WorldWideScience

Sample records for wireless internet access

  1. Evaluasi Pemanfaatan Wireless Internet Protocol Access System di Kota Malang

    Directory of Open Access Journals (Sweden)

    Ahmad Budi Setiawan

    2012-03-01

    Full Text Available WIPAS (Wireless Internet Protocol Accsess System adalah salah satu teknologi pita lebar (broadband yang terbaru. Teknologi tersebut dikembangkan berdasarkan model point-to-multipoint access system pada jaringan nirkabel tetap atau Fixed Wireless Access (FWA dengan memanfaatkan pita frekuensi 26-GHz. Dengan besarnya pita frekuensi yang digunakan, teknologi WIPAS dapat menampung kapasitas akses untuk lalu lintas jaringan yang sangat besar. Dalam penelitian ini akan dikaji dan dievaluasi efektifitas penggunaan teknologi WIPAS melalui kasus pemanfaatan teknologi WIPAS untuk pemberdayaan komunitas di kota Malang. Dalam penelitian ini juga akan dideskripsikan pemanfaatan teknologi WIPAS untuk melihat manfaat penggunaan teknologi tersebut. Penelitian ini dilakukan dengan metode kualitatif dengan melakukan evaluasi terhadap infrastruktur yang telah dibangun untuk melihat efektifitas pemanfaatan WIPAS. Hasil penelitian ini adalah sebuah kajian evaluatif tentang pemanfaatan WIPAS di kota Malang dan rekomendasi untuk implementasi lebih lanjut.

  2. Wireless Internet

    NARCIS (Netherlands)

    el Zarki, M.; Heijenk, Geert; Lee, Kenneth S.; Bidgoli, H.

    This chapter addresses the topic of wireless Internet, the extension of the wireline Internet architecture to the wireless domain. As such the chapter introduces the reader to the dominant characteristics of the Internet, from its structure to the protocols that control the forwarding of data and

  3. Wireless Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Wireless Access. Wireless connect to the Base station. Easy and Convenient access. Costlier as compared to the wired technology. Reliability challenges. We see it as a complementary technology to the DSL.

  4. Wired or Wireless Internet?

    DEFF Research Database (Denmark)

    Gimpel, Gregory

    2010-01-01

    This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...... the speed of technological obsolescence, market share dominance, and the black boxing of technology influence consumer intention to adopt WiMax and 3G wireless internet for their laptop computers. The results, implications for industry, and areas for further research are discussed....

  5. Broadband wireless communications for railway applications for onboard internet access and other applications

    CERN Document Server

    Masson, Émilie

    2017-01-01

    This book focuses on the needs of railway operators in terms of wireless communications, divided in two main categories: the commercial services and the operational needs. Then, all available technologies that can be used to provide Internet access on board trains and all the other operational applications requiring high capacity are detailed. Finally, challenges and trends in railway telecommunications are highlighted, through the presentation of the future and emerging technologies, the current discussions and works in the different authorities, and the key challenges and scientific barriers.

  6. Wireless mobile Internet security

    CERN Document Server

    Rhee, Man Young

    2013-01-01

      The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless mobile Internet technologies will become the future objectives for convergence of these technologies thr

  7. The wireless internet explained

    CERN Document Server

    Rhoton, John

    2001-01-01

    The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq. The Wireless Internet Explained takes a practical look at wireless technology. Rhoton explains the concepts behind the physics, and provides an overview that clarifies the convoluted set of standards heaped together under the umbrella of wireless. It then expands on these technical foundations to give a panorama of the increasingly crowded landscape of wireless product offerings. When it comes to actual implementation the book gives abundant down-to-earth advice on topics ranging from the selection and deployment of mobile devices to the extremely sensitive subject of security.Written by an expert on Internet messaging, the author of Digital Press''s successful Programmer''s Guide to Internet Mail and X.400 and SMTP: Battle of the E-mail Protocols, The Wireless Internet Explained describes and evaluates the current state of the fast-growing and crucial...

  8. Economics and Governance of the wireless Internet

    DEFF Research Database (Denmark)

    Falch, Morten; Henten, Anders; Tadayoni, Reza

    barriers of entry. In this paper three issues are discussed: 1) Developments in pricing schemes for Internet interconnection and Internet access with special focus on the role of wireless access. 2) Developments in supporting infrastructures with special focus on the increasing role of wireless......The Internet has undergone a growing diversification with regard to types of users, kinds of services and use of transmission technologies and infrastructures. Today, internet services are delivered by the use of many different wired and wireless communication technologies with different technical...... capabilities and limitations, and with different techno-economic characteristics. The question is whether these trends challenge the current mode of governance for the Internet. In the early days, the Internet was considered to be open, free, competitive, with a high level of entrepreneurialism, and with low...

  9. Wired or Wireless Internet?

    DEFF Research Database (Denmark)

    Gimpel, Gregory

    2010-01-01

    This paper finds that network externalities play a minimal role in the choice of internet access technology. Potential adopters of mobile laptop internet view broadband technology as a black box, the technological details of which donot matter. The study uses qualitative techniques to explore how...

  10. Adoption of wireless internet parks: An empirical study in Qatar

    OpenAIRE

    Weerakkody, V

    2008-01-01

    This paper examines the adoption of free wireless internet parks (iPark) by Qatari citizens as means of accessing electronic services from public parks. The Qatar government has launched the iPark concept with a view of providing free internet access for all citizens while enjoying the outdoors. By offering free wireless Internet access, the Qatari government encourages its citizen's to actively participate in the global information society with a view of bridging the digital divide. Using a ...

  11. Architectural and Mobility Management Designs in Internet-Based Infrastructure Wireless Mesh Networks

    Science.gov (United States)

    Zhao, Weiyi

    2011-01-01

    Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. They have numerous applications, such as broadband Internet access, building automation, and intelligent transportation systems. One research challenge for Internet-based WMNs is to design efficient mobility…

  12. VT Wireless Internet Service Providers 2007

    Data.gov (United States)

    Vermont Center for Geographic Information — (Link to Metadata) The VT Wireless Internet Service Provider (ISP) dataset (WISP2007) includes polygons depicting the extent of Vermont's WISP broadband system as of...

  13. Work in progress — rural Pondicherry's wireless internet | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    In that time, a project to bring the Information Age to villagers in southern India has won awards and given 50 000 "information shop" users in a dozen communities high-speed wireless telephone and Internet access. It has also helped improve more traditional Indian communication methods, such as community newspapers ...

