite IT support, participants still experienced internet connectivity issues that negatively impacted their health information seeking. Frustration in their search to find information may serve as an additional barrier to those who have medical issues. After initial internet access, a second-level digital divide emerged due to connectivity issues, highlighting the need to understand the complex network of barriers experienced by low-SEP internet users. © The Author 2016. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  5. A Practical Application Combining Wireless Sensor Networks and Internet of Things: Safety Management System for Tower Crane Groups

    Directory of Open Access Journals (Sweden)

    Dexing Zhong

    2014-07-01

    Full Text Available The so-called Internet of Things (IoT has attracted increasing attention in the field of computer and information science. In this paper, a specific application of IoT, named Safety Management System for Tower Crane Groups (SMS-TC, is proposed for use in the construction industry field. The operating status of each tower crane was detected by a set of customized sensors, including horizontal and vertical position sensors for the trolley, angle sensors for the jib and load, tilt and wind speed sensors for the tower body. The sensor data is collected and processed by the Tower Crane Safety Terminal Equipment (TC-STE installed in the driver’s operating room. Wireless communication between each TC-STE and the Local Monitoring Terminal (LMT at the ground worksite were fulfilled through a Zigbee wireless network. LMT can share the status information of the whole group with each TC-STE, while the LMT records the real-time data and reports it to the Remote Supervision Platform (RSP through General Packet Radio Service (GPRS. Based on the global status data of the whole group, an anti-collision algorithm was executed in each TC-STE to ensure the safety of each tower crane during construction. Remote supervision can be fulfilled using our client software installed on a personal computer (PC or smartphone. SMS-TC could be considered as a promising practical application that combines a Wireless Sensor Network with the Internet of Things.

  6. A Practical Application Combining Wireless Sensor Networks and Internet of Things: Safety Management System for Tower Crane Groups

    Science.gov (United States)

    Zhong, Dexing; Lv, Hongqiang; Han, Jiuqiang; Wei, Quanrui

    2014-01-01

    The so-called Internet of Things (IoT) has attracted increasing attention in the field of computer and information science. In this paper, a specific application of IoT, named Safety Management System for Tower Crane Groups (SMS-TC), is proposed for use in the construction industry field. The operating status of each tower crane was detected by a set of customized sensors, including horizontal and vertical position sensors for the trolley, angle sensors for the jib and load, tilt and wind speed sensors for the tower body. The sensor data is collected and processed by the Tower Crane Safety Terminal Equipment (TC-STE) installed in the driver's operating room. Wireless communication between each TC-STE and the Local Monitoring Terminal (LMT) at the ground worksite were fulfilled through a Zigbee wireless network. LMT can share the status information of the whole group with each TC-STE, while the LMT records the real-time data and reports it to the Remote Supervision Platform (RSP) through General Packet Radio Service (GPRS). Based on the global status data of the whole group, an anti-collision algorithm was executed in each TC-STE to ensure the safety of each tower crane during construction. Remote supervision can be fulfilled using our client software installed on a personal computer (PC) or smartphone. SMS-TC could be considered as a promising practical application that combines a Wireless Sensor Network with the Internet of Things. PMID:25196106

  7. A practical application combining wireless sensor networks and Internet of Things: Safety Management System for Tower Crane Groups.

    Science.gov (United States)

    Zhong, Dexing; Lv, Hongqiang; Han, Jiuqiang; Wei, Quanrui

    2014-07-30

    The so-called Internet of Things (IoT) has attracted increasing attention in the field of computer and information science. In this paper, a specific application of IoT, named Safety Management System for Tower Crane Groups (SMS-TC), is proposed for use in the construction industry field. The operating status of each tower crane was detected by a set of customized sensors, including horizontal and vertical position sensors for the trolley, angle sensors for the jib and load, tilt and wind speed sensors for the tower body. The sensor data is collected and processed by the Tower Crane Safety Terminal Equipment (TC-STE) installed in the driver's operating room. Wireless communication between each TC-STE and the Local Monitoring Terminal (LMT) at the ground worksite were fulfilled through a Zigbee wireless network. LMT can share the status information of the whole group with each TC-STE, while the LMT records the real-time data and reports it to the Remote Supervision Platform (RSP) through General Packet Radio Service (GPRS). Based on the global status data of the whole group, an anti-collision algorithm was executed in each TC-STE to ensure the safety of each tower crane during construction. Remote supervision can be fulfilled using our client software installed on a personal computer (PC) or smartphone. SMS-TC could be considered as a promising practical application that combines a Wireless Sensor Network with the Internet of Things.

  8. Design and implementation of an Internet based effective controlling and monitoring system with wireless fieldbus communications technologies for process automation--an experimental study.

    Science.gov (United States)

    Cetinceviz, Yucel; Bayindir, Ramazan

    2012-05-01

    The network requirements of control systems in industrial applications increase day by day. The Internet based control system and various fieldbus systems have been designed in order to meet these requirements. This paper describes an Internet based control system with wireless fieldbus communication designed for distributed processes. The system was implemented as an experimental setup in a laboratory. In industrial facilities, the process control layer and the distance connection of the distributed control devices in the lowest levels of the industrial production environment are provided with fieldbus networks. In this paper, the Internet based control system that will be able to meet the system requirements with a new-generation communication structure, which is called wired/wireless hybrid system, has been designed on field level and carried out to cover all sectors of distributed automation, from process control, to distributed input/output (I/O). The system has been accomplished by hardware structure with a programmable logic controller (PLC), a communication processor (CP) module, two industrial wireless modules and a distributed I/O module, Motor Protection Package (MPP) and software structure with WinCC flexible program used for the screen of Scada (Supervisory Control And Data Acquisition), SIMATIC MANAGER package program ("STEP7") used for the hardware and network configuration and also for downloading control program to PLC. Copyright © 2012 ISA. Published by Elsevier Ltd. All rights reserved.

  9. Convergent optical wired and wireless long-reach access network using high spectral-efficient modulation.

    Science.gov (United States)

    Chow, C W; Lin, Y H

    2012-04-09

    To provide broadband services in a single and low cost perform, the convergent optical wired and wireless access network is promising. Here, we propose and demonstrate a convergent optical wired and wireless long-reach access networks based on orthogonal wavelength division multiplexing (WDM). Both the baseband signal and the radio-over-fiber (ROF) signal are multiplexed and de-multiplexed in optical domain, hence it is simple and the operation speed is not limited by the electronic bottleneck caused by the digital signal processing (DSP). Error-free de-multiplexing and down-conversion can be achieved for all the signals after 60 km (long-reach) fiber transmission. The scalability of the system for higher bit-rate (60 GHz) is also simulated and discussed.

  10. Health issues in adolescents' Internet use - benefits and risks.

    Science.gov (United States)

    Hardoff, D

    2013-09-01

    The Internet has turned during the past decade into a major information resource in various domains of life and a communication venue among adolescents who seek health information via the net. The increasing availability of computers in homes, as well as wireless Internet access, means that adolescents today can go online anywhere, at any time. The media are not the leading cause of any major health problem, but they do contribute significantly to a variety of adolescent health problems, including aggressive behavior, sexual activity, drug use, obesity, sleep disorders, eating disorders, depression, suicide and self harm. This paper focuses on 3 major health issues in adolescents' Internet use: Body image and eating behaviors; sexuality and reproductive health behaviors; and self harm and suicidal behavior. This paper also demonstrates Internet venues where reliable health information is provided to young people by health professionals. Health professionals need to recognize the hazards of adolescents Internet use, and to address potential Internet abuse when encountering adolescents in clinical settings.

  11. Internet accessibility and disability policy: lessons for digital inclusion and equality from Australia

    Directory of Open Access Journals (Sweden)

    Gerard Goggin

    2017-03-01

    Full Text Available In the fifth decade of the internet, accessibility for all, especially those with disabilities, is central to digital inclusion. Yet internationally, the score card on internet and accessibility remains mixed, at best; and woefully inadequate, at worst. Via an Australian case study, we argue that it is imperative to better understand how internet technology interacts with the life worlds and dynamics of disability, and we suggest how policy can be articulated and improved to put people with disabilities on an equal basis to others in digital societies.

  12. Computer and internet access for long-term care residents: perceived benefits and barriers.

    Science.gov (United States)

    Tak, Sunghee H; Beck, Cornelia; McMahon, Ed

    2007-05-01

    In this study, the authors examined residents' computer and Internet access, as well as benefits and barriers to access in nursing homes. Administrators of 64 nursing homes in a national chain completed surveys. Fourteen percent of the nursing homes provided computers for residents to use, and 11% had Internet access. Some residents owned personal computers in their rooms. Administrators perceived the benefits of computer and Internet use for residents as facilitating direct communication with family and providing mental exercise, education, and enjoyment. Perceived barriers included cost and space for computer equipment and residents' cognitive and physical impairments. Implications of residents' computer activities were discussed for nursing care. Further research is warranted to examine therapeutic effects of computerized activities and their cost effectiveness.

  13. Literacy disparities in patient access and health-related use of Internet and mobile technologies.

    Science.gov (United States)

    Bailey, Stacy C; O'Conor, Rachel; Bojarski, Elizabeth A; Mullen, Rebecca; Patzer, Rachel E; Vicencio, Daniel; Jacobson, Kara L; Parker, Ruth M; Wolf, Michael S

    2015-12-01

    Age and race-related disparities in technology use have been well documented, but less is known about how health literacy influences technology access and use. To assess the association between patients' literacy skills and mobile phone ownership, use of text messaging, Internet access, and use of the Internet for health-related purposes. A secondary analysis utilizing data from 1077 primary care patients enrolled in two, multisite studies from 2011-2013. Patients were administered an in-person, structured interview. Patients with adequate health literacy were more likely to own a mobile phone or smartphone in comparison with patients having marginal or low literacy (mobile phone ownership: 96.8 vs. 95.2 vs. 90.1%, respectively, P Internet from their home (92.1 vs. 74.7 vs. 44.9%, P Internet for email (93.0 vs. 75.7 vs. 38.5%, P technology access and use are widespread, with lower literate patients being less likely to own smartphones or to access and use the Internet, particularly for health reasons. Future interventions should consider these disparities and ensure that health promotion activities do not further exacerbate disparities. © 2014 John Wiley & Sons Ltd.

  14. Warming Up to Wireless

    Science.gov (United States)

    Milner, Jacob

    2005-01-01

    In districts big and small across the U.S., students, teachers, and administrators alike have come to appreciate the benefits of wireless technology. Because the technology delivers Internet signals on airborne radio frequencies, wireless networking allows users of all portable devices to move freely on a school's campus and stay connected to the…

  15. Assessing internet access and use in a medically underserved population: implications for providing enhanced health information services.

    Science.gov (United States)

    Zach, Lisl; Dalrymple, Prudence W; Rogers, Michelle L; Williver-Farr, Heather

    2012-03-01

    The relationship between health information seeking, patient engagement and health literacy is not well understood. This is especially true in medically underserved populations, which are often viewed as having limited access to health information. To improve communication between an urban health centre and the community it serves, a team of library and information science researchers undertook an assessment of patients' level and methods of access to and use of the Internet. Data were collected in 53 face-to-face anonymous interviews with patients at the centre. Interviews were tape-recorded for referential accuracy, and data were analysed to identify patterns of access and use. Seventy-two percentage of study participants reported having access to the Internet through either computers or cell phones. Barriers to Internet access were predominantly lack of equipment or training rather than lack of interest. Only 21% of those with Internet access reported using the Internet to look for health information. The findings suggest that lack of access to the Internet in itself is not the primary barrier to seeking health information in this population and that the digital divide exists not at the level of information access but rather at the level of information use. © 2011 The authors. Health Information and Libraries Journal © 2011 Health Libraries Group.

  16. Accessing wound-care information on the Internet: the implications for patients.

    Science.gov (United States)

    Bovill, E S; Hormbrey, E; Gillespie, P H; Banwell, P E

    2001-02-01

    The Internet and the World Wide Web have revolutionised communication and provide a unique forum for the exchange of information. It has been proposed that the Internet has given the public more access to medical information resources and improved patient education. This study assessed the impact of the Internet on the availability of information on wound care management. The search phrases 'wound care', 'wound healing' and 'wounds' were analysed using a powerful Metacrawler search engine (www.go2net.com). Web site access was classified according to the target audience (wound-care specialists, other health professionals, patients) and the author (societies, institutions or commercial companies). The largest proportion of web sites were commercially based (32%). Of the total number, 23% specifically targeted patients, mostly by advertising. Only 20% were aimed at wound specialists. Extensive surfing was required to obtain wound-care information, and objective information sites were under-represented. Regulated, easily accessible, objective information sites on wound-healing topics are needed for improved patient education and to balance the existing commercial bias.

  17. A wireless smart sensor network for automated monitoring of cable tension

    International Nuclear Information System (INIS)

    Sim, Sung-Han; Cho, Soojin; Li, Jian; Jo, Hongki; Park, Jong-Woong; Jung, Hyung-Jo; Spencer Jr, Billie F

    2014-01-01

    As cables are primary load carrying members in cable-stayed bridges, monitoring the tension forces of the cables provides valuable information regarding structural soundness. Incorporating wireless smart sensors with vibration-based tension estimation methods provides an efficient means of autonomous long-term monitoring of cable tensions. This study develops a wireless cable tension monitoring system using MEMSIC’s Imote2 smart sensors. The monitoring system features autonomous operation, sustainable energy harvesting and power consumption, and remote access using the internet. To obtain the tension force, an in-network data processing strategy associated with the vibration-based tension estimation method is implemented on the Imote2-based sensor network, significantly reducing the wireless data transmission and the power consumption. The proposed monitoring system has been deployed and validated on the Jindo Bridge, a cable-stayed bridge located in South Korea. (paper)

  18. A wireless smart sensor network for automated monitoring of cable tension

    Science.gov (United States)

    Sim, Sung-Han; Li, Jian; Jo, Hongki; Park, Jong-Woong; Cho, Soojin; Spencer, Billie F., Jr.; Jung, Hyung-Jo

    2014-02-01

    As cables are primary load carrying members in cable-stayed bridges, monitoring the tension forces of the cables provides valuable information regarding structural soundness. Incorporating wireless smart sensors with vibration-based tension estimation methods provides an efficient means of autonomous long-term monitoring of cable tensions. This study develops a wireless cable tension monitoring system using MEMSIC’s Imote2 smart sensors. The monitoring system features autonomous operation, sustainable energy harvesting and power consumption, and remote access using the internet. To obtain the tension force, an in-network data processing strategy associated with the vibration-based tension estimation method is implemented on the Imote2-based sensor network, significantly reducing the wireless data transmission and the power consumption. The proposed monitoring system has been deployed and validated on the Jindo Bridge, a cable-stayed bridge located in South Korea.

  19. Application of an automated wireless structural monitoring system for long-span suspension bridges

    International Nuclear Information System (INIS)

    Kurata, M.; Lynch, J. P.; Linden, G. W. van der; Hipley, P.; Sheng, L.-H.

    2011-01-01

    This paper describes an automated wireless structural monitoring system installed at the New Carquinez Bridge (NCB). The designed system utilizes a dense network of wireless sensors installed in the bridge but remotely controlled by a hierarchically designed cyber-environment. The early efforts have included performance verification of a dense network of wireless sensors installed on the bridge and the establishment of a cellular gateway to the system for remote access from the internet. Acceleration of the main bridge span was the primary focus of the initial field deployment of the wireless monitoring system. An additional focus of the study is on ensuring wireless sensors can survive for long periods without human intervention. Toward this end, the life-expectancy of the wireless sensors has been enhanced by embedding efficient power management schemes in the sensors while integrating solar panels for power harvesting. The dynamic characteristics of the NCB under daily traffic and wind loads were extracted from the vibration response of the bridge deck and towers. These results have been compared to a high-fidelity finite element model of the bridge.

  20. Application of AN Automated Wireless Structural Monitoring System for Long-Span Suspension Bridges

    Science.gov (United States)

    Kurata, M.; Lynch, J. P.; van der Linden, G. W.; Hipley, P.; Sheng, L.-H.

    2011-06-01

    This paper describes an automated wireless structural monitoring system installed at the New Carquinez Bridge (NCB). The designed system utilizes a dense network of wireless sensors installed in the bridge but remotely controlled by a hierarchically designed cyber-environment. The early efforts have included performance verification of a dense network of wireless sensors installed on the bridge and the establishment of a cellular gateway to the system for remote access from the internet. Acceleration of the main bridge span was the primary focus of the initial field deployment of the wireless monitoring system. An additional focus of the study is on ensuring wireless sensors can survive for long periods without human intervention. Toward this end, the life-expectancy of the wireless sensors has been enhanced by embedding efficient power management schemes in the sensors while integrating solar panels for power harvesting. The dynamic characteristics of the NCB under daily traffic and wind loads were extracted from the vibration response of the bridge deck and towers. These results have been compared to a high-fidelity finite element model of the bridge.

  1. Ubiquitous wireless ECG recording: a powerful tool physicians should embrace.

    Science.gov (United States)

    Saxon, Leslie A

    2013-04-01

    The use of smart phones has increased dramatically and there are nearly a billion users on 3G and 4G networks worldwide. Nearly 60% of the U.S. population uses smart phones to access the internet, and smart phone sales now surpass those of desktop and laptop computers. The speed of wireless communication technology on 3G and 4G networks and the widespread adoption and use of iOS equipped smart phones (Apple Inc., Cupertino, CA, USA) provide infrastructure for the transmission of wireless biomedical data, including ECG data. These technologies provide an unprecedented opportunity for physicians to continually access data that can be used to detect issues before symptoms occur or to have definitive data when symptoms are present. The technology also greatly empowers and enables the possibility for unprecedented patient participation in their own medical education and health status as well as that of their social network. As patient advocates, physicians and particularly cardiac electrophysiologists should embrace the future and promise of wireless ECG recording, a technology solution that can truly scale across the global population. © 2013 Wiley Periodicals, Inc.

  2. Towards Controlling Latency in Wireless Networks

    KAUST Repository

    Bouacida, Nader

    2017-01-01

    Wireless networks are undergoing an unprecedented revolution in the last decade. With the explosion of delay-sensitive applications in the Internet (i.e., online gaming and VoIP), latency becomes a major issue for the development of wireless

  3. Virtual Wireless Sensor Networks: Adaptive Brain-Inspired Configuration for Internet of Things Applications

    Science.gov (United States)

    Toyonaga, Shinya; Kominami, Daichi; Murata, Masayuki

    2016-01-01

    Many researchers are devoting attention to the so-called “Internet of Things” (IoT), and wireless sensor networks (WSNs) are regarded as a critical technology for realizing the communication infrastructure of the future, including the IoT. Against this background, virtualization is a crucial technique for the integration of multiple WSNs. Designing virtualized WSNs for actual environments will require further detailed studies. Within the IoT environment, physical networks can undergo dynamic change, and so, many problems exist that could prevent applications from running without interruption when using the existing approaches. In this paper, we show an overall architecture that is suitable for constructing and running virtual wireless sensor network (VWSN) services within a VWSN topology. Our approach provides users with a reliable VWSN network by assigning redundant resources according to each user’s demand and providing a recovery method to incorporate environmental changes. We tested this approach by simulation experiment, with the results showing that the VWSN network is reliable in many cases, although physical deployment of sensor nodes and the modular structure of the VWSN will be quite important to the stability of services within the VWSN topology. PMID:27548177

  4. Virtual Wireless Sensor Networks: Adaptive Brain-Inspired Configuration for Internet of Things Applications.

    Science.gov (United States)

    Toyonaga, Shinya; Kominami, Daichi; Murata, Masayuki

    2016-08-19

    Many researchers are devoting attention to the so-called "Internet of Things" (IoT), and wireless sensor networks (WSNs) are regarded as a critical technology for realizing the communication infrastructure of the future, including the IoT. Against this background, virtualization is a crucial technique for the integration of multiple WSNs. Designing virtualized WSNs for actual environments will require further detailed studies. Within the IoT environment, physical networks can undergo dynamic change, and so, many problems exist that could prevent applications from running without interruption when using the existing approaches. In this paper, we show an overall architecture that is suitable for constructing and running virtual wireless sensor network (VWSN) services within a VWSN topology. Our approach provides users with a reliable VWSN network by assigning redundant resources according to each user's demand and providing a recovery method to incorporate environmental changes. We tested this approach by simulation experiment, with the results showing that the VWSN network is reliable in many cases, although physical deployment of sensor nodes and the modular structure of the VWSN will be quite important to the stability of services within the VWSN topology.

  5. Internet Access and Usage by Students of the College of Medicine ...

    African Journals Online (AJOL)

    Findings revealed that the Internet facilities at the time of this study were inadequate – hence many students did not have access. It also revealed that although quite a number of the students were aware of the immense benefits of the use of the Internet for academic studies. They lacked the necessary skill to make effective ...

  6. Who's Connected? Trends from 1999 to 2011 in Home Internet Access in North Carolina

    Directory of Open Access Journals (Sweden)

    Kenneth Wilson

    2013-06-01

    Full Text Available Using the Internet has become an essential part of many people's daily life activities. In this information age, the Internet is an indispensible tool for communicating and sharing of information. This transformation of technological incorporation into every aspect of social life has been relatively swift, although not all-inclusive. Lack of access to the Internet produces and perpetuates social inequality. In this paper we present results of a unique data set compiled from six studies conducted across twelve years in the state of North Carolina. Our results show differences in home access to the Internet are associated with various aspects of social stratification. The findings reveal that digital divide persists over time. At least one quarter of respondents with one or more of the following sociodemographic characteristics reported not having home Internet access: African Americans, those with only a high school degree or less, those without school-age children in the home, those with a household income less than $30,000, people age 69 years and older, and rural residents. Future research and policy recommendations are provided.

  7. Security in Internet of Things

    OpenAIRE

    Mohar, Matej

    2017-01-01

    The Internet of Things (IoT) is emerging the Internet and other networks with wireless technologies to make physical objects interact online. The IoT has developed to become a promising technology and receives significant research attention in recent years because of the development of wireless communications and micro-electronics.  Like other immature technological inventions, although IoT will promise their users a better life in the near future, it is a security risk, especially today the ...

  8. Data Transmission and Access Protection of Community Medical Internet of Things

    Directory of Open Access Journals (Sweden)

    Xunbao Wang

    2017-01-01

    Full Text Available On the basis of Internet of Things (IoT technologies, Community Medical Internet of Things (CMIoT is a new medical information system and generates massive multiple types of medical data which contain all kinds of user identity data, various types of medical data, and other sensitive information. To effectively protect users’ privacy, we propose a secure privacy data protection scheme including transmission protection and access control. For the uplink transmission data protection, bidirectional identity authentication and fragmented multipath data transmission are used, and for the downlink data protection, fine grained access control and dynamic authorization are used. Through theoretical analysis and experiment evaluation, it is proved that the community medical data can be effectively protected in the transmission and access process without high performance loss.

  9. Information Access Skills in Mothers as Containment of Internet Negative Impact

    Directory of Open Access Journals (Sweden)

    Putri Limilia

    2018-02-01

    Full Text Available Media and Information Literacy (MIL skills was one of the skills that must be possessed by netizens. These skills become important in the effort of coping with the negative impact of the internet. The high penetration of the internet is not followed by the high skill of MIL. Therefore, the writers are interested to know the skills of information and media literacy (access skills in mothers. This study uses descriptive quantitative method by using questionnaires as means of data collection. The result of the study shows that mothers tend to have moderate-level information access skills. The skills are reflected in the skills of mothers at moderate level in understanding the role of information, seeking sources of information, accessing information effectively and efficiently, and storing information.

  10. An orthogonal wavelet division multiple-access processor architecture for LTE-advanced wireless/radio-over-fiber systems over heterogeneous networks

    Science.gov (United States)

    Mahapatra, Chinmaya; Leung, Victor CM; Stouraitis, Thanos

    2014-12-01

    The increase in internet traffic, number of users, and availability of mobile devices poses a challenge to wireless technologies. In long-term evolution (LTE) advanced system, heterogeneous networks (HetNet) using centralized coordinated multipoint (CoMP) transmitting radio over optical fibers (LTE A-ROF) have provided a feasible way of satisfying user demands. In this paper, an orthogonal wavelet division multiple-access (OWDMA) processor architecture is proposed, which is shown to be better suited to LTE advanced systems as compared to orthogonal frequency division multiple access (OFDMA) as in LTE systems 3GPP rel.8 (3GPP, http://www.3gpp.org/DynaReport/36300.htm). ROF systems are a viable alternative to satisfy large data demands; hence, the performance in ROF systems is also evaluated. To validate the architecture, the circuit is designed and synthesized on a Xilinx vertex-6 field-programmable gate array (FPGA). The synthesis results show that the circuit performs with a clock period as short as 7.036 ns (i.e., a maximum clock frequency of 142.13 MHz) for transform size of 512. A pipelined version of the architecture reduces the power consumption by approximately 89%. We compare our architecture with similar available architectures for resource utilization and timing and provide performance comparison with OFDMA systems for various quality metrics of communication systems. The OWDMA architecture is found to perform better than OFDMA for bit error rate (BER) performance versus signal-to-noise ratio (SNR) in wireless channel as well as ROF media. It also gives higher throughput and mitigates the bad effect of peak-to-average-power ratio (PAPR).

  11. Performance Evaluation of TDMA Medium Access Control Protocol in Cognitive Wireless Networks

    Directory of Open Access Journals (Sweden)

    Muhammed Enes Bayrakdar

    2017-02-01

    Full Text Available Cognitive radio paradigm has been revealed as a new communication technology that shares channels in wireless networks. Channel assignment is a crucial issue in the field of cognitive wireless networks because of the spectrum scarcity. In this work, we have evaluated the performance of TDMA medium access control protocol. In our simulation scenarios, primary users and secondary users utilize TDMA as a medium access control protocol. We have designed a network environment in Riverbed simulation software that consists of primary users, secondary users, and base stations. In our system model, secondary users sense the spectrum and inform the base station about empty channels. Then, the base station decides accordingly which secondary user may utilize the empty channel. Energy detection technique is employed as a spectrum sensing technique because it is the best when information about signal of primary user is acquired. Besides, different number of users is selected in simulation scenarios in order to obtain accurate delay and throughput results. Comparing analytical model with simulation results, we have shown that performance analysis of our system model is consistent and accurate.

  12. Identity Management Framework for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.

    -configuring capability and is termed as Internet of Things (IoT). The vision of IoT is to connect every object with computing, communication and sensing ability to the Internet. IoT contains varied range of devices from RFID tags, sensor nodes to the even shoes. Thus, IoT enable nomadic collaboration and communication...... between users and devices, between devices themselves and devices to services. Due to rapid technological advancements in the wireless communications, information coming from uncountable applications and services converged on user devices, communication infrastructure and the Internet are integral part...... that are public can be part of the personal space of multiple users at the same time. Secure interaction in and with IoT, secure data management and exchange, authentication, distributed access control and IdM of the devices are the main challenges. The work carried out in the scope of this thesis addresses...

  13. Study of intelligent building system based on the internet of things

    Science.gov (United States)

    Wan, Liyong; Xu, Renbo

    2017-03-01

    In accordance with the problem such as isolated subsystems, weak system linkage and expansibility of the bus type buildings management system, this paper based on the modern intelligent buildings has studied some related technologies of the intelligent buildings and internet of things, and designed system architecture of the intelligent buildings based on the Internet of Things. Meanwhile, this paper has also analyzed wireless networking modes, wireless communication protocol and wireless routing protocol of the intelligent buildings based on the Internet of Things.

  14. QoS Modeling for End-to-End Performance Evaluation over Networks with Wireless Access

    Directory of Open Access Journals (Sweden)

    Gómez Gerardo

    2010-01-01

    Full Text Available This paper presents an end-to-end Quality of Service (QoS model for assessing the performance of data services over networks with wireless access. The proposed model deals with performance degradation across protocol layers using a bottom-up strategy, starting with the physical layer and moving on up to the application layer. This approach makes it possible to analytically assess performance at different layers, thereby facilitating a possible end-to-end optimization process. As a representative case, a scenario where a set of mobile terminals connected to a streaming server through an IP access node has been studied. UDP, TCP, and the new TCP-Friendly Rate Control (TFRC protocols were analyzed at the transport layer. The radio interface consisted of a variable-rate multiuser and multichannel subsystem, including retransmissions and adaptive modulation and coding. The proposed analytical QoS model was validated on a real-time emulator of an end-to-end network with wireless access and proved to be very useful for the purposes of service performance estimation and optimization.

  15. Virus spreading in wireless sensor networks with a medium access control mechanism

    International Nuclear Information System (INIS)

    Wang Ya-Qi; Yang Xiao-Yuan

    2013-01-01

    In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations. (general)

  16. Accessing northern California earthquake data via Internet

    Science.gov (United States)

    Romanowicz, Barbara; Neuhauser, Douglas; Bogaert, Barbara; Oppenheimer, David

    The Northern California Earthquake Data Center (NCEDC) provides easy access to central and northern California digital earthquake data. It is located at the University of California, Berkeley, and is operated jointly with the U.S. Geological Survey (USGS) in Menlo Park, Calif., and funded by the University of California and the National Earthquake Hazard Reduction Program. It has been accessible to users in the scientific community through Internet since mid-1992.The data center provides an on-line archive for parametric and waveform data from two regional networks: the Northern California Seismic Network (NCSN) operated by the USGS and the Berkeley Digital Seismic Network (BDSN) operated by the Seismographic Station at the University of California, Berkeley.

  17. Internet access and use among Nigerian dental students ...

    African Journals Online (AJOL)

    Objective: The aim of this study was to determine access to internet /e-mail and its usage among Nigerian clinical dental students in year 4 to year 6. Methods: This is a cross-sectional study involving clinical dental students in year 4 to year 6 of the College of Medicine, University of Lagos. Information obtained from the ...

  18. One4All Cooperative Media Access Strategy in Infrastructure Based Distributed Wireless Networks

    DEFF Research Database (Denmark)

    Zhang, Qi; Fitzek, Frank H.P.; Iversen, Villy Bæk

    2008-01-01

    a cooperative cluster using their short-range air interface and one device contends the channel for all the devices within the cluster. This strategy reduces the number of mobile devices involved in the collision process for the wireless medium resulting in larger throughput, smaller access delay, and less...

  19. Access Routes of Internet Finance Dictionaries: Present Solutions and Future Opportunities

    Directory of Open Access Journals (Sweden)

    Deny Arnos Kwary

    2011-10-01

    Full Text Available

    ABSTRACT: Lexicographers working on finance dictionaries have not properly exploited the fast development of the Internet. This is revealed by the poor utilization of the access routes found in current Internet finance dictionaries. Consequently, users cannot effectively and efficiently find answers to their lexicographical problems. Firstly, there are Internet finance dictionaries which lack technological features and can simply be called meagre Internet dictionaries. Secondly, there are Internet finance dictionaries which utilize so many technological features that users incur high lexicographical information costs. In order to create better access routes, a sound theoretical foundation has to be established. This article shows that the implementation of the modern theory of lexicographical functions, which focuses on the users, results in a better design for future Internet finance dictionaries. With the proper theoretical basis, lexicographers will be able to create state-ofthe- art dictionaries that can provide effective and efficient solutions to lexicographical problems.

    OPSOMMING: Toegangsroetes van Internet- finansiële woordeboeke: Huidige oplossings en toekomstige geleenthede. Leksikograwe wat aan finansiële woordeboeke werk, het nie die vinnige ontwikkeling van die Internet behoorlik benut nie. Dit blyk uit die gebrekkige aanwending van die toegangsroetes wat in huidige Internet- finansiële woordeboeke aangetref word. Gevolglik kan gebruikers nie doeltreffend en doelmatig antwoorde kry op hul leksikografiese probleme nie. Eerstens is daar Internet- finansiële woordeboeke waarin tegnologiese kenmerke ontbreek en wat gewoon karige Internetwoordeboeke genoem kan word. Tweedens is daar Internet- finansiële woordeboeke wat so baie tegnologiese kenmerke aanwend dat gebruikers hoë leksikografiese inligtingskoste oploop. Om beter toegangsroetes te skep, moet 'n deeglike teoretiese grondslag gevestig word. Hierdie artikel toon

  20. Wireless Technology in K-12 Education

    Science.gov (United States)

    Walery, Darrell

    2004-01-01

    Many schools begin implementing wireless technology slowly by creating wireless "hotspots" on the fly. This is accomplished by putting a wireless access point on a cart along with a set of wireless laptop computers. A teacher can then wheel the cart anywhere in the school that has a network drop, plug the access point in and have an…

  1. A scalable and continuous-upgradable optical wireless and wired convergent access network.

    Science.gov (United States)

    Sung, J Y; Cheng, K T; Chow, C W; Yeh, C H; Pan, C-L

    2014-06-02

    In this work, a scalable and continuous upgradable convergent optical access network is proposed. By using a multi-wavelength coherent comb source and a programmable waveshaper at the central office (CO), optical millimeter-wave (mm-wave) signals of different frequencies (from baseband to > 100 GHz) can be generated. Hence, it provides a scalable and continuous upgradable solution for end-user who needs 60 GHz wireless services now and > 100 GHz wireless services in the future. During the upgrade, user only needs to upgrade their optical networking unit (ONU). A programmable waveshaper is used to select the suitable optical tones with wavelength separation equals to the desired mm-wave frequency; while the CO remains intact. The centralized characteristics of the proposed system can easily add any new service and end-user. The centralized control of the wavelength makes the system more stable. Wired data rate of 17.45 Gb/s and w-band wireless data rate up to 3.36 Gb/s were demonstrated after transmission over 40 km of single-mode fiber (SMF).

  2. Implementation of an Embedded Web Server Application for Wireless Control of Brain Computer Interface Based Home Environments.

    Science.gov (United States)

    Aydın, Eda Akman; Bay, Ömer Faruk; Güler, İnan

    2016-01-01

    Brain Computer Interface (BCI) based environment control systems could facilitate life of people with neuromuscular diseases, reduces dependence on their caregivers, and improves their quality of life. As well as easy usage, low-cost, and robust system performance, mobility is an important functionality expected from a practical BCI system in real life. In this study, in order to enhance users' mobility, we propose internet based wireless communication between BCI system and home environment. We designed and implemented a prototype of an embedded low-cost, low power, easy to use web server which is employed in internet based wireless control of a BCI based home environment. The embedded web server provides remote access to the environmental control module through BCI and web interfaces. While the proposed system offers to BCI users enhanced mobility, it also provides remote control of the home environment by caregivers as well as the individuals in initial stages of neuromuscular disease. The input of BCI system is P300 potentials. We used Region Based Paradigm (RBP) as stimulus interface. Performance of the BCI system is evaluated on data recorded from 8 non-disabled subjects. The experimental results indicate that the proposed web server enables internet based wireless control of electrical home appliances successfully through BCIs.

  3. Accessing Wireless Sensor Networks Via Dynamically Reconfigurable Interaction Models

    Directory of Open Access Journals (Sweden)

    Maria Cecília Gomes

    2012-12-01

    Full Text Available The Wireless Sensor Networks (WSNs technology is already perceived as fundamental for science across many domains, since it provides a low cost solution for environment monitoring. WSNs representation via the service concept and its inclusion in Web environments, e.g. through Web services, supports particularly their open/standard access and integration. Although such Web enabled WSNs simplify data access, network parameterization and aggregation, the existing interaction models and run-time adaptation mechanisms available to clients are still scarce. Nevertheless, applications increasingly demand richer and more flexible accesses besides the traditional client/server. For instance, applications may require a streaming model in order to avoid sequential data requests, or the asynchronous notification of subscribed data through the publish/subscriber. Moreover, the possibility to automatically switch between such models at runtime allows applications to define flexible context-based data acquisition. To this extent, this paper discusses the relevance of the session and pattern abstractions on the design of a middleware prototype providing richer and dynamically reconfigurable interaction models to Web enabled WSNs.

  4. Progress on Broadband Access to the Internet and Use of Mobile Devices in the United States.

    Science.gov (United States)

    Serrano, Katrina J; Thai, Chan L; Greenberg, Alexandra J; Blake, Kelly D; Moser, Richard P; Hesse, Bradford W

    Healthy People 2020 (HP2020) aims to improve population health outcomes through several objectives, including health communication and health information technology. We used 7 administrations of the Health Information National Trends Survey to examine HP2020 goals toward access to the Internet through broadband and mobile devices (N = 34 080). We conducted descriptive analyses and obtained predicted marginals, also known as model-adjusted risks, to estimate the association between demographic characteristics and use of mobile devices. The HP2020 target (7.7% of the US population) for accessing the Internet through a cellular network was surpassed in 2014 (59.7%), but the HP2020 target (83.2%) for broadband access fell short (63.8%). Sex and age were associated with accessing the Internet through a cellular network throughout the years (Wald F test, P Internet through mobile devices presents an opportunity for technology-based health interventions that should be explored.

  5. A Novel Scheme for an Energy Efficient Internet of Things Based on Wireless Sensor Networks.

    Science.gov (United States)

    Rani, Shalli; Talwar, Rajneesh; Malhotra, Jyoteesh; Ahmed, Syed Hassan; Sarkar, Mahasweta; Song, Houbing

    2015-11-12

    One of the emerging networking standards that gap between the physical world and the cyber one is the Internet of Things. In the Internet of Things, smart objects communicate with each other, data are gathered and certain requests of users are satisfied by different queried data. The development of energy efficient schemes for the IoT is a challenging issue as the IoT becomes more complex due to its large scale the current techniques of wireless sensor networks cannot be applied directly to the IoT. To achieve the green networked IoT, this paper addresses energy efficiency issues by proposing a novel deployment scheme. This scheme, introduces: (1) a hierarchical network design; (2) a model for the energy efficient IoT; (3) a minimum energy consumption transmission algorithm to implement the optimal model. The simulation results show that the new scheme is more energy efficient and flexible than traditional WSN schemes and consequently it can be implemented for efficient communication in the IoT.

  6. A Multimetric Approach for Handoff Decision in Heterogeneous Wireless Networks

    Science.gov (United States)

    Kustiawan, I.; Purnama, W.

    2018-02-01

    Seamless mobility and service continuity anywhere at any time are an important issue in the wireless Internet. This research proposes a scheme to make handoff decisions effectively in heterogeneous wireless networks using a fuzzy system. Our design lies in an inference engine which takes RSS (received signal strength), data rate, network latency, and user preference as strategic determinants. The logic of our engine is realized on a UE (user equipment) side in faster reaction to network dynamics while roaming across different radio access technologies. The fuzzy system handles four metrics jointly to deduce a moderate decision about when to initiate handoff. The performance of our design is evaluated by simulating move-out mobility scenarios. Simulation results show that our scheme outperforms other approaches in terms of reducing unnecessary handoff.

  7. Cell phone internet access, online sexual solicitation, partner seeking, and sexual risk behavior among adolescents.

    Science.gov (United States)

    Rice, Eric; Winetrobe, Hailey; Holloway, Ian W; Montoya, Jorge; Plant, Aaron; Kordic, Timothy

    2015-04-01

    Online partner seeking is associated with sexual risk behavior among young adults (specifically men who have sex with men), but this association has yet to be explored among a probability sample of adolescents. Moreover, cell phone internet access and sexual risk taking online and offline have not been explored. A probability sample (N = 1,831) of Los Angeles Unified School District high school students was collected in 2011. Logistic regression models assessed relationships between specific sexual risk behaviors (online sexual solicitation, seeking partners online, sex with internet-met partners, condom use) and frequency of internet use, internet access points, and demographics. Students with cell phone internet access were more likely to report being solicited online for sex, being sexually active, and having sex with an internet-met partner. Bisexual-identifying students reported higher rates of being approached online for sex, being sexually active, and not using condoms at last sex. Gay, lesbian, and questioning (GLQ) students were more likely to report online partner seeking and unprotected sex at last sex with an internet-met partner. Additionally, having sex with an internet-met partner was associated with being male, online sexual solicitation, and online partner seeking. Internet- and school-based sexual health programs should incorporate safety messages regarding online sexual solicitation, seeking sex partners online, and engaging in safer sex practices with all partners. Programs must target adolescents of all sexual identities, as adolescents may not yet be "out," and bisexual and GLQ adolescents are more likely to engage in risky sex behaviors.

  8. Scalable Video Streaming Relay for Smart Mobile Devices in Wireless Networks.

    Science.gov (United States)

    Kwon, Dongwoo; Je, Huigwang; Kim, Hyeonwoo; Ju, Hongtaek; An, Donghyeok

    2016-01-01

    Recently, smart mobile devices and wireless communication technologies such as WiFi, third generation (3G), and long-term evolution (LTE) have been rapidly deployed. Many smart mobile device users can access the Internet wirelessly, which has increased mobile traffic. In 2014, more than half of the mobile traffic around the world was devoted to satisfying the increased demand for the video streaming. In this paper, we propose a scalable video streaming relay scheme. Because many collisions degrade the scalability of video streaming, we first separate networks to prevent excessive contention between devices. In addition, the member device controls the video download rate in order to adapt to video playback. If the data are sufficiently buffered, the member device stops the download. If not, it requests additional video data. We implemented apps to evaluate the proposed scheme and conducted experiments with smart mobile devices. The results showed that our scheme improves the scalability of video streaming in a wireless local area network (WLAN).

  9. Scalable Video Streaming Relay for Smart Mobile Devices in Wireless Networks

    Science.gov (United States)

    Kwon, Dongwoo; Je, Huigwang; Kim, Hyeonwoo; Ju, Hongtaek; An, Donghyeok

    2016-01-01

    Recently, smart mobile devices and wireless communication technologies such as WiFi, third generation (3G), and long-term evolution (LTE) have been rapidly deployed. Many smart mobile device users can access the Internet wirelessly, which has increased mobile traffic. In 2014, more than half of the mobile traffic around the world was devoted to satisfying the increased demand for the video streaming. In this paper, we propose a scalable video streaming relay scheme. Because many collisions degrade the scalability of video streaming, we first separate networks to prevent excessive contention between devices. In addition, the member device controls the video download rate in order to adapt to video playback. If the data are sufficiently buffered, the member device stops the download. If not, it requests additional video data. We implemented apps to evaluate the proposed scheme and conducted experiments with smart mobile devices. The results showed that our scheme improves the scalability of video streaming in a wireless local area network (WLAN). PMID:27907113

  10. A hybrid medium access control for convergence of broadband wireless and wireline ATM networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    2000-01-01

    In this paper, we propose a hybrid medium access control protocol for supporting broadband integrated services in the wireless ATM networks. The integrated services include CBR, VBR and ABR traffic varying from low bit-rate to very high bit-rate. The proposed protocol is an excellent compromise...

  11. Assessing the Impact of Internet Access on Household Income and Financial Performance of Small Farms

    OpenAIRE

    Khanal, Aditya R.; Mishra, Ashok K.

    2013-01-01

    With increased focus on survival strategies for small farm businesses, we investigate the impact of Internet access on income and farm expenses of small farm business and households. Using a nation-wide farm-level data in the U.S. and non-parametric matching estimators, the study finds a significant positive impact of Internet access on total household and off-farm income.

  12. Data Transmission and Access Protection of Community Medical Internet of Things

    OpenAIRE

    Wang, Xunbao; Chen, Fulong; Ye, Heping; Yang, Jie; Zhu, Junru; Zhang, Ziyang; Huang, Yakun

    2017-01-01

    On the basis of Internet of Things (IoT) technologies, Community Medical Internet of Things (CMIoT) is a new medical information system and generates massive multiple types of medical data which contain all kinds of user identity data, various types of medical data, and other sensitive information. To effectively protect users’ privacy, we propose a secure privacy data protection scheme including transmission protection and access control. For the uplink transmission data protection, bidirect...

  13. Public Libraries and Internet Access across the United States: A Comparison by State 2004–2006

    Directory of Open Access Journals (Sweden)

    Paul T. Jaeger

    2007-06-01

    Full Text Available Drawing upon findings from a national survey of U.S. public libraries, this paper examines trends in Internet and public computing access in public libraries across states from 2004 to 2006. Based on library-supplied information about levels and types of Internet and public computing access, the authors offer insights into the network-based content and services that public libraries provide. Examining data from 2004 to 2006 reveals trends and accomplishments in certain states and geographic regions. This paper details and discusses the data, identifies and analyzes issues related to Internet access, and suggests areas for future research.

  14. Cross-layer based adaptive wireless traffic control for per-flow and per-station fairness

    Directory of Open Access Journals (Sweden)

    Siwamogsatham Siwaruk

    2011-01-01

    Full Text Available Abstract In the IEEE 802.11 wireless LANs, the bandwidth is not fairly shared among stations due to the distributed coordination function (DCF mechanism in the IEEE 802.11 MAC protocol. It introduces the per-flow and per-station unfairness problems between uplink and downlink flows, as the uplink flows usually dominate the downlink flows. In addition, some users may use greedy applications such as video streaming, which may prevent other applications from connecting to the Internet. In this article, we propose an adaptive cross-layer bandwidth allocation mechanism to provide per-station and per-flow fairness. To verify the effectiveness and scalability, our scheme is implemented on a wireless access router and numerous experiments in a typical wireless environment with both TCP and UDP traffic are conducted to evaluate performance of the proposed scheme.

  15. Mobile Edge Computing Empowers Internet of Things

    Science.gov (United States)

    Ansari, Nirwan; Sun, Xiang

    In this paper, we propose a Mobile Edge Internet of Things (MEIoT) architecture by leveraging the fiber-wireless access technology, the cloudlet concept, and the software defined networking framework. The MEIoT architecture brings computing and storage resources close to Internet of Things (IoT) devices in order to speed up IoT data sharing and analytics. Specifically, the IoT devices (belonging to the same user) are associated to a specific proxy Virtual Machine (VM) in the nearby cloudlet. The proxy VM stores and analyzes the IoT data (generated by its IoT devices) in real-time. Moreover, we introduce the semantic and social IoT technology in the context of MEIoT to solve the interoperability and inefficient access control problem in the IoT system. In addition, we propose two dynamic proxy VM migration methods to minimize the end-to-end delay between proxy VMs and their IoT devices and to minimize the total on-grid energy consumption of the cloudlets, respectively. Performance of the proposed methods are validated via extensive simulations.

  16. Challenges in Second-Generation Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Pescapé Antonio

    2008-01-01

    Full Text Available Wireless mesh networks have the potential to provide ubiquitous high-speed Internet access at low costs. The good news is that initial deployments of WiFi meshes show the feasibility of providing ubiquitous Internet connectivity. However, their performance is far below the necessary and achievable limit. Moreover, users' subscription in the existing meshes is dismal even though the technical challenges to get connectivity are low. This paper provides an overview of the current status of mesh networks' deployment, and highlights the technical, economical, and social challenges that need to be addressed in the next years. As a proof-of-principle study, we discuss the above-mentioned challenges with reference to three real networks: (i MagNets, an operator-driven planned two-tier mesh network; (ii Berlin Freifunk network as a pure community-driven single-tier network; (iii Weimar Freifunk network, also a community-driven but two-tier network.

  17. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    OpenAIRE

    Razaque, Abdul; Elleithy, Khaled M.

    2014-01-01

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols,...

  18. Design Aspects of An Energy-Efficient, Lightweight Medium Access Control Protocol for Wireless Sensor Networks

    NARCIS (Netherlands)

    van Hoesel, L.F.W.; Havinga, Paul J.M.

    2006-01-01

    This document gives an overview of the most relevant design aspects of the lightweight medium access control (LMAC) protocol [16] for wireless sensor networks (WSNs). These aspects include selfconfiguring and localized operation of the protocol, time synchronization in multi-hop networks, network

  19. Strategy for incumbent wireline operator: customers' provision of broadband wireless access

    Science.gov (United States)

    Khan, Naveed Ahmed; Kan, Kaili; Tareen, Abdul Wahid

    2011-10-01

    The phenomenal growth in mobile market during last decade has left incumbent wireline operators with very low fixed line customer base. The incumbent wireline operators are losing their market dominant position and wireline resources are lying underutilized. This paper proposed a cost effective strategy for incumbent wireline operators for customers' provision of broadband wireless access. The strategy will make wireline networks more value added and customer base will increase. The revenue will enhance and wireline resources will be utilized more efficiently.

  20. A Fine-Grained Data Access Control System in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Boniface K. Alese

    2015-12-01

    Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.

  1. The Digital Divide and Patient Portals: Internet Access Explained Differences in Patient Portal Use for Secure Messaging by Age, Race, and Income.

    Science.gov (United States)

    Graetz, Ilana; Gordon, Nancy; Fung, Vick; Hamity, Courtnee; Reed, Mary E

    2016-08-01

    Online access to health records and the ability to exchange secure messages with physicians can improve patient engagement and outcomes; however, the digital divide could limit access to web-based portals among disadvantaged groups. To understand whether sociodemographic differences in patient portal use for secure messaging can be explained by differences in internet access and care preferences. Cross-sectional survey to examine the association between patient sociodemographic characteristics and internet access and care preferences; then, the association between sociodemographic characteristics and secure message use with and without adjusting for internet access and care preference. One thousand forty-one patients with chronic conditions in a large integrated health care delivery system (76% response rate). Internet access, portal use for secure messaging, preference for in-person or online care, and sociodemographic and health characteristics. Internet access and preference mediated some of the differences in secure message use by age, race, and income. For example, using own computer to access the internet explained 52% of the association between race and secure message use and 60% of the association between income and use (Sobel-Goodman mediation test, Pdifferences in portal use remained statistically significant when controlling for internet access and preference. As the availability and use of patient portals increase, it is important to understand which patients have limited access and the barriers they may face. Improving internet access and making portals available across multiple platforms, including mobile, may reduce some disparities in secure message use.

  2. Towards Controlling Latency in Wireless Networks

    KAUST Repository

    Bouacida, Nader

    2017-04-24

    Wireless networks are undergoing an unprecedented revolution in the last decade. With the explosion of delay-sensitive applications in the Internet (i.e., online gaming and VoIP), latency becomes a major issue for the development of wireless technology. Taking advantage of the significant decline in memory prices, industrialists equip the network devices with larger buffering capacities to improve the network throughput by limiting packets drops. Over-buffering results in increasing the time that packets spend in the queues and, thus, introducing more latency in networks. This phenomenon is known as “bufferbloat”. While throughput is the dominant performance metric, latency also has a huge impact on user experience not only for real-time applications but also for common applications like web browsing, which is sensitive to latencies in order of hundreds of milliseconds. Concerns have arisen about designing sophisticated queue management schemes to mitigate the effects of such phenomenon. My thesis research aims to solve bufferbloat problem in both traditional half-duplex and cutting-edge full-duplex wireless systems by reducing delay while maximizing wireless links utilization and fairness. Our work shed lights on buffer management algorithms behavior in wireless networks and their ability to reduce latency resulting from excessive queuing delays inside oversized static network buffers without a significant loss in other network metrics. First of all, we address the problem of buffer management in wireless full-duplex networks by using Wireless Queue Management (WQM), which is an active queue management technique for wireless networks. Our solution is based on Relay Full-Duplex MAC (RFD-MAC), an asynchronous media access control protocol designed for relay full-duplexing. Compared to the default case, our solution reduces the end-to-end delay by two orders of magnitude while achieving similar throughput in most of the cases. In the second part of this thesis

  3. Next-generation wireless technologies 4G and beyond

    CERN Document Server

    Chilamkurti, Naveen; Chaouchi, Hakima

    2013-01-01

    This comprehensive text/reference examines the various challenges to secure, efficient and cost-effective next-generation wireless networking. Topics and features: presents the latest advances, standards and technical challenges in a broad range of emerging wireless technologies; discusses cooperative and mesh networks, delay tolerant networks, and other next-generation networks such as LTE; examines real-world applications of vehicular communications, broadband wireless technologies, RFID technology, and energy-efficient wireless communications; introduces developments towards the 'Internet o

  4. A Novel Scheme for an Energy Efficient Internet of Things Based on Wireless Sensor Networks

    Science.gov (United States)

    Rani, Shalli; Talwar, Rajneesh; Malhotra, Jyoteesh; Ahmed, Syed Hassan; Sarkar, Mahasweta; Song, Houbing

    2015-01-01

    One of the emerging networking standards that gap between the physical world and the cyber one is the Internet of Things. In the Internet of Things, smart objects communicate with each other, data are gathered and certain requests of users are satisfied by different queried data. The development of energy efficient schemes for the IoT is a challenging issue as the IoT becomes more complex due to its large scale the current techniques of wireless sensor networks cannot be applied directly to the IoT. To achieve the green networked IoT, this paper addresses energy efficiency issues by proposing a novel deployment scheme. This scheme, introduces: (1) a hierarchical network design; (2) a model for the energy efficient IoT; (3) a minimum energy consumption transmission algorithm to implement the optimal model. The simulation results show that the new scheme is more energy efficient and flexible than traditional WSN schemes and consequently it can be implemented for efficient communication in the IoT. PMID:26569260

  5. A Novel Scheme for an Energy Efficient Internet of Things Based on Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Shalli Rani

    2015-11-01

    Full Text Available One of the emerging networking standards that gap between the physical world and the cyber one is the Internet of Things. In the Internet of Things, smart objects communicate with each other, data are gathered and certain requests of users are satisfied by different queried data. The development of energy efficient schemes for the IoT is a challenging issue as the IoT becomes more complex due to its large scale the current techniques of wireless sensor networks cannot be applied directly to the IoT. To achieve the green networked IoT, this paper addresses energy efficiency issues by proposing a novel deployment scheme. This scheme, introduces: (1 a hierarchical network design; (2 a model for the energy efficient IoT; (3 a minimum energy consumption transmission algorithm to implement the optimal model. The simulation results show that the new scheme is more energy efficient and flexible than traditional WSN schemes and consequently it can be implemented for efficient communication in the IoT.

  6. Investigating the Perceptions and Behaviors of Elementary Students and Teachers when Internet Access is Universal

    Science.gov (United States)

    Hinson, Janice M

    2005-01-01

    This study presents a preliminary investigation into changes in the perceptions and behaviors of teachers and students when all have universal Internet access at home and school using Internet-on-TV technology. Four hundred fourth-grade students and their teachers from seven schools participated in the WISH TV (WorldGate Internet School to Home)…

  7. Channel capacity of TDD-OFDM-MIMO for multiple access points in a wireless single-frequency-network

    DEFF Research Database (Denmark)

    Takatori, Y.; Fitzek, Frank; Tsunekawa, K.

    2005-01-01

    MIMO data transmission scheme, which combines Single-Frequency-Network (SFN) with TDD-OFDM-MIMO applied for wireless LAN networks. In our proposal, we advocate to use SFN for multiple access points (MAP) MIMO data transmission. The goal of this approach is to achieve very high channel capacity in both......The multiple-input-multiple-output (MIMO) technique is the most attractive candidate to improve the spectrum efficiency in the next generation wireless communication systems. However, the efficiency of MIMO techniques reduces in the line of sight (LOS) environments. In this paper, we propose a new...

  8. Within a Stone's Throw: Proximal Geolocation of Internet Users via Covert Wireless Signaling

    Energy Technology Data Exchange (ETDEWEB)

    Paul, Nathanael R [ORNL; Shue, Craig [Worcester Polytechnic Institute, Worcester; Taylor, Curtis [Worcester Polytechnic Institute, Worcester

    2013-01-01

    While Internet users may often believe they have anonymity online, a culmination of technologies and recent research may allow an adversary to precisely locate an online user s geophysical location. In many cases, such as peer-to-peer applications, an adversary can easily use a target s IP address to quickly obtain the general geographical location of the target. Recent research has scoped this general area to a 690m (0.43 mile) radius circle. In this work, we show how an adversary can exploit Internet communication for geophysical location by embedding covert signals in communication with a target on a remote wireless local area network. We evaluated the approach in two common real-world settings: a residential neighborhood and an apartment building. In the neighborhood case, we used a single-blind trial in which an observer located a target network to within three houses in less than 40 minutes. Directional antennas may have allowed even more precise geolocation. This approach had only a 0.38% false positive rate, despite 24,000 observed unrelated packets and many unrelated networks. This low rate allowed the observer to exclude false locations and continue searching for the target. Our results enable law enforcement or copyright holders to quickly locate online Internet users without requiring time-consuming subpoenas to Internet Service Providers. Other privacy use cases include rapidly locating individuals based on their online speech or interests. We hope to raise awareness of these issues and to spur discussion on privacy and geolocating techniques.

  9. Research and Mass Deployment of Non-cognitive Authentication Strategy Based on Campus Wireless Network

    Directory of Open Access Journals (Sweden)

    Huangfu Dapeng

    2018-01-01

    Full Text Available With the rapid development of Internet +, the dependence on wireless networks and wireless terminals are increasing. Campus wireless network has become the main network of teachers and students in campus on the internet. As there are uneven clients and a wide variety of intelligent terminals now. Simplified authentication and network security become the most urgent problem for wireless network. This paper used the Portal + Mac authentication method to realize the non-cognitive authentication of teachers and students on basis of the analysis of the advantages and disadvantages of mainstream authentication of campus wireless network, such as 802.1X authentication, Portal authentication, Mac authentication and DHCP authentication. Teachers and students only need portal certification at the first time, then surf the internet with non-perceived authentication at the second time and later. This method increases network security, and is better to meet the needs of teachers and students.

  10. Access Selection Algorithm of Heterogeneous Wireless Networks for Smart Distribution Grid Based on Entropy-Weight and Rough Set

    Science.gov (United States)

    Xiang, Min; Qu, Qinqin; Chen, Cheng; Tian, Li; Zeng, Lingkang

    2017-11-01

    To improve the reliability of communication service in smart distribution grid (SDG), an access selection algorithm based on dynamic network status and different service types for heterogeneous wireless networks was proposed. The network performance index values were obtained in real time by multimode terminal and the variation trend of index values was analyzed by the growth matrix. The index weights were calculated by entropy-weight and then modified by rough set to get the final weights. Combining the grey relational analysis to sort the candidate networks, and the optimum communication network is selected. Simulation results show that the proposed algorithm can implement dynamically access selection in heterogeneous wireless networks of SDG effectively and reduce the network blocking probability.

  11. Accessing And Utilizing Hinagoa Resources On The Internet By The ...

    African Journals Online (AJOL)

    This paper presents simple descriptive steps required in accessing full -text articles from the HINAGOA resources on the Internet. The primary aim is to enable NIFOR scientists search and obtain desired information from the HINAGOA resources much more precis ely and efficiently. The three portals that make up HINAGOA, ...

  12. Wireless home networking for dummies

    CERN Document Server

    Briere, Danny; Ferris, Edward

    2010-01-01

    The perennial bestseller shows you how share your files and Internet connection across a wireless network. Fully updated for Windows 7 and Mac OS X Snow Leopard, this new edition of this bestseller returns with all the latest in wireless standards and security. This fun and friendly guide shows you how to integrate your iPhone, iPod touch, smartphone, or gaming system into your home network. Veteran authors escort you through the various financial and logisitical considerations that you need to take into account before building a wireless network at home.: Covers the basics of planning, instal

  13. Democracy and the Internet: Access, Engagement and Deliberation

    Directory of Open Access Journals (Sweden)

    Roman Gerodimos

    2005-12-01

    Full Text Available The internet has the capacity to facilitate the creation of new forms of civic engagement, but the realisation of these opportunities requires institutional and cultural reinforcement. The democratic character of e-citizenship and the equal distribution of online resources to the public require the fulfilment of four conditions: access, engagement (incorporating education, motivation and trust, meaningful deliberation and a link between civic input and public policy output. Furthermore, the gap between the main features of cyberspace and the inherent prerequisites of democracy, such as a finite space and a set of rules, create tensions that need to be negotiated politically. Although the empirical evidence available includes some encouraging signs regarding the future use of the internet for civic engagement, the existing limitations and obstacles mean that the new media will complement, rather than replace, the old media as a democratic public sphere.

  14. Proposal of Wireless Traffic Control Schemes for Wireless LANs

    Science.gov (United States)

    Hiraguri, Takefumi; Ichikawa, Takeo; Iizuka, Masataka; Kubota, Shuji

    This paper proposes two traffic control schemes to support the communication quality of multimedia streaming services such as VoIP and audio/video over IEEE 802.11 wireless LAN systems. The main features of the proposed scheme are bandwidth control for each flow of the multimedia streaming service and load balancing between access points (APs) of the wireless LAN by using information of data link, network and transport layers. The proposed schemes are implemented on a Linux machine which is called the wireless traffic controller (WTC). The WTC connects a high capacity backbone network and an access network to which the APs are attached. We evaluated the performance of the proposed WTC and confirmed that the communication quality of the multimedia streaming would be greatly improved by using this technique.

  15. Access to CERN from the Internet: termination of the VPN service

    CERN Multimedia

    2007-01-01

    Due to the continued incidents and growing security risks from the service, access to CERN using the VPN (Virtual Private Network) service will be discontinued on Tuesday 29th January 2008. In addition, new registrations will no longer be accepted. Further information is linked from: http://cern.ch/security/vpn Users are requested to stop using VPN immediately and start using the recommended alternative methods for connecting to CERN from the Internet. These are outlined together with a set of FAQs at: http://cern.ch/security/Internet IT Department

  16. Towards Effective Intra-flow Network Coding in Software Defined Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Donghai Zhu

    2016-01-01

    Full Text Available Wireless Mesh Networks (WMNs have potential to provide convenient broadband wireless Internet access to mobile users.With the support of Software-Defined Networking (SDN paradigm that separates control plane and data plane, WMNs can be easily deployed and managed. In addition, by exploiting the broadcast nature of the wireless medium and the spatial diversity of multi-hop wireless networks, intra-flow network coding has shown a greater benefit in comparison with traditional routing paradigms in data transmission for WMNs. In this paper, we develop a novel OpenCoding protocol, which combines the SDN technique with intra-flow network coding for WMNs. Our developed protocol can simplify the deployment and management of the network and improve network performance. In OpenCoding, a controller that works on the control plane makes routing decisions for mesh routers and the hop-by-hop forwarding function is replaced by network coding functions in data plane. We analyze the overhead of OpenCoding. Through a simulation study, we show the effectiveness of the OpenCoding protocol in comparison with existing schemes. Our data shows that OpenCoding outperforms both traditional routing and intra-flow network coding schemes.

  17. Developing a Framework for E-Manufacturing Based on Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Xu Xi

    2013-06-01

    Full Text Available This paper analyzes the current situation of business environment and business intelligence systems integration at first. With emerging applications of internet and wireless communication technologies, e-manufacturing is focused on the use of internet, monitoring and communications technologies to make things happen collaboratively on a global basis. A wireless sensor network based data acquisition system gives enormous benefits such as ease and flexibility of deployment in addition to low maintenance and deployment costs. This paper reviews wireless sensor network and its application for e-manufacturing. To provide a dependable, non-intrusive, secure, real-time automated health monitoring, a distributed reconfigurable sensor network is introduced which consists of real and virtual sensor nodes over a communication wireless sensor network using Mica2 motes.

  18. A novel PON based UMTS broadband wireless access network architecture with an algorithm to guarantee end to end QoS

    Science.gov (United States)

    Sana, Ajaz; Hussain, Shahab; Ali, Mohammed A.; Ahmed, Samir

    2007-09-01

    In this paper we proposes a novel Passive Optical Network (PON) based broadband wireless access network architecture to provide multimedia services (video telephony, video streaming, mobile TV, mobile emails etc) to mobile users. In the conventional wireless access networks, the base stations (Node B) and Radio Network Controllers (RNC) are connected by point to point T1/E1 lines (Iub interface). The T1/E1 lines are expensive and add up to operating costs. Also the resources (transceivers and T1/E1) are designed for peak hours traffic, so most of the time the dedicated resources are idle and wasted. Further more the T1/E1 lines are not capable of supporting bandwidth (BW) required by next generation wireless multimedia services proposed by High Speed Packet Access (HSPA, Rel.5) for Universal Mobile Telecommunications System (UMTS) and Evolution Data only (EV-DO) for Code Division Multiple Access 2000 (CDMA2000). The proposed PON based back haul can provide Giga bit data rates and Iub interface can be dynamically shared by Node Bs. The BW is dynamically allocated and the unused BW from lightly loaded Node Bs is assigned to heavily loaded Node Bs. We also propose a novel algorithm to provide end to end Quality of Service (QoS) (between RNC and user equipment).The algorithm provides QoS bounds in the wired domain as well as in wireless domain with compensation for wireless link errors. Because of the air interface there can be certain times when the user equipment (UE) is unable to communicate with Node B (usually referred to as link error). Since the link errors are bursty and location dependent. For a proposed approach, the scheduler at the Node B maps priorities and weights for QoS into wireless MAC. The compensations for errored links is provided by the swapping of services between the active users and the user data is divided into flows, with flows allowed to lag or lead. The algorithm guarantees (1)delay and throughput for error-free flows,(2)short term fairness

  19. University Undergraduate Students, Perceptions of The Wireless ...

    African Journals Online (AJOL)

    The study focused on Uni versity Undergraduate students' perceptions of the use of the wireless internet of Abubakar Tafawa Balewa University, Bauchi, Nigeria. Using emperical and new field data, this exploratory study investigated the students' perceptions of internet use in relation to library use. The study adopted a ...

  20. Architectural Considerations of Fiber-Radio Millimeter-Wave Wireless Access Systems

    Science.gov (United States)

    Kitayama, Ken-Ichi

    The architecture of fiber-radio mm-wave wireless access systems critically depends upon the optical mm-wave generation and transport techniques. Four optical mm-wave generation and transport techniques: 1) optical self-heterodyning, 2) external modulation, 3) up- and downconversion, and 4) optical transceiver, will be assessed. From the technical viewpoints, their advantages and disadvantages are discussed. The economical assessment, focusing on the cost of a base station BS ( ), will suggest that the optical transceiver looks the most promising in the long run, but in the near future, however, the external modulation will be cost-effective. The experimental results of 60 GHz testbeds using the external modulation will support the conclusion.

  1. Rogue AP Detection in the Wireless LAN for Large Scale Deployment

    OpenAIRE

    Sang-Eon Kim; Byung-Soo Chang; Sang Hong Lee; Dae Young Kim

    2006-01-01

    The wireless LAN standard, also known as WiFi, has begun to use commercial purposes. This paper describes access network architecture of wireless LAN for large scale deployment to provide public service. A metro Ethernet and digital subscriber line access network can be used for wireless LAN with access point. In this network architecture, access point plays interface between wireless node and network infrastructure. It is important to maintain access point without any failure and problems to...

  2. Subdividing the digital divide: differences in internet access and use among rural residents with medical limitations.