  14. Scheduling and congestion control for wireless internet

    CERN Document Server

    Wang, Xin

    2014-01-01

    This brief proposes that the keys to internet cross-layer optimization are the development of non-standard implicit primal-dual solvers for underlying optimization problems, and design of jointly optimal network protocols as decomposition of such solvers. Relying on this novel design-space oriented approach, the author develops joint TCP congestion control and wireless-link scheduling schemes for wireless applications over Internet with centralized and distributed (multi-hop) wireless links. Different from the existing solutions, the proposed schemes can be asynchronously implemented without message passing among network nodes; thus they are readily deployed with current infrastructure. Moreover, global convergence/stability of the proposed schemes to optimal equilibrium is established using the Lyapunov method in the network fluid model. Simulation results are provided to evaluate the proposed schemes in practical networks.

  15. Mobile access to the Internet: from personal bubble to satellites

    Science.gov (United States)

    Gerla, Mario

    2001-10-01

    Mobile, wireless access and networking has emerged in the last few years as one of the most important directions of Internet growth. The popularity of mobile, and, more generally, nomadic Internet access is due to many enabling factors including: (a) emergence of meaningful applications tailored to the individual on the move; (b) small form factor and long battery life; (c) efficient middleware designed to support mobility; and, (d) efficient wireless networking technologies. A key player in the mobile Internet access is the nomad, i.e. the individual equipped with various computing and I/O gadgets (cellular phone, earphones, GPS navigator, palm pilot, beeper, portable scanner, digital camera, etc.). These devices form his/her Personal Area Network or PAN or personal bubble. The connectivity within the bubble is wireless (using for example a low cost, low power wireless LAN such as Bluetooth). The bubble can expand and contract dynamically depending on needs. It may temporarily include sensors and actuators as the nomad walks into a new environment. In this paper, we identify the need for the interconnection of the PAN with other wireless networks in order to achieve costeffective mobile access to the Internet. We will overview some key networking technologies required to support the PAN (eg, Bluetooth). We will also discuss an emerging technology, Ad Hoc wireless networking which is the natural complement of the PAN in sparsely populated areas. Finally, we will identify the need for intelligent routers to assist the mobile user in the selection of the best Internet access strategy.

  16. Principles of wireless access and localization

    CERN Document Server

    Pahlavan, Kaveh

    2013-01-01

    A comprehensive, encompassing and accessible text examining a wide range of key Wireless Networking and Localization technologies This book provides a unified treatment of issues related to all wireless access and wireless localization techniques.  The book reflects principles of design and deployment of infrastructure for wireless access and localization for wide, local, and personal networking.   Description of wireless access methods includes design and deployment of traditional TDMA and CDMA technologies and emerging Long Term Evolution (LTE) techniques for wide area cellular networks, the

  17. Modulation Schemes for Wireless Access

    Directory of Open Access Journals (Sweden)

    F. Vejrazka

    2000-12-01

    Full Text Available Four modulation schemes, namely minimum shift keying (MSK, Gaussianminimum shift keying (GMSK, multiamplitude minimum shift keying(MAMSK and π/4 differential quadrature phase shift keying (π/4-QPSKare described and their applicability to wireless access is discussedin the paper. Low complexity receiver structures based on differentialdetection are analysed to estimate the performance of the modulationschemes in the additive Gaussian noise and the Rayleigh and Riceenvelope fast fading channel. The bandwidth efficiency is calculated toevaluate the modulation schemes. The results show that the MAMSK schemegives the greatest bandwidth efficiency, but its performance in theRayleigh channel is rather poor. In contrast, the MSK scheme is lessbandwidth efficient, but it is more resistant to Rayleigh fading. Theperformance of π/4-QPSK signal is considerably improved by appropriateprefiltering.

  18. Distributed medium access control in wireless networks

    CERN Document Server

    Wang, Ping

    2013-01-01

    This brief investigates distributed medium access control (MAC) with QoS provisioning for both single- and multi-hop wireless networks including wireless local area networks (WLANs), wireless ad hoc networks, and wireless mesh networks. For WLANs, an efficient MAC scheme and a call admission control algorithm are presented to provide guaranteed QoS for voice traffic and, at the same time, increase the voice capacity significantly compared with the current WLAN standard. In addition, a novel token-based scheduling scheme is proposed to provide great flexibility and facility to the network servi

  19. Exploring Processes and Outcomes of Wireless Internet in Higher Education: A Case Study of a University's Early Experience

    Science.gov (United States)

    Lee, Lisa

    2007-01-01

    Many universities in the UK have recently started offering their staff and students free wireless Internet access through Wireless Local Area Network (WLAN) technologies, such as Wi-Fi. Based on a small empirical study of WLAN deployment in a university setting, the article explores adoption processes of the new technology by both the organisation…

  20. Wireless Internet and Student-Centered Learning: A Partial Least-Squares Model

    Science.gov (United States)

    Lu, Eric Y.; Ma, Hongyan; Turner, Sandra; Huang, Wayne

    2007-01-01

    Wireless Internet technology is gaining a foothold on more and more campuses, yet few studies have investigated how wireless Internet supports and enhances a student-centered learning environment. This study seeks to fill the gap by developing an instrument to measure how wireless Internet supports student-centered learning. A web survey was…

  1. Transparent data service with multiple wireless access

    Science.gov (United States)

    Dean, Richard A.; Levesque, Allen H.

    The rapid introduction of digital wireless networks is an important part of the emerging digital communications scene. The introduction of Digital Cellular, LEO and GEO Satellites, and Personal Communications Services poses both a challenge and an opportunity for the data user. On the one hand wireless access will introduce significant new portable data services such as personal notebooks, paging, E-mail, and fax that will put the information age in the user's pocket. On the other hand the challenge of creating a seamless and transparent environment for the user in multiple access environments and across multiple network connections is formidable. A summary of the issues associated with developing techniques and standards that can support transparent and seamless data services is presented. The introduction of data services into the radio world represents a unique mix of RF channel problems, data protocol issues, and network issues. These problems require that experts from each of these disciplines fuse the individual technologies to support these services.