    Science.gov (United States)

    Wang, Jong-Yi; Bennett, Kevin; Probst, Janice

    2011-03-03

    Access to health care is often contingent upon an individual's ability to travel for services. Certain groups, such as those with physical limitations and rural residents, have more travel barriers than other groups, reducing their access to services. The use of the Internet may be a way for these groups to seek care or information to support their health care needs. The purpose of this study was to examine Internet use among those whose are, for medical reasons, limited in their ability to travel. We also examined disparities in Internet use by race/ethnicity and rural residence, particularly among persons with medical conditions. We used data from the 2001 National Household Travel Survey (NHTS), a nationally representative sample of US households, to examine Internet use among individuals with medical conditions, rural residents, and minority populations. Internet use was defined as any use within the past 6 months; among users, frequency of use and location of use were explored. Control variables included sociodemographics, family life cycle, employment status, region, and job density in the community. All analyses were weighted to reflect the complex NHTS sampling frame. Individuals with medical conditions were far less likely to report Internet use than those without medical conditions (32.6% vs 70.3%, P digital divide between urban and rural residents. Internet use and frequency was also lower among those reporting a medical condition than among those without a condition. After we controlled for many factors, however, African Americans and Hispanics were still less likely to use the Internet, and to use it less often, than whites. Policy makers should look for ways to improve the access to, and use of, the Internet among these populations.

  3. Internet Access and Usage in Improving Students' Self-Directed Learning in Indonesia Open University

    Science.gov (United States)

    Rahardjo, Djoko; Sumardjo; Lubis, Djuara P.; Harijati, Sri Ir.

    2016-01-01

    Internet is well known nowadays, however higher distance education students who live in remote rural areas still have not been able to take advantages of this medium optimally for their learning process. For accessing the internet the students have to be available with the minimum prerequisites: the existence of adequate devices and the sufficient…

  4. Simulation of Wireless Digital Communication Systems

    Directory of Open Access Journals (Sweden)

    A. Mohammed

    2004-12-01

    Full Text Available Due to the explosive demands for high speed wireless services, suchas wireless Internet, email and cellular video conferencing, digitalwireless communications has become one of the most exciting researchtopics in electrical and electronic engineering field. The never-endingdemand for such personal and multimedia services, however, demandstechnologies operating at higher data rates and broader bandwidths. Inaddition, the complexity of wireless communication and signalprocessing systems has grown considerably during the past decade.Therefore, powerful computer­aided techniques are required for theprocess of modeling, designing, analyzing and evaluating theperformance of digital wireless communication systems. In this paper wediscuss the basic propagation mechanisms affecting the performance ofwireless communication systems, and present a simple, powerful andefficient way to simulate digital wireless communication systems usingMatlab. The simulated results are compared with the theoreticalanalysis to validate the simulator. The simulator is useful inevaluating the performance of wireless multimedia services and theassociated signal processing structures and algorithms for current andnext generation wireless mobile communication systems.

  5. Regulating internet access in UK public libraries: legal compliance and ethical dilemmas

    OpenAIRE

    Muir, Adrienne; Spacey, Rachel; Cooke, Louise; Creaser, Claire

    2016-01-01

    Purpose – This paper aims to consider selected results from the Arts and Humanities Research Council (AHRC) funded “Managing Access to the internet in Public Libraries” (MAIPLE) project, from 2012-2014. MAIPLE has explored the ways in which public library services manage use of the internet connections that they provide for the public. This included the how public library services balance their legal obligations and the needs of their communities in a public space and the ethical dilemmas tha...

  6. The Lure of Wireless Encryption

    CERN Multimedia

    Computer Security Team

    2013-01-01

    Following our article entitled “Jekyll or Hyde? Better browse securely” in the last issue of the Bulletin, some people wondered why the CERN wireless network is not encrypted…   There are many arguments why it is not. The simplest is usability: the communication and management of the corresponding access keys would be challenging given the sheer number of wireless devices the CERN network hosts. Keys would quickly become public, e.g. at conferences, and might be shared, written on whiteboards, etc. Then there are all the devices which cannot be easily configured to use encryption protocols - a fact which would create plenty of calls to the CERN Service Desk… But our main argument is that wireless encryption is DECEPTIVE. Wireless encryption is deceptive as it only protects the wireless network against unauthorised access (and the CERN network already has other means to protect against that). Wireless encryption however, does not really help you. You ...

  7. Internet Use and Access Among Pregnant Women via Computer and Mobile Phone: Implications for Delivery of Perinatal Care.

    Science.gov (United States)

    Peragallo Urrutia, Rachel; Berger, Alexander A; Ivins, Amber A; Beckham, A Jenna; Thorp, John M; Nicholson, Wanda K

    2015-03-30

    The use of Internet-based behavioral programs may be an efficient, flexible method to enhance prenatal care and improve pregnancy outcomes. There are few data about access to, and use of, the Internet via computers and mobile phones among pregnant women. We describe pregnant women's access to, and use of, computers, mobile phones, and computer technologies (eg, Internet, blogs, chat rooms) in a southern United States population. We describe the willingness of pregnant women to participate in Internet-supported weight-loss interventions delivered via computers or mobile phones. We conducted a cross-sectional survey among 100 pregnant women at a tertiary referral center ultrasound clinic in the southeast United States. Data were analyzed using Stata version 10 (StataCorp) and R (R Core Team 2013). Means and frequency procedures were used to describe demographic characteristics, access to computers and mobile phones, and use of specific Internet modalities. Chi-square testing was used to determine whether there were differences in technology access and Internet modality use according to age, race/ethnicity, income, or children in the home. The Fisher's exact test was used to describe preferences to participate in Internet-based postpartum weight-loss interventions via computer versus mobile phone. Logistic regression was used to determine demographic characteristics associated with these preferences. The study sample was 61.0% white, 26.0% black, 6.0% Hispanic, and 7.0% Asian with a mean age of 31.0 (SD 5.1). Most participants had access to a computer (89/100, 89.0%) or mobile phone (88/100, 88.0%) for at least 8 hours per week. Access remained high (>74%) across age groups, racial/ethnic groups, income levels, and number of children in the home. Internet/Web (94/100, 94.0%), email (90/100, 90.0%), and Facebook (50/100, 50.0%) were the most commonly used Internet technologies. Women aged less than 30 years were more likely to report use of Twitter and chat rooms

  8. Traffic management mechanism for intranets with available-bit-rate access to the Internet

    Science.gov (United States)

    Hassan, Mahbub; Sirisena, Harsha R.; Atiquzzaman, Mohammed

    1997-10-01

    The design of a traffic management mechanism for intranets connected to the Internet via an available bit rate access- link is presented. Selection of control parameters for this mechanism for optimum performance is shown through analysis. An estimate for packet loss probability at the access- gateway is derived for random fluctuation of available bit rate of the access-link. Some implementation strategies of this mechanism in the standard intranet protocol stack are also suggested.

  9. 40 CFR 1400.5 - Internet access to certain off-site consequence analysis data elements.

    Science.gov (United States)

    2010-07-01

    ... consequence analysis data elements. 1400.5 Section 1400.5 Protection of Environment ENVIRONMENTAL PROTECTION... UNDER THE CLEAN AIR ACT SECTION 112(r)(7); DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION DISTRIBUTION OF OFF-SITE CONSEQUENCE ANALYSIS INFORMATION Public Access § 1400.5 Internet access to certain off...

  10. An Ontology-Based Context Model for Wireless Sensor Network (WSN Management in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Adnan Al-Anbuky

    2013-09-01

    Full Text Available Wireless sensor networks (WSNs are an enabling technology of context-aware systems. The Internet of Things (IoT, which has attracted much attention in recent years, is an emerging paradigm where everyday objects and spaces are made context-aware and interconnected through heterogeneous networks on a global scale. However, the IoT system can suffer from poor performances when its underlying networks are not optimized. In this paper, an ontology model for representing and facilitating context sharing between network entities in WSNs is proposed for the first time. The context model aims to enable optimal context-aware management of WSNs in IoT, which will also harness the rich context knowledge of IoT systems.

  11. Creation of an online multimedia radiology module access to Internet

    International Nuclear Information System (INIS)

    Alejo, J.P.; Vega, J.M.; Perez, R.

    1996-01-01

    Using freely distributed programs, we have created a radiology data server in the world wide web (WWW) system, which includes among its services a radiological teaching module developed entirely in Spanish. This server is linked to Internet, the extensive worldwide computer network, to which WWW subscribers have access. The data is presented in hypertext and hypermedia format. (Author) 9 refs

  12. Gastric cancer-related information on the Internet: incomplete, poorly accessible, and overly commercial.

    LENUS (Irish Health Repository)

    Killeen, Shane

    2011-02-01

    Patients increasingly use the Internet for gastric cancer information. However, the quality of the information is questionable. We evaluated the accuracy, completeness, accessibility, reliability, and readability of gastric cancer websites.

  13. The digital divide: Examining socio-demographic factors associated with health literacy, access and use of internet to seek health information.

    Science.gov (United States)

    Estacio, Emee Vida; Whittle, Rebecca; Protheroe, Joanne

    2017-02-01

    This article aims to examine the socio-demographic characteristics associated with access and use of Internet for health-related purposes and its relationship with health literacy. Data were drawn from a health literacy survey ( N = 1046) and analysed using logistic regression. Results show a strong association between health literacy, internet access and use. Socio-demographic characteristics particularly age, education, income, perceived health and social isolation also predict internet access. Thus, in addition to widening access, the movement towards digitisation of health information and services should also consider digital skills development to enable people to utilise digital technology more effectively, especially among traditionally hard-to-reach communities.

  14. Rural Health Care Information Access and the Use of the Internet: Opportunity for University Extension

    Science.gov (United States)

    Das, Biswa R.; Leatherman, John C.; Bressers, Bonnie M.

    2015-01-01

    The Internet has potential for improving health information delivery and strengthening connections between rural populations and local health service providers. An exploratory case study six rural health care markets in Kansas showed that about 70% of adults use the Internet, with substantial use for accessing health information. While there are…

  15. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  16. SMART HOME SECURITY SOLUTIONS BASED ON INTERNET OF THINGS (IOT) USING WIFI INTERFACE

    OpenAIRE

    Bhavna1, Dr. Neetu Sharma2

    2018-01-01

    Smart home system is very popular in modern days that give many kind of application that make everything is simple and easy to control. In modern day, home appliances are using wireless technology and can be accessed by internet that will make residents life easier and organized. IoT-based Home Automation System is designed to assist the people with physical disabilities and elderly to provide support as well as to control the electrical appliances and monitor the room temperature using mobil...

  17. Wireless sensor networks architectures and protocols

    CERN Document Server

    Callaway, Jr, Edgar H

    2003-01-01

    Introduction to Wireless Sensor NetworksApplications and MotivationNetwork Performance ObjectivesContributions of this BookOrganization of this BookThe Development of Wireless Sensor NetworksEarly Wireless NetworksWireless Data NetworksWireless Sensor and Related NetworksConclusionThe Physical LayerSome Physical Layer ExamplesA Practical Physical Layer for Wireless Sensor NetworksSimulations and ResultsConclusionThe Data Link LayerMedium Access Control TechniquesThe Mediation DeviceSystem Analysis and SimulationConclusionThe Network LayerSome Network Design ExamplesA Wireless Sensor Network De

  18. Perceptions of the Risks and Benefits of Internet Access and Use by People with Intellectual Disabilities

    Science.gov (United States)

    Chadwick, Darren D.; Quinn, Sally; Fullwood, Chris

    2017-01-01

    Background: Information and communication technologies, with the Internet at the forefront, have the potential to enhance the knowledge, service, employment, development and social interactional opportunities available to people with intellectual disabilities. Despite this, people with intellectual disabilities are not accessing the Internet to…

  19. Wireless telecommunication systems

    CERN Document Server

    Terré, Michel; Vivier, Emmanuelle

    2013-01-01

    Wireless telecommunication systems generate a huge amount of interest. In the last two decades, these systems have experienced at least three major technological leaps, and it has become impossible to imagine how society was organized without them. In this book, we propose a macroscopic approach on wireless systems, and aim at answering key questions about power, data rates, multiple access, cellular engineering and access networks architectures.We present a series of solved problems, whose objective is to establish the main elements of a global link budget in several radiocommunicati

  20. Multi-Channel Wireless Sensor Networks: Protocols, Design and Evaluation

    OpenAIRE

    Durmaz, O.

    2009-01-01

    Pervasive systems, which are described as networked embedded systems integrated with everyday environments, are considered to have the potential to change our daily lives by creating smart surroundings and by their ubiquity, just as the Internet. In the last decade, “Wireless Sensor Networks��? have appeared as one of the real-world examples of pervasive systems by combining automated sensing, embedded computing and wireless networking into tiny embedded devices. A wireless sensor network typ...

  1. Access to CERN from the Internet: termination of the VPN service - Reminder

    CERN Multimedia

    IT Department

    2008-01-01

    Due to the continued incidents and growing security risks associated with the service, access to CERN using the VPN (Virtual Private Network) service will be discontinued as of Tuesday, 29 January 2008. In addition, new registrations are no longer accepted. For further information see: http://cern.ch/security/vpn. Users are requested to stop using VPN immediately and to start to use the recommended alternative methods for connecting to CERN from the Internet. An outline of these methods and a set of FAQs are available at: http://cern.ch/security/Internet IT Department

  2. Internet Use and Access Among Pregnant Women via Computer and Mobile Phone: Implications for Delivery of Perinatal Care

    Science.gov (United States)

    Peragallo Urrutia, Rachel; Berger, Alexander A; Ivins, Amber A; Beckham, A Jenna; Thorp Jr, John M

    2015-01-01

    Background The use of Internet-based behavioral programs may be an efficient, flexible method to enhance prenatal care and improve pregnancy outcomes. There are few data about access to, and use of, the Internet via computers and mobile phones among pregnant women. Objective We describe pregnant women’s access to, and use of, computers, mobile phones, and computer technologies (eg, Internet, blogs, chat rooms) in a southern United States population. We describe the willingness of pregnant women to participate in Internet-supported weight-loss interventions delivered via computers or mobile phones. Methods We conducted a cross-sectional survey among 100 pregnant women at a tertiary referral center ultrasound clinic in the southeast United States. Data were analyzed using Stata version 10 (StataCorp) and R (R Core Team 2013). Means and frequency procedures were used to describe demographic characteristics, access to computers and mobile phones, and use of specific Internet modalities. Chi-square testing was used to determine whether there were differences in technology access and Internet modality use according to age, race/ethnicity, income, or children in the home. The Fisher’s exact test was used to describe preferences to participate in Internet-based postpartum weight-loss interventions via computer versus mobile phone. Logistic regression was used to determine demographic characteristics associated with these preferences. Results The study sample was 61.0% white, 26.0% black, 6.0% Hispanic, and 7.0% Asian with a mean age of 31.0 (SD 5.1). Most participants had access to a computer (89/100, 89.0%) or mobile phone (88/100, 88.0%) for at least 8 hours per week. Access remained high (>74%) across age groups, racial/ethnic groups, income levels, and number of children in the home. Internet/Web (94/100, 94.0%), email (90/100, 90.0%), and Facebook (50/100, 50.0%) were the most commonly used Internet technologies. Women aged less than 30 years were more likely to

  3. Menores y acceso a Internet en el hogar: las normas familiares Internet Access by Minors at Home: Usage Norms Imposed by Parents

    Directory of Open Access Journals (Sweden)

    Mercè Morey López

    2010-03-01

    Full Text Available Este artículo analiza el establecimiento de normas por parte de los progenitores a sus hijos sobre la utilización de Internet en los hogares. Los datos se han obtenido mediante encuestación sobre una muestra representativa de los menores de las Islas Baleares de entre 6 y 16 años, habiéndose analizado las siguientes dimensiones: acceso de los menores a Internet desde el hogar; grado de autonomía o acompañamiento en la navegación; normativización impuesta en el hogar por parte de sus padres y madres; tipos de normas impuestas; relación entre normas y género; valoración de los menores de los conocimientos y habilidades de sus progenitores para navegar por Internet y, finalmente, el acompañamiento de los padres y madres a la hora de navegar por Internet. Se constata que poco más del 53% de los menores de entre 6 y 14 años, y del 62% de los de 15 y 16 años navegan a través de Internet sin que sus progenitores les establezcan limitaciones. Cuando establecen algún tipo de normas, éstas se refieren, principalmente, a restricciones de carácter temporal. Por tanto, se infiere que los padres y madres no son conscientes de los peligros de la Red o que, al menos, actúan de forma poco razonable. Ello muestra la necesidad de sensibilizar y formar a las familias para que asuman su responsabilidad educativa.This paper examines and discusses the rules and standards set by parents for their children on Internet usage at home. Data that supports the paper have been obtained by surveying a representative sample of children in the Balearic Islands aged between 6 and 16 years; the analysis dimensions are: access by minors to the Internet from home; location of the computer from which have online access; level of autonomy or accompaniment while surfing the Net; norms imposed by their parents; types of rules imposed; relationship between norms and gender; the minors’ opinion and assessment of the knowledge and abilities of their parents on use of

  4. Wireless Network Security Vulnerabilities and Concerns

    Science.gov (United States)

    Mushtaq, Ahmad

    The dilemma of cyber communications insecurity has existed all the times since the beginning of the network communications. The problems and concerns of unauthorized access and hacking has existed form the time of introduction of world wide web communication and Internet's expansion for popular use in 1990s, and has remained till present time as one of the most important issues. The wireless network security is no exception. Serious and continuous efforts of investigation, research and development has been going on for the last several decades to achieve the goal of provision of 100 percent or full proof security for all the protocols of networking architectures including the wireless networking. Some very reliable and robust strategies have been developed and deployed which has made network communications more and more secure. However, the most desired goal of complete security has yet to see the light of the day. The latest Cyber War scenario, reported in the media of intrusion and hacking of each other's defense and secret agencies between the two super powers USA and China has further aggravated the situation. This sort of intrusion by hackers between other countries such as India and Pakistan, Israel and Middle East countries has also been going on and reported in the media frequently. The paper reviews and critically examines the strategies already in place, for wired network. Wireless Network Security and also suggests some directions and strategies for more robust aspects to be researched and deployed.

  5. Efficient scheduling request algorithm for opportunistic wireless access

    KAUST Repository

    Nam, Haewoon

    2011-08-01

    An efficient scheduling request algorithm for opportunistic wireless access based on user grouping is proposed in this paper. Similar to the well-known opportunistic splitting algorithm, the proposed algorithm initially adjusts (or lowers) the threshold during a guard period if no user sends a scheduling request. However, if multiple users make requests simultaneously and therefore a collision occurs, the proposed algorithm no longer updates the threshold but narrows down the user search space by splitting the users into multiple groups iteratively, whereas the opportunistic splitting algorithm keeps adjusting the threshold until a single user is found. Since the threshold is only updated when no user sends a request, it is shown that the proposed algorithm significantly alleviates the burden of the signaling for the threshold distribution to the users by the scheduler. More importantly, the proposed algorithm requires a less number of mini-slots to make a user selection given a certain scheduling outage probability. © 2011 IEEE.

  6. Capacity Analysis of Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    M. I. Gumel

    2012-06-01

    Full Text Available The next generation wireless networks experienced a great development with emergence of wireless mesh networks (WMNs, which can be regarded as a realistic solution that provides wireless broadband access. The limited available bandwidth makes capacity analysis of the network very essential. While the network offers broadband wireless access to community and enterprise users, the problems that limit the network capacity must be addressed to exploit the optimum network performance. The wireless mesh network capacity analysis shows that the throughput of each mesh node degrades in order of l/n with increasing number of nodes (n in a linear topology. The degradation is found to be higher in a fully mesh network as a result of increase in interference and MAC layer contention in the network.

  7. Power Analysis of an Enterprise Wireless Communication Architecture

    Science.gov (United States)

    2017-09-01

    command and control, C2, Internet of Things , IoT, model based systems engineering, MBSE, marine air-ground task force, MAGTF, command control and...Electronics Engineers InTop Integrated Topside IPS Instructions per Second IoT Internet of Things JTNC Joint Tactical Networking Center L-RTac...wireless communications in the military increases the amount of energy needed for missions. The Internet of Things (IoT) movement (Thomas, McPherson, and

  8. Combining wireless sensor networks and semantic middleware for an Internet of Things-based sportsman/woman monitoring application.

    Science.gov (United States)

    Rodríguez-Molina, Jesús; Martínez, José-Fernán; Castillejo, Pedro; López, Lourdes

    2013-01-31

    Wireless Sensor Networks (WSNs) are spearheading the efforts taken to build and deploy systems aiming to accomplish the ultimate objectives of the Internet of Things. Due to the sensors WSNs nodes are provided with, and to their ubiquity and pervasive capabilities, these networks become extremely suitable for many applications that so-called conventional cabled or wireless networks are unable to handle. One of these still underdeveloped applications is monitoring physical parameters on a person. This is an especially interesting application regarding their age or activity, for any detected hazardous parameter can be notified not only to the monitored person as a warning, but also to any third party that may be helpful under critical circumstances, such as relatives or healthcare centers. We propose a system built to monitor a sportsman/woman during a workout session or performing a sport-related indoor activity. Sensors have been deployed by means of several nodes acting as the nodes of a WSN, along with a semantic middleware development used for hardware complexity abstraction purposes. The data extracted from the environment, combined with the information obtained from the user, will compose the basis of the services that can be obtained.

  9. Combining Wireless Sensor Networks and Semantic Middleware for an Internet of Things-Based Sportsman/Woman Monitoring Application

    Science.gov (United States)

    Rodríguez-Molina, Jesús; Martínez, José-Fernán; Castillejo, Pedro; López, Lourdes

    2013-01-01

    Wireless Sensor Networks (WSNs) are spearheading the efforts taken to build and deploy systems aiming to accomplish the ultimate objectives of the Internet of Things. Due to the sensors WSNs nodes are provided with, and to their ubiquity and pervasive capabilities, these networks become extremely suitable for many applications that so-called conventional cabled or wireless networks are unable to handle. One of these still underdeveloped applications is monitoring physical parameters on a person. This is an especially interesting application regarding their age or activity, for any detected hazardous parameter can be notified not only to the monitored person as a warning, but also to any third party that may be helpful under critical circumstances, such as relatives or healthcare centers. We propose a system built to monitor a sportsman/woman during a workout session or performing a sport-related indoor activity. Sensors have been deployed by means of several nodes acting as the nodes of a WSN, along with a semantic middleware development used for hardware complexity abstraction purposes. The data extracted from the environment, combined with the information obtained from the user, will compose the basis of the services that can be obtained. PMID:23385405

  10. Combining Wireless Sensor Networks and Semantic Middleware for an Internet of Things-Based Sportsman/Woman Monitoring Application

    Directory of Open Access Journals (Sweden)

    Lourdes López

    2013-01-01

    Full Text Available Wireless Sensor Networks (WSNs are spearheading the efforts taken to build and deploy systems aiming to accomplish the ultimate objectives of the Internet of Things. Due to the sensors WSNs nodes are provided with, and to their ubiquity and pervasive capabilities, these networks become extremely suitable for many applications that so-called conventional cabled or wireless networks are unable to handle. One of these still underdeveloped applications is monitoring physical parameters on a person. This is an especially interesting application regarding their age or activity, for any detected hazardous parameter can be notified not only to the monitored person as a warning, but also to any third party that may be helpful under critical circumstances, such as relatives or healthcare centers. We propose a system built to monitor a sportsman/woman during a workout session or performing a sport-related indoor activity. Sensors have been deployed by means of several nodes acting as the nodes of a WSN, along with a semantic middleware development used for hardware complexity abstraction purposes. The data extracted from the environment, combined with the information obtained from the user, will compose the basis of the services that can be obtained.

  11. A Lightweight Medium Access Protocol (LMAC) for Wireless Sensor Networks: Reducing Preamble Transmissions and Transceiver State Switches

    NARCIS (Netherlands)

    van Hoesel, L.F.W.; Havinga, Paul J.M.

    2004-01-01

    In this paper, we present an energy-efficient medium access protocol designed for wireless sensor networks. Although the protocol uses TDMA to give nodes in the WSN the opportunity to communicate collision-free, the network is self-organizing in terms of time slot assignment and synchronization. The

  12. Packet Header Compression for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Pekka KOSKELA

    2016-01-01

    Full Text Available Due to the extensive growth of Internet of Things (IoT, the number of wireless devices connected to the Internet is forecasted to grow to 26 billion units installed in 2020. This will challenge both the energy efficiency of wireless battery powered devices and the bandwidth of wireless networks. One solution for both challenges could be to utilize packet header compression. This paper reviews different packet compression, and especially packet header compression, methods and studies the performance of Robust Header Compression (ROHC in low speed radio networks such as XBEE, and in high speed radio networks such as LTE and WLAN. In all networks, the compressing and decompressing processing causes extra delay and power consumption, but in low speed networks, energy can still be saved due to the shorter transmission time.

  13. Command and Control of Space Assets Through Internet-Based Technologies Demonstrated

    Science.gov (United States)

    Foltz, David A.

    2002-01-01

    The NASA Glenn Research Center successfully demonstrated a transmission-control-protocol/ Internet-protocol- (TCP/IP) based approach to the command and control of onorbit assets over a secure network. This is a significant accomplishment because future NASA missions will benefit by using Internet-standards-based protocols. Benefits of this Internet-based space command and control system architecture include reduced mission costs and increased mission efficiency. The demonstration proved that this communications architecture is viable for future NASA missions. This demonstration was a significant feat involving multiple NASA organizations and industry. Phillip Paulsen, from Glenn's Project Development and Integration Office, served as the overall project lead, and David Foltz, from Glenn's Satellite Networks and Architectures Branch, provided the hybrid networking support for the required Internet connections. The goal was to build a network that would emulate a connection between a space experiment on the International Space Station and a researcher accessing the experiment from anywhere on the Internet, as shown. The experiment was interfaced to a wireless 802.11 network inside the demonstration area. The wireless link provided connectivity to the Tracking and Data Relay Satellite System (TDRSS) Internet Link Terminal (TILT) satellite uplink terminal located 300 ft away in a parking lot on top of a panel van. TILT provided a crucial link in this demonstration. Leslie Ambrose, NASA Goddard Space Flight Center, provided the TILT/TDRSS support. The TILT unit transmitted the signal to TDRS 6 and was received at the White Sands Second TDRSS Ground Station. This station provided the gateway to the Internet. Coordination also took place at the White Sands station to install a Veridian Firewall and automated security incident measurement (ASIM) system to the Second TDRSS Ground Station Internet gateway. The firewall provides a trusted network for the simulated space

  14. Data converters for wireless standards

    CERN Document Server

    Shi, Chunlei

    2002-01-01

    Wireless communication is witnessing tremendous growth with proliferation of different standards covering wide, local and personal area networks (WAN, LAN and PAN). The trends call for designs that allow 1) smooth migration to future generations of wireless standards with higher data rates for multimedia applications, 2) convergence of wireless services allowing access to different standards from the same wireless device, 3) inter-continental roaming. This requires designs that work across multiple wireless standards, can easily be reused, achieve maximum hardware share at a minimum power consumption levels particularly for mobile battery-operated devices.

  15. General Data Acquisition Platform for Wireless Sensor Network Based on CC2538

    Directory of Open Access Journals (Sweden)

    Yang Zhi-Jun

    2017-01-01

    Full Text Available Wireless sensor networks are the hotspots of current research and have very wide application prospects. Its front end is a sensor that can sense and check the external world. This paper takes temperature and humidity as the research object, and builds a wireless sensor network data acquisition platform by combining the Internet of things and the WeChat public platform. The platform uses DHT11 temperature and humidity sensors and CC2538 sensor nodes to obtain the relevant data, through the server and database for data access. The combination with WeChat public platform not only allows us to view the temperature and humidity in the WeChat public, but also allows us to understand the environmental changes of the relevant detection area more conveniently and quickly. The effectiveness of the platform is also demonstrated by the collection of temperature and humidity data.

  16. Internet Access and Use among Students of Physical Education: A Study of Kurukshetra University, Kurukshetra

    Directory of Open Access Journals (Sweden)

    Kumar, Rajender

    2014-06-01

    Full Text Available This paper depicts a study conducted on the behavior of physical education students towards Internet usage at Kurukshetra University, Kurukshetra. Specially, the study aims to know the purposes for use of Internet resources and services, frequency of use, places and means of use, student's satisfaction level toward the Internet, and problems faced while using the Internet. A survey was carried out with a sample of 100 physical education students of Kurukshetra University and the response rate was 88%. A well-designed questionnaire was distributed to the students' sample. Amazingly, the results of the study reveal that usage of the Internet in research and education was not favored, whereas email, chatting, and sports websites were commonly used among students. The study also found that too much information on the Internet, slow access speeds, and finding relevant information were the main problems in using the Internet.

  17. Power Stabilization Strategy of Random Access Loads in Electric Vehicles Wireless Charging System at Traffic Lights

    Directory of Open Access Journals (Sweden)

    Linlin Tan

    2016-10-01

    Full Text Available An opportunity wireless charging system for electric vehicles when they stop and wait at traffic lights is proposed in this paper. In order to solve the serious power fluctuation caused by random access loads, this study presents a power stabilization strategy based on counting the number of electric vehicles in a designated area, including counting method, power source voltage adjustment strategy and choice of counting points. Firstly, the circuit model of a wireless power system with multi-loads is built and the equation of each load is obtained. Secondly, after the counting method of electric vehicles is stated, the voltage adjustment strategy, based on the number of electric vehicles when the system is at a steady state, is set out. Then, the counting points are chosen according to power curves when the voltage adjustment strategy is adopted. Finally, an experimental prototype is implemented to verify the power stabilization strategy. The experimental results show that, with the application of this strategy, the charging power is stabilized with the fluctuation of no more than 5% when loads access randomly.

  18. Access to and use of Internet by adolescents who have a physical disability: a comparative study.

    NARCIS (Netherlands)

    Lathouwers, K.A.M.; Moor, J.M.H. de; Didden, R.

    2009-01-01

    The purpose of this study was to examine access to and use of Internet by 97 physically disabled adolescents. Four main objectives were to: (1) explore frequency and nature of Internet use and the role of care givers, (2) compare these results with non-disabled adolescents, (3) explore associations

  19. Access to and use of Internet by adolescents who have a physical disability: A comparative study

    NARCIS (Netherlands)

    Lathouwers, K.A.M.; Moor, J.M.H. de; Didden, H.C.M.

    2009-01-01

    The purpose of this study was to examine access to and use of Internet by 97 physically disabled adolescents. Four main objectives were to: (1) explore frequency and nature of Internet use and the role of care givers, (2) compare these results with non-disabled adolescents, (3) explore associations

  20. Security analysis and improvements of authentication and access control in the Internet of Things.

    Science.gov (United States)

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  1. Development of a wireless protection against imitation system for identification and control of vehicle access

    Directory of Open Access Journals (Sweden)

    Aleksei A. Gavrishev

    2018-03-01

    Full Text Available This article deals with wireless systems for identification and control of vehicle access to protected objects. Known systems are considered. As a result, it has been established that one of the most promising approaches to identifying and controlling vehicle access to protected objects is the use of systems based on the "friend or foe" principle. Among these systems, there are "one-directional" and "bedirectional" identification and access control systems. "Bidirectional" systems are more preferable for questions of identification and access control. However, at present, these systems should have a reduced probability of recognizing the structure of the request and response signals because the potential attacker can easily perform unauthorized access to the radio channel of the system. On this basis, developed a wireless system identification and control vehicle access to protected objects based on the principle of "friend or foe", featuring increased protection from unauthorized access and jamming through the use of rewritable drives chaotic sequences. In addition, it’s proposed to use to identify the vehicle's RFID tag containing additional information about it. Are some specifications of the developed system (the possible frequency range of the request-response signals, the communication range, data rate, the size of the transmitted data, guidelines for choosing RFID. Also, with the help of fuzzy logic, was made the security assessment from unauthorized access request-response signals based on the system of "friend or foe", which are transferred via radio channel, developed systems and analogues. The security assessment of the developed system shows an adequate degree of protection against complex threats (view, spoofing, interception and jamming of traffic in comparison with known systems of this class. Among the main advantages of the developed system it’s necessary to mention increased security from unauthorized access and jamming

  2. Enabling the internet of things through energy harvesting : a circuit-aware system synthesis-oriented analysis approach

    OpenAIRE

    Gomez Cid-Fuentes, Raül

    2016-01-01

    Powering wireless sensors has become a key challenge to enable the Internet of Things vision. A common approach to achieve this is to use Energy Harvesting. By means of this technology, sensors have access to an unlimited source of energy, which can extend their operation lifetime. Unfortunately, typically the energy that is available surrounding the sensors is neither controllable nor predictable, showing significant variations in the expected harvested energy in terms of both space and t...

  3. Non-Orthogonal Multiple Access for Ubiquitous Wireless Sensor Networks.

    Science.gov (United States)

    Anwar, Asim; Seet, Boon-Chong; Ding, Zhiguo

    2018-02-08

    Ubiquitous wireless sensor networks (UWSNs) have become a critical technology for enabling smart cities and other ubiquitous monitoring applications. Their deployment, however, can be seriously hampered by the spectrum available to the sheer number of sensors for communication. To support the communication needs of UWSNs without requiring more spectrum resources, the power-domain non-orthogonal multiple access (NOMA) technique originally proposed for 5th Generation (5G) cellular networks is investigated for UWSNs for the first time in this paper. However, unlike 5G networks that operate in the licensed spectrum, UWSNs mostly operate in unlicensed spectrum where sensors also experience cross-technology interferences from other devices sharing the same spectrum. In this paper, we model the interferences from various sources at the sensors using stochastic geometry framework. To evaluate the performance, we derive a theorem and present new closed form expression for the outage probability of the sensors in a downlink scenario under interference limited environment. In addition, diversity analysis for the ordered NOMA users is performed. Based on the derived outage probability, we evaluate the average link throughput and energy consumption efficiency of NOMA against conventional orthogonal multiple access (OMA) technique in UWSNs. Further, the required computational complexity for the NOMA users is presented.