  2. Wireless Internet on Trains - Impact on Performance of Business Travelers

    NARCIS (Netherlands)

    Zhang, M.; Marchau, V.A.W.J.; Wee, B. van; Hoorn, T. van der

    2006-01-01

    Wireless Internet service (WIS) is finding increasing implementation in the Netherlands via several markets. Recently, the idea has emerged of providing WIS through public transport services. The impact of WIS on train travelers, particularly on business travelers, is, however, unknown. In a study

  3. Wireless Internet on Trains : Impact on Performance of Business Travelers

    NARCIS (Netherlands)

    Zhang, Min; Marchau, V.A.W.J.; Wee, B. van; Hoorn, T. van der

    2006-01-01

    Wireless Internet service (WIS) is finding increasing implementation in the Netherlands via several markets. Recently, the idea has emerged of providing WIS through public transport services. The impact of WIS on train travelers, particularly on business travelers, is, however, unknown. In a study

  4. An Experimental Performance Measurement of Implemented Wireless Access Point for Interworking Wi-Fi and HSDPA Networks

    Science.gov (United States)

    Byun, Tae-Young

    This paper presents a prototype of WAP(Wireless Access Point) that provides the wireless Internet access anywhere. Implemented WAP can be equipped with various wireless WAN interfaces such as WCDMA and HSDPA. WAP in the IP mechanism has to process connection setup procedure to one wireless WAN. Also, WAP can provide connection management procedures to reconnect interrupted connection automatically. By using WAP, several mobile devices such as netbook, UMPC and smart-phone in a moving vehicle can access to HSDPA network simultaneously. So, it has more convenient for using the WAP when there are needs to access wireless Internet more than two mobile devices in restricted spaces such as car, train and ship.

  5. Wireless IP and building the mobile Internet

    National Research Council Canada - National Science Library

    Dixit, Sudhir; Prasad, Ramjee

    2003-01-01

    ..., as well as the shortage of technical material in a single place in the field of wireless IP and closely related technologies that form the critical success factors. Therefore, we decided to invite the experts who are truly active in the field: the equipment manufacturers, mobile operators, and those working in research laboratories and unive...

  6. Virtualization of event sources in wireless sensor networks for the internet of things.

    Science.gov (United States)

    Lucas Martínez, Néstor; Martínez, José-Fernán; Hernández Díaz, Vicente

    2014-12-01

    Wireless Sensor Networks (WSNs) are generally used to collect information from the environment. The gathered data are delivered mainly to sinks or gateways that become the endpoints where applications can retrieve and process such data. However, applications would also expect from a WSN an event-driven operational model, so that they can be notified whenever occur some specific environmental changes instead of continuously analyzing the data provided periodically. In either operational model, WSNs represent a collection of interconnected objects, as outlined by the Internet of Things. Additionally, in order to fulfill the Internet of Things principles, Wireless Sensor Networks must have a virtual representation that allows indirect access to their resources, a model that should also include the virtualization of event sources in a WSN. Thus, in this paper a model for a virtual representation of event sources in a WSN is proposed. They are modeled as internet resources that are accessible by any internet application, following an Internet of Things approach. The model has been tested in a real implementation where a WSN has been deployed in an open neighborhood environment. Different event sources have been identified in the proposed scenario, and they have been represented following the proposed model.

  7. Sistem Autentikasi Hotspot Menggunakan LDAP dan Radius pada Jaringan Internet Wireless Prodi Teknik Sistem Komputer

    Directory of Open Access Journals (Sweden)

    Ahmad Herdinal Muttaqin

    2016-04-01

    Full Text Available Wireless network is a network utilizing radio waves that propagate openly. This network requires security to simplify the process by using user Authentication. One of technology that could be used in order to make it safer is a Lightweight Directory Access Protocol (LDAP and Remote Authentication Dila In User Service (RADIUS. Computer Systems Engineering Department is one of the study program in the Faculty of Engineering, University of Diponegoro that reserve the internet service everyday for students need. However, internet wireless network in this department is not yet safe enough,for the necessary to secure it’s need creating a security system with LDAP and RADIUS.The results of this study is a network authentication server using OpenLDAP and FreeRadius Hotspot that will be integrated with an account of Academic Information System, which is implemented on Prodi Computer Systems Engineering Department of the University of Diponegoro.

  8. Revocable Anonymous Access to the Internet?

    Science.gov (United States)

    Claessens, Joris; Diaz, Claudia; Goemans, Caroline; Preneel, Bart; Vandewalle, Joos; Dumortier, Jos

    2003-01-01

    Users of telecommunications networks are concerned about privacy, and desire anonymous access, while some organizations are concerned about how this anonymous access might be abused. Proposes a solution for revocable anonymous access to the Internet. Presents some legal background and motivation for such a solution. Indicates some difficulties and…

  9. Access control mechanism of wireless gateway based on open flow

    Science.gov (United States)

    Peng, Rong; Ding, Lei

    2017-08-01

    In order to realize the access control of wireless gateway and improve the access control of wireless gateway devices, an access control mechanism of SDN architecture which is based on Open vSwitch is proposed. The mechanism utilizes the features of the controller--centralized control and programmable. Controller send access control flow table based on the business logic. Open vSwitch helps achieve a specific access control strategy based on the flow table.

  10. Browsing for the Best Internet Access Provider?

    Science.gov (United States)

    Weil, Marty

    1996-01-01

    Highlights points to consider when choosing an Internet Service Provider. Serial Line Internet Protocol (SLIP) and Point to Point Protocol (PPP) are compared regarding price, performance, bandwidth, speed, and technical support. Obtaining access via local, national, consumer online, and telephone-company providers is discussed. A pricing chart and…

  11. M2M massive wireless access

    DEFF Research Database (Denmark)

    Zanella, Andrea; Zorzi, Michele; Santos, André F.

    2013-01-01

    In order to make the Internet of Things a reality, ubiquitous coverage and low-complexity connectivity are required. Cellular networks are hence the most straightforward and realistic solution to enable a massive deployment of always connected Machines around the globe. Nevertheless, a paradigm...... shift in the conception and design of future cellular networks is called for. Massive access attempts, low-complexity and cheap machines, sporadic transmission and correlated signals are among the main properties of this new reality, whose main consequence is the disruption of the development...... Access Reservation, Coded Random Access and the exploitation of multiuser detection in random access. Additionally, we will show how the properties of machine originated signals, such as sparsity and spatial/time correlation can be exploited. The end goal of this paper is to provide motivation...