  4. Converged wireline and wireless signal transport over optical fibre access links

    DEFF Research Database (Denmark)

    Tafur Monroy, Idelfonso; Prince, Kamau; Osadchiy, Alexey Vladimirovich

    2009-01-01

    This article reviews emerging trends in converged optical-wireless communication systems and outline the role that photonic technologies are playing in making the vision of a wireline-wireless converged signal transport network a reality.......This article reviews emerging trends in converged optical-wireless communication systems and outline the role that photonic technologies are playing in making the vision of a wireline-wireless converged signal transport network a reality....

  5. Identity Establishment and Capability Based Access Control (IECAC) Scheme for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) become discretionary part of everyday life and could befall a threat if security is not considered before deployment. Authentication and access control in IoT is equally important to establish secure communication between devices. To protect IoT from man in middle, replay...... and denial of service attacks, the concept of capability for access control is introduced. This paper presents Identity establishment and capability based access control (IECAC) protocol using ECC (Elliptical Curve Cryptography) for IoT along with protocol evaluation, which protect against the aforementioned...

  6. Wireless IP and building the mobile Internet

    National Research Council Canada - National Science Library

    Dixit, Sudhir; Prasad, Ramjee

    2003-01-01

    ..., as well as the shortage of technical material in a single place in the field of wireless IP and closely related technologies that form the critical success factors. Therefore, we decided to invite the experts who are truly active in the field: the equipment manufacturers, mobile operators, and those working in research laboratories and unive...

  7. Minimum Interference Channel Assignment Algorithm for Multicast in a Wireless Mesh Network

    Directory of Open Access Journals (Sweden)

    Sangil Choi

    2016-12-01

    Full Text Available Wireless mesh networks (WMNs have been considered as one of the key technologies for the configuration of wireless machines since they emerged. In a WMN, wireless routers provide multi-hop wireless connectivity between hosts in the network and also allow them to access the Internet via gateway devices. Wireless routers are typically equipped with multiple radios operating on different channels to increase network throughput. Multicast is a form of communication that delivers data from a source to a set of destinations simultaneously. It is used in a number of applications, such as distributed games, distance education, and video conferencing. In this study, we address a channel assignment problem for multicast in multi-radio multi-channel WMNs. In a multi-radio multi-channel WMN, two nearby nodes will interfere with each other and cause a throughput decrease when they transmit on the same channel. Thus, an important goal for multicast channel assignment is to reduce the interference among networked devices. We have developed a minimum interference channel assignment (MICA algorithm for multicast that accurately models the interference relationship between pairs of multicast tree nodes using the concept of the interference factor and assigns channels to tree nodes to minimize interference within the multicast tree. Simulation results show that MICA achieves higher throughput and lower end-to-end packet delay compared with an existing channel assignment algorithm named multi-channel multicast (MCM. In addition, MICA achieves much lower throughput variation among the destination nodes than MCM.

  8. Wireless Integrated Microelectronic Vacuum Sensor System

    Science.gov (United States)

    Krug, Eric; Philpot, Brian; Trott, Aaron; Lawrence, Shaun

    2013-01-01

    -gauge measurements automatically and wirelessly, in near-real time - using a low-maintenance, lowpower sensor mesh network. The WIMVSS operates by using a self-configuring mesh network of wireless sensor units. Mesh networking is a type of networking where each sensor or node can capture and disseminate its own data, but also serve as a relay to receive and transmit data from other sensors. Each sensor node can synchronize with adjacent sensors, and propagate data from one sensor to the next, until the destination is reached. In this case, the destination is a Network Interface Unit (NIU). The WIMVSS sensors are mounted on the existing vacuum gauges. Information gathered by the sensors is sent to the NIU. Because of the mesh networking, if a sensor cannot directly send the data to the NIU, it can be propagated through the network of sensors. The NIU requires antenna access to the sensor units, AC power, and an Ethernet connection. The NIU bridges the sensor network to a WIMVSS server via an Ethernet connection. The server is configured with a database, a Web server, and proprietary interface software that makes it possible for the vacuum measurements from vacuum jacketed fluid lines to be saved, retrieved, and then displayed from any Web-enabled PC that has access to the Internet. Authorized users can then simply access the data from any PC with Internet connection. Commands can also be sent directly from the Web interface for control and maintenance of the sensor network. The technology enabled by the WIMVSS decreases labor required for gathering vacuum measurements, increases access to vacuum data by making it available on any computer with access to the Internet, increases the frequency with which data points can be acquired for evaluating the system, and decreases the recurring cost of the sensors by using off-the-shelf components and integrating these with heritage vacuum gauges.

  9. Advanced Signal Processing for Wireless Multimedia Communications

    Directory of Open Access Journals (Sweden)

    Xiaodong Wang

    2000-01-01

    Full Text Available There is at present a worldwide effort to develop next-generation wireless communication systems. It is envisioned that many of the future wireless systems will incorporate considerable signal-processing intelligence in order to provide advanced services such as multimedia transmission. In general, wireless channels can be very hostile media through which to communicate, due to substantial physical impediments, primarily radio-frequency interference and time-arying nature of the channel. The need of providing universal wireless access at high data-rate (which is the aim of many merging wireless applications presents a major technical challenge, and meeting this challenge necessitates the development of advanced signal processing techniques for multiple-access communications in non-stationary interference-rich environments. In this paper, we present some key advanced signal processing methodologies that have been developed in recent years for interference suppression in wireless networks. We will focus primarily on the problem of jointly suppressing multiple-access interference (MAI and intersymbol interference (ISI, which are the limiting sources of interference for the high data-rate wireless systems being proposed for many emerging application areas, such as wireless multimedia. We first present a signal subspace approach to blind joint suppression of MAI and ISI. We then discuss a powerful iterative technique for joint interference suppression and decoding, so-called Turbo multiuser detection, that is especially useful for wireless multimedia packet communications. We also discuss space-time processing methods that employ multiple antennas for interference rejection and signal enhancement. Finally, we touch briefly on the problems of suppressing narrowband interference and impulsive ambient noise, two other sources of radio-frequency interference present in wireless multimedia networks.

  10. Latency and Jitter Analysis for IEEE 802.11e Wireless LANs

    Directory of Open Access Journals (Sweden)

    Sungkwan Youm

    2013-01-01

    Full Text Available This paper presents a numerical analysis of latency and jitter for IEEE 802.11e wireless local area networks (WLANs in a saturation condition, by using a Markov model. We use this model to explicate how the enhanced distributed coordination function (EDCF differentiates classes of service and to characterize the probability distribution of the medium access control (MAC layer packet latency and jitter, on which the quality of the voice over Internet protocol (VoIP calls is dependent. From the proposed analytic model, we can estimate the available number of nodes determining the system performance, in order to satisfy user demands on the latency and jitter.

  11. Global Market Access in the Internet Era: South Africa's Wood Furniture Industry.

    Science.gov (United States)

    Moodley, Sagren

    2002-01-01

    Explores the link between Internet connectivity and access to global markets, and uses the South African wood furniture producers as they are integrated into global value chains and exposed to the demands of more sophisticated markets. Articulates policy recommendations to promote greater diffusion of e-commerce technologies in the wood furniture…

  12. Comparison of Broadband Wireless Access Technology for HAPS Communication

    Directory of Open Access Journals (Sweden)

    Mingxiang GUAN

    2014-03-01

    Full Text Available An information system formed by HAP (High Altitude Platform will be a new generation-system for the wireless communications and HAPS (HAP Station communication system combines the advantages of both terrestrial and satellite communication systems and avoids, to different extents, their disadvantages. Third generation (3G mobile technology which is specified by the third generation partnership project (3 GPP is definitely one of the candidates. With the success of wireless network, the IEEE 802.16 standard, with its wireless metropolitan area network (MAN air interface appears to be a strong competitor. We provide initial practical comparison of these two technologies for HAPS Communication.

  13. QoS Differentiated and Fair Packet Scheduling in Broadband Wireless Access Networks

    Directory of Open Access Journals (Sweden)

    Zhang Yan

    2009-01-01

    Full Text Available This paper studies the packet scheduling problem in Broadband Wireless Access (BWA networks. The key difficulties of the BWA scheduling problem lie in the high variability of wireless channel capacity and the unknown model of packet arrival process. It is difficult for traditional heuristic scheduling algorithms to handle the situation and guarantee satisfying performance in BWA networks. In this paper, we introduce learning-based approach for a better solution. Specifically, we formulate the packet scheduling problem as an average cost Semi-Markov Decision Process (SMDP. Then, we solve the SMDP by using reinforcement learning. A feature-based linear approximation and the Temporal-Difference learning technique are employed to produce a near optimal solution of the corresponding SMDP problem. The proposed algorithm, called Reinforcement Learning Scheduling (RLS, has in-built capability of self-training. It is able to adaptively and timely regulate its scheduling policy according to the instantaneous network conditions. Simulation results indicate that RLS outperforms two classical scheduling algorithms and simultaneously considers: (i effective QoS differentiation, (ii high bandwidth utilization, and (iii both short-term and long-term fairness.

  14. Energy-aware Wireless Multi-hop Networks

    NARCIS (Netherlands)

    Vazifehdan, J.

    2011-01-01

    Wireless networks have provided us a variety of services which facilitate communication between people beyond the physical boundaries. Mobile telephony, mobile Internet and high-deffnition video calls are examples of services supported by modern networks nowadays. Beyond this, enhancements in

  15. The Prospects of Ultra-Broadband THz Wireless Communications

    DEFF Research Database (Denmark)

    Yu, Xianbin; Chen, Ying; Galili, Michael

    2014-01-01

    Wireless communications have entered into a path towards Terabit era, to accommodate the increasing demands on fast wireless access, e.g. huge data file transferring and fast mobile data access. Terahertz (THz) technology is considered feasible to carry ultrafast data signals, as it offers up...... to a few THz bandwidths. This paper overviews the prospects of Tbit/s wireless data rate and their potential applications. Technically, this talk reviews the key technologies and challenges to achieve an ultrafast wireless system operating in the THz frequency band, from viewpoint of communication......, in terms of ultrafast THz generation/THz detection and link power budget....

  16. [Exploration of the design of media access control layer of wireless body area network for medical healthcare].

    Science.gov (United States)

    Liu, Xuemei; Ge, Baofeng

    2012-04-01

    This paper proposes a media access control (MAC) layer design for wireless body area network (WBAN) systems. WBAN is a technology that targets for wireless networking of wearable and implantable body sensors which monitor vital body signs, such as heart-rate, body temperature, blood pressure, etc. It has been receiving attentions from international organizations, e. g. the Institute of Electrical and Electronics Engineers (IEEE), due to its capability of providing efficient healthcare services and clinical management. This paper reviews the standardization procedure of WBAN and summarizes the challenge of the MAC layer design. It also discusses the methods of improving power consumption performance, which is one of the major issues of WBAN systems.

  17. e-Portfolios for Learning and Development: without constant internet or electrical grid access

    NARCIS (Netherlands)

    Casey, John; Calverley, Gayle; Greller, Wolfgang; Uhomoibhi, James

    2011-01-01

    Casey, J., Calverley, G., Greller, W., & Uhomoibhi, J. (2010, 26-28 May). e-Portfolios for Learning and Development: without constant internet or electrical grid access. Presentation at the 5th International Conference on ICT for Development, Education, and Training - eLearning Africa, Lusaka,

  18. Simulations of Large-scale WiFi-based Wireless Networks: Interdisciplinary Challenges and Applications

    OpenAIRE

    Nekovee, Maziar

    2008-01-01

    Wireless Fidelity (WiFi) is the fastest growing wireless technology to date. In addition to providing wire-free connectivity to the Internet WiFi technology also enables mobile devices to connect directly to each other and form highly dynamic wireless adhoc networks. Such distributed networks can be used to perform cooperative communication tasks such ad data routing and information dissemination in the absence of a fixed infrastructure. Furthermore, adhoc grids composed of wirelessly network...

  19. Patient access to complex chronic disease records on the Internet

    Directory of Open Access Journals (Sweden)

    Bartlett Cherry

    2012-08-01

    Full Text Available Abstract Background Access to medical records on the Internet has been reported to be acceptable and popular with patients, although most published evaluations have been of primary care or office-based practice. We tested the feasibility and acceptability of making unscreened results and data from a complex chronic disease pathway (renal medicine available to patients over the Internet in a project involving more than half of renal units in the UK. Methods Content and presentation of the Renal PatientView (RPV system was developed with patient groups. It was designed to receive information from multiple local information systems and to require minimal extra work in units. After piloting in 4 centres in 2005 it was made available more widely. Opinions were sought from both patients who enrolled and from those who did not in a paper survey, and from staff in an electronic survey. Anonymous data on enrolments and usage were extracted from the webserver. Results By mid 2011 over 17,000 patients from 47 of the 75 renal units in the UK had registered. Users had a wide age range (90 yrs but were younger and had more years of education than non-users. They were enthusiastic about the concept, found it easy to use, and 80% felt it gave them a better understanding of their disease. The most common reason for not enrolling was being unaware of the system. A minority of patients had security concerns, and these were reduced after enrolling. Staff responses were also strongly positive. They reported that it aided patient concordance and disease management, and increased the quality of consultations with a neutral effect on consultation length. Neither patient nor staff responses suggested that RPV led to an overall increase in patient anxiety or to an increased burden on renal units beyond the time required to enrol each patient. Conclusions Patient Internet access to secondary care records concerning a complex chronic disease is feasible and popular

  20. Patient access to complex chronic disease records on the Internet.

    Science.gov (United States)

    Bartlett, Cherry; Simpson, Keith; Turner, A Neil

    2012-08-06

    Access to medical records on the Internet has been reported to be acceptable and popular with patients, although most published evaluations have been of primary care or office-based practice. We tested the feasibility and acceptability of making unscreened results and data from a complex chronic disease pathway (renal medicine) available to patients over the Internet in a project involving more than half of renal units in the UK. Content and presentation of the Renal PatientView (RPV) system was developed with patient groups. It was designed to receive information from multiple local information systems and to require minimal extra work in units. After piloting in 4 centres in 2005 it was made available more widely. Opinions were sought from both patients who enrolled and from those who did not in a paper survey, and from staff in an electronic survey. Anonymous data on enrollment and usage were extracted from the webserver. By mid 2011 over 17,000 patients from 47 of the 75 renal units in the UK had registered. Users had a wide age range (90 yrs) but were younger and had more years of education than non-users. They were enthusiastic about the concept, found it easy to use, and 80% felt it gave them a better understanding of their disease. The most common reason for not enrolling was being unaware of the system. A minority of patients had security concerns, and these were reduced after enrolling. Staff responses were also strongly positive. They reported that it aided patient concordance and disease management, and increased the quality of consultations with a neutral effect on consultation length. Neither patient nor staff responses suggested that RPV led to an overall increase in patient anxiety or to an increased burden on renal units beyond the time required to enroll each patient. Patient Internet access to secondary care records concerning a complex chronic disease is feasible and popular, providing an increased sense of empowerment and understanding, with no

  1. Reducing Exposure to Radiofrequency Electromagnetic Fields from Wireless Networking with Laptop Computers

    OpenAIRE

    Koppel, T; Ahonen, M; Vilcāne, I

    2014-01-01

    Mobile modems are used with laptops to connect Internet wirelessly. Recently several organisations, including the WHO IARC and the European Union have emphasised health risk-management practices related to wireless devices. We present here radio frequency (RF) power density measurements when a wireless modem is 30 cm, 1 m and 5 m from a user. Our results indicate that by using a USB cable and adding distance between a user and a wireless modem, there is a substantial reduction of exposure. Ad...

  2. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    Science.gov (United States)

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  3. Optimal Pricing Strategy for Wireless Social Community Networks

    OpenAIRE

    Mazloumian, Amin; Manshaei, Mohammad Hossein; Felegyhazi, Mark; Hubaux, Jean-Pierre

    2008-01-01

    The increasing number of mobile applications fuels the demand for affordable and ubiquitous wireless access. The traditional wireless network technologies such as EV-DO or WiMAX provide this service but require a huge upfront investment in infrastructure and spectrum. On the contrary, as they do not have to face such an investment, social community operators rely on subscribers who constitute a community of users. The pricing strategy of the provided wireless access is an open problem for thi...

  4. Providing Internet Access to the Ohio Career Information System for All Residents: A Feasibility Study.

    Science.gov (United States)

    Lewis, Morgan V.

    Expanded Internet access to the Ohio Career Information System (OCIS) would provide adults in Ohio who need to or wish to make career changes with the best available information about occupations, education and training programs, and financial aid. In order to determine the feasibility of improving access without cost to users, an advisory group,…

  5. A Federated Capability-based Access Control Mechanism for Internet of Things (IoTs)

    OpenAIRE

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-01-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, l...

  6. High accessible experimental information on CPD experiment

    Energy Technology Data Exchange (ETDEWEB)

    Hasegawa, M. [RIAM, Kyushu University, Kasuga, Fukuoka 816-8580 (Japan)], E-mail: hasegawa@triam.kyushu-u.ac.jp; Nakamura, K.; Higashijima, A.; Kawasaki, S.; Nakashima, H.; Sato, K.N.; Zushi, H.; Hanada, K.; Sakamoto, M.; Idei, H. [RIAM, Kyushu University, Kasuga, Fukuoka 816-8580 (Japan)

    2008-04-15

    On CPD [1] (Compact PWI experimental Device) experiment, information of electronic logbook and sequence status are distributed by Web services to prepare future experimental environment such as steady state operation and remote participation. Hence, all the researchers can acquire information with a Web browser installed on a personal computer if they are connected to the Internet. However, to carry a notebook computer all the time is a burden to researchers. Furthermore, the researchers may not be always connected to the Internet. Mobile phones are superior in portability compared to notebook computers, and are easy to connect with Internet through the wireless network of the telecom carriers. Moreover, since recent mobile phones have full browsing function, their affinities to the Web services are becoming high. On this account, Web services for mobile phones are developed to access experimental information. For sequence monitoring, a mobile application MIDlet that utilizes special functions of mobile phone such as sound and vibration is also developed to draw attentions of researchers to sequence status.

  7. High accessible experimental information on CPD experiment

    International Nuclear Information System (INIS)

    Hasegawa, M.; Nakamura, K.; Higashijima, A.; Kawasaki, S.; Nakashima, H.; Sato, K.N.; Zushi, H.; Hanada, K.; Sakamoto, M.; Idei, H.

    2008-01-01

    On CPD [1] (Compact PWI experimental Device) experiment, information of electronic logbook and sequence status are distributed by Web services to prepare future experimental environment such as steady state operation and remote participation. Hence, all the researchers can acquire information with a Web browser installed on a personal computer if they are connected to the Internet. However, to carry a notebook computer all the time is a burden to researchers. Furthermore, the researchers may not be always connected to the Internet. Mobile phones are superior in portability compared to notebook computers, and are easy to connect with Internet through the wireless network of the telecom carriers. Moreover, since recent mobile phones have full browsing function, their affinities to the Web services are becoming high. On this account, Web services for mobile phones are developed to access experimental information. For sequence monitoring, a mobile application MIDlet that utilizes special functions of mobile phone such as sound and vibration is also developed to draw attentions of researchers to sequence status

  8. MANETS and Internet of Things: The Development of a Data Routing Algorithm

    OpenAIRE

    Alameri, I. A.

    2018-01-01

    Internet of things (IoT), is an innovative technology which allows the connection of physical things with the digital world through the use of heterogeneous networks and communication technologies. IoT in smart environments interacts with wireless sensor network (WSN) and mobile ad‐hoc network (MANET), becoming even more attractive and economically successful. Interaction between wireless sensor and mobile ad‐hoc networks with the internet of things allows the creation of a new MANET‐IoT syst...

  9. Mobile internet technologies and their application to intelligent transportation systems

    Science.gov (United States)

    2003-01-01

    The worlds of mobile communication and the Internet are rapidly converging. This new domain, which is being touted as the "Wireless Web" or "Mobile Internet", is in its infancy and will require a number of complex technologies to mature and converge ...

  10. Internet accessible hot cell with gamma spectroscopy at the Missouri S and T nuclear reactor

    Energy Technology Data Exchange (ETDEWEB)

    Grant, Edwin [Nuclear Engineering, Missouri University of Science and Technology, 203 Fulton Hall, 300 W. 13th St., Rolla, MO 65409 (United States); Mueller, Gary, E-mail: gmueller@mst.edu [Nuclear Engineering, Missouri University of Science and Technology, 203 Fulton Hall, 300 W. 13th St., Rolla, MO 65409 (United States); Castano, Carlos; Usman, Shoaib; Kumar, Arvind [Nuclear Engineering, Missouri University of Science and Technology, 203 Fulton Hall, 300 W. 13th St., Rolla, MO 65409 (United States)

    2011-08-15

    Highlights: > A dual-chambered internet-accessible heavily shielded facility has been built. > The facility allows distance users to analyze neutron irradiated samples remotely. > The Missouri S and T system uses computer automation with user feedback. > The system can analyze multiple samples and assist several researchers concurrently. - Abstract: A dual-chambered internet-accessible heavily shielded facility with pneumatic access to the University of Missouri Science and Technology (Missouri S and T) 200 kW Research Nuclear Reactor (MSTR) core has been built and is currently available for irradiation and analysis of samples. The facility allows authorized distance users engaged in collaborative activities with Missouri S and T to remotely manipulate and analyze neutron irradiated samples. The system consists of two shielded compartments, one for multiple sample storage, and the other dedicated exclusively for radiation measurements and spectroscopy. The second chamber has multiple detector ports, with graded shielding, and has the capability to support gamma spectroscopy using radiation detectors such as an HPGe detector. Both these chambers are connected though a rapid pneumatic system with access to the MSTR nuclear reactor core. This new internet-based system complements the MSTR's current bare pneumatic tube (BPT) and cadmium lined pneumatic tube (CPT) facilities. The total transportation time between the core and the hot cell, for samples weighing 10 g, irradiated in the MSTR core, is roughly 3.0 s. This work was funded by the DOE grant number DE-FG07-07ID14852 and expands the capabilities of teaching and research at the MSTR. It allows individuals who do not have on-site access to a nuclear reactor facility to remotely participate in research and educational activities.

  11. Internet accessible hot cell with gamma spectroscopy at the Missouri S and T nuclear reactor

    International Nuclear Information System (INIS)

    Grant, Edwin; Mueller, Gary; Castano, Carlos; Usman, Shoaib; Kumar, Arvind

    2011-01-01

    Highlights: → A dual-chambered internet-accessible heavily shielded facility has been built. → The facility allows distance users to analyze neutron irradiated samples remotely. → The Missouri S and T system uses computer automation with user feedback. → The system can analyze multiple samples and assist several researchers concurrently. - Abstract: A dual-chambered internet-accessible heavily shielded facility with pneumatic access to the University of Missouri Science and Technology (Missouri S and T) 200 kW Research Nuclear Reactor (MSTR) core has been built and is currently available for irradiation and analysis of samples. The facility allows authorized distance users engaged in collaborative activities with Missouri S and T to remotely manipulate and analyze neutron irradiated samples. The system consists of two shielded compartments, one for multiple sample storage, and the other dedicated exclusively for radiation measurements and spectroscopy. The second chamber has multiple detector ports, with graded shielding, and has the capability to support gamma spectroscopy using radiation detectors such as an HPGe detector. Both these chambers are connected though a rapid pneumatic system with access to the MSTR nuclear reactor core. This new internet-based system complements the MSTR's current bare pneumatic tube (BPT) and cadmium lined pneumatic tube (CPT) facilities. The total transportation time between the core and the hot cell, for samples weighing 10 g, irradiated in the MSTR core, is roughly 3.0 s. This work was funded by the DOE grant number DE-FG07-07ID14852 and expands the capabilities of teaching and research at the MSTR. It allows individuals who do not have on-site access to a nuclear reactor facility to remotely participate in research and educational activities.

  12. Building a sustainable research & HCD eco-system: Case study of two wireless communication eco systems

    CSIR Research Space (South Africa)

    Mekuria, F

    2013-05-01

    Full Text Available Sensor Networks (M2M, Energy Efficient & Smart Adhoc Sensor Networks) (Emerging) Energy & Spectrum Efficient Wireless Mesh Network (Existing) Next Generation Wireless Networking (e.g. White Spaces, Femto-cells, Cellular ± 4G, LTE, WiMAX) (Co... applications, M2M and the Internet of Things, (3) wireless cognitive radio network laboratory for spectrum and energy efficient network development, (4) Future wireless cellular networking research with MIMO based LTE applications. The wireless mesh...

  13. Identity driven Capability based Access Control (ICAC) Scheme for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) becomes discretionary part of everyday life. Scalability and manageability is daunting due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is equally important to establish secure communication between multiple...... devices and services. In this paper, the concept of capability for access control is introduced where the identities of the involved devices are entrenched in the access capabilities. Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related...... to complexity and dynamics of device identities. ICAC is implemented for 802.11 and results shows that ICAC has less scalability issues and better performance analysis compared with other access control schemes. The ICAC evaluation by using security protocol verification tool shows that ICAC is secure against...

  14. Providing India with Internet access anywhere there is electricity - and Canada with commercial opportunity

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2010-07-01

    Access to high-speed Internet service is booming all over the world but the cost of optic cable installation and other related broadband delivery technology is still too high for many developing countries to afford. A Canada-India R & D group is working on a broadband technology delivered over the power line in order to provide internet access wherever there is electricity. Moreover, the application of such a technology in rural India could also improve the distribution and management of India's national electrical grid, as the risk of electricity theft can be monitored by power assumption tracking. Since the required infrastructure is already in place across the country, this project could be deployed rapidly and in a cost-efficient manner, providing thousands of potential opportunities for rural dwellers as well as for Indian and international companies.

  15. Worm epidemics in wireless ad hoc networks

    Energy Technology Data Exchange (ETDEWEB)

    Nekovee, Maziar [BT Research, Polaris 134, Adastral Park, Martlesham, Suffolk IP5 3RE (United Kingdom); Centre for Computational Science, University College London, 20 Gordon Street, London WC1H 0AJ (United Kingdom)

    2007-06-15

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet.

  16. Worm epidemics in wireless ad hoc networks

    Science.gov (United States)

    Nekovee, Maziar

    2007-06-01

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet.

  17. Worm epidemics in wireless ad hoc networks

    International Nuclear Information System (INIS)

    Nekovee, Maziar

    2007-01-01

    A dramatic increase in the number of computing devices with wireless communication capability has resulted in the emergence of a new class of computer worms which specifically target such devices. The most striking feature of these worms is that they do not require Internet connectivity for their propagation but can spread directly from device to device using a short-range radio communication technology, such as WiFi or Bluetooth. In this paper, we develop a new model for epidemic spreading of these worms and investigate their spreading in wireless ad hoc networks via extensive Monte Carlo simulations. Our studies show that the threshold behaviour and dynamics of worm epidemics in these networks are greatly affected by a combination of spatial and temporal correlations which characterize these networks, and are significantly different from the previously studied epidemics in the Internet

  18. Quality of Recovery Evaluation of the Protection Schemes for Fiber-Wireless Access Networks

    Science.gov (United States)

    Fu, Minglei; Chai, Zhicheng; Le, Zichun

    2016-03-01

    With the rapid development of fiber-wireless (FiWi) access network, the protection schemes have got more and more attention due to the risk of huge data loss when failures occur. However, there are few studies on the performance evaluation of the FiWi protection schemes by the unified evaluation criterion. In this paper, quality of recovery (QoR) method was adopted to evaluate the performance of three typical protection schemes (MPMC scheme, OBOF scheme and RPMF scheme) against the segment-level failure in FiWi access network. The QoR models of the three schemes were derived in terms of availability, quality of backup path, recovery time and redundancy. To compare the performance of the three protection schemes comprehensively, five different classes of network services such as emergency service, prioritized elastic service, conversational service, etc. were utilized by means of assigning different QoR weights. Simulation results showed that, for the most service cases, RPMF scheme was proved to be the best solution to enhance the survivability when planning the FiWi access network.

  19. Internet Information-Seeking and Its Relation to Support for Access to Government Records

    Science.gov (United States)

    Cuillier, David; Piotrowski, Suzanne J.

    2009-01-01

    Public access to government records is essential for democratic self-governance, and attitudes toward that right can facilitate or hinder public policy regarding transparency. As more people use the internet for gathering information about their governments and communities, it is unknown whether such online information-seeking is related to…

  20. Wireless local area network for the dental office.

    Science.gov (United States)

    Mupparapu, Muralidhar

    2004-01-01

    Dental offices are no exception to the implementation of new and advanced technology, especially if it enhances productivity. In a rapidly transforming digital world, wireless technology has a special place, as it has truly "retired the wire" and contributed to the ease and efficient access to patient data and other software-based applications for diagnosis and treatment. If the office or the clinic is networked, access to patient management software, imaging software and treatment planning tools is enhanced. Access will be further enhanced and unrestricted if the entire network is wireless. As with any new, emerging technology, there will be issues that should be kept in mind before adapting to the wireless environment. Foremost is the network security involved in the installation and use of these wireless networks. This short, technical manuscript deals with standards and choices in wireless technology currently available for implementation within a dental office. The benefits of each network security protocol available to protect patient data and boost the efficiency of a modern dental office are discussed.

  1. Impact of the Digital Divide on Computer Use and Internet Access on the Poor in Nigeria

    Science.gov (United States)

    Tayo, Omolara; Thompson, Randall; Thompson, Elizabeth

    2016-01-01

    We recruited 20 community members in Ido Local Government Area, Oyo state and Yewa Local Government Area, Ogun state in Nigeria to explore experiences and perceptions of Internet access and computer use. Face-to-face interviews were conducted using open-ended questions to collect qualitative data regarding accessibility of information and…

  2. The influence of the digital divide on face preferences in El Salvador: people without internet access prefer more feminine men, more masculine women, and women with higher adiposity.

    Directory of Open Access Journals (Sweden)

    Carlota Batres

    Full Text Available Previous studies on face preferences have found that online and laboratory experiments yield similar results with samples from developed countries, where the majority of the population has internet access. No study has yet explored whether the same holds true in developing countries, where the majority of the population does not have internet access. This gap in the literature has become increasingly important given that several online studies are now using cross-country comparisons. We therefore sought to determine if an online sample is representative of the population in the developing country of El Salvador. In studies of Hispanic men and women aged 18-25, we tested facial masculinity and adiposity preferences by collecting data in person as well as online. Our results showed that there were no differences in preferences between people who reported having internet access, whether they were tested online or in person. This provides evidence that testing style does not bias preferences among the same population. On the other hand, our results showed multiple differences in preferences between people who reported having internet access and people who reported not having internet access. More specifically, we found that people without internet access preferred more feminine men, more masculine women, and women with higher adiposity than people with internet access. We also found that people without internet access had fewer resources (e.g. running water than people with internet access, suggesting that harshness in the environment may be influencing face preferences. These findings suggest that online studies may provide a distorted perspective of the populations in developing countries.

  3. The influence of the digital divide on face preferences in El Salvador: people without internet access prefer more feminine men, more masculine women, and women with higher adiposity.

    Science.gov (United States)

    Batres, Carlota; Perrett, David I

    2014-01-01

    Previous studies on face preferences have found that online and laboratory experiments yield similar results with samples from developed countries, where the majority of the population has internet access. No study has yet explored whether the same holds true in developing countries, where the majority of the population does not have internet access. This gap in the literature has become increasingly important given that several online studies are now using cross-country comparisons. We therefore sought to determine if an online sample is representative of the population in the developing country of El Salvador. In studies of Hispanic men and women aged 18-25, we tested facial masculinity and adiposity preferences by collecting data in person as well as online. Our results showed that there were no differences in preferences between people who reported having internet access, whether they were tested online or in person. This provides evidence that testing style does not bias preferences among the same population. On the other hand, our results showed multiple differences in preferences between people who reported having internet access and people who reported not having internet access. More specifically, we found that people without internet access preferred more feminine men, more masculine women, and women with higher adiposity than people with internet access. We also found that people without internet access had fewer resources (e.g. running water) than people with internet access, suggesting that harshness in the environment may be influencing face preferences. These findings suggest that online studies may provide a distorted perspective of the populations in developing countries.

  4. Shed a light of wireless technology on portable mobile design of NIRS

    Science.gov (United States)

    Sun, Yunlong; Li, Ting

    2016-03-01

    Mobile internet is growing rapidly driven by high-tech companies including the popular Apple and Google. The wireless mini-NIRS is believed to deserve a great spread future, while there is sparse report on wireless NIRS device and even for the reported wireless NIRS, its wireless design is scarcely presented. Here we focused on the wireless design of NIRS devices. The widely-used wireless communication standards and wireless communication typical solutions were employed into our NIRS design and then compared on communication efficiency, distance, error rate, low-cost, power consumption, and stabilities, based on the requirements of NIRS applications. The properly-performed wireless communication methods matched with the characteristics of NIRS are picked out. Finally, we realized one recommended wireless communication in our NIRS, developed a test platform on wireless NIRS and tested the full properties on wireless communication. This study elaborated the wireless communication methods specified for NIRS and suggested one implementation with one example fully illustrated, which support the future mobile design on NIRS devices.