  12. A Comparative Survey on Wireless Internet Usage and Future Expectations of University Students -The Cases of USF, AKU and IUS

    Directory of Open Access Journals (Sweden)

    Hüseyin Koçak

    2015-07-01

    Full Text Available In this article, college students’ internet usage and the expectations for better wireless access are discussed. Wireless and mobile internet access recently became an integral part of our lives. Especially, with the introduction of smart devices (phones, tablets etc. into the wireless market and the vast number of applications running on these devices, we end up being addicted to them. Now, some of us have come to a point where we can leave everything behind us except our phones. To better understand how the wireless access has influenced us we conducted a face-to-face survey with three different groups of college students totalling 829. According to the survey, there are some problems while using the internet, such as internet speed and connection. University students do not want to give up mobile communications and they never want to be secondary users. They pay more attention to security and privacy in communication. They are also awaiting functional innovations in the future.

  13. Linux-Based Access Point Dalam Wireless LAN

    OpenAIRE

    Witono, Timotius

    2006-01-01

    Technology 802.11 which more known as WiFi, have started to become the cablereplacement technology especially in local network so-called Wireless LAN. Mostly Wireless LAN use the Infrastructure topology, which require uses of one or more Access Points as the communication center of Mobile Stations. Existence of a high quality Access Point is an important factor to determine the quality of Wireless LAN performance. Besides using Access Point that made in factory, Access Point can be custom-bui...

  14. An Internet of Energy Things Based on Wireless LPWAN

    Directory of Open Access Journals (Sweden)

    Yonghua Song

    2017-08-01

    Full Text Available Under intense environmental pressure, the global energy sector is promoting the integration of renewable energy into interconnected energy systems. The demand-side management (DSM of energy systems has drawn considerable industrial and academic attention in attempts to form new flexibilities to respond to variations in renewable energy inputs to the system. However, many DSM concepts are still in the experimental demonstration phase. One of the obstacles to DSM usage is that the current information infrastructure was mainly designed for centralized systems, and does not meet DSM requirements. To overcome this barrier, this paper proposes a novel information infrastructure named the Internet of Energy Things (IoET in order to make DSM practicable by basing it on the latest wireless communication technology: the low-power wide-area network (LPWAN. The primary advantage of LPWAN over general packet radio service (GPRS and area Internet of Things (IoT is its wide-area coverage, which comes with minimum power consumption and maintenance costs. Against this background, this paper briefly reviews the representative LPWAN technologies of narrow-band Internet of Things (NB-IoT and Long Range (LoRa technology, and compares them with GPRS and area IoT technology. Next, a wireless-to-cloud architecture is proposed for the IoET, based on the main technical features of LPWAN. Finally, this paper looks forward to the potential of IoET in various DSM application scenarios.

  15. The Making of a Sustainable Wireless City? Mapping Public Wi-Fi Access in Shanghai

    Directory of Open Access Journals (Sweden)

    Mingfeng Wang

    2016-01-01

    Full Text Available In the context of the global information economy, ready access to the Internet is critical to a city’s competitiveness, which has prompted a number of cities to launch plans to establish wireless networks. Most literature on the development of wireless cities focuses on cities in Western countries, and few have discussed how Chinese cities have adopted wireless technologies in their urban infrastructure development efforts. This paper examines recent development and spatial distribution of public Wi-Fi access in Shanghai, a leading business hub in China. We mapped Wi-Fi hotspots through the government sponsored “i-Shanghai” project and China Mobile Communications Corporation (CMCC. We find that while telecommunication providers have been proactively deploying WLAN (wireless local area network,a proxy of public Wi-Fi or wireless access hotspots in Shanghai, neither government sponsored WLAN hotspots nor facilities established by CMCC could cover the old traditional neighborhoods in the central city and sub-districts in remote rural areas. We also address the development of a more sustainable wireless city in Shanghai with a particular focus on digital divide and social equity issues.

  16. Ubiquitous Wireless Sensor Networks and future “Internet of Things""

    OpenAIRE

    Vermesan, Ovidiu

    2009-01-01

    Overview of heterogeneous networks of embedded devices that can range from RFID, to smart identifiable systems with sensing and actuating capabilitie. Presentation of wireless sensor networks protocols and Internet of Things future technology. Bridging the real, virtual and digital worlds by using wireless connectivity. Application examples in automotive, aeronautics, healthcare, building, oil and gas industries. Ubiquitous Wireless Sensor Networks and future “Internet ...

  17. Penggunaan Frekuensi 2,4 GHz dalam Keperluan Internet Wireless Studi Kasus Yogyakarta

    Directory of Open Access Journals (Sweden)

    Sri Ariyanti

    2011-06-01

    Full Text Available Penelitian ini bertujuan untuk mengetahui kondisi penggunaan frekuensi 2.4 GHz dalam keperluan internet wireless di daerah Yogyakarta, mengetahui kendala yang dihadapi penyelenggara internet wireless (ISP dalam memanfaatkan frekuensi 2.4 GHz dan mengetahui tanggapan pengguna internet wireless agar frekuensi 2.4 GHz dapat dimanfaatkan secara maksimal. Metode penelitian ini menggunakan pendekatan kualitatif. Teknik pengumpulan datanya dengan melakukan in-depth interview kepada Balai monitoring frekuensi dan penyelenggara internet wireless yang menggunakan frekuensi 2.4 GHz. Berdasarkan hasil penelitian kondisi penggunaan frekuensi 2.4 GHz pada daerah Yogyakarta masih belum sesuai dengan peraturan yang ditetapkan dalam KM No.2 tahun 2005. Kendala yang dihadapi ISP dalam menggunakan frekuensi 2.4 GHz yaitu banyaknya interferensi yang terjadi. Agar frekuensi 2.4 GHz dapat dimanfaatkan secara maksimal maka peralatan yang digunakan harus disertifikasi terlebih dahulu, dilakukan pengawasan terhadap daya pancar dan penggunaannya mempunyai skill di bidang jaringan internet wireless.

  18. Internet Access from CERN GSM subscriptions

    CERN Document Server

    IT Department

    2008-01-01

    The data service on GSM subscriptions has been improved, allowing CERN users to access the Internet directly. A CERN GSM subscription with data option now allows you to connect to the Internet from a mobile phone or a PC equipped with a GSM modem. The previous access (CERN intranet) still exists. To get access to the new service, you will find all the information on configurations at: http://cern.ch/gprs The use of this service on the Sunrise network is charged on a flat-rate basis (no extra charge related to the volume of downloaded data). Depending on your CERN subscription type (standard or master), you can also connect to foreign GSM data networks (roaming), but this is strongly discouraged, except where absolutely necessary, due to international roaming charges. Telecom Section, IT/CS

  19. Real-time reporting and internet-accessible coastal sea-level gauge

    Digital Repository Service at National Institute of Oceanography (India)

    Desai, R.G.P.; Joseph, A.; Agarvadekar, Y.; Mehra, P.; Dabholkar, N.; Parab, A.; Gouveia, A.D.; Tengali, S.

    example; INSAT, GOES) permit data transfer only at predefined time-slots, thereby inhibiting continuous data access. While satellite communication is relatively expensive, wirelesses networking infrastructure and ubiquity of cellular phones have...-level data transmission system utilising exiting cellular communication infrastructure. Several issues involved in the implementation of internet-accessible sea-level gauge have been addressed. It is anticipated that the growth in communication...

  20. IPTV technology for the wireless Internet service provider (WISP

    Directory of Open Access Journals (Sweden)

    Mitchell Vásquez Bermúdez

    2018-02-01

    Full Text Available This article describes the implementation of the IPTV technology through an open source system for the wireless Internet service provider (WISP in the Cerecita site, located in the province of Guayas, Ecuador. The feasibility of implementing the IPTV technology is given through the use of the Emby Server application, in addition to the use of an operating system such as CentOS 7, which are open source and have the necessary requirements for the creation of this service. The analysis of data tra c generated on the WISP network, which will establish the advantages and disadvantages generated by the transmission of this technology, created to VOD multimedia content server that allows the video signal to be sent to users Finally, a feasibility study was carried out to analyze the advantages and disadvantages that exist in the implementation of this IPTV technology.

  1. Internet-accessible real-time weather information system

    Digital Repository Service at National Institute of Oceanography (India)

    Desai, R.G.P.; Joseph, A.; Desa, E.; Mehra, P.; Desa, E.; Gouveia, A.D.

    An internet-accessible real-time weather information system has been developed. This system provides real-time accessibility to weather information from a multitude of spatially distributed weather stations. The Internet connectivity also offers...

  2. Quantum-classical access networks with embedded optical wireless links

    Science.gov (United States)

    Elmabrok, Osama; Ghalaii, Masoud; Razavi, Mohsen

    2018-03-01

    We examine the applicability of wireless indoor quantum key distribution (QKD) in hybrid quantum-classical networks. We propose practical configurations that would enable wireless access to such networks. The proposed setups would allow an indoor wireless user, equipped with a QKD-enabled mobile device, to communicate securely with a remote party on the other end of the access network. QKD signals, sent through wireless indoor channels, are combined with classical ones and sent over shared fiber links to the remote user. Dense wavelengthdivision multiplexing would enable the simultaneous transmission of quantum and classical signals over the same fiber. We consider the adverse effects of the background noise induced by Raman scattered light on the QKD receivers due to such an integration. In addition, we consider the loss and the background noise that arise from indoor environments. We consider a number of discrete and continuous-variable QKD protocols and study their performance in different scenarios.

  3. OFDM Towards Fixed and Mobile Broadband Wireless Access

    DEFF Research Database (Denmark)

    Shanker Jha, Uma; Prasad, Ramjee

    of mobile broadband wireless access and the standards developed by the IEEE 802.16 standards organization. The book gives practitioners a solid understaning of: Basic requirements of fixed and mobile broadband access technologies. Fundamentals of orthogonal frequency division multiplexing (OFDM...

  4. A Survey on Energy Conserving Mechanisms for the Internet of Things: Wireless Networking Aspects.

    Science.gov (United States)

    Abbas, Zeeshan; Yoon, Wonyong

    2015-09-25

    The Internet of Things (IoT) is an emerging key technology for future industries and everyday lives of people, where a myriad of battery operated sensors, actuators, and smart objects are connected to the Internet to provide services such as mobile healthcare, intelligent transport system, environmental monitoring, etc. Since energy efficiency is of utmost importance to these battery constrained IoT devices, IoT-related standards and research works have focused on the device energy conserving issues. This paper presents a comprehensive survey on energy conserving issues and solutions in using diverse wireless radio access technologies for IoT connectivity, e.g., the 3rd Generation Partnership Project (3GPP) machine type communications, IEEE 802.11ah, Bluetooth Low Energy (BLE), and Z-Wave. We look into the literature in broad areas of standardization, academic research, and industry development, and structurally summarize the energy conserving solutions based on several technical criteria. We also propose future research directions regarding energy conserving issues in wireless networking-based IoT.

  5. A Survey on Energy Conserving Mechanisms for the Internet of Things: Wireless Networking Aspects

    Directory of Open Access Journals (Sweden)

    Zeeshan Abbas

    2015-09-01

    Full Text Available The Internet of Things (IoT is an emerging key technology for future industries and everyday lives of people, where a myriad of battery operated sensors, actuators, and smart objects are connected to the Internet to provide services such as mobile healthcare, intelligent transport system, environmental monitoring, etc. Since energy efficiency is of utmost importance to these battery constrained IoT devices, IoT-related standards and research works have focused on the device energy conserving issues. This paper presents a comprehensive survey on energy conserving issues and solutions in using diverse wireless radio access technologies for IoT connectivity, e.g., the 3rd Generation Partnership Project (3GPP machine type communications, IEEE 802.11ah, Bluetooth Low Energy (BLE, and Z-Wave. We look into the literature in broad areas of standardization, academic research, and industry development, and structurally summarize the energy conserving solutions based on several technical criteria. We also propose future research directions regarding energy conserving issues in wireless networking-based IoT.

  6. A Survey on Energy Conserving Mechanisms for the Internet of Things: Wireless Networking Aspects

    Science.gov (United States)

    Abbas, Zeeshan; Yoon, Wonyong

    2015-01-01

    The Internet of Things (IoT) is an emerging key technology for future industries and everyday lives of people, where a myriad of battery operated sensors, actuators, and smart objects are connected to the Internet to provide services such as mobile healthcare, intelligent transport system, environmental monitoring, etc. Since energy efficiency is of utmost importance to these battery constrained IoT devices, IoT-related standards and research works have focused on the device energy conserving issues. This paper presents a comprehensive survey on energy conserving issues and solutions in using diverse wireless radio access technologies for IoT connectivity, e.g., the 3rd Generation Partnership Project (3GPP) machine type communications, IEEE 802.11ah, Bluetooth Low Energy (BLE), and Z-Wave. We look into the literature in broad areas of standardization, academic research, and industry development, and structurally summarize the energy conserving solutions based on several technical criteria. We also propose future research directions regarding energy conserving issues in wireless networking-based IoT. PMID:26404275

  7. SmartGate – connecting wireless sensor nodes to the Internet

    Directory of Open Access Journals (Sweden)