  5. The study and implementation of the wireless network data security model

    Science.gov (United States)

    Lin, Haifeng

    2013-03-01

    In recent years, the rapid development of Internet technology and the advent of information age, people are increasing the strong demand for the information products and the market for information technology. Particularly, the network security requirements have become more sophisticated. This paper analyzes the wireless network in the data security vulnerabilities. And a list of wireless networks in the framework is the serious defects with the related problems. It has proposed the virtual private network technology and wireless network security defense structure; and it also given the wireless networks and related network intrusion detection model for the detection strategies.

  6. Consumer access to health information on the internet: health policy implications.

    Science.gov (United States)

    Scott, W Guy; Scott, Helen M; Auld, Terry S

    2005-06-28

    Providers of health care usually have much better information about health and health care interventions than do consumers. The internet is an important and rapidly evolving source of global health-related information and could provide a means of correcting for asymmetric information. However, little is known about who accesses this information and how it is used in New Zealand. The aims of this research were to: determine the nature of the health information sought, how respondents use the information, how helpful they perceive the information to be, and the self-assessed value of such information. The researchers conducted an anonymous five minute telephone and mall intercept survey of randomly selected Wellington residents who had searched for health-related information on the internet. Investigators entered the data into an Excel spreadsheet and transferred it to SPSS for data cleaning, data exploration and statistical analysis. Search time costs were based on the opportunity cost of income foregone and respondents were asked to provide a money value for the information found. Eighty-three percent of respondents accessed the internet from home, and 87% conducted the search for themselves. Forty-five percent of people were looking for general health and nutrition information, 42% for data about a specific illness and 40% for a medicine. After finding the information, 58% discussed it with a family member/friend/workmate, 36% consulted a general practitioner, 33% changed their eating or drinking habits, and 13% did nothing. Respondents found the information very quick to find and useful. It took them on average 0.47 hours and cost $12 (opportunity cost of time) to find the information. The average value of the data found was $60 and the net benefit to the consumer was $48 ($60 - $12). The results of this research could assist providers of health information via the internet to tailor their websites to better suit users' needs. Given the high perceived value of

  7. European Research towards Future Wireless Communications

    DEFF Research Database (Denmark)

    Frederiksen, Flemming Bjerge; Prasad, Ramjee; Pedersen, Gert Frølund

    2005-01-01

    This paper presents an overview of four on-going European research projects in the field of mobile and wireless communications leading to the next generations of wireless communications. The projects started in 2004. They investigate requirements and definition of access technology, network...

  8. Strategies for P2P connectivity in reconfigurable converged wired/wireless access networks.

    Science.gov (United States)

    Puerto, Gustavo; Mora, José; Ortega, Beatriz; Capmany, José

    2010-12-06

    This paper presents different strategies to define the architecture of a Radio-Over-Fiber (RoF) Access networks enabling Peer-to-Peer (P2P) functionalities. The architectures fully exploit the flexibility of a wavelength router based on the feedback configuration of an Arrayed Waveguide Grating (AWG) and an optical switch to broadcast P2P services among diverse infrastructures featuring dynamic channel allocation and enabling an optical platform for 3G and beyond wireless backhaul requirements. The first architecture incorporates a tunable laser to generate a dedicated wavelength for P2P purposes and the second architecture takes advantage of reused wavelengths to enable the P2P connectivity among Optical Network Units (ONUs) or Base Stations (BS). While these two approaches allow the P2P connectivity in a one at a time basis (1:1), the third architecture enables the broadcasting of P2P sessions among different ONUs or BSs at the same time (1:M). Experimental assessment of the proposed architecture shows approximately 0.6% Error Vector Magnitude (EVM) degradation for wireless services and 1 dB penalty in average for 1 x 10(-12) Bit Error Rate (BER) for wired baseband services.

  9. Wireless Data Acquisition of Transient Signals for Mobile Spectrometry Applications.

    Science.gov (United States)

    Trzcinski, Peter; Weagant, Scott; Karanassios, Vassili

    2016-05-01

    Wireless data acquisition using smartphones or handhelds offers increased mobility, it provides reduced size and weight, it has low electrical power requirements, and (in some cases) it has an ability to access the internet. Thus, it is well suited for mobile spectrometry applications using miniaturized, field-portable spectrometers, or detectors for chemical analysis in the field (i.e., on-site). There are four main wireless communications standards that can be used for wireless data acquisition, namely ZigBee, Bluetooth, Wi-Fi, and UWB (ultra-wide band). These are briefly reviewed and are evaluated for applicability to data acquisition of transient signals (i.e., time-domain) in the field (i.e., on-site) from a miniaturized, field-portable photomultiplier tube detector and from a photodiode array detector installed in a miniaturized, field-portable fiber optic spectrometer. These are two of the most widely used detectors for optical measurements in the ultraviolet-visible range of the spectrum. A miniaturized, 3D-printed, battery-operated microplasma-on-a-chip was used for generation of transient optical emission signals. Elemental analysis from liquid microsamples, a microplasma, and a handheld or a smartphone will be used as examples. Development and potential applicability of wireless data acquisition of transient optical emission signals for taking part of the lab to the sample types of mobile, field-portable spectrometry applications will be discussed. The examples presented are drawn from past and ongoing work in the authors' laboratory. A handheld or a smartphone were used as the mobile computing devices of choice. © The Author(s) 2016.

  10. 36 CFR 1254.32 - What rules apply to public access use of the Internet on NARA-supplied computers?

    Science.gov (United States)

    2010-07-01

    ... access use of the Internet on NARA-supplied computers? 1254.32 Section 1254.32 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION PUBLIC AVAILABILITY AND USE USING RECORDS AND DONATED... for Internet use in all NARA research rooms. The number of workstations varies per location. We...

  11. THE MOBILE SPACE AND MOBILE TARGETING ENVIRONMENT FOR INTERNET USERS: FEATURES OF MODEL SUBMISSION AND USING IN EDUCATION

    Directory of Open Access Journals (Sweden)

    V. Bykov

    2013-08-01

    Full Text Available Article submitted the results of the analysis of the use of mobile devices in education. The substantiation of the definition of user mobility in the Internet space, taking into account the variability of mobile devices and communications. The use of mobile devices in the educational process is based on the paradigm of open and equal access to quality education. Considered the technology of using different types of devices and their functions . The conditions of user mobility in the internet environment, the factors influencing it, the creation and storage of mobile communications resources . Provided with basic mathematical model of user behavior in a virtual network. A model of migration as a user from device to device , and its geographic move , and then use the resulting model for the design of distance learning systems . Preliminary forecasts have been made on the development of education in the transition from the remote technology to open. It is assumed the appearance of new types of personal devices that will combine the power of a desktop PC and the autonomy of smartphones with constant access for broadband wireless connection to the Internet. The use of cloud technology to store and process information resources training helps centralize and synchronize data and access to them from different devices.

  12. 5G-Enabled Tactile Internet

    OpenAIRE

    Simsek, Meryem; Aijaz, Adnan; Dohler, Mischa; Sachs, Joachim; Fettweis, Gerhard

    2016-01-01

    The long-term ambition of the Tactile Internet is to enable a democratization of skill, and how it is being delivered globally. An integral part of this is to be able to transmit touch in perceived real-time, which is enabled by suitable robotics and haptics equipment at the edges, along with an unprecedented communications network. The fifth generation (5G) mobile communications systems will underpin this emerging Internet at the wireless edge. This paper presents the most important technolo...

  13. Deployment of Remotely-Accessible Robotics Laboratory

    Directory of Open Access Journals (Sweden)

    Richard Balogh

    2012-03-01

    Full Text Available Robotnacka is an autonomous drawing mobile robot, designed for eaching beginners in the Logo programming language. It can also be used as an experimental platform, in our case in a remotely accessible robotic laboratory with the possibility to control the robots via the Internet. In addition to a basic version of the robot a version equipped with a gripper is available too, one with a wireless camera, and one with additional ultrasonic distance sensors. The laboratory is available on-line permanently and provides a simple way to incorporate robotics in teaching mathematics, programming and other subjects. The laboratory has been in use several years. We provide description of its functionality and summarize our experience.

  14. Forecasting economic aspects of future wireless services

    DEFF Research Database (Denmark)

    Falch, Morten; Henten, Anders; Saugstrup, Dan

    services be shaped like the Internet today with a large number of independent information providers offering their services directly to the customers? This deliverable will analyse economic models for delivery of ‘3G and beyond’ wireless Internet services, and assess the types of services that will drive...... the market and the business models to be applied. The analysis will take current market trends as point of departure with focus on vanguard markets with respect to 3G services....

  15. Current Status and Trend of Internet and E-Commerce Market in Korea

    Institute of Scientific and Technical Information of China (English)

    LEE Hongjoo; KIM Jongwoo; PARK Sungjoo

    2004-01-01

    After the remarkable increase of Internet users and broadband Internet subscribers at the end of the 20th century, the size of Korean Internet and e-commerce market steadily increased but the growth rate has been either stagnant or decreased. Trends of Korean Internet and e-commerce market are summarized in this paper the trends on Internet usage are introduced. Trends of online games, blogs and wireless Internet are introduced. The trends of Korean Internet market may have implications for China and Japan.

  16. Broadband Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Broadband Access. Worldwide market for broadband access $30 Billion! Over 200 million broadband subscribers worldwide! Various Competing Broadband access. Digital Subscriber line; Wireless; Optical Fiber.

  17. Access to care and use of the Internet to search for health information: results from the US National Health Interview Survey.

    Science.gov (United States)

    Amante, Daniel J; Hogan, Timothy P; Pagoto, Sherry L; English, Thomas M; Lapane, Kate L

    2015-04-29

    The insurance mandate of the Affordable Care Act has increased the number of people with health coverage in the United States. There is speculation that this increase in the number of insured could make accessing health care services more difficult. Those who are unable to access care in a timely manner may use the Internet to search for information needed to answer their health questions. The aim was to determine whether difficulty accessing health care services for reasons unrelated to insurance coverage is associated with increased use of the Internet to obtain health information. Survey data from 32,139 adults in the 2011 National Health Interview Study (NHIS) were used in this study. The exposure for this analysis was reporting difficulty accessing health care services or delaying getting care for a reason unrelated to insurance status. To define this exposure, we examined 8 questions that asked whether different access problems occurred during the previous 12 months. The outcome for this analysis, health information technology (HIT) use, was captured by examining 2 questions that asked survey respondents if they used an online health chat room or searched the Internet to obtain health information in the previous 12 months. Several multinomial logistic regressions estimating the odds of using HIT for each reported access difficulty were conducted to accomplish the study objective. Of a survey population of 32,139 adults, more than 15.90% (n=5109) reported experiencing at least one access to care barrier, whereas 3.63% (1168/32,139) reported using online health chat rooms and 43.55% (13,997/32,139) reported searching the Internet for health information. Adults who reported difficulty accessing health care services for reasons unrelated to their health insurance coverage had greater odds of using the Internet to obtain health information. Those who reported delaying getting care because they could not get an appointment soon enough (OR 2.2, 95% CI 1.9-2.5), were

  18. Testing the associations between different aspects of seafarers' employment contract and on-board internet access and their job and life satisfaction and health.

    Science.gov (United States)

    Slišković, Ana; Penezić, Zvjezdan

    2016-12-01

    The aim of this study was to test for associations between different aspects of contract and on-board internet access and seafarers' satisfaction and health. Altogether 298 Croatian seafarers, all officers, employed on cargo ships, with a minimum work experience of two years with their current shipping company, participated in an online survey. The questionnaire included sociodemographic items, questions relating to their employment contract and internet access, and measures of job satisfaction, life satisfaction, mental health, and gastrointestinal and cardiovascular symptoms. Their job- and lifesatisfaction levels were higher for shorter duration on board, favourable ratio of work to non-work days, and compliance with the employment contract regarding the changes to work and non-work days. Mental health differed likewise but only in relation to two aspects of the contract: on-board duration and compliance with the contract. The level of gastrointestinal symptoms was lower in cases of shorter on-board duration and compliance with the contract, and in seafarers who have free, unlimited internet access on board. Lower level of cardiovascular symptoms was found in seafarers with free, unlimited internet access on board. Our findings suggest that in promoting satisfaction and health in seafaring, attention should be given to reducing on-board duration, compliance with the contract, and internet accessibility on board.

  19. Attacks on IEEE 802.11 wireless networks

    Directory of Open Access Journals (Sweden)

    Dejan Milan Tepšić

    2013-06-01

    Full Text Available Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated. Introduction In the entire history of

  20. Intelligent Devices in Rural Wireless Networks

    Directory of Open Access Journals (Sweden)

    Daniel FUENTES

    2014-03-01

    Full Text Available The rural wireless networks are increasingly in demand by associations and autarchies to expand Internet access in this type of areas. The problem of such solutions centers not only in network deployment and its maintenance, but also in the equipment installation on clients, which always has big costs. This installation and configuration must be performed by a technician on site, so that the equipment can be integrated in the infrastructure. To try to mitigate this problem, it is presented a solution that allows the clients to install, with transparency, the device at home, reducing not only the cost for the management entity but also for the clients. This way, for info-excluded people or with new technology low experience level, it is the user that integrates himself in the network, making him part of the process, fostering the network usage.In this article are specified not only the system architecture but also the way that it works and how it obtains the desirable result. The tests made to the solution show the quickness, reliability and autonomy in the execution of the tasks, making it a benefit for rural wireless networks.This solution, by its robustness and simplicity, allowed an uptake to the IT by people who never thought to do it, namely an advanced age group (elderly who want to join the world of the new technologies

  1. OPTICAL WIRELESS COMMUNICATION SYSTEM

    Directory of Open Access Journals (Sweden)

    JOSHUA L.Y. CHIENG

    2016-02-01

    Full Text Available The growing demand of bandwidth in this modern internet age has been testing the existing telecommunication infrastructures around the world. With broadband speeds moving towards the region of Gbps and Tbps, many researches have begun on the development of using optical wireless technology as feasible and future methods to the current wireless technology. Unlike the existing radio frequency wireless applications, optical wireless uses electromagnetic spectrums that are unlicensed and free. With that, this project aim to understand and gain better understanding of optical wireless communication system by building an experimental and simulated model. The quality of service and system performance will be investigated and reviewed. This project employs laser diode as the propagation medium and successfully transferred audio signals as far as 15 meters. On its quality of service, results of the project model reveal that the bit error rate increases, signal-to-noise ratio and quality factor decreases as the link distance between the transmitter and receiver increases. OptiSystem was used to build the simulated model and MATLAB was used to assist signal-to-noise ratio calculations. By comparing the simulated and experimental receiver’s power output, the experimental model’s efficiency is at 66.3%. Other than the system’s performance, challenges and factors affecting the system have been investigated and discussed. Such challenges include beam divergence, misalignment and particle absorption.

  2. Using TV white space spectrum to practise telemedicine: A promising technology to enhance broadband internet connectivity within healthcare facilities in rural regions of developing countries.

    Science.gov (United States)

    Chavez, Afton; Littman-Quinn, Ryan; Ndlovu, Kagiso; Kovarik, Carrie L

    2016-06-01

    The following correspondence provides an overview of TV White Space (TVWS) technology, regulations, and potential applications to the health care sector. This report also introduces "Project Kgolagano," a Botswana-based initiative representing the first endeavour to utilize TVWS internet connection for practising telemedicine. TV "white space" refers to the previously unused, wasted spectrum within TV radiofrequency channels that can now be leveraged to obtain broadband internet access. TVWS represents a less costly, faster, and farther-reaching internet connection that is a promising option for connecting the previously unconnected populations of remote and underserved areas. The Botswana-University of Pennsylvania Partnership, Microsoft, Botswana Innovation Hub, Vista Life Sciences, and Global Broadband Solutions have partnered together to bring TVWS wireless broadband access to healthcare facilities in poorly connected regions of Botswana (Lobatse, Francistown, Maun, Gaborone) in order to improve healthcare delivery and facilitate telemedicine in dermatology, cervical cancer screening, and family medicine (HIV/AIDS, TB, general adult and pediatric medicine). © The Author(s) 2015.

  3. Evolution of Network Access Points (NAPs and agreements among Internet Service Providers (ISPs in South America

    Directory of Open Access Journals (Sweden)

    Fernando Beltrán

    2006-05-01

    Full Text Available Este artículo presenta los aspectos principales del desarrollo histórico y de asuntos actuales en el mercado suramericano de acceso a Internet: los acuerdos de interconexión para el intercambio de tráfico local y regional en Suramérica, los incentivos que tienen los proveedores de acceso a Internet para mantener o modificar la naturaleza de los acuerdos y los métodos de recuperación de costos en los puntos de intercambio de tráfico. El artículo también identifica algunas amenazas a la estabilidad de los puntos de intercambio de tráfico y las ilustra con dos casos. / This paper presents the main aspects of the historical development and the current issues at stake in the South American Internet access market: the interconnection schemes for the exchange of local and regional traffic in the South American region, the incentives Internet access providers have for keeping or modifying the nature of the agreements, and the cost recovery methods at the traffic exchange points. Some threats to the stability of the scheme for domestic traffic exchange adopted throughout the region are also identified and subsequently illustrated with country-cases.

  4. Integration between WSNs and Internet based on Address Internetworking for Web

    OpenAIRE

    Jeong Hee Kim; Do Hyeun Kim; Ho Young Kwak; Yung Cheol Byun

    2012-01-01

    There has been an increasing interest in wireless sensor networks as a new technology to realize ubiquitous computing, and demands for internetworking technology between the wireless sensor networks and the Internet which is based on IP address. For this purpose, this paper proposes and implements the internetworking scheme which assigns IP addresses to the sensor nodes and internetworks based on the gateway-based integration for internetworking between the wireless sensor networks and the In...

  5. Optimal Pricing of Spectrum Resources in Wireless Opportunistic Access

    Directory of Open Access Journals (Sweden)

    Hanna Bogucka

    2012-01-01

    Full Text Available We consider opportunistic access to spectrum resources in cognitive wireless networks. The users equipment, or the network nodes in general are able to sense the spectrum and adopt a subset of available resources (the spectrum and the power individually and independently in a distributed manner, that is, based on their local channel quality information and not knowing the Channel State Information (CSI of the other nodes' links in the considered network area. In such a network scenery, the competition of nodes for available resources is observed, which can be modeled as a game. To obtain spectrally efficient and fair spectrum allocation in this competitive environment with the nodes having no information on the other players, taxation of resources is applied to coerce desired behavior of the competitors. In the paper, we present mathematical formulation of the problem of finding the optimal taxation rate (common for all nodes and propose a reduced-complexity algorithm for this optimization. Simulation results for these derived optimal values in various scenarios are also provided.

  6. Fundamental Analysis of Extremely Fast Photonic THz Wireless Communication Systems

    DEFF Research Database (Denmark)

    Yu, Xianbin; Zhang, Xianmin

    This talk will review the recent progress on developing THz communication systems for high speed wireless access, and fundamentally analyze the realistic throughput and accessible wireless range of a THz impulse radio communication link by employing a uni-travelling photodiode (UTC-PD) as emitter...

  7. An Analysis Of Wireless Security

    OpenAIRE

    Salendra Prasad

    2017-01-01

    The WLAN security includes Wired Equivalent Primary WEP and WI-FI protected Access WPA. Today WEP is regarded as very poor security standard. WEP was regarded as very old security standard and has many security issues which users need to be addressed. In this Paper we will discuss Wireless Security and ways to improve on wireless security.

  8. Resource slicing in virtual wireless networks: a survey

    OpenAIRE

    Richart, Matias; Baliosian De Lazzari, Javier Ernesto; Serrat Fernández, Juan; Gorricho Moreno, Juan Luis

    2016-01-01

    New architectural and design approaches for radio access networks have appeared with the introduction of network virtualization in the wireless domain. One of these approaches splits the wireless network infrastructure into isolated virtual slices under their own management, requirements, and characteristics. Despite the advances in wireless virtualization, there are still many open issues regarding the resource allocation and isolation of wireless slices. Because of the dynamics and share...

  9. How to model wireless mesh networks topology

    International Nuclear Information System (INIS)

    Sanni, M L; Hashim, A A; Anwar, F; Ali, S; Ahmed, G S M

    2013-01-01

    The specification of network connectivity model or topology is the beginning of design and analysis in Computer Network researches. Wireless Mesh Networks is an autonomic network that is dynamically self-organised, self-configured while the mesh nodes establish automatic connectivity with the adjacent nodes in the relay network of wireless backbone routers. Researches in Wireless Mesh Networks range from node deployment to internetworking issues with sensor, Internet and cellular networks. These researches require modelling of relationships and interactions among nodes including technical characteristics of the links while satisfying the architectural requirements of the physical network. However, the existing topology generators model geographic topologies which constitute different architectures, thus may not be suitable in Wireless Mesh Networks scenarios. The existing methods of topology generation are explored, analysed and parameters for their characterisation are identified. Furthermore, an algorithm for the design of Wireless Mesh Networks topology based on square grid model is proposed in this paper. The performance of the topology generated is also evaluated. This research is particularly important in the generation of a close-to-real topology for ensuring relevance of design to the intended network and validity of results obtained in Wireless Mesh Networks researches

  10. Searching for Suicide Methods: Accessibility of Information About Helium as a Method of Suicide on the Internet.

    Science.gov (United States)

    Gunnell, David; Derges, Jane; Chang, Shu-Sen; Biddle, Lucy

    2015-01-01

    Helium gas suicides have increased in England and Wales; easy-to-access descriptions of this method on the Internet may have contributed to this rise. To investigate the availability of information on using helium as a method of suicide and trends in searching about this method on the Internet. We analyzed trends in (a) Google searching (2004-2014) and (b) hits on a Wikipedia article describing helium as a method of suicide (2013-2014). We also investigated the extent to which helium was described as a method of suicide on web pages and discussion forums identified via Google. We found no evidence of rises in Internet searching about suicide using helium. News stories about helium suicides were associated with increased search activity. The Wikipedia article may have been temporarily altered to increase awareness of suicide using helium around the time of a celebrity suicide. Approximately one third of the links retrieved using Google searches for suicide methods mentioned helium. Information about helium as a suicide method is readily available on the Internet; the Wikipedia article describing its use was highly accessed following celebrity suicides. Availability of online information about this method may contribute to rises in helium suicides.

  11. Persistent digital divide in access to and use of the Internet as a resource for health information: Results from a California population-based study.

    Science.gov (United States)

    Nguyen, Amy; Mosadeghi, Sasan; Almario, Christopher V

    2017-07-01

    Access to the Internet has grown dramatically over the past two decades. Using data from a population-based survey, we aimed to determine the prevalence and predictors of (i) access to the Internet, and (ii) use of the Internet to search for health information. We analyzed data from the 2011-12 California Health Interview Survey (CHIS) and included all individuals 18 years of age and older. Our outcomes were (i) prior use of the Internet, and (ii) use of the Internet to find health or medical information within the past year. We performed survey-weighted logistic regression models on our outcomes to adjust for potentially confounding demographic and socioeconomic factors. Our study included an unweighted and survey-weighted sample of 42,935 and 27,796,484 individuals, respectively. We found that 81.5% of the weighted sample reported having previously used the Internet. Among Internet users, 64.5% stated that they used the Internet within the past year to find health or medical information. Racial/ethnic minorities, older individuals, and those who lived in lower income households and rural areas were less likely to have access to and use the Internet to search for health information. Conversely, English-proficiency and increasing levels of education were positively associated with online health information-seeking. We found that most Californians have access to and use the Internet to search for health information, but still noted a persistent digital divide. Interventions to narrow the divide are needed, otherwise this may lead to a continued widening of existing healthcare disparities. Copyright © 2017 Elsevier B.V. All rights reserved.

  12. Wi-Fi Networks Security and Accessing Control

    OpenAIRE

    Tarek S. Sobh

    2013-01-01

    As wireless networks access gains popularity in corporate, private and personal networks, the nature of wireless networks opens up new possibilities for network attacks. This paper negotiating Wi-Fi security against scanning of rogue Wi-Fi networks and other related activities and considers the monitoring of Wi-Fi traffic effects. The unauthorized access point (AP) problem has raised more attention and resulted in obtaining wireless access without subscriber permission.This work assumes Wi-Fi...

  13. Disparities in internet use among orthopedic outpatients.

    Science.gov (United States)

    Walsh, Kenneth P; Rehman, Saqib; Goldhirsh, Jessie

    2014-02-01

    Internet access has lagged behind for patients with lower incomes and from certain ethnic groups. This study investigated the possible improvement of access to health-related information on the Internet for all patients in an urban outpatient setting, regardless of socioeconomic background. A 28-question survey was completed by 100 orthopedic outpatients evaluating associations between their age, ethnicity, income, or education level and their access to the Internet. The survey also examined how patients used the Internet to obtain information about their medical condition, their privacy concerns when conducting online research, and their use of mobile phones as a primary means of Internet access. The Internet was used by 57% of orthopedic outpatients in this urban setting. Internet access decreased with advancing age but increased with increasing income and education, findings consistent with similar studies. Despite the inability to identify an association between ethnicity and Internet access in this patient population, fewer Latinos (33%) than whites (67%) or African Americans (77%) sought information about their medical condition. Among patients who used a mobile phone as the primary method for online access, 74% were African American or Latino and 26% were white. This difference in mobile phone use for online access suggests that mobile phones have provided ethnic minorities with greater Internet access and thus may have narrowed the digital divide among the races. Copyright 2014, SLACK Incorporated.

  14. www.mydrugdealer.com: Ethics and legal implications of Internet-based access to substances of abuse.

    Science.gov (United States)

    Klein, Carolina A; Kandel, Surendra

    2011-01-01

    The Internet has increasingly become an intrinsic part of everyday life, offering countless possibilities for education, services, recreation, and more. In fact, an entire virtual life within the digitalized World Wide Web is possible and common among many Internet users. Today's psychiatrists must therefore incorporate this dimension of human life into clinical practice, to achieve an adequate assessment of the tools and risks available to the patient. We focus on the Internet as a portal for the trade of and access to substances of abuse. We review the legal regulations that may inform care and standards of practice and analyze the difficulties that arise in assessment and monitoring of the current situation. We consider the potential impact of Internet-based narcotics trade on addiction morbidities and the practice of clinical psychiatry, as well as on the potential legal implications that the forensic expert may face.

  15. Who is NOT likely to access the Internet for health information? Findings from first-time mothers in southwest Sydney, Australia.

    Science.gov (United States)

    Wen, Li Ming; Rissel, Chris; Baur, Louise A; Lee, Eric; Simpson, Judy M

    2011-06-01

    This study aimed to explore inequities in access to online health information and its relation to socioeconomic status, and to inform the development of the use of the Internet for health promotion. We analyzed cross-sectional baseline survey data for 664 first-time mothers from the Healthy Beginnings Trial conducted in Southwest Sydney, Australia during 2007-2010. First-time mothers' reports of their computer ownership, sources of health information including Internet access and self-rated health as well as demographic data were collected through face-to-face interviews. Multivariate analysis was performed using log-binomial regression. We found that 37% of first-time mothers reported not using the Internet for health information. Maternal education level, household income level and having a computer at home were significant factors associated with the use of the Internet for health information after adjusting for other factors. Mothers who only had school certificate or lower were 1.5 times more likely not to use the Internet for health information than those with university/tertiary education [adjusted risk ratio (ARR) 1.50, 95% CI 1.06-2.12, P=0.03]. Mothers with a household income of less than $40,000 per year were 1.7 times more likely not to use the Internet for health information than those with a household income over $80,000 per year (ARR 1.66, 95% CI 1.24-2.12, P=0.001). These findings have important implications for using the Internet for health promotion among young women. A substantial number of first-time mothers do not access the Internet for health information, in particular among those with lower levels of education, lower household income and without a computer at home. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  16. An Access Control Protocol for Wireless Sensor Network Using Double Trapdoor Chameleon Hash Function

    Directory of Open Access Journals (Sweden)

    Tejeshwari Thakur

    2016-01-01

    Full Text Available Wireless sensor network (WSN, a type of communication system, is normally deployed into the unattended environment where the intended user can get access to the network. The sensor nodes collect data from this environment. If the data are valuable and confidential, then security measures are needed to protect them from the unauthorized access. This situation requires an access control protocol (ACP in the design of sensor network because of sensor nodes which are vulnerable to various malicious attacks during the authentication and key establishment and the new node addition phase. In this paper, we propose a secured ACP for such WSN. This protocol is based on Elliptic Curve Discrete Log Problem (ECDLP and double trapdoor chameleon hash function which secures the WSN from malicious attacks such as node masquerading attack, replay attack, man-in-the-middle attack, and forgery attacks. Proposed ACP has a special feature known as session key security. Also, the proposed ACP is more efficient as it requires only one modular multiplication during the initialization phase.

  17. Challenging Aspects of Terahertz Terabit Wireless Communications

    DEFF Research Database (Denmark)

    Yu, Xianbin; Galili, Michael; Jepsen, Peter Uhd

    The increasing demand on fast wireless communications, e.g. huge data file transferring and mobile broadband access, has driven wireless communication systems into a path towards Terabit era. Terahertz (THz) technology is promising due to its unique features, such as unlimited bandwidth available......, in terms of THz generation and link power budget. The THz atmospheric absorption is another critical issue to limit wireless communication range....

  18. Public Internet Access Points (PIAPs) and Their Social Impact: A Case Study from Turkey

    Science.gov (United States)

    Afacan, Gulgun; Er, Erkan; Arifoglu, Ali

    2013-01-01

    Building public Internet access points (PIAPs) is a significant contribution of governments towards achieving an information society. While many developing countries are investing great amounts to establish PIAPs today, people may not use PIAPs effectively. Yet, the successful implementation of PIAPs is the result of citizens' acceptance to use…

  19. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2013-01-01

    In the last few years the Internet of Things (IoT) has seen widespread application and can be found in each field. Authentication and access control are important and critical functionalities in the context of IoT to enable secure communication between devices. Mobility, dynamic network topology...... and weak physical security of low power devices in IoT networks are possible sources for security vulnerabilities. It is promising to make an authentication and access control attack resistant and lightweight in a resource constrained and distributed IoT environment. This paper presents the Identity...... Authentication and Capability based Access Control (IACAC) model with protocol evaluation and performance analysis. To protect IoT from man-in-the-middle, replay and denial of service (Dos) attacks, the concept of capability for access control is introduced. The novelty of this model is that, it presents...

  20. Introduction to wireless sensor networks

    CERN Document Server

    Forster, Anna

    2016-01-01

    Explores real-world wireless sensor network development, deployment, and applications. The book begins with an introduction to wireless sensor networks and their fundamental concepts. Hardware components, operating systems, protocols, and algorithms that make up the anatomy of a sensor node are described in chapter two. Properties of wireless communications, medium access protocols, wireless links, and link estimation protocols are described in chapter three and chapter four. Routing basics and metrics, clustering techniques, time synchronization and localization protocols, as well as sensing techniques are introduced in chapter five to nine. The concluding chapter summarizes the learnt methods and shows how to use them to deploy real-world sensor networks in a structured way.

  1. Examining Internet Access and Social Media Application Use for Online Nutrition Education in SNAP-Ed Participants in Rural Illinois.

    Science.gov (United States)

    Loehmer, Emily; Smith, Sylvia; McCaffrey, Jennifer; Davis, Jeremy

    2018-01-01

    To examine Internet access and interest in receiving nutrition education via social media applications among low-income adults participating in the Supplemental Nutrition Assistance Program Education (SNAP-Ed). A cross-sectional survey was distributed during 25 SNAP-Ed classes throughout the 16 southernmost counties of Illinois. From 188 responses, the majority of participants had Internet access (76%). Among participants aged 18-32 years (n = 51), 92% owned a smartphone with Internet access and 57% indicated that they would use online nutrition education, with most interest in e-mail (41%), Facebook (40%), and text messaging (35%). There was little interest in using blogs, Vine, Twitter, Tumblr, and Pinterest. Overall, 49% of middle-aged adults aged 33-64 years and 87% of seniors aged ≥65 years reported they would not use online nutrition education. Results indicated similar Internet accessibility in southern Illinois among low-income populations compared with national rural rates. Interest in using online nutrition education varied among SNAP-Ed participants according to age. Young adults appeared to be the most captive audience regarding online nutrition education. Results may be useful to agencies implementing SNAP-Ed to supplement current curriculum with online nutrition education for audiences aged ≤32 years. Copyright © 2017 Society for Nutrition Education and Behavior. Published by Elsevier Inc. All rights reserved.