    G. U. Gamm

    2013-05-01

    Full Text Available Wireless sensor nodes inside buildings are used to read out sensor data and to control actuators. The nodes need to operate for a long time with a single battery. Often the sensor data should be accessible via Internet from every point of the world. When using a standard Wi-Fi connection, the battery of the node would be depleted after a few hours due to idle currents in receive state. Using sensor nodes with included wake-up receivers can prolong the lifetime of the sensor network to several years. However, no gateway exists that can, on the one hand, connect itself to the Internet and on the other hand can send out the special coded wake-up signal needed by the wake-up receivers on the nodes. In this work we want to bridge this gap by introducing the SmartGate. It is a gateway that has two transceivers incorporated on a single printed circuit board (PCB. A Wi-Fi module connects itself to an existing Wi-Fi network and listens for incoming messages. A CC430 microcontroller analyzes the incoming Wi-Fi messages and builds up the corresponding wake-up signal with included 16-bit address coding. The wake-up signal is sent out using the integrated CC1101 transceiver core from Texas Instruments. A woken-up node will read out its sensor data and will transmit it back to the gateway, where it will be packed into a TCP/IP packet and sent back to the user. The use of the gateway allows the implementation of a wireless sensor network with wake-up receivers that can be accessed via Internet from every point of the world.

  8. Threats and risks to information security: a practical analysis of free access wireless networks

    Science.gov (United States)

    Quirumbay, Daniel I.; Coronel, Iván. A.; Bayas, Marcia M.; Rovira, Ronald H.; Gromaszek, Konrad; Tleshova, Akmaral; Kozbekova, Ainur

    2017-08-01

    Nowadays, there is an ever-growing need to investigate, consult and communicate through the internet. This need leads to the intensification of free access to the web in strategic and functional points for the benefit of the community. However, this open access is also related to the increase of information insecurity. The existing works on computer security primarily focus on the development of techniques to reduce cyber-attacks. However, these approaches do not address the sector of inexperienced users who have difficulty understanding browser settings. Two methods can solve this problem: first the development of friendly browsers with intuitive setups for new users and on the other hand, by implementing awareness programs on essential security without deepening on technical information. This article addresses an analysis of the vulnerabilities of wireless equipment that provides internet service in the open access zones and the potential risks that could be found when using these means.

  9. Internet Access Competence and the Use of the Internet for ...

    African Journals Online (AJOL)

    The Internet is dramatically changing the world of research and teaching. However academics would have to learn new skills on Internet use to fully transform their research and teaching. The objective of the study therefore was to assess the impact of Internet competence on the use of the Internet for teaching and research ...

  10. Technological advancements and Internet sexuality: does private access to the Internet influence online sexual behavior?

    Science.gov (United States)

    Daneback, Kristian; Månsson, Sven-Axel; Ross, Michael W

    2012-08-01

    The aim of this study was to investigate whether demographic characteristics and sexual behavior online and offline were associated with private, respectively, nonprivate access to the Internet in a Web sample of people who use the Internet for sexual purposes. A total of 1,913 respondents completed an online questionnaire about Internet sexuality, and 1,614 reported using the Internet for sexual purposes. The majority of these respondents reported having access to an Internet-connected computer no one else had access to (62 percent women and 70 percent men). The results showed that it is possible to differentiate between those who have access to an Internet-connected computer no one else has access to and those who have shared access to an Internet-connected computer. Not only did they differ in demographic characteristics, but also in the sexual activities they engaged in on the Internet. Different patterns were found for women and men. For example, men who had private access to Internet-connected computers were more likely than those who had shared access to seek information about sexual issues. Thus, having access to Internet computers no one else has access to may promote sexual knowledge and health for men. The results of this study along with the technological development implies that in future research, attention should be paid to where and how people access the Internet in relation to online behavior in general and online sexual behavior in particular.

  11. Wireless-accessible sensor populations for monitoring biological variables

    NARCIS (Netherlands)

    Mazzu, Marco; Scalvini, Simonetta; Giordano, A.; Frumento, E.; Wells, Hannah; Lokhorst, C.; Glisenti, Fulvio

    2008-01-01

    The current health-care infrastructure is generally considered to be inadequate to meet the needs of an increasingly older population. We have investigated the feasibility of a passive in-home monitoring system based on wireless accessible sensor populations (WASP). In an EU-funded project we have

  12. Modeling of Bandwidth Aggregation over Heterogeneous Wireless Access Networks

    DEFF Research Database (Denmark)

    Popovska Avramova, Andrijana; Dittmann, Lars

    2012-01-01

    Motivated by the multihomming capability of the mobile devices and the fact that the heterogeneous wireless access networks overlap in coverage, mobile operators are looking for solutions that will benefit by simultaneous use of the available multiple access interfaces. Multipath or multilink...... applications. The analysis is performed on a multipath model developed with OPNET Modeler, which is an advanced research tool that supports modeling and integration of various kinds of built-in networks....

  13. Access to the internet for knowledge dissemination: agricultural ...

    African Journals Online (AJOL)

    Access to agricultural information is a prerequisite for agricultural development. However, information on how agricultural scientists make use of the Internet to access agricultural information is limited. This study therefore investigated access to the Internet for knowledge dissemination by agricultural researchers in ...

  14. Wireless virtualization

    CERN Document Server

    Wen, Heming; Le-Ngoc, Tho

    2013-01-01

    This SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless technologies by summarizing and comparing different architectures, techniques and technologies applicable to a future virtualized wireless network infrastructure. The readers are exposed to a short walkthrough of the future Internet initiative and network virtualization technologies in order to understand the potential role of wireless virtualization in the broader context of next-generation ubiq

  15. ICSW2AN : An Inter-vehicle Communication System Using Mobile Access Point over Wireless Wide Area Networks

    Science.gov (United States)

    Byun, Tae-Young

    This paper presents a prototype of inter-vehicle communication system using mobile access point that internetworks wired or wireless LAN and wireless WAN anywhere. Implemented mobile access point can be equipped with various wireless WAN interfaces such as WCDMA and HSDPA. Mobile access point in the IP mechanism has to process connection setup procedure to one wireless WAN. To show the applicability of the mobile access point to inter-vehicle communication, a simplified V2I2V-based car communication system called ICSW2AN is implemented to evaluate major performance metrics by road test. In addition, results of road test for traffic information service are investigated in view of RTT, latency and server processing time. The experimental result indicates that V2I2V-based car communication system sufficiently can provide time-tolerant traffic information to moving vehicles while more than two mobile devices in restricted spaces such as car, train and ship access wireless Internet simultaneously.

  16. An internet of things example: classrooms access control over near field communication.

    Science.gov (United States)

    Palma, Daniel; Agudo, Juan Enrique; Sánchez, Héctor; Macías, Miguel Macías

    2014-04-21

    The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC) and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  17. An Internet of Things Example: Classrooms Access Control over Near Field Communication

    Directory of Open Access Journals (Sweden)

    Daniel Palma

    2014-04-01

    Full Text Available The Internet of Things is one of the ideas that has become increasingly relevant in recent years. It involves connecting things to the Internet in order to retrieve information from them at any time and from anywhere. In the Internet of Things, sensor networks that exchange information wirelessly via Wi-Fi, Bluetooth, Zigbee or RF are common. In this sense, our paper presents a way in which each classroom control is accessed through Near Field Communication (NFC and the information is shared via radio frequency. These data are published on the Web and could easily be used for building applications from the data collected. As a result, our application collects information from the classroom to create a control classroom tool that displays access to and the status of all the classrooms graphically and also connects this data with social networks.

  18. Hybrid evolutionary computing model for mobile agents of wireless Internet multimedia

    Science.gov (United States)

    Hortos, William S.

    2001-03-01

    The ecosystem is used as an evolutionary paradigm of natural laws for the distributed information retrieval via mobile agents to allow the computational load to be added to server nodes of wireless networks, while reducing the traffic on communication links. Based on the Food Web model, a set of computational rules of natural balance form the outer stage to control the evolution of mobile agents providing multimedia services with a wireless Internet protocol WIP. The evolutionary model shows how mobile agents should behave with the WIP, in particular, how mobile agents can cooperate, compete and learn from each other, based on an underlying competition for radio network resources to establish the wireless connections to support the quality of service QoS of user requests. Mobile agents are also allowed to clone themselves, propagate and communicate with other agents. A two-layer model is proposed for agent evolution: the outer layer is based on the law of natural balancing, the inner layer is based on a discrete version of a Kohonen self-organizing feature map SOFM to distribute network resources to meet QoS requirements. The former is embedded in the higher OSI layers of the WIP, while the latter is used in the resource management procedures of Layer 2 and 3 of the protocol. Algorithms for the distributed computation of mobile agent evolutionary behavior are developed by adding a learning state to the agent evolution state diagram. When an agent is in an indeterminate state, it can communicate to other agents. Computing models can be replicated from other agents. Then the agents transitions to the mutating state to wait for a new information-retrieval goal. When a wireless terminal or station lacks a network resource, an agent in the suspending state can change its policy to submit to the environment before it transitions to the searching state. The agents learn the facts of agent state information entered into an external database. In the cloning process, two

  19. What is harmful for male fertility: cell phone or the wireless Internet?

    Science.gov (United States)

    Yildirim, Mehmet Erol; Kaynar, Mehmet; Badem, Huseyin; Cavis, Mucahıt; Karatas, Omer Faruk; Cimentepe, Ersın

    2015-09-01

    In this study, we aimed to assess the potential harmful effects of radiofrequency-electromagnetic radiation on sperm parameters. We requested semen for analyses from the male patients coming to our infertility division and also asked them to fill out an anonymous questionnaire. We queried their mobile phone and wireless Internet usage frequencies in order to determine their radiofrequency-electromagnetic radiation exposure. A total of 1082 patients filled the questionnaire but 51 of them were excluded from the study because of azoospermia. There was no significant difference between sperm counts and sperm morphology excluding sperm motility, due to mobile phone usage period, (p = 0.074, p = 0.909, and p = 0.05, respectively). The total motile sperm count and the progressive motile sperm count decreased due to the increase of internet usage (p = 0.032 and p = 0.033, respectively). In line with the total motile sperm count, progressive motile sperm count also decreased with wireless Internet usage compared with the wired Internet connection usage (p = 0.009 and p = 0.018, respectively). There was a negative correlation between wireless Internet usage duration and the total sperm count (r = -0.089, p = 0.039). We have also explored the negative effect of wireless Internet use on sperm motility according to our preliminary results. Copyright © 2015. Published by Elsevier Taiwan.

  20. What is harmful for male fertility: Cell phone or the wireless internet?

    Directory of Open Access Journals (Sweden)

    Mehmet Erol Yildirim

    2015-09-01

    Full Text Available In this study, we aimed to assess the potential harmful effects of radiofrequency-electromagnetic radiation on sperm parameters. We requested semen for analyses from the male patients coming to our infertility division and also asked them to fill out an anonymous questionnaire. We queried their mobile phone and wireless internet usage frequencies in order to determine their radiofrequency-electromagnetic radiation exposure. A total of 1082 patients filled the questionnaire but 51 of them were excluded from the study because of azoospermia. There was no significant difference between sperm counts and sperm morphology excluding sperm motility, due to mobile phone usage period, (p = 0.074, p = 0.909, and p = 0.05, respectively. The total motile sperm count and the progressive motile sperm count decreased due to the increase of internet usage (p = 0.032 and p = 0.033, respectively. In line with the total motile sperm count, progressive motile sperm count also decreased with wireless internet usage compared with the wired internet connection usage (p = 0.009 and p = 0.018, respectively. There was a negative correlation between wireless internet usage duration and the total sperm count (r = −0.089, p = 0.039. We have also explored the negative effect of wireless internet use on sperm motility according to our preliminary results.

  1. Profile of internet access in active cocaine users.

    Science.gov (United States)

    Strickland, Justin C; Wagner, Frances P; Stoops, William W; Rush, Craig R

    2015-10-01

    Web-based interventions have received attention for substance abuse treatment. Few studies have examined Internet use among substance users. Internet-use data were examined for 66 participants screened to participate in behavioral pharmacology studies. A majority of active cocaine users reported regular Internet use. Demographic profiles generally did not impact Internet use, but Internet users were more likely to be younger and report other drug use. Active cocaine users have similar rates of Internet access as the general population. Our findings contribute to the limited data on Internet use in active drug users by demonstrating Internet access in cocaine-using populations, supporting the use of this medium to conduct research and clinical interventions. © American Academy of Addiction Psychiatry.