  2. Real-time video streaming in mobile cloud over heterogeneous wireless networks

    Science.gov (United States)

    Abdallah-Saleh, Saleh; Wang, Qi; Grecos, Christos

    2012-06-01

    Recently, the concept of Mobile Cloud Computing (MCC) has been proposed to offload the resource requirements in computational capabilities, storage and security from mobile devices into the cloud. Internet video applications such as real-time streaming are expected to be ubiquitously deployed and supported over the cloud for mobile users, who typically encounter a range of wireless networks of diverse radio access technologies during their roaming. However, real-time video streaming for mobile cloud users across heterogeneous wireless networks presents multiple challenges. The network-layer quality of service (QoS) provision to support high-quality mobile video delivery in this demanding scenario remains an open research question, and this in turn affects the application-level visual quality and impedes mobile users' perceived quality of experience (QoE). In this paper, we devise a framework to support real-time video streaming in this new mobile video networking paradigm and evaluate the performance of the proposed framework empirically through a lab-based yet realistic testing platform. One particular issue we focus on is the effect of users' mobility on the QoS of video streaming over the cloud. We design and implement a hybrid platform comprising of a test-bed and an emulator, on which our concept of mobile cloud computing, video streaming and heterogeneous wireless networks are implemented and integrated to allow the testing of our framework. As representative heterogeneous wireless networks, the popular WLAN (Wi-Fi) and MAN (WiMAX) networks are incorporated in order to evaluate effects of handovers between these different radio access technologies. The H.264/AVC (Advanced Video Coding) standard is employed for real-time video streaming from a server to mobile users (client nodes) in the networks. Mobility support is introduced to enable continuous streaming experience for a mobile user across the heterogeneous wireless network. Real-time video stream packets

  3. A Seamless Handoff Scheme with Access Point Load Balance for Real-Time Services Support in 802.11 Wireless LANs

    Science.gov (United States)

    Manodham, Thavisak; Loyola, Luis; Miki, Tetsuya

    IEEE 802.11 wirelesses LANs (WLANs) have been rapidly deployed in enterprises, public areas, and households. Voice-over-IP (VoIP) and similar applications are now commonly used in mobile devices over wireless networks. Recent works have improved the quality of service (QoS) offering higher data rates to support various kinds of real-time applications. However, besides the need for higher data rates, seamless handoff and load balancing among APs are key issues that must be addressed in order to continue supporting real-time services across wireless LANs and providing fair services to all users. In this paper, we introduce a novel access point (AP) with two transceivers that improves network efficiency by supporting seamless handoff and traffic load balancing in a wireless network. In our proposed scheme, the novel AP uses the second transceiver to scan and find neighboring STAs in the transmission range and then sends the results to neighboring APs, which compare and analyze whether or not the STA should perform a handoff. The initial results from our simulations show that the novel AP module is more effective than the conventional scheme and a related work in terms of providing a handoff process with low latency and sharing traffic load with neighbor APs.

  4. Accessing files in an Internet: The Jade file system

    Science.gov (United States)

    Peterson, Larry L.; Rao, Herman C.

    1991-01-01

    Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.

  5. Accessing files in an internet - The Jade file system

    Science.gov (United States)

    Rao, Herman C.; Peterson, Larry L.

    1993-01-01

    Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.

  6. A medical-grade wireless architecture for remote electrocardiography.

    Science.gov (United States)

    Kang, Kyungtae; Park, Kyung-Joon; Song, Jae-Jin; Yoon, Chang-Hwan; Sha, Lui

    2011-03-01

    In telecardiology, electrocardiogram (ECG) signals from a patient are acquired by sensors and transmitted in real time to medical personnel across a wireless network. The use of IEEE 802.11 wireless LANs (WLANs), which are already deployed in many hospitals, can provide ubiquitous connectivity and thus allow cardiology patients greater mobility. However, engineering issues, including the error-prone nature of wireless channels and the unpredictable delay and jitter due to the nondeterministic nature of access to the wireless medium, need to be addressed before telecardiology can be safely realized. We propose a medical-grade WLAN architecture for remote ECG monitoring, which employs the point-coordination function (PCF) for medium access control and Reed-Solomon coding for error control. Realistic simulations with uncompressed two-lead ECG data from the MIT-BIH arrhythmia database demonstrate reliable wireless ECG monitoring; the reliability of ECG transmission exceeds 99.99% with the initial buffering delay of only 2.4 s.

  7. A Mechanism for Reliable Mobility Management for Internet of Things Using CoAP

    Directory of Open Access Journals (Sweden)

    Seung-Man Chun

    2017-01-01

    Full Text Available Under unreliable constrained wireless networks for Internet of Things (IoT environments, the loss of the signaling message may frequently occur. Mobile Internet Protocol version 6 (MIPv6 and its variants do not consider this situation. Consequently, as a constrained device moves around different wireless networks, its Internet Protocol (IP connectivity may be frequently disrupted and power can be drained rapidly. This can result in the loss of important sensing data or a large delay for time-critical IoT services such as healthcare monitoring and disaster management. This paper presents a reliable mobility management mechanism in Internet of Things environments with lossy low-power constrained device and network characteristics. The idea is to use the Internet Engineering Task Force (IETF Constrained Application Protocol (CoAP retransmission mechanism to achieve both reliability and simplicity for reliable IoT mobility management. Detailed architecture, algorithms, and message extensions for reliable mobility management are presented. Finally, performance is evaluated using both mathematical analysis and simulation.

  8. A Mechanism for Reliable Mobility Management for Internet of Things Using CoAP.

    Science.gov (United States)

    Chun, Seung-Man; Park, Jong-Tae

    2017-01-12

    Under unreliable constrained wireless networks for Internet of Things (IoT) environments, the loss of the signaling message may frequently occur. Mobile Internet Protocol version 6 (MIPv6) and its variants do not consider this situation. Consequently, as a constrained device moves around different wireless networks, its Internet Protocol (IP) connectivity may be frequently disrupted and power can be drained rapidly. This can result in the loss of important sensing data or a large delay for time-critical IoT services such as healthcare monitoring and disaster management. This paper presents a reliable mobility management mechanism in Internet of Things environments with lossy low-power constrained device and network characteristics. The idea is to use the Internet Engineering Task Force (IETF) Constrained Application Protocol (CoAP) retransmission mechanism to achieve both reliability and simplicity for reliable IoT mobility management. Detailed architecture, algorithms, and message extensions for reliable mobility management are presented. Finally, performance is evaluated using both mathematical analysis and simulation.

  9. Interoperability, Standardisation and Governance in the Era of Internet of Things (IoT)

    DEFF Research Database (Denmark)

    Rohokale, Vandana M.; Prasad, Rajeev; Prasad, Neeli R.

    2011-01-01

    The idiom “Internet of Things” has appeared to describe a number of technologies and research disciplines that enable the Internet to reach out into the real world of physical objects. Technologies such as RFID, short-range wireless communications, real-time localization, and sensor networks...... are becoming increasingly common, bringing the “Internet of Things” into industrial, commercial, and domestic use. Since the last decade, a thought-provoking idea is fast emerging in the wireless communications which gives us the newscientific insight about the omnipresent presence around us of a variety...... of “things” or “objects,” such as RFIDs, sensors, actuators, mobile phones, which, through unique addressing schemes, are able to interact with each other and cooperate with their neighboring “smart” components to reach common goals. This novel paradigm, named “The Internet of Things” (IoT) continues...

  10. Internet Access: How to Design and Test an Internet Use/Management Policy

    National Research Council Canada - National Science Library

    Montgomery, Doris

    2001-01-01

    The Internet is filled with tremendous marketing potential and vulnerabilities, organizations should develop polices that offer both Internet Usage/Management policies that are consisted with their organization...

  11. Data aggregation in wireless sensor networks using the SOAP protocol

    International Nuclear Information System (INIS)

    Al-Yasiri, A; Sunley, A

    2007-01-01

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks

  12. Data aggregation in wireless sensor networks using the SOAP protocol

    Energy Technology Data Exchange (ETDEWEB)

    Al-Yasiri, A; Sunley, A [School of Computing, Science and Engineering, University of Salford, Greater Manchester, M5 4WT (United Kingdom)

    2007-07-15

    Wireless sensor networks (WSN) offer an increasingly attractive method of data gathering in distributed system architectures and dynamic access via wireless connectivity. Wireless sensor networks have physical and resource limitations, this leads to increased complexity for application developers and often results in applications that are closely coupled with network protocols. In this paper, a data aggregation framework using SOAP (Simple Object Access Protocol) on wireless sensor networks is presented. The framework works as a middleware for aggregating data measured by a number of nodes within a network. The aim of the study is to assess the suitability of the protocol in such environments where resources are limited compared to traditional networks.

  13. Wired and wireless convergent extended-reach optical access network using direct-detection of all-optical OFDM super-channel signal.

    Science.gov (United States)

    Chow, C W; Yeh, C H; Sung, J Y; Hsu, C W

    2014-12-15

    We propose and demonstrate the feasibility of using all-optical orthogonal frequency division multiplexing (AO-OFDM) for the convergent optical wired and wireless access networks. AO-OFDM relies on all-optically generated orthogonal subcarriers; hence, high data rate (> 100 Gb/s) can be easily achieved without hitting the speed limit of electronic digital-to-analog and analog-to-digital converters (DAC/ADC). A proof-of-concept convergent access network using AO-OFDM super-channel (SC) is demonstrated supporting 40 - 100 Gb/s wired and gigabit/s 100 GHz millimeter-wave (MMW) ROF transmissions.

  14. Self-learning power control in wireless sensor networks

    NARCIS (Netherlands)

    Chincoli, Michele; Liotta, Antonio

    2018-01-01

    Current trends in interconnecting myriad smart objects to monetize on Internet of Things applications have led to high-density communications in wireless sensor networks. This aggravates the already over-congested unlicensed radio bands, calling for new mechanisms to improve spectrum management and

  15. Wireless networks of opportunity in support of secure field operations

    Science.gov (United States)

    Stehle, Roy H.; Lewis, Mark

    1997-02-01

    Under funding from the Defense Advanced Research Projects Agency (DARPA) for joint military and law enforcement technologies, demonstrations of secure information transfer in support of law enforcement and military operations other than war, using wireless and wired technology, were held in September 1996 at several locations in the United States. In this paper, the network architecture, protocols, and equipment supporting the demonstration's scenarios are presented, together with initial results, including lessons learned and desired system enhancements. Wireless networks of opportunity encompassed in-building (wireless-LAN), campus-wide (Metricom Inc.), metropolitan (AMPS cellular, CDPD), and national (one- and two-way satellite) systems. Evolving DARPA-sponsored packet radio technology was incorporated. All data was encrypted, using multilevel information system security initiative (MISSI)FORTEZZA technology, for carriage over unsecured and unclassified commercial networks. The identification and authentication process inherent in the security system permitted logging for database accesses and provided an audit trail useful in evidence gathering. Wireless and wireline communications support, to and between modeled crisis management centers, was demonstrated. Mechanisms for the guarded transport of data through the secret-high military tactical Internet were included, to support joint law enforcement and crisis management missions. A secure World Wide Web (WWW) browser forms the primary, user-friendly interface for information retrieval and submission. The WWW pages were structured to be sensitive to the bandwidth, error rate, and cost of the communications medium in use (e.g., the use of and resolution for graphical data). Both still and motion compressed video were demonstrated, along with secure voice transmission from laptop computers in the field. Issues of network bandwidth, airtime costs, and deployment status are discussed.

  16. A Wireless Sensor Network Deployment for Rural and Forest Fire Detection and Verification

    Science.gov (United States)

    Lloret, Jaime; Garcia, Miguel; Bri, Diana; Sendra, Sandra

    2009-01-01

    Forest and rural fires are one of the main causes of environmental degradation in Mediterranean countries. Existing fire detection systems only focus on detection, but not on the verification of the fire. However, almost all of them are just simulations, and very few implementations can be found. Besides, the systems in the literature lack scalability. In this paper we show all the steps followed to perform the design, research and development of a wireless multisensor network which mixes sensors with IP cameras in a wireless network in order to detect and verify fire in rural and forest areas of Spain. We have studied how many cameras, sensors and access points are needed to cover a rural or forest area, and the scalability of the system. We have developed a multisensor and when it detects a fire, it sends a sensor alarm through the wireless network to a central server. The central server selects the closest wireless cameras to the multisensor, based on a software application, which are rotated to the sensor that raised the alarm, and sends them a message in order to receive real-time images from the zone. The camera lets the fire fighters corroborate the existence of a fire and avoid false alarms. In this paper, we show the test performance given by a test bench formed by four wireless IP cameras in several situations and the energy consumed when they are transmitting. Moreover, we study the energy consumed by each device when the system is set up. The wireless sensor network could be connected to Internet through a gateway and the images of the cameras could be seen from any part of the world. PMID:22291533

  17. A Wireless Sensor Network Deployment for Rural and Forest Fire Detection and Verification

    Directory of Open Access Journals (Sweden)

    Sandra Sendra

    2009-10-01

    Full Text Available Forest and rural fires are one of the main causes of environmental degradation in Mediterranean countries. Existing fire detection systems only focus on detection, but not on the verification of the fire. However, almost all of them are just simulations, and very few implementations can be found. Besides, the systems in the literature lack scalability. In this paper we show all the steps followed to perform the design, research and development of a wireless multisensor network which mixes sensors with IP cameras in a wireless network in order to detect and verify fire in rural and forest areas of Spain. We have studied how many cameras, sensors and access points are needed to cover a rural or forest area, and the scalability of the system. We have developed a multisensor and when it detects a fire, it sends a sensor alarm through the wireless network to a central server. The central server selects the closest wireless cameras to the multisensor, based on a software application, which are rotated to the sensor that raised the alarm, and sends them a message in order to receive real-time images from the zone. The camera lets the fire fighters corroborate the existence of a fire and avoid false alarms. In this paper, we show the test performance given by a test bench formed by four wireless IP cameras in several situations and the energy consumed when they are transmitting. Moreover, we study the energy consumed by each device when the system is set up. The wireless sensor network could be connected to Internet through a gateway and the images of the cameras could be seen from any part of the world.

  18. The impact of Internet access for people with spinal cord injuries: a descriptive analysis of a pilot study.

    Science.gov (United States)

    Houlihan, Bethlyn Vergo; Drainoni, Mari-Lynn; Warner, Grace; Nesathurai, Shanker; Wierbicky, Jane; Williams, Steven

    2003-04-22

    A pilot study was undertaken regarding the effect of Internet access on health-related quality of life (HRQoL) and self-reported impact for people with spinal cord injuries (SCI). This study is unique in providing free Internet access and looking at benefits for people with disabilities. HRQoL was measured using indicators of global health and social isolation at baseline and after 6 to 19 months of use via telephone interviews on a convenience sample of 23 adults with SCI. Additionally, monthly telephone surveys measured usage patterns, recreation, and self-reported impact. Both quantitative and qualitative analyses were conducted. Bivariate tests for differences in proportions and paired T-tests were conducted. Qualitatively, conceptual categories of impact were created using the Constant Comparative Method. Qualitatively, the predominant benefit was quality of life, mentioned by 61% of participants 46% of months surveyed, with quantitative trends towards improved emotional health. Ease of access to information, social connection, and quality of information were also frequently reported, with modest support from quantitative data. The study's persuasive qualitative results suggest the Internet has particular benefit to people with disabilities and that rehabilitation goals should include leisure. Further scientific research is strongly warranted.

  19. Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends

    Science.gov (United States)

    Joshi, Gyanendra Prasad; Nam, Seung Yeob; Kim, Sung Won

    2013-01-01

    A cognitive radio wireless sensor network is one of the candidate areas where cognitive techniques can be used for opportunistic spectrum access. Research in this area is still in its infancy, but it is progressing rapidly. The aim of this study is to classify the existing literature of this fast emerging application area of cognitive radio wireless sensor networks, highlight the key research that has already been undertaken, and indicate open problems. This paper describes the advantages of cognitive radio wireless sensor networks, the difference between ad hoc cognitive radio networks, wireless sensor networks, and cognitive radio wireless sensor networks, potential application areas of cognitive radio wireless sensor networks, challenges and research trend in cognitive radio wireless sensor networks. The sensing schemes suited for cognitive radio wireless sensor networks scenarios are discussed with an emphasis on cooperation and spectrum access methods that ensure the availability of the required QoS. Finally, this paper lists several open research challenges aimed at drawing the attention of the readers toward the important issues that need to be addressed before the vision of completely autonomous cognitive radio wireless sensor networks can be realized. PMID:23974152

  20. Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends

    Directory of Open Access Journals (Sweden)

    Gyanendra Prasad Joshi

    2013-08-01

    Full Text Available A cognitive radio wireless sensor network is one of the candidate areas where cognitive techniques can be used for opportunistic spectrum access. Research in this area is still in its infancy, but it is progressing rapidly. The aim of this study is to classify the existing literature of this fast emerging application area of cognitive radio wireless sensor networks, highlight the key research that has already been undertaken, and indicate open problems. This paper describes the advantages of cognitive radio wireless sensor networks, the difference between ad hoc cognitive radio networks, wireless sensor networks, and cognitive radio wireless sensor networks, potential application areas of cognitive radio wireless sensor networks, challenges and research trend in cognitive radio wireless sensor networks. The sensing schemes suited for cognitive radio wireless sensor networks scenarios are discussed with an emphasis on cooperation and spectrum access methods that ensure the availability of the required QoS. Finally, this paper lists several open research challenges aimed at drawing the attention of the readers toward the important issues that need to be addressed before the vision of completely autonomous cognitive radio wireless sensor networks can be realized.

  1. Cognitive radio wireless sensor networks: applications, challenges and research trends.

    Science.gov (United States)

    Joshi, Gyanendra Prasad; Nam, Seung Yeob; Kim, Sung Won

    2013-08-22

    A cognitive radio wireless sensor network is one of the candidate areas where cognitive techniques can be used for opportunistic spectrum access. Research in this area is still in its infancy, but it is progressing rapidly. The aim of this study is to classify the existing literature of this fast emerging application area of cognitive radio wireless sensor networks, highlight the key research that has already been undertaken, and indicate open problems. This paper describes the advantages of cognitive radio wireless sensor networks, the difference between ad hoc cognitive radio networks, wireless sensor networks, and cognitive radio wireless sensor networks, potential application areas of cognitive radio wireless sensor networks, challenges and research trend in cognitive radio wireless sensor networks. The sensing schemes suited for cognitive radio wireless sensor networks scenarios are discussed with an emphasis on cooperation and spectrum access methods that ensure the availability of the required QoS. Finally, this paper lists several open research challenges aimed at drawing the attention of the readers toward the important issues that need to be addressed before the vision of completely autonomous cognitive radio wireless sensor networks can be realized.

  2. Radio frequency identification enabled wireless sensing for intelligent food logistics.

    Science.gov (United States)

    Zou, Zhuo; Chen, Qiang; Chen, Qing; Uysal, Ismail; Zheng, Lirong

    2014-06-13

    Future technologies and applications for the Internet of Things (IoT) will evolve the process of the food supply chain and create added value of business. Radio frequency identifications (RFIDs) and wireless sensor networks (WSNs) have been considered as the key technological enablers. Intelligent tags, powered by autonomous energy, are attached on objects, networked by short-range wireless links, allowing the physical parameters such as temperatures and humidities as well as the location information to seamlessly integrate with the enterprise information system over the Internet. In this paper, challenges, considerations and design examples are reviewed from system, implementation and application perspectives, particularly with focus on intelligent packaging and logistics for the fresh food tracking and monitoring service. An IoT platform with a two-layer network architecture is introduced consisting of an asymmetric tag-reader link (RFID layer) and an ad-hoc link between readers (WSN layer), which are further connected to the Internet via cellular or Wi-Fi. Then, we provide insights into the enabling technology of RFID with sensing capabilities. Passive, semi-passive and active RFID solutions are discussed. In particular, we describe ultra-wideband radio RFID which has been considered as one of the most promising techniques for ultra-low-power and low-cost wireless sensing. Finally, an example is provided in the form of an application in fresh food tracking services and corresponding field testing results.

  3. Internet use and suicidal behaviors: internet as a threat or opportunity?

    Science.gov (United States)

    Robert, Anna; Suelves, Josep Maria; Armayones, Manuel; Ashley, Sivakamy

    2015-04-01

    Suicidal behavior is a common and severe health problem around the world. Internet use has been related to an increase in suicidal behaviors, but few studies have focused on the potential benefits of Internet use for preventing self-harm and suicide. We reviewed the existing literature on the relationship between suicide and Internet use. The accessibility of suicide-related information on the Internet seems to have an impact on the incidence of suicide behaviors. However, the Internet is useful for linking people who feel lonely or isolated, and it provides access to suicide prevention information and resources. The Internet can influence vulnerable people to attempt suicide, but it can also be used to prevent self-harm and suicide. We propose some efforts that can be made in this preventive line.

  4. Ubiquitous Monitoring Solution for Wireless Sensor Networks with Push Notifications and End-to-End Connectivity

    Directory of Open Access Journals (Sweden)

    Luis M. L. Oliveira

    2014-01-01

    Full Text Available Wireless Sensor Networks (WSNs belongs to a new trend in technology in which tiny and resource constrained devices are wirelessly interconnected and are able to interact with the surrounding environment by collecting data such as temperature and humidity. Recently, due to the huge growth in the use of mobile devices with Internet connection, smartphones are becoming the center of future ubiquitous wireless networks. Interconnecting WSNs with smartphones and the Internet is a big challenge and new architectures are required due to the heterogeneity of these devices. Taking into account that people are using smartphones with Internet connection, there is a good opportunity to propose a new architecture for wireless sensors monitoring using push notifications and smartphones. Then, this paper proposes a ubiquitous approach for WSN monitoring based on a REST Web Service, a relational database, and an Android mobile application. Real-time data sensed by WSNs are sent directly to a smartphone or stored in a database and requested by the mobile application using a well-defined RESTful interface. A push notification system was created in order to alert mobile users when a sensor parameter overcomes a given threshold. The proposed architecture and mobile application were evaluated and validated using a laboratory WSN testbed and are ready for use.

  5. Flexible and Lightweight Access Control for Online Healthcare Social Networks in the Context of the Internet of Things

    Directory of Open Access Journals (Sweden)

    Zhen Qin

    2017-01-01

    Full Text Available Online healthcare social networks (OHSNs play an essential role in sharing information among medical experts and patients who are equipped with similar experiences. To access other patients’ data or experts’ diagnosis anywhere and anytime, it is necessary to integrate the OHSN into the Internet as part of the Internet of Things (IoT. Therefore, it is crucial to design an efficient and versatile access control scheme that can grant and revoke a user to access the OHSN. In this paper, we propose novel attribute-based encryption (ABE features with user revocation and verifiable decryption outsourcing to control the access privilege of the users. The security of the proposed ABE scheme is given in the well-studied random oracle model. With the proposed ABE scheme, the malicious users can be excluded from the system and the user can offload most of the overhead in the decryption to an untrusted cloud server in a verifiable manner. An access control scheme for the OHSN has been given in the context of the IoT based on the proposed ABE scheme. The simulation demonstrates that our access control mechanism is practical.

  6. The digital divide: Trends in global mobile and broadband Internet access from 2000-2010.

    Science.gov (United States)

    Ronquillo, Charlene; Currie, Leanne

    2012-01-01

    The digital divide is described as the gap between those who do and do not have access to digital information and communications technologies (ICT). ICTs are viewed as an indicator of infrastructure and potential for development, and are a growing platform for health information and services delivery. This study compares the penetration of mobile and broadband Internet technologies by global region from 2000 to 2010. Results illustrate the rapid growth of mobile cellular telephone subscriptions in all global regions with trends suggesting a continued increase. Little to modest gains were made in fixed broadband Internet subscriptions globally. There is a growing popularity of mobile subscriptions with use of data communications, exceeding the numbers of fixed Internet subscriptions. This comparison reveals current strengths that can be built on and highlights the importance of awareness of global trends and using such knowledge to inform design and delivery of ICT-based health services.

  7. An applicable 5.8 GHz wireless power transmission system with rough beamforming to Project Loon

    Directory of Open Access Journals (Sweden)

    Chang-Jun Ahn

    2016-06-01

    Full Text Available In recent, Google proposed the Project Loon being developed with the mission of providing internet access to rural and remote areas using high-altitude balloons. In this paper, we describe an applicable prototype of 5.8 GHz wireless power transmission system with rough beamforming method to Project Loon. From the measurement results, transmit beamforming phased array antenna can transmit power more efficiently compared to a horn antenna and array antenna without beamforming with increasing the transmission distance. For the transmission distance of 1000 mm, transmit beamforming phased array antenna can obtain higher received power about 1.46 times compared to array antenna without transmit beamforming.

  8. Sustainable wireless networks

    CERN Document Server

    Zheng, Zhongming; Xuemin

    2013-01-01

    This brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustainable energy. The characteristics of green energy and investigating existing energy-efficient green approaches for wireless networks with sustainable energy is covered in the first part of this brief. The book then addresses the random availability and capacity of the energy supply. The authors explore how to maximize the energy sustainability of the network and minimize the failure probability that the mesh access points (APs) could deplete their

  9. Influence of Internet Accessibility and Demographic factors on utilization of Web-based Health Information Resources by Resident Doctors in Nigeria.

    Science.gov (United States)

    Ajuwon, G A; Popoola, S O

    2014-09-01

    The internet is a huge library with avalanche of information resources including healthcare information. There are numerous studies on use of electronic resources by healthcare providers including medical practitioners however, there is a dearth of information on the patterns of use of web-based health information resource by resident doctors in Nigeria. This study therefore investigates the influence of internet accessibility and demographic factors on utilization of web-based health information resources by resident doctors in tertiary healthcare institutions in Nigeria. Descriptive survey design was adopted for this study. The population of study consisted of medical doctors undergoing residency training in 13 tertiary healthcare institutions in South-West Nigeria. The tertiary healthcare institutions were Federal Medical Centres, University Teaching Hospitals and Specialist Hospitals (Neuropsychiatric and Orthopaedic). A pre-tested, self-administered questionnaire was used for data collection. The Statistical Package for the Social Sciences (SPSS) was used for data analysis. Data were analyzed using descriptive statistics, Pearson Product Moment correlation and multiple regression analysis. The mean age of the respondents was 34 years and males were in the majority (69.0%). A total of 96.1% respondents had access to the Internet. E-mail (X̄=5.40, SD=0.91), Google (X̄=5.26, SD=1.38), Yahoo (X̄=5.15, SD=4.44) were used weekly by the respondents. Preparation for Seminar/Grand Round presentation (X̄=8.4, SD=1.92), research (X̄=7.8, SD=2.70) and communication (X̄=7.6, SD=2.60) were ranked high as purposes for use of web-based information resources. There is a strong, positive and significant relationship between internet accessibility and utilization of web-based health information resources (r=0.628, pdesignation (B=-0.343) educational qualification (B=2.411) significantly influence utilization of web-based health information resources of the respondents. A

  10. Wireless, battery-operated data acquisition system for mobile spectrometry applications and (potentially) for the Internet of things

    Science.gov (United States)

    Fitzgerald, Ryan; Karanassios, Vassili

    2017-05-01

    There are many applications requiring chemical analysis in the field and analytical results in (near) real-time. For example, when accidental spills occur. In others, collecting samples in the field followed by analysis in a lab increases costs and introduces time-delays. In such cases, "bring part of the lab to the sample" would be ideal. Toward this ideal (and to further reduce size and weight), we developed a relatively inexpensive, battery-operated, wireless data acquisition hardware system around an Arduino nano micro-controller and a 16-bit ADC (Analog-to- Digital Converter) with a max sampling rate of 860 samples/s. The hardware communicates the acquired data using low-power Bluetooth. Software for data acquisition and data display was written in Python. Potential ways of making the hardware-software approach described here a part of the Internet-of-Things (IoT) are presented.

  11. WIRELESS TECHNOLOGIES for LOCATION-BASED SERVICES

    Directory of Open Access Journals (Sweden)

    Dewi Wirastuti

    2012-06-01

    Full Text Available This paper presents an overview of wireless technologies that support location-based services (LBS. Satellite and cellular networks have exploited their communication infrastructure to offer LBS. The rapid deployment of mobile broadband wireless networks has offered another appealing application area. Key to the realisation of LBS is an efficient and accurate positioning technique with various methods and offering different performance levels. So far, Global Positioning System (GPS has offered the best accuracy at a low cost but it is challenged by poor indoor coverage. With the rapid deployment of broadband wireless access ubiquitously, Mobile WiMAX (Worldwide Interoperability for Microwave Access is seen as a potential positioning option for LBS. Some key features of WiMAX, i.e., broadband benefit, high speed and large coverage area; it will be exploited to provide LBS.

  12. Towards a tangible web: using physical objects to access and manipulate the Internet of Things

    CSIR Research Space (South Africa)

    Smith, Andrew C

    2013-09-01

    Full Text Available . This additional step has resulted in the phenomenon commonly referred to as the Internet of Things (IoT). In order to realise the full potential of the IoT, individuals need a mechanism to access and manipulate it. A potential mechanism for achieving...

  13. Internet Use and Access, Behavior, Cyberbullying, and Grooming: Results of an Investigative Whole City Survey of Adolescents

    Science.gov (United States)

    Toaff, Joseph; Pulvirenti, Giuliana; Settanni, Chiara; Colao, Emma; Lavano, Serena Marianna; Cemicetti, Riccardo; Cotugno, David; Perrotti, Giuseppe; Meschesi, Viviana; Montera, Roberto; Zepponi, Barbara

    2017-01-01

    Background According to the Digital Agenda for Europe, the way children use the Internet and mobile technologies has changed dramatically in the past years. Objective The aims of this study were to: (1) breakdown the modalities of access and use of the Internet by teenagers to assess risks and risky behaviors; and (2) provide scientific data to evaluate and counsel safe use of the Internet and new technologies by teenagers. Methods The study was conducted under the program “Strategies for a Better Internet for Children” started in May 2012 by the European Commission. It represents the main result of the project launched by Telecom Italia, “Anche io ho qualcosa da dire” (I too have something to say), thanks to which many contributions were collected and used to develop a survey. The questionnaire was structured in 45 questions, covering three macro areas of interest. It was approved by the Department Board at University of Magna Graecia’s School of Medicine. After authorization from the regional high school authority, it was administered to all 1534 students (aged 13-19 years) in the city of Catanzaro, Italy. Results The data was broken down into three main groups: (1) describing education and access to the Internet; (2) methods of use and social networking; and (3) perception and evaluation of risk and risky behaviors. Among noteworthy results in the first group, we can mention that the average age of first contact with information technologies was around 9 years. Moreover, 78.87% (1210/1534) of the interviewed students reported having access to a smartphone or a tablet. Among the results of the second group, we found that the most used social networks were Facebook (85.78%, 1316/1534), YouTube (61.14%, 938/1534), and Google+ (51.56%, 791/1534). About 71.31% (1094/1534) of the interviewed teenagers use their name and surname on social networks, and 40.09% (615/1534) of them knew all their Facebook contacts personally. Among the results of the third group

  14. Performance evaluation of modulation and multiple access schemes in ultraviolet optical wireless connections for two atmosphere thickness cases.

    Science.gov (United States)

    Raptis, Nikos; Pikasis, Evangelos; Syvridis, Dimitris

    2016-08-01

    The exploitation of optical wireless communication channels in a non-line-of-sight regime is studied for point-to-point and networking configurations considering the use of light-emitting diodes. Two environments with different scattering center densities are considered, assuming operation at 265 nm. The bit error rate performance of both pulsed and multicarrier modulation schemes is examined, using numerical approaches. In the networking scenario, a central node only receives data, one node transmits useful data, and the rest of them act as interferers. The performance of the desirable node's transmissions is evaluated. The access to the medium is controlled by a code division multiple access scheme.

  15. Analysis of the Main Access Municipal Project Free and Free Internet in Public Squares: Digital Inclusion in the Present Corporate Information Globalized

    Directory of Open Access Journals (Sweden)

    Anderson Nogueira Oliveira

    2015-12-01

    Full Text Available The present study has as its theme the role of municipalities in the current global information society. So it has the general objective analysis on the free access to the internet in public places as a means of digital inclusion, with such spaces known as digital o hotspots squares. In this case we will present concepts, definitions and brief historical development of the objects of study of this research, namely, globalization, the information society and digital inclusion. We emphasize that this research will analyze recent data on internet access in Brazil, and will check the key municipal projects freely and free internet access in public squares. For this research we use the hypothetical-deductive method by the methodology of analysis of books, scientific papers and official data by renamed institutions to present a scientifically valid conclusion.

  16. The Internet and the medical radiation science practitioner

    Energy Technology Data Exchange (ETDEWEB)

    Shanahan, Madeleine [School of Medical Science, RMIT University, Bundoora, Victoria 3083 (Australia)], E-mail: mshanahan@rmit.edu.au; Herrington, Anthony; Herrington, Jan [Faculty of Education, University of Wollongong, New South Wales (Australia)

    2009-08-15

    Purpose: The Internet is an important information source for health practitioners providing immediate access to the most current health and medical information. Factors limiting practitioner access to the Internet have been identified and the literature shows that access to the Internet varies across and within health professions. There is therefore a need for each health profession to investigate practitioner access to the Internet. There has been, however, no identified empirical research investigating medical radiation science (MRS) practitioner access to or use of the Internet. This research sought to establish the professional use of Internet-based tools by Australian MRS practitioners and issues affecting access to the Internet within MRS workplaces. Methods: Qualitative and quantitative approaches were used in this research. These included interviews with 28 MRS practitioners from the four areas of specialisation, namely nuclear medicine, radiation therapy, radiography and sonography and a survey of MRS practitioners. In 2007 a 4-page postal survey was sent to a random sample of 1142 MRS practitioners with a response rate of 32.8%. Results: The Internet is an important information source widely used by MRS practitioners. MRS practitioners search the Internet (87%), access specific web pages (86%), use email (82%) and listservs (39.4%) to update their professional knowledge. It was evident that access to the Internet within the workplace varied within the MRS profession. Whilst the majority (96.4%) of MRS practitioners had some level of access to the Internet in their workplace, factors shown to affect practitioner access were workplace setting (p = 0.000), work environment (p = 0.000), and geographic location (p = 0.025). The majority of clinical workplaces (81%) did not provide practitioners with remote access to electronic resources available in the workplace such as e-journals and databases. Conclusions: This research provides baseline data to the MRS

  17. The Internet and the medical radiation science practitioner

    International Nuclear Information System (INIS)

    Shanahan, Madeleine; Herrington, Anthony; Herrington, Jan

    2009-01-01

    Purpose: The Internet is an important information source for health practitioners providing immediate access to the most current health and medical information. Factors limiting practitioner access to the Internet have been identified and the literature shows that access to the Internet varies across and within health professions. There is therefore a need for each health profession to investigate practitioner access to the Internet. There has been, however, no identified empirical research investigating medical radiation science (MRS) practitioner access to or use of the Internet. This research sought to establish the professional use of Internet-based tools by Australian MRS practitioners and issues affecting access to the Internet within MRS workplaces. Methods: Qualitative and quantitative approaches were used in this research. These included interviews with 28 MRS practitioners from the four areas of specialisation, namely nuclear medicine, radiation therapy, radiography and sonography and a survey of MRS practitioners. In 2007 a 4-page postal survey was sent to a random sample of 1142 MRS practitioners with a response rate of 32.8%. Results: The Internet is an important information source widely used by MRS practitioners. MRS practitioners search the Internet (87%), access specific web pages (86%), use email (82%) and listservs (39.4%) to update their professional knowledge. It was evident that access to the Internet within the workplace varied within the MRS profession. Whilst the majority (96.4%) of MRS practitioners had some level of access to the Internet in their workplace, factors shown to affect practitioner access were workplace setting (p = 0.000), work environment (p = 0.000), and geographic location (p = 0.025). The majority of clinical workplaces (81%) did not provide practitioners with remote access to electronic resources available in the workplace such as e-journals and databases. Conclusions: This research provides baseline data to the MRS

  18. PowerPoint Presentation

    Indian Academy of Sciences (India)

    Growth of Wireless & Internet- Source Motorola · Convergence · Internet Alone is Not Enough…… Wireless Data Services Access for the Mobile Professional · Digital Convergence – Smart Devices · Network Convergence · ICT will Transform the Way We Communicate · ICT will Transform the Way We Deal With Information.

  19. Frameless ALOHA Protocol for Wireless Networks

    DEFF Research Database (Denmark)

    Stefanovic, Cedomir; Popovski, Petar; Vukobratovic, Dejan

    2012-01-01

    We propose a novel distributed random access scheme for wireless networks based on slotted ALOHA, motivated by the analogies between successive interference cancellation and iterative belief-propagation decoding on erasure channels. The proposed scheme assumes that each user independently accesse...

  20. Connected car: Engines diagnostic via Internet of Things (IoT)

    Science.gov (United States)

    Hamid, A. F. A.; Rahman, M. T. A.; Khan, S. F.; Adom, A. H.; Rahim, M. A.; Rahim, N. A.; Ismail, M. H. N.; Norizan, A.

    2017-10-01

    This paper is about an experiment for performing engines diagnostic using wireless sensing Internet of Thing (IoT). The study is to overcome problem of current standard On Board Diagnosis (OBD-II) data acquisition method that only can be perform in offline or wired method. From this paper it show a method to determined how the data from engines can be collected, make the data can be easily understand by human and sending data over the wireless internet connection via platform of IOT. This study is separate into three stages that is CAN-bus data collection, CAN data conversion and send data to cloud storage. Every stage is experimented with a two different method and consist five data parameter that is Revolution per Minute (RPM), Manifold Air Pressure (MAP), load-fuel, barometric pressure and engine temperature. The experiment use Arduino Uno as microcontroller, CAN-bus converter and ESP8266 wifi board as transfer medium for data to internet.

  1. Networking wireless sensors

    National Research Council Canada - National Science Library

    Krishnamachari, Bhaskar

    2005-01-01

    ... by networking techniques across multiple layers. The topics covered include network deployment, localization, time synchronization, wireless radio characteristics, medium-access, topology control, routing, data-centric techniques, and transport protocols. Ideal for researchers and designers seeking to create new algorithms and protocols and enginee...

  2. A wireless potentiostat for mobile chemical sensing and biosensing.

    Science.gov (United States)

    Steinberg, Matthew D; Kassal, Petar; Kereković, Irena; Steinberg, Ivana Murković

    2015-10-01

    Wireless chemical sensors are used as analytical devices in homeland defence, home-based healthcare, food logistics and more generally for the Sensor Internet of Things (SIoT). Presented here is a battery-powered and highly portable credit-card size potentiostat that is suitable for performing mobile and wearable amperometric electrochemical measurements with seamless wireless data transfer to mobile computing devices. The mobile electrochemical analytical system has been evaluated in the laboratory with a model redox system - the reduction of hexacyanoferrate(III) - and also with commercially available enzymatic blood-glucose test-strips. The potentiostat communicates wirelessly with mobile devices such as tablets or Smartphones by near-field communication (NFC) or with personal computers by radio-frequency identification (RFID), and thus provides a solution to the 'missing link' in connectivity that often exists between low-cost mobile and wearable chemical sensors and ubiquitous mobile computing products. The mobile potentiostat has been evaluated in the laboratory with a set of proof-of-concept experiments, and its analytical performance compared with a commercial laboratory potentiostat (R(2)=0.9999). These first experimental results demonstrate the functionality of the wireless potentiostat and suggest that the device could be suitable for wearable and point-of-sample analytical measurements. We conclude that the wireless potentiostat could contribute significantly to the advancement of mobile chemical sensor research and adoption, in particular for wearable sensors in healthcare and sport physiology, for wound monitoring and in mobile point-of-sample diagnostics as well as more generally as a part of the Sensor Internet of Things. Copyright © 2015 Elsevier B.V. All rights reserved.

  3. Scaling Laws for Heterogeneous Wireless Networks

    Science.gov (United States)

    2009-09-01

    planned and the size of communication networks that are fundamentally understood. On the one hand, wireline networks (like the Internet) have grown from...Franceschetti, Marco D. Migliore, and Paolo Minero . The capacity of wireless networks: Information-theoretic and physical limits. In Proceedings of the...Allerton Conference on Communication, Control, and Computing, September 2007. [12] Massimo Franceschetti, Marco D. Migliore, and Paolo Minero . The

  4. "De-Randomizing" Congestion Losses to Improve TCP Performance over Wired-Wireless Networks

    National Research Council Canada - National Science Library

    Biaz, Saad; Vaidya, Nitin H

    2004-01-01

    .... With Internet becoming more heterogeneous with more and more wireless error-prone links, a TCP connection may unduly throttle its sending rate and experience poor performance over paths experiencing...

  5. Design and implementation about the campus wireless network

    International Nuclear Information System (INIS)

    Qi Fazhi; An Dehai; Wang Yanming; Cui Tao; Chen Gang; Liu Baoxu

    2007-01-01

    With the development of network applications, flexibility and wieldy is becoming more and more important for network users. Based on the analysis of the needs of campus wireless network. This article design and analysis the deployment mechanism, register system and protection system of wireless network. Built a wireless network system base on IHEP network environment, realization the 'always and everywhere' access the network in the IHEP campus area. (authors)

  6. Optical wireless communication in data centers

    Science.gov (United States)

    Arnon, Shlomi

    2018-01-01

    In the last decade data centers have become a crucial element in modern human society. However, to keep pace with internet data rate growth, new technologies supporting data center should develop. Integration of optical wireless communication (OWC) in data centers is one of the proposed technologies as augmented technology to the fiber network. One implementation of the OWC technology is deployment of optical wireless transceiver on top of the existing cable/fiber network as extension to the top of rack (TOR) switch; in this way, a dynamic and flexible network is created. Optical wireless communication could reduce energy consumption, increase the data rate, reduce the communication latency, increase flexibility and scalability, and reduce maintenance time and cost, in comparison to extra fiber network deployment. In this paper we review up to date literature in the field, propose an implementation scheme of OWC network, discuss ways to reduce energy consumption by parallel link communication and report preliminary measurement result of university data center environment.

  7. Introductory survey for wireless infrared communications

    Directory of Open Access Journals (Sweden)

    Munsif Ali Jatoi

    2014-08-01

    Full Text Available Wireless infrared communications can be defined as the propagation of light waves in free space using infrared radiation whose range is 400–700 nm. This range corresponds to frequencies of hundreds of terahertz, which is high for higher data rate applications. Wireless infrared is applied for higher data rates applications such as wireless computing, wireless video and wireless multimedia communication applications. Introduced by Gfeller, this field has grown with different link configurations, improved transmitter efficiency, increased receiver responsivity and various multiple access techniques for improved quality. Errors are caused because of background light, which causes degradation overall system performance. Error correction techniques are used to remove the errors caused during transmission. This study provides a brief account on field theory used for error correction in wireless infrared systems. The results are produced in terms of bit error rate and signal-to-noise ratio for various bit lengths to show the ability of encoding and decoding algorithms.

  8. SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet access

    OpenAIRE

    Boudguiga , Aymen; Quesnel , Flavien; Bouzerna , Nabil

    2017-01-01

    International audience; A blockchain infrastructure, combined with cryptographic signatures, can improve availability and accountability for the deployment of IoT updates.However, cars with limited or intermittent Internet access may have difficulties in downloading full updates fromthe blockchain. Therefore, we allow cars that successfully downloaded updates to share them with other cars by means of a Peer-to-Peer (P2P) mechanism.

  9. Wireless Network Penetration Testing and Security Auditing

    Directory of Open Access Journals (Sweden)

    Wang Shao-Long

    2016-01-01

    Full Text Available IEEE802.11 wireless wireless networks have security issues that are vulnerable to a variety of attacks. Due to using radio to transport data, attackers can bypass firewalls, sniff sensitive information, intercept packets and send malicious packets. Security auditing and penetration testing is expected to ensure wireless networks security. The contributions of this work are analyzed the vulnerability and types of attacks pertaining to IEEE 802.11 WLAN, performed well known attacks in a laboratory environment to conduct penetration tests to confirm whether our wireless network is hackable or not. WAIDPS is configured as auditing tool to view wireless attacks, such as WEP/WPA/WPA2 cracking, rouge access points, denial of service attack. WAIDPS is designed to detect wireless intrusion with additional features. Penetration testing and auditing will mitigate the risk and threatening to protect WALN.

  10. Access for Internet of Things using Smartphone as a Gateway utilizing LTE and WiFi

    DEFF Research Database (Denmark)

    Mathur, Prateek; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2016-01-01

    Communicating the Internet of Things (IoT) data relying on Long-Term Evolution (LTE) and WiFi has been been presented in the relevant literature. However, this necessitates devices to have LTE/WiFi capability of their own, that has limitations in the form of power consumption, and radio access...... the data to the Internet. In this paper we present a system model wherein the smartphone functions as a gateway for the IoT devices operating on NFC, ZigBee and Bluetooth. The smartphone functioning as a gateway for transferring IoT data. The system modelled in the form of a Markov Chain based...

  11. Matching of Energy Provisions in Multihop Wireless Infra-Structures

    Directory of Open Access Journals (Sweden)

    Rui Teng

    2016-01-01

    Full Text Available Recently there have been large advances in energy technologies for battery-operated systems, including green energy resources and high capacity batteries. The effective use of battery energy resources in wireless infrastructure networks to improve the versatility and reliability of wireless communications is an important issue. Emerging applications of smart cities, Internet of Things (IoT, and emergency responses highly rely on the basic communication network infrastructures that enable ubiquitous network connections. However, energy consumption by nodes in a wireless infrastructure network depends on the transmissions of other nodes in the network. Considering this inter-dependence is necessary to achieve efficient provision of energy in wireless networks. This paper studies the issue of energy provision for wireless relay nodes in Wireless Multihop Infrastructures (WMI assuming constraints on the total energy provision. We introduce a scheme of Energy Provision Matching (Matching-EP for WMI which optimizes energy provision based on matching of energy provision with estimates of differentiated position-dependent energy consumption by wireless nodes distributed in the network. The evaluation results show that Matching-EP with 4%–34% improvement in energy matching degree enables 10%–40% improvement of the network lifetime, and 5%–40% improvement of packet delivery compared with conventional WMI networks.

  12. Internet from Above.

    Science.gov (United States)

    Sullivan, Laura

    1998-01-01

    Explains how fast and reliable Internet access can be obtained by using satellite communications based on experiences at a high school in Mississippi. Discusses Internet communications; how it was implemented in the media center; local area networks; the need for Ethernet-based connection to the Internet; and price. (LRW)

  13. Internet Use and Access, Behavior, Cyberbullying, and Grooming: Results of an Investigative Whole City Survey of Adolescents.

    Science.gov (United States)

    Vismara, Marco Flavio Michele; Toaff, Joseph; Pulvirenti, Giuliana; Settanni, Chiara; Colao, Emma; Lavano, Serena Marianna; Cemicetti, Riccardo; Cotugno, David; Perrotti, Giuseppe; Meschesi, Viviana; Montera, Roberto; Zepponi, Barbara; Rapetto, Umberto; Marotta, Rosa

    2017-08-29

    According to the Digital Agenda for Europe, the way children use the Internet and mobile technologies has changed dramatically in the past years. The aims of this study were to: (1) breakdown the modalities of access and use of the Internet by teenagers to assess risks and risky behaviors; and (2) provide scientific data to evaluate and counsel safe use of the Internet and new technologies by teenagers. The study was conducted under the program "Strategies for a Better Internet for Children" started in May 2012 by the European Commission. It represents the main result of the project launched by Telecom Italia, "Anche io ho qualcosa da dire" (I too have something to say), thanks to which many contributions were collected and used to develop a survey. The questionnaire was structured in 45 questions, covering three macro areas of interest. It was approved by the Department Board at University of Magna Graecia's School of Medicine. After authorization from the regional high school authority, it was administered to all 1534 students (aged 13-19 years) in the city of Catanzaro, Italy. The data was broken down into three main groups: (1) describing education and access to the Internet; (2) methods of use and social networking; and (3) perception and evaluation of risk and risky behaviors. Among noteworthy results in the first group, we can mention that the average age of first contact with information technologies was around 9 years. Moreover, 78.87% (1210/1534) of the interviewed students reported having access to a smartphone or a tablet. Among the results of the second group, we found that the most used social networks were Facebook (85.78%, 1316/1534), YouTube (61.14%, 938/1534), and Google+ (51.56%, 791/1534). About 71.31% (1094/1534) of the interviewed teenagers use their name and surname on social networks, and 40.09% (615/1534) of them knew all their Facebook contacts personally. Among the results of the third group, we found that 7.69% (118/1534) of the

  14. Experience of wireless local area network in a radiation oncology department.

    Science.gov (United States)

    Mandal, Abhijit; Asthana, Anupam Kumar; Aggarwal, Lalit Mohan

    2010-01-01

    The aim of this work is to develop a wireless local area network (LAN) between different types of users (Radiation Oncologists, Radiological Physicists, Radiation Technologists, etc) for efficient patient data management and to made easy the availability of information (chair side) to improve the quality of patient care in Radiation Oncology department. We have used mobile workstations (Laptops) and stationary workstations, all equipped with wireless-fidelity (Wi-Fi) access. Wireless standard 802.11g (as recommended by Institute of Electrical and Electronic Engineers (IEEE, Piscataway, NJ) has been used. The wireless networking was configured with the Service Set Identifier (SSID), Media Access Control (MAC) address filtering, and Wired Equivalent Privacy (WEP) network securities. We are successfully using this wireless network in sharing the indigenously developed patient information management software. The proper selection of the hardware and the software combined with a secure wireless LAN setup will lead to a more efficient and productive radiation oncology department.

  15. A Calibrated Test-Set for Measurement of Access-Point Time Specifications in Hybrid Wired/Wireless Industrial Communication †

    Directory of Open Access Journals (Sweden)

    Federico Tramarin

    2018-05-01

    Full Text Available In factory automation and process control systems, hybrid wired/wireless networks are often deployed to connect devices of difficult reachability such as those mounted on mobile equipment. A widespread implementation of these networks makes use of Access Points (APs to implement wireless extensions of Real-Time Ethernet (RTE networks via the IEEE 802.11 Wireless LAN (WLAN. Unfortunately, APs may introduce random delays in frame forwarding, mainly related to their internal behavior (e.g., queue management, processing times, that clearly impact the overall worst case execution time of real-time tasks involved in industrial process control systems. As a consequence, the knowledge of such delays becomes a crucial design parameter, and their estimation is definitely of utter importance. In this scenario, the paper presents an original and effective method to measure the aforementioned delays introduced by APs, exploiting a hybrid loop-back link and a simple, yet accurate set-up with moderate instrumentation requirements. The proposed method, which requires an initial calibration phase by means of a reference AP, has been successfully tested on some commercial APs to prove its effectiveness. The proposed measurement procedure is proven to be general and, as such, can be profitably adopted in even different scenarios.

  16. Airborne wireless communication systems, airborne communication methods, and communication methods

    Science.gov (United States)

    Deaton, Juan D [Menan, ID; Schmitt, Michael J [Idaho Falls, ID; Jones, Warren F [Idaho Falls, ID

    2011-12-13

    An airborne wireless communication system includes circuitry configured to access information describing a configuration of a terrestrial wireless communication base station that has become disabled. The terrestrial base station is configured to implement wireless communication between wireless devices located within a geographical area and a network when the terrestrial base station is not disabled. The circuitry is further configured, based on the information, to configure the airborne station to have the configuration of the terrestrial base station. An airborne communication method includes answering a 911 call from a terrestrial cellular wireless phone using an airborne wireless communication system.

  17. Use of internet for accessing healthcare information among patients in an outpatient department of a Tertiary Care Center

    Directory of Open Access Journals (Sweden)

    Lakshmi Renganathan

    2017-01-01

    Full Text Available Background: Health information is one of the most accessed topics online. Worldwide, about 4.5% of all Internet searches are for health-related informationand more than 70, 000 websites disseminate health information. However, critics question the quality and credibility of online health information as contents are mostly a result of limited research or are commercialised. There is a need to train people to locate relevant websites where they can efficiently retrieve evidence based information and evaluate the same. The study was conducted with the objectives of determining the prevalence of use of internet for accessing healthcare information amongst literate adult population in an urban area and to assess the association between the demography and the reasons of internet use. Methodology: We used an anonymous, cross sectional survey completed by a sample of out patients of 408 individuals who came to a tertiary care centre at Pune during the year 2015. The survey consisted of 17 questions related to behavioural, attitudinal and demographic items. Results: Out of the total of 408 individuals, 256 (63.2% individuals used internet for health information though 332 (82.4% of them were aware of authorised websites for health information and 69 (16.9% thought information available in the internet can be harmful. Also, 63 out of 256 (24.6% agreed to the fact that they ask questions to their doctors based on the information that they acquired from internet while surfing about that particular disease/ ailment. More individuals (p<0.05 who were working and who were educated, graduates and above, were using internet for health information. Conclusion: Our results suggest the great potential for using the internet to disseminate the information and awareness to the public about health and healthcare facilities. However, it is important to disseminate credible information from reliable and authorised websites assigned for health since online healthcare

  18. Accessing suicide-related information on the internet: a retrospective observational study of search behavior.

    Science.gov (United States)

    Wong, Paul Wai-Ching; Fu, King-Wa; Yau, Rickey Sai-Pong; Ma, Helen Hei-Man; Law, Yik-Wa; Chang, Shu-Sen; Yip, Paul Siu-Fai

    2013-01-11

    The Internet's potential impact on suicide is of major public health interest as easy online access to pro-suicide information or specific suicide methods may increase suicide risk among vulnerable Internet users. Little is known, however, about users' actual searching and browsing behaviors of online suicide-related information. To investigate what webpages people actually clicked on after searching with suicide-related queries on a search engine and to examine what queries people used to get access to pro-suicide websites. A retrospective observational study was done. We used a web search dataset released by America Online (AOL). The dataset was randomly sampled from all AOL subscribers' web queries between March and May 2006 and generated by 657,000 service subscribers. We found 5526 search queries (0.026%, 5526/21,000,000) that included the keyword "suicide". The 5526 search queries included 1586 different search terms and were generated by 1625 unique subscribers (0.25%, 1625/657,000). Of these queries, 61.38% (3392/5526) were followed by users clicking on a search result. Of these 3392 queries, 1344 (39.62%) webpages were clicked on by 930 unique users but only 1314 of those webpages were accessible during the study period. Each clicked-through webpage was classified into 11 categories. The categories of the most visited webpages were: entertainment (30.13%; 396/1314), scientific information (18.31%; 240/1314), and community resources (14.53%; 191/1314). Among the 1314 accessed webpages, we could identify only two pro-suicide websites. We found that the search terms used to access these sites included "commiting suicide with a gas oven", "hairless goat", "pictures of murder by strangulation", and "photo of a severe burn". A limitation of our study is that the database may be dated and confined to mainly English webpages. Searching or browsing suicide-related or pro-suicide webpages was uncommon, although a small group of users did access websites that contain

  19. Ding Dong, You've Got Mail! A Lab Activity for Teaching the Internet of Things

    Science.gov (United States)

    Frydenberg, Mark

    2017-01-01

    Connecting ordinary devices to the Internet is a defining characteristic of the Internet of Things. In this hands-on lab activity, students will connect a wireless doorbell to the Internet using a Raspberry Pi computer. By modifying and running a program on the Raspberry Pi to send an email or text message notifying a recipient that someone is at…

  20. Small Space Platform Enhanced Internet Protocol Stack Device, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Wireless communication of small, nano and micro satellites will play a vital role to NASA mission and marketability of the satellite. The use of an Internet-based...

  1. Data security issues arising from integration of wireless access into healthcare networks.

    Science.gov (United States)

    Frenzel, John C

    2003-04-01

    The versatility of having Ethernet speed connectivity without wires is rapidly driving adoption of wireless data networking by end users across all types of industry. Designed to be easy to configure and work among diverse platforms, wireless brings online data to mobile users. This functionality is particularly useful in modern clinical medicine. Wireless presents operators of networks containing or transmitting sensitive and confidential data with several new types of security vulnerabilities, and potentially opens previously protected core network resources to outside attack. Herein, we review the types of vulnerabilities, the tools necessary to exploit them, and strategies to thwart a successful attack.

  2. IP Connected Low Power Wireless Personal Area Networks in the Future Internet

    DEFF Research Database (Denmark)

    Jacobsen, Rune Hylsberg; Toftegaard, Thomas Skjødeberg; Kjærgaard, Jens Kristian

    2012-01-01

    The Internet of Things is a key concept of the Future Internet. The Internet of Things potentially interconnects billions of small devices in a large ubiquitous infrastructure based on the Internet Protocol (IP). Typically, these devices will be limited in computational capacity, memory......WPANs). The authors address the key mechanisms from network aspects down to device design aspects and discuss how technologies interplay to make real application deployment practical for the Internet of Things....

  3. Multi-Channel Wireless Sensor Networks: Protocols, Design and Evaluation

    NARCIS (Netherlands)

    Durmaz, O.

    2009-01-01

    Pervasive systems, which are described as networked embedded systems integrated with everyday environments, are considered to have the potential to change our daily lives by creating smart surroundings and by their ubiquity, just as the Internet. In the last decade, “Wireless Sensor Networks��? have

  4. On design of sensor nodes in the rice planthopper monitoring system based on the internet of things

    Science.gov (United States)

    Wang, Ke Qiang; Cai, Ken

    2011-02-01

    Accurate records and prediction of the number of the rice planthopper's outbreaks and the environmental information of farmland are effective measures to control pests' damages. On the other hand, a new round of technological revolution from the Internet to the Internet of things is taking place in the field of information. The application of the Internet of things in rice planthopper and environmental online monitoring is an effective measure to solve problems existing in the present wired sensor monitoring technology. Having described the general framework of wireless sensor nodes in the Internet of things in this paper, the software and hardware design schemes of wireless sensor nodes are proposed, combining the needs of rice planthopper and environmental monitoring. In these schemes, each module's design and key components' selection are both aiming to the characteristics of the Internet of things, so it has a strong practical value.

  5. Accessibility and preferred use of online Web applications among WIC participants with Internet access.

    Science.gov (United States)

    Bensley, Robert J; Hovis, Amanda; Horton, Karissa D; Loyo, Jennifer J; Bensley, Kara M; Phillips, Diane; Desmangles, Claudia

    2014-01-01

    This study examined the current technology use of clients in the western Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) region and the preferences these current clients have for using new technologies to interact with WIC. Cross-sectional convenience sample for online survey of WIC clients over 2 months in 2011. A weighted sample of 8,144 participants showed that the majority of WIC clients have access to the Internet using a computer or mobile phone. E-mail, texting, and Facebook were technologies most often used for communication. Significant differences (P video chat. Technologies should be considered for addressing WIC clients' needs, including use of text messaging and smartphone apps for appointments, education, and other WIC services; online scheduling and nutrition education; and a stronger Facebook presence for connecting with WIC clients and breastfeeding support. Published by Elsevier Inc.

  6. Wireless multimedia communication systems design, analysis, and implementation

    CERN Document Server

    Rao, KR; Bakmaz, Bojan M

    2014-01-01

    Rapid progress in software, hardware, mobile networks, and the potential of interactive media poses many questions for researchers, manufacturers, and operators of wireless multimedia communication systems. Wireless Multimedia Communication Systems: Design, Analysis, and Implementation strives to answer those questions by not only covering the underlying concepts involved in the design, analysis, and implementation of wireless multimedia communication systems, but also by tackling advanced topics such as mobility management, security components, and smart grids.Offering an accessible treatment

  7. Circuit Design for Highly Sensitive RF-Powered Wireless Sensor Nodes

    NARCIS (Netherlands)

    Stoopman, M.

    2016-01-01

    Emerging applications such as Internet of Things (IoT), smart buildings and warehouse inventory management are important driving forces behind the development of Wireless Sensor Nodes (WSNs). With future advancements made in the semiconductor industry, these WSNs are expected to become smaller,

  8. Gender Differences in Availability, Internet Access and Rate of Usage of Computers among Distance Education Learners.

    Science.gov (United States)

    Atan, Hanafi; Sulaiman, Fauziah; Rahman, Zuraidah Abd; Idrus, Rozhan Mohammed

    2002-01-01

    Explores the level of availability of computers, Internet accessibility, and the rate of usage of computers both at home and at the workplace between distance education learners according to gender. Results of questionnaires completed at the Universiti Sains Malaysia indicate that distance education reduces the gender gap. (Author/LRW)

  9. The digital divide: Trends in global mobile and broadband Internet access from 2000–2010

    Science.gov (United States)

    Ronquillo, Charlene; Currie, Leanne

    2012-01-01

    The digital divide is described as the gap between those who do and do not have access to digital information and communications technologies (ICT). ICTs are viewed as an indicator of infrastructure and potential for development, and are a growing platform for health information and services delivery. This study compares the penetration of mobile and broadband Internet technologies by global region from 2000 to 2010. Results illustrate the rapid growth of mobile cellular telephone subscriptions in all global regions with trends suggesting a continued increase. Little to modest gains were made in fixed broadband Internet subscriptions globally. There is a growing popularity of mobile subscriptions with use of data communications, exceeding the numbers of fixed Internet subscriptions. This comparison reveals current strengths that can be built on and highlights the importance of awareness of global trends and using such knowledge to inform design and delivery of ICT-based health services. PMID:24199118

  10. Cross-layer design for radio resource allocation based on priority scheduling in OFDMA wireless access network

    Directory of Open Access Journals (Sweden)

    Chen Yen-Wen

    2011-01-01

    Full Text Available Abstract The orthogonal frequency-division multiple access (OFDMA system has the advantages of flexible subcarrier allocation and adaptive modulation with respect to channel conditions. However, transmission overhead is required in each frame to broadcast the arrangement of radio resources to all mobile stations within the coverage of the same base station. This overhead greatly affects the utilization of valuable radio resources. In this paper, a cross layer scheme is proposed to reduce the number of traffic bursts at the downlink of an OFDMA wireless access network so that the overhead of the media access protocol (MAP field can be minimized. The proposed scheme considers the priorities and the channel conditions of quality of service (QoS traffic streams to arrange for them to be sent with minimum bursts in a heuristic manner. In addition, the trade-off between the degradation of the modulation level and the reduction of traffic bursts is investigated. Simulation results show that the proposed scheme can effectively reduce the traffic bursts and, therefore, increase resource utilization.

  11. Accessing data transfer reliability for duty cycled mobile wireless sensor network

    International Nuclear Information System (INIS)

    Shaikh, F.K.

    2014-01-01

    Mobility in WSNs (Wireless Sensor Networks) introduces significant challenges which do not arise in static WSNs. Reliable data transport is an important aspect of attaining consistency and QoS (Quality of Service) in several applications of MWSNs (Mobile Wireless Sensor Networks). It is important to understand how each of the wireless sensor networking characteristics such as duty cycling, collisions, contention and mobility affects the reliability of data transfer. If reliability is not managed well, the MWSN can suffer from overheads which reduce its applicability in the real world. In this paper, reliability assessment is being studied by deploying MWSN in different indoor and outdoor scenarios with various duty cycles of the motes and speeds of the mobile mote. Results show that the reliability is greatly affected by the duty cycled motes and the mobility using inherent broadcast mechanisms. (author)

  12. Spread Spectrum Techniques and their Applications to Wireless Communications

    DEFF Research Database (Denmark)

    Prasad, Ramjee; Cianca, E.

    2005-01-01

    Spread Spectrum (SS) radio communications is on the verge of potentially explosive commercial development An SS-based multiple access, such as CDMA, has been chosen for 3G wireless communications. Other current applications of SS techniues are in Wireless LANs and Satellite Navigation Systems...

  13. Competition in the domain of wireless networks security

    Science.gov (United States)

    Bednarczyk, Mariusz

    2017-04-01

    Wireless networks are very popular and have found wide spread usage amongst various segments, also in military environment. The deployment of wireless infrastructures allow to reduce the time it takes to install and dismantle communications networks. With wireless, users are more mobile and can easily get access to the network resources all the time. However, wireless technologies like WiFi or Bluetooth have security issues that hackers have extensively exploited over the years. In the paper several serious security flaws in wireless technologies are presented. Most of them enable to get access to the internal networks and easily carry out man-in-the-middle attacks. Very often, they are used to launch massive denial of service attacks that target the physical infrastructure as well as the RF spectrum. For instance, there are well known instances of Bluetooth connection spoofing in order to steal WiFi password stored in the mobile device. To raise the security awareness and protect wireless networks against an adversary attack, an analysis of attack methods and tools over time is presented in the article. The particular attention is paid to the severity, possible targets as well as the ability to persist in the context of protective measures. Results show that an adversary can take complete control of the victims' mobile device features if the users forget to use simple safety principles.

  14. Internet access, awareness and utilisation of web based evidence: a survey of ANZ and Singaporean radiation oncology registrars in 2003

    International Nuclear Information System (INIS)

    Wong, K.; Veness, M.

    2003-01-01

    The past decade has seen an 'explosion' in electronically archived evidence available on the Internet. Access to, and awareness of, pre-appraised web based evidence such as is available at the Cochrane Library, and more recently the Cancer Library, is now easily accessible to both clinicians and patients. A postal survey was recently sent out to all Radiation Oncology registrars in Australia, New Zealand and Singapore. The aim of the survey was to ascertain previous training in literature searching and critical appraisal, the extent of Internet access and use of web based evidence and awareness of databases including the Cochrane Library. Sixty six (66) out of ninety (90) registrars responded (73% response rate). Fifty five percent of respondents had previously undertaken some form of training related to literature searching or critical appraisal. The majority (68%) felt confident in performing a literature search, although 80% of respondents indicated interest in obtaining further training. The majority (68%) reported accessing web-based evidence for literature searching in the previous week, and 92% in the previous month. Nearly all respondents (89%) accessed web-based evidence at work. Most (94%) were aware of the Cochrane Library with 48% of respondents having used this database. Sixty-eight percent were aware of the Cancer Library. In 2000 a similar survey revealed only 68% of registrars aware and 30% having used the Cochrane Library. These findings reveal almost universal access to the Internet and use of web-based evidence amongst Radiation Oncology registrars. There has been a marked increase in awareness and use of the Cochrane Library with the majority also aware of the recently introduced Cancer Library

  15. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks

    Directory of Open Access Journals (Sweden)

    Raghav V. Sampangi

    2015-09-01

    Full Text Available Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID and Wireless Body Area Networks (WBAN that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG, and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  16. Butterfly Encryption Scheme for Resource-Constrained Wireless Networks.

    Science.gov (United States)

    Sampangi, Raghav V; Sampalli, Srinivas

    2015-09-15

    Resource-constrained wireless networks are emerging networks such as Radio Frequency Identification (RFID) and Wireless Body Area Networks (WBAN) that might have restrictions on the available resources and the computations that can be performed. These emerging technologies are increasing in popularity, particularly in defence, anti-counterfeiting, logistics and medical applications, and in consumer applications with growing popularity of the Internet of Things. With communication over wireless channels, it is essential to focus attention on securing data. In this paper, we present an encryption scheme called Butterfly encryption scheme. We first discuss a seed update mechanism for pseudorandom number generators (PRNG), and employ this technique to generate keys and authentication parameters for resource-constrained wireless networks. Our scheme is lightweight, as in it requires less resource when implemented and offers high security through increased unpredictability, owing to continuously changing parameters. Our work focuses on accomplishing high security through simplicity and reuse. We evaluate our encryption scheme using simulation, key similarity assessment, key sequence randomness assessment, protocol analysis and security analysis.

  17. Internet Addiction among Adolescence

    Science.gov (United States)

    Sargin, Nurten

    2012-01-01

    Each innovation brings along many risks. One of the risks related with the Internet use is Internet addiction. The aim of this study is to examine Internet addiction in adolescence in terms of gender, Internet access at home and grades. The research design used was survey method. The study population consisted of second stage students attending…

  18. Internet-Based Indoor Navigation Services

    OpenAIRE

    Zeinalipour-Yazti, Demetrios; Laoudias, Christos; Georgiou, Kyriakos

    2017-01-01

    Smartphone advances are leading to a class of Internet-based Indoor Navigation services. IIN services rely on geolocation databases that store indoor models, comprising floor maps and points of interest, along with wireless, light, and magnetic signals for localizing users. Developing IIN services creates new information management challenges - such as crowdsourcing indoor models, acquiring and fusing big data velocity signals, localization algorithms, and custodians' location privacy. Here, ...

  19. Internet of "printed" Things: low-cost fabrication of autonomous sensing nodes by inkjet printing

    Science.gov (United States)

    Kawahara, Yoshihiro

    2014-11-01

    "What if electronics devices are printed using an inkjet printer even at home?" "What if those devices no longer need a battery?" I will introduce two enabling technologies for the Internet of Things concept. 1. Instant Inkjet Circuits: A low cost, fast and accessible technology to support the rapid prototyping of electronic devices. We demonstrated that "sintering-free" silver nano particle ink with a commodity inkjet printer can be used to fabricate printed circuit board and high-frequency applications such as antennas and sensors. The technology is now commercialized by AgIC, Inc. 2. Wireless Power: Although large amounts of data can be exchanged over a wireless communication link, mobile devices are still tethered by power cables. We are trying to solve this problem by two different approaches: energy harvesting. A simple circuitry comprised of diodes and capacitor can convert ambient radio signals into DC current. Our research revealed the signals from TV tower located 6.5km apart could be used to feed 100 microwatts to power microcontrollers.

  20. Associations among Different Internet Access Time, Gender and Cyberbullying Behaviors in Taiwan?s Adolescents

    OpenAIRE

    Chao, Cheng-Min; Yu, Tai-Kuei

    2017-01-01

    With the increasing convenience of social networking sites and their interconnectedness with human interaction, verbal and image bullying have turned digital, making cyberbullying a new form of bullying attracting the attention of researchers, social workers, and schools. This study focuses on the status quo of attitude toward cyberbullying and cyberbullying behavior, explores associations of attitude toward behavior on cyberbullying behavior in gender and different internet access times. In ...

  1. Copenhagen as a centre of excellence for mobile and Wireless communication

    DEFF Research Database (Denmark)

    Falch, Morten

    doing well with regard to connectivity of broadband and Internet access, and Denmark has also developed an advanced market for mobile services. The major share of the Danish mobile sector is concentrated in the capital region. In relative terms the mobile sector is largest in Northern Jutland......The aim of this paper is to analyze the potential of the Copenhagen capital region to maintain a leading position in development and provision of mobile technologies. The paper presents empirical data on the mobile sector in the capital region in order to identify strengths and weaknesses...... of the Capital Region of Copenhagen. Denmark is as the rest of Scandinavia considered to be among the leading countries with regard to mobile and wireless communication. This position has been confirmed in a long series of benchmarking analyses comparing e-readiness in countries and regions. Denmark is also...

  2. Accounting for Energy Cost When Designing Energy-Efficient Wireless Access Networks

    Directory of Open Access Journals (Sweden)

    Greta Vallero

    2018-03-01

    Full Text Available Because of the increase of the data traffic demand, wireless access networks, through which users access telecommunication services, have expanded, in terms of size and of capability and, consequently, in terms of power consumption. Therefore, costs to buy the necessary power for the supply of base stations of those networks is becoming very high, impacting the communication cost. In this study, strategies to reduce the amount of money spent for the purchase of the energy consumed by the base stations are proposed for a network powered by solar panels, energy batteries and the power grid. First, the variability of the energy prices is exploited. It provides a cost reduction of up to 30%, when energy is bought in advance. If a part of the base stations is deactivated when the energy price is higher than a given threshold, a compromise between the energy cost and the user coverage drop is needed. In the simulated scenario, the necessary energy cost can be reduced by more than 40%, preserving the user coverage by greater than 94%. Second, the network is introduced to the energy market: it buys and sells energy from/to the traditional power grid. Finally, costs are reduced by the reduction of power consumption of the network, achieved by using microcell base stations. In the considered scenario, up to a 31% cost reduction is obtained, without the deterioration of the quality of service, but a huge Capex expenditure is required.

  3. Distribution of Multimedia Streams to Mobile Internet Users

    NARCIS (Netherlands)

    Hesselman, C.E.W.

    2005-01-01

    In this thesis, we consider the efficient distribution of live and scheduled multimedia content (e.g., radio and TV broadcasts) to mobile users via a ubiquitous wireless Internet. The objective is to design and develop a content delivery system that (1) enables content owners to deliver their

  4. Real-Time Communication in Wireless Home Networks

    NARCIS (Netherlands)

    Scholten, Johan; Jansen, P.G.

    This paper describes a medium access protocol for real-time communication in wireless networks. Medium access is controlled by a scheduler, which utilizes a pre-emptive earliest deadline first (PEDF) scheduling algorithm. The scheduler prevents collisions in the network, where normally only

  5. Integrated control platform for converged optical and wireless networks

    DEFF Research Database (Denmark)

    Yan, Ying

    The next generation of broadband access networks is expected to be heterogeneous. Multiple wired and wireless systems can be integrated, in order to simultaneously provide seamless access with an appropriate Quality of Service (QoS). Wireless networks support ubiquitous connectivity yet low data...... rates, whereas optical networks can offer much higher data rates but only provide fixed connection structures. Their complementary characteristics make the integration of the two networks a promising trend for next generation networks. With combined strengths, the converged network will provide both...... the complementary characteristics of the optical networks and the wireless networks, addresses motivations for their interworking, discusses the current progress in hybrid network architectures as well as the functionalities of a control system, and identifies the achieved research contributions in the integrated...

  6. An Internet of Things Based Multi-Level Privacy-Preserving Access Control for Smart Living

    Directory of Open Access Journals (Sweden)

    Usama Salama

    2018-05-01

    Full Text Available The presence of the Internet of Things (IoT in healthcare through the use of mobile medical applications and wearable devices allows patients to capture their healthcare data and enables healthcare professionals to be up-to-date with a patient’s status. Ambient Assisted Living (AAL, which is considered as one of the major applications of IoT, is a home environment augmented with embedded ambient sensors to help improve an individual’s quality of life. This domain faces major challenges in providing safety and security when accessing sensitive health data. This paper presents an access control framework for AAL which considers multi-level access and privacy preservation. We focus on two major points: (1 how to use the data collected from ambient sensors and biometric sensors to perform the high-level task of activity recognition; and (2 how to secure the collected private healthcare data via effective access control. We achieve multi-level access control by extending Public Key Infrastructure (PKI for secure authentication and utilizing Attribute-Based Access Control (ABAC for authorization. The proposed access control system regulates access to healthcare data by defining policy attributes over healthcare professional groups and data classes classifications. We provide guidelines to classify the data classes and healthcare professional groups and describe security policies to control access to the data classes.

  7. Marine C2 in Support of HA/DR: Observations and Critical Assessments Following Super-Typhoon Haiyan

    Science.gov (United States)

    2014-06-01

    farm (Figure 1), established Internet access over commercial satellite service 6 (Figure 2), and configured a wireless local area network ( WLAN ...included support for a larger diameter wireless local area network ( WLAN ), providing greater freedom of movement for users accessing the GATR...emerging commercial capabilities, both communications systems and handheld/user-access devices involves the establishment of a synergistic application

  8. MANETS and Internet of Things: The Development of a Data Routing Algorithm

    Directory of Open Access Journals (Sweden)

    I. A. Alameri

    2018-02-01

    Full Text Available Internet of things (IoT, is an innovative technology which allows the connection of physical things with the digital world through the use of heterogeneous networks and communication technologies. IoT in smart environments interacts with wireless sensor network (WSN and mobile ad‐hoc network (MANET, becoming even more attractive and economically successful. Interaction between wireless sensor and mobile ad‐hoc networks with the internet of things allows the creation of a new MANET‐IoT systems and IT‐based networks. Such systems give the user greater mobility and reduce costs. At the same time new challenging issues are opened in networking aspects. In this work, author proposed a routing solution for the IoT system using a combination of MANET protocols and WSN routing principles. The presented results of solution's investigation provide an effective approach to efficient energy consumption in the global MANET‐IoT system. That is a step forward to a reliable provision of services over global future internet infrastructure.

  9. Use of consumer wireless devices by South Africans with severe communication disability.

    Science.gov (United States)

    Bornman, Juan; Bryen, Diane Nelson; Moolman, Enid; Morris, John

    2016-01-01

    Advancements in wireless technology (e.g. cell phones and tablets) have opened new communication opportunities and environments for individuals with severe communication disabilities. The advancement of these technologies poses challenges to ensuring that these individuals enjoy equal access to this increasingly essential technology. However, a paucity of research exists. To describe the nature and frequency with which South African adults with severe communication disabilities have access to and use wireless devices, as well as the types of activities for which wireless devices are used. Survey research was conducted with 30 individuals who use augmentative and alternative communication (AAC) technology using the Survey of User Needs Questionnaire developed in the United States, and localized to the South African context. All participants, despite their limited education, unemployment and low economic status, owned and/or used mainstream wireless devices. Slightly more than half of the participants (53.3%) needed adaptations to their wireless devices. Advantages of using wireless devices were highlighted, including connecting with others (through using text messaging, social networking, making plans with others, sharing photos and videos with friends), for leisure activities (e.g. listening to music, watching videos, playing games), and for safety purposes (e.g. to navigate when lost, using the device when in trouble and needing immediate assistance). These wireless devices offer substantial benefits and opportunities to individuals with disabilities who rely on AAC in terms of independence, social participation, education and safety/security. However, they still do not enjoy equal opportunity to access and use wireless devices relative to the non-disabled population.

  10. Evidence-based decision making and asthma in the internet age: the tools of the trade.

    Science.gov (United States)

    Jadad, A R

    2002-01-01

    At the dawn of the Information Age, the practice of evidence-based decision making (EBDM) is still hindered by many important barriers related to the decision makers, to the evidence per se or to the health system. Some of these barriers, particularly those related to the distillation, dissemination and packaging of research evidence, could be overcome by recent and ongoing developments in portable/wearable computers, internet appliances, multimedia and wireless broadband internet traffic. This article describes specific EBDM-related tools, with emphasis on internet-enabled "how to" books; and tools to improve the quality of reporting research, to formulate questions; to search for evidence; to access journals, systematic reviews and guidelines; to interact with organizations promoting EBDM; and to tailor evidence to individual cases. However, thinking that all barriers to the practice of EBDM could be solved by fancy information technology is naïve. Barriers related to the generation, interpretation, integration and use of the evidence demand more complex and perhaps unfeasible solutions, as overcoming them will require substantial changes in the structure of the health system, in the politics of science and in the way in which humans think and behave.

  11. Prevalence of Internet use amongst an elective spinal surgery outpatient population.

    Science.gov (United States)

    Baker, Joseph F; Devitt, Brian M; Kiely, Paul D; Green, James; Mulhall, Kevin J; Synnott, Keith A; Poynton, Ashley R

    2010-10-01

    Nationally 62% of individuals in Ireland have internet access. Previous published work has suggested that internet use is higher among those with low back pain. We aimed to determine the levels of internet access and use amongst an elective spinal outpatient population and determine what characteristics influence these. We distributed a self-designed questionnaire to patients attending elective spinal outpatient clinics. Data including demographics, history of surgery, number of visits, level of satisfaction with previous consultations, access to the internet, possession of health insurance, and details regarding use of the internet to research one's spinal complaint were collected. 213 patients completed the questionnaire. 159 (75%) had access to the internet. Of this group 48 (23%) used the internet to research their spinal condition. Increasing age, higher education level, and possession of health insurance were all significantly associated with access to the internet (p internet use while possession of insurance weakly predicted non-use (p internet access is consistent with national statistics and use is comparable to previous reports. Approximately, one quarter of outpatients will use the internet to research their spinal condition. Should we use this medium to disseminate information we need to be aware some groups may not have access.

  12. Prevalence of Internet use amongst an elective spinal surgery outpatient population.

    LENUS (Irish Health Repository)

    Baker, Joseph F

    2010-10-01

    Nationally 62% of individuals in Ireland have internet access. Previous published work has suggested that internet use is higher among those with low back pain. We aimed to determine the levels of internet access and use amongst an elective spinal outpatient population and determine what characteristics influence these. We distributed a self-designed questionnaire to patients attending elective spinal outpatient clinics. Data including demographics, history of surgery, number of visits, level of satisfaction with previous consultations, access to the internet, possession of health insurance, and details regarding use of the internet to research one\\'s spinal complaint were collected. 213 patients completed the questionnaire. 159 (75%) had access to the internet. Of this group 48 (23%) used the internet to research their spinal condition. Increasing age, higher education level, and possession of health insurance were all significantly associated with access to the internet (p < 0.05). A higher education level predicted greater internet use while possession of insurance weakly predicted non-use (p < 0.05). In our practice, internet access is consistent with national statistics and use is comparable to previous reports. Approximately, one quarter of outpatients will use the internet to research their spinal condition. Should we use this medium to disseminate information we need to be aware some groups may not have access.

  13. Software defined networking for improved wireless sensor network management: a survey

    CSIR Research Space (South Africa)

    Ndiaye, M

    2017-05-01

    Full Text Available Wireless sensor networks (WSNs) are becoming increasingly popular with the advent of the Internet of things (IoT). Various real-world applications of WSNs such as in smart grids, smart farming and smart health would require a potential deployment...

  14. Tactical Wireless Networking in Coalition Environments: Implementing an IEEE 802.20 Wireless End-User Network Utilizing FLASH-OFDM to Provide a Secure Mobile Extension to Existing WAN

    National Research Council Canada - National Science Library

    Parrish, William J; Tovar, Daniel R

    2005-01-01

    This thesis will focus on the area of 802.20 wireless networking as a feasible "last mile" solution to wireless access in a tactical coalition environment and will be implemented into a series of experiments...

  15. WiMax taking wireless to the max

    CERN Document Server

    Pareek, Deepak

    2006-01-01

    With market value expected to reach 5 billion by 2007 and the endorsement of some of the biggest names in telecommunications, World Interoperability for Microwave Access (WiMAX) is poised to change the broadband wireless landscape. But how much of WiMAX's touted potential is merely hype? Now that several pre-WiMAX networks have been deployed, what are the operators saying about QoS and ROI? How and when will device manufacturers integrate WiMAX into their products? What is the business case for using WiMAX rather than any number of other established wireless alternatives?WiMAX: Taking Wireless

  16. Enabling multimode wireless access networks using remote radio heads

    DEFF Research Database (Denmark)

    Kardaras, Georgios; Soler, José; Dittmann, Lars

    2012-01-01

    and management plane. Switching between wireless standards becomes easily feasible through firmware upgrading. Finally, real-time configuration of radio functionalities, such as transmit power, receiver gain, carrier frequency, channel bandwidth and others result in a modular software defined radio platform...

  17. Don't Let Your COWS Be an Udder (Utter) Disaster: Wirelessness and Education Test the Electromagnetic Spectrum

    Science.gov (United States)

    Huber, Joe; Gillan, Bud

    2004-01-01

    Just when thinking about the Internet and other tidal waves of technology have found their places in schools, along comes a brash new upstart called wirelessness. This discussion takes on more simple task of providing more useful information to schools in their quest for being wireless, including the use of COWS (computer on wheels) is related to…

  18. A New Missing Values Estimation Algorithm in Wireless Sensor Networks Based on Convolution

    Directory of Open Access Journals (Sweden)

    Feng Liu

    2013-04-01

    Full Text Available Nowadays, with the rapid development of Internet of Things (IoT applications, data missing phenomenon becomes very common in wireless sensor networks. This problem can greatly and directly threaten the stability and usability of the Internet of things applications which are constructed based on wireless sensor networks. How to estimate the missing value has attracted wide interest, and some solutions have been proposed. Different with the previous works, in this paper, we proposed a new convolution based missing value estimation algorithm. The convolution theory, which is usually used in the area of signal and image processing, can also be a practical and efficient way to estimate the missing sensor data. The results show that the proposed algorithm in this paper is practical and effective, and can estimate the missing value accurately.

  19. 802.11 Wireless Infrastructure To Enhance Medical Response to Disasters

    Science.gov (United States)

    Arisoylu, Mustafa; Mishra, Rajesh; Rao, Ramesh; Lenert, Leslie A.

    2005-01-01

    802.11 (WiFi) is a well established network communications protocol that has wide applicability in civil infrastructure. This paper describes research that explores the design of 802.11 networks enhanced to support data communications in disaster environments. The focus of these efforts is to create network infrastructure to support operations by Metropolitan Medical Response System (MMRS) units and Federally-sponsored regional teams that respond to mass casualty events caused by a terrorist attack with chemical, biological, nuclear or radiological weapons or by a hazardous materials spill. In this paper, we describe an advanced WiFi-based network architecture designed to meet the needs of MMRS operations. This architecture combines a Wireless Distribution Systems for peer-to-peer multihop connectivity between access points with flexible and shared access to multiple cellular backhauls for robust connectivity to the Internet. The architecture offers a high bandwidth data communications infrastructure that can penetrate into buildings and structures while also supporting commercial off-the-shelf end-user equipment such as PDAs. It is self-configuring and is self-healing in the event of a loss of a portion of the infrastructure. Testing of prototype units is ongoing. PMID:16778990

  20. A hybrid MAC protocol design for energy-efficient very-high-throughput millimeter wave, wireless sensor communication networks

    Science.gov (United States)

    Jian, Wei; Estevez, Claudio; Chowdhury, Arshad; Jia, Zhensheng; Wang, Jianxin; Yu, Jianguo; Chang, Gee-Kung

    2010-12-01

    This paper presents an energy-efficient Medium Access Control (MAC) protocol for very-high-throughput millimeter-wave (mm-wave) wireless sensor communication networks (VHT-MSCNs) based on hybrid multiple access techniques of frequency division multiplexing access (FDMA) and time division multiplexing access (TDMA). An energy-efficient Superframe for wireless sensor communication network employing directional mm-wave wireless access technologies is proposed for systems that require very high throughput, such as high definition video signals, for sensing, processing, transmitting, and actuating functions. Energy consumption modeling for each network element and comparisons among various multi-access technologies in term of power and MAC layer operations are investigated for evaluating the energy-efficient improvement of proposed MAC protocol.

  1. Modeling Multistandard Wireless Networks in OPNET

    DEFF Research Database (Denmark)

    Zakrzewska, Anna; Berger, Michael Stübert; Ruepp, Sarah Renée

    2011-01-01

    Future wireless communication is emerging towards one heterogeneous platform. In this new environment wireless access will be provided by multiple radio technologies that are cooperating and complementing one another. The paper investigates the possibilities of developing such a multistandard sys...... system using OPNET Modeler. A network model consisting of LTE interworking with WLAN and WiMAX is considered from the radio resource management perspective. In particular, implementing a joint packet scheduler across multiple systems is discussed more in detail....

  2. Opportunity for All: How the American Public Benefits from Internet Access at U.S. Libraries

    Science.gov (United States)

    Becker, Samantha; Crandall, Michael D.; Fisher, Karen E.; Kinney, Bo; Landry, Carol; Rocha, Anita

    2010-01-01

    Over the past decade and a half, free access to computers and the Internet in U.S. public libraries evolved from a rare commodity into a core service. Now, people from all walks of life rely on this service every day to look for jobs, find health care, and read the latest news. As the nation struggled through a historic recession, nearly one-third…

  3. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP

    Directory of Open Access Journals (Sweden)

    Dan Garcia-Carrillo

    2017-11-01

    Full Text Available The Internet-of-Things (IoT landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN, the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP, which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA infrastructures and the Extensible Authentication Protocol (EAP protocol. For this integration, we use the Constrained Application Protocol (CoAP to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.

  4. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP.

    Science.gov (United States)

    Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander

    2017-11-17

    The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.

  5. Monitoring System of Environmental Variables Using a Wireless Sensor Network and Platforms of Internet of Things

    Directory of Open Access Journals (Sweden)

    Manuel Quiñones-Cuenca

    2017-02-01

    Full Text Available This work proposes a system for collecting meteorological data using a Wireless Sensor Network (WSN, that is able to transmit data in real-time. The system automatizes the process of collecting the data in a continuous manner for long periods of time, for this, the module is equipped with a source of solar energy that allows autonomous operation. In order to obtain viability of design and prototype implementation, the construction of two systems was proposed based on DigiMesh and Wi-Fi; those prototypes could be applied to different scenarios such as urban and rural areas. Additionally, it was performed an evaluation of broadcasting of information to platforms of Internet of Things (IoT, where the data collected by the nodes will be managed and displayed. This system was conceived as a low-cost alternative compared with conventional weather stations that offer these facilities and are based on free hardware and software components. Finally, the validation of the obtained results was performed using a statistical analysis with the collected data of the weather station Davis Vantage Pro, obtaining a maximum average relative error of 4.93%.

  6. .Planning Our Smart Cities In The Internet Of Things Architects ...

    African Journals Online (AJOL)

    2016-12-01

    Dec 1, 2016 ... ... IoT (Internet of Things) was developed in parallel to Wireless Sensor Networks, and ... interpret and transmit the data coming from all these sensors. The cloud is .... devices or data sources with limited power and unreliable ...

  7. Wireless technology for ABC Assessment

    DEFF Research Database (Denmark)

    Kristensen, Margit; Kyng, Morten; Christensen, Erika Frischknecht

    are developing: A wireless biomonitoring system (WBMS), where data, collected from (injured) persons is distributed wirelessly to displays, available for any rescuer in need of accessing the data, independently of the rescuers location. A biosensor for measuring respiration sound and frequency, to give direct....... Firstly in the daily EMS work where the collected data can be available at the hospital before the victim arrives and data can be used in the before-arrival-planning process. Secondly in larger incidents with several victims where a WBMS can support rescuers at the incident site in the assessment...

  8. Wireless Augmented Reality Communication System

    Science.gov (United States)

    Devereaux, Ann (Inventor); Jedrey, Thomas (Inventor); Agan, Martin (Inventor)

    2017-01-01

    A portable unit is for video communication to select a user name in a user name network. A transceiver wirelessly accesses a communication network through a wireless connection to a general purpose node coupled to the communication network. A user interface can receive user input to log on to a user name network through the communication network. The user name network has a plurality of user names, at least one of the plurality of user names is associated with a remote portable unit, logged on to the user name network and available for video communication.

  9. A Study of LoRa: Long Range & Low Power Networks for the Internet of Things.

    Science.gov (United States)

    Augustin, Aloÿs; Yi, Jiazi; Clausen, Thomas; Townsley, William Mark

    2016-09-09

    LoRa is a long-range, low-power, low-bitrate, wireless telecommunications system, promoted as an infrastructure solution for the Internet of Things: end-devices use LoRa across a single wireless hop to communicate to gateway(s), connected to the Internet and which act as transparent bridges and relay messages between these end-devices and a central network server. This paper provides an overview of LoRa and an in-depth analysis of its functional components. The physical and data link layer performance is evaluated by field tests and simulations. Based on the analysis and evaluations, some possible solutions for performance enhancements are proposed.

  10. A Study of LoRa: Long Range & Low Power Networks for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Aloÿs Augustin

    2016-09-01

    Full Text Available LoRa is a long-range, low-power, low-bitrate, wireless telecommunications system, promoted as an infrastructure solution for the Internet of Things: end-devices use LoRa across a single wireless hop to communicate to gateway(s, connected to the Internet and which act as transparent bridges and relay messages between these end-devices and a central network server. This paper provides an overview of LoRa and an in-depth analysis of its functional components. The physical and data link layer performance is evaluated by field tests and simulations. Based on the analysis and evaluations, some possible solutions for performance enhancements are proposed.

  11. Outsourcing a High Speed Internet Access Project: An Information Technology Class Case Study in Three Parts

    Science.gov (United States)

    Platt, Richard G.; Carper, William B.; McCool, Michael

    2010-01-01

    In early 2004, the Hilton Hotels Corporation (HHC) required that all of its hotels (both owned and franchised) install high-speed Internet access (HSIA) in all of their rooms by June 2004. This case focuses on how one of its franchise properties located on the northern gulf coast of Florida (the Hilton Sandestin Beach Golf Resort &…

  12. Internet addiction or excessive internet use.

    Science.gov (United States)

    Weinstein, Aviv; Lejoyeux, Michel

    2010-09-01

    Problematic Internet addiction or excessive Internet use is characterized by excessive or poorly controlled preoccupations, urges, or behaviors regarding computer use and Internet access that lead to impairment or distress. Currently, there is no recognition of internet addiction within the spectrum of addictive disorders and, therefore, no corresponding diagnosis. It has, however, been proposed for inclusion in the next version of the Diagnostic and Statistical Manual of Mental Disorder (DSM). To review the literature on Internet addiction over the topics of diagnosis, phenomenology, epidemiology, and treatment. Review of published literature between 2000-2009 in Medline and PubMed using the term "internet addiction. Surveys in the United States and Europe have indicated prevalence rate between 1.5% and 8.2%, although the diagnostic criteria and assessment questionnaires used for diagnosis vary between countries. Cross-sectional studies on samples of patients report high comorbidity of Internet addiction with psychiatric disorders, especially affective disorders (including depression), anxiety disorders (generalized anxiety disorder, social anxiety disorder), and attention deficit hyperactivity disorder (ADHD). Several factors are predictive of problematic Internet use, including personality traits, parenting and familial factors, alcohol use, and social anxiety. Although Internet-addicted individuals have difficulty suppressing their excessive online behaviors in real life, little is known about the patho-physiological and cognitive mechanisms responsible for Internet addiction. Due to the lack of methodologically adequate research, it is currently impossible to recommend any evidence-based treatment of Internet addiction.

  13. Digital signal processing for wireless communication using Matlab

    CERN Document Server

    Gopi, E S

    2016-01-01

    This book examines signal processing techniques used in wireless communication illustrated by using the Matlab program. The author discusses these techniques as they relate to Doppler spread; delay spread; Rayleigh and Rician channel modeling; rake receiver; diversity techniques; MIMO and OFDM -based transmission techniques; and array signal processing. Related topics such as detection theory, link budget, multiple access techniques, and spread spectrum are also covered.   ·         Illustrates signal processing techniques involved in wireless communication using Matlab ·         Discusses multiple access techniques such as Frequency division multiple access, Time division multiple access, and Code division multiple access ·         Covers band pass modulation techniques such as Binary phase shift keying, Differential phase shift keying, Quadrature phase shift keying, Binary frequency shift keying, Minimum shift keying, and Gaussian minimum shift keying.

  14. On Novel Access and Scheduling Schemes for IoT Communications

    Directory of Open Access Journals (Sweden)

    Zheng Jiang

    2016-01-01

    Full Text Available The Internet of Things (IoT is expected to foster the development of 5G wireless networks and requires the efficient support for a large number of simultaneous short message communications. To address these challenges, some existing works utilize new waveform and multiuser superposition transmission schemes to improve the capacity of IoT communication. In this paper, we will investigate the spatial degree of freedom of IoT devices based on their distribution, then extend the multiuser shared access (MUSA which is one of the typical MUST schemes to spatial domain, and propose two novel schemes, that is, the preconfigured access scheme and the joint spatial and code domain scheduling scheme, to enhance IoT communication. The results indicate that the proposed schemes can reduce the collision rate dramatically during the IoT random access procedure and improve the performance of IoT communication obviously. Based on the simulation results, it is also shown that the proposed scheduling scheme can achieve the similar performance to the corresponding brute-force scheduling but with lower complexity.

  15. Evaluation of an open-access CBT-based Internet program for social anxiety: Patterns of use, retention, and outcomes.

    Science.gov (United States)

    Dryman, M Taylor; McTeague, Lisa M; Olino, Thomas M; Heimberg, Richard G

    2017-10-01

    Internet-delivered cognitive-behavioral therapy (ICBT) has been established as both efficacious and effective in reducing symptoms of social anxiety. However, most research has been conducted in controlled settings, and little is known regarding the utility of such programs in an open-access format. The present study examined the use, adherence, and effectiveness of Joyable, an open-access, Internet-delivered, coach-supported CBT-based intervention for social anxiety. Participants were 3,384 registered users (Mage [SD] = 29.82 [7.89]; 54% male) that created an account between 2014 and 2016. Characteristics of use, factors related to attrition and adherence, and within-group outcomes were examined. The primary outcome measure was the Social Phobia Inventory. On average, participants remained in the program for 81.02 days (SD = 60.50), during which they completed 12.14 activities (SD = 11.09) and 1.53 exposures (SD = 3.18). About half (57%) had contact with a coach. Full adherence to the program was achieved by 16% of participants, a rate higher than previously published open-access studies of ICBT. Social anxiety symptoms were significantly reduced for participants that engaged in the program, with medium within-group effects from baseline through the cognitive restructuring module (d = 0.63-0.76) and large effects from baseline through the exposure module (d = 1.40-1.83). Response rates were high (72%). Exposures and coach contact were significant predictors of retention and outcome. This open-access online CBT-based program is effective in reducing social anxiety symptoms and has the potential to extend Internet-based mental health services to socially anxious individuals unwilling or unable to seek face-to-face evidence-based therapy. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  16. Designing the Health-related Internet of Things: Ethical Principles and Guidelines

    Directory of Open Access Journals (Sweden)

    Brent Mittelstadt

    2017-07-01

    Full Text Available The conjunction of wireless computing, ubiquitous Internet access, and the miniaturisation of sensors have opened the door for technological applications that can monitor health and well-being outside of formal healthcare systems. The health-related Internet of Things (H-IoT increasingly plays a key role in health management by providing real-time tele-monitoring of patients, testing of treatments, actuation of medical devices, and fitness and well-being monitoring. Given its numerous applications and proposed benefits, adoption by medical and social care institutions and consumers may be rapid. However, a host of ethical concerns are also raised that must be addressed. The inherent sensitivity of health-related data being generated and latent risks of Internet-enabled devices pose serious challenges. Users, already in a vulnerable position as patients, face a seemingly impossible task to retain control over their data due to the scale, scope and complexity of systems that create, aggregate, and analyse personal health data. In response, the H-IoT must be designed to be technologically robust and scientifically reliable, while also remaining ethically responsible, trustworthy, and respectful of user rights and interests. To assist developers of the H-IoT, this paper describes nine principles and nine guidelines for ethical design of H-IoT devices and data protocols.

  17. A federated capability-based access control mechanism for internet of things (IoTs)

    Science.gov (United States)

    Xu, Ronghua; Chen, Yu; Blasch, Erik; Chen, Genshe

    2018-05-01

    The prevalence of Internet of Things (IoTs) allows heterogeneous embedded smart devices to collaboratively provide intelligent services with or without human intervention. While leveraging the large-scale IoT-based applications like Smart Gird and Smart Cities, IoT also incurs more concerns on privacy and security. Among the top security challenges that IoTs face is that access authorization is critical in resource and information protection over IoTs. Traditional access control approaches, like Access Control Lists (ACL), Role-based Access Control (RBAC) and Attribute-based Access Control (ABAC), are not able to provide a scalable, manageable and efficient mechanisms to meet requirement of IoT systems. The extraordinary large number of nodes, heterogeneity as well as dynamicity, necessitate more fine-grained, lightweight mechanisms for IoT devices. In this paper, a federated capability-based access control (FedCAC) framework is proposed to enable an effective access control processes to devices, services and information in large scale IoT systems. The federated capability delegation mechanism, based on a propagation tree, is illustrated for access permission propagation. An identity-based capability token management strategy is presented, which involves registering, propagation and revocation of the access authorization. Through delegating centralized authorization decision-making policy to local domain delegator, the access authorization process is locally conducted on the service provider that integrates situational awareness (SAW) and customized contextual conditions. Implemented and tested on both resources-constrained devices, like smart sensors and Raspberry PI, and non-resource-constrained devices, like laptops and smart phones, our experimental results demonstrate the feasibility of the proposed FedCAC approach to offer a scalable, lightweight and fine-grained access control solution to IoT systems connected to a system network.

  18. A Distributed Approach towards Improved Dissemination Protocol for Smooth Handover in MediaSense IoT Platform

    OpenAIRE

    Shabir Ahmad; Ishfaq Hussain; Muhammad Fayaz; Do-Hyeun Kim

    2018-01-01

    Recently, the Internet has been utilized by many applications to convey time-sensitive messages. The persistently expanding Internet coverage and its easy accessibility have offered to ascend to a problem which was once regarded as not essential to contemplate. Nowadays, the Internet has been utilized by many applications to convey time-sensitive messages. Wireless access points have widely been used but these access points have limitations regarding area coverage. So for covering a wider spa...

  19. Access Point Security Service for wireless ad-hoc communication

    NARCIS (Netherlands)

    Scholten, Johan; Nijdam, M.

    2006-01-01

    This paper describes the design and implementation of a security solution for ad-hoc peer-to-peer communication. The security solution is based on a scenario where two wireless devices require secure communication, but share no security relationship a priori. The necessary requirements for the

  20. Internet accounting dictionaries

    DEFF Research Database (Denmark)

    Nielsen, Sandro; Mourier, Lise

    2005-01-01

    An examination of existing accounting dictionaries on the Internet reveals a general need for a new type of dictionary. In contrast to the dictionaries now accessible, the future accounting dictionaries should be designed as proper Internet dictionaries based on a functional approach so they can...