  2. Service Class Resource Management For Green Wireless-Optical Broadband Access NetworksWOBAN

    Directory of Open Access Journals (Sweden)

    SRUTHY.S

    2015-08-01

    Full Text Available Abstract-Broadband access networks have become an essential part of worldwide communication systems because of the exponential growth of broadband services such as video on demand high definition TV internet protocol TV and video conferencing. Exponential growth in the volume of wireless data boosted by the growing popularity of mobile devices such as smartphone and tablets has forced the telecommunication industries to rethink the way networks are currently designed and to focus on the development of high-capacity mobile broadband networks. In response to this challenge researchers have been working toward the development of an integrated wireless optical broadband access network. Two major candidate technologies which are currently known for their high capacity as well as quality of service QoS for multimedia traffic are passive optical networks PON and fourth generation 4G wireless networks. PON is a wired access technology well known for its cost efficiency and high capacity whereas 4G is a wireless broadband access technology which has achieved broad market acceptance because of its ease of deployment ability to offer mobility and its cost efficiency. Integration of PON and 4G technologies in the form of wireless-optical broadband access networks offers advantages such as extension of networks in rural areas support for mobile broadband services and quick deployment of broadband networks. These two technologies however have different design architectures for handling broadband services that require quality of service. For example 4G networks use traffic classification for supporting different QoS demands whereas the PON architecture has no such mechanism to differentiate between types of traffic. These two technologies also differ in their power saving mechanisms. Propose a service class mapping for the integrated PON-4G network which is based on the MG1 queuing model and class-based power saving mechanism which significantly improves the

  3. Internet Access And Usage By Nigerian Educational Research And ...

    African Journals Online (AJOL)

    The paper examined internet access and usage by NERDC staff at the headquarter office in Abuja. Questionnaire were distributed to both the Academic and Non Academic staff of NERDC. The finding shows the ignorant level of both the Academic and Non academic staff with regard to internet access and usage. Generally ...

  4. Analisis Kinerja Voip Server pada Wireless Access Point

    Directory of Open Access Journals (Sweden)

    Effan Najwaini

    2015-01-01

    Abstract Voice quality on VoIP communication is caused by many factors, one of which is the quality of the server. Choosing PC platform or server which is suitable is the main issue in developing VoIP network. A bad server performance or not equivalent with the most of users will degrade the sound quality or even not able to connect between users. Tthe test carried out to the performance of the wireless access point Linksys WRT54GL which is used as a VoIP server. The test was carried out to determine how many VoIP calls which are able to be serviced by a wireless access point as a VoIP server and how long the server needs to be able to process every signal of SIP and RTP packet. Based on the test result performed, the VoIP server on the wireless access point is able to serve VoIP communication well for a few calls number, so it is worth to be implemented on the use of small scale. The use of Native Bridging method in handling the media performed by the server can increase the number of calls that were able to be served about 3 to 7 times compared with other methods.     Keywords— VoIP, Asterisk, Acess Point, WRT54GL, OpenWRT, Performance

  5. On the scalability of uncoordinated multiple access for the Internet of Things

    KAUST Repository

    Chisci, Giovanni

    2017-11-16

    The Internet of things (IoT) will entail massive number of wireless connections with sporadic traffic patterns. To support the IoT traffic, several technologies are evolving to support low power wide area (LPWA) wireless communications. However, LPWA networks rely on variations of uncoordinated spectrum access, either for data transmissions or scheduling requests, thus imposing a scalability problem to the IoT. This paper presents a novel spatiotemporal model to study the scalability of the ALOHA medium access. In particular, the developed mathematical model relies on stochastic geometry and queueing theory to account for spatial and temporal attributes of the IoT. To this end, the scalability of the ALOHA is characterized by the percentile of IoT devices that can be served while keeping their queues stable. The results highlight the scalability problem of ALOHA and quantify the extend to which ALOHA can support in terms of number of devices, traffic requirement, and transmission rate.

  6. Internet Access by People with Intellectual Disabilities: Inequalities and Opportunities

    Directory of Open Access Journals (Sweden)

    Chris Fullwood

    2013-07-01

    Full Text Available This review gives an overview of the societal inequalities faced by people with intellectual disabilities, before focusing specifically on challenges people face accessing the Internet. Current access will be outlined along with the societal, support and attitudinal factors that can hinder access. Discussion of carer views of Internet use by people with intellectual disabilities will be covered incorporating consideration of the tension between protection, self-determination and lifestyle issues and gaining Internet access. We will address how impairment related factors may impede access and subsequently discuss how supports may be used to obfuscate impairments and facilitate access. We will move on from this to critically describe some of the potential benefits the Internet could provide to people with intellectual disabilities, including the potential for self-expression, advocacy and developing friendships. Finally, strategies to better include people with intellectual disabilities online will be given along with future research suggestions.

  7. Access to internet in rural and remote Canada

    OpenAIRE

    Currie, L.; Ronquillo, C. E.; Dick, T.

    2014-01-01

    Canada is the second largest landmass country in the world, but has one of the lowest population densities. As of 2011, approximately 19% of the Canadian population lives in rural, or remote communities. The purpose of this study was to examine differences in rural and urban access to the Internet and device use in Canada, and to explore differences in access to broadband between Aboriginal and non-Aboriginal communities in Canada. In general rural-dwellers had lower levels of Internet access...

  8. Authomatization of Digital Collection Access Using Mobile and Wireless Data Terminals

    Science.gov (United States)

    Leontiev, I. V.

    -processing and synchronization with remote library databases. We discuss the use of PalmOS-compatible devices, and WindowsCE terminals. Our software system is based on modular, scalable three-tier architecture. Additional functionality can be easily customized. Scalability is also supplied by Internet / Intranet technologies, and radio-access points. The base module of the system supports generic warehouse operations: cyclecounting with handheld barcode-scanners, efficient items delivery and issue, item movement, reserving, report generating on finished and in-process operations. Movements are optimized using worker's current location, operations are sorted in a priority order and transmitted to mobile and wireless worker's terminals. Mobile terminals improve of tasks processing control, eliminate staff mistakes, display actual information about main processes, provide data for online-reports, and significantly raise the efficiency of data exchange.

  9. Breaking barriers to Internet access | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    develop a new generation natural language based Internet search engine for the visually impaired, cell phone users, and Chinese citizens who cannot read English;; create a Canada-China Centre of excellence in the field of internet information acquisition; and; train graduate students in computer science in both Canada ...

  10. Internet Accessibility: Challenges before the African Nations

    African Journals Online (AJOL)

    Introduction. About ten years ago, the internet was virtually unknown to Africa, but today all capitals in the region, apart from Cosmos and Somalia (which, incidentally, do not have plans for development in the near future) have internet service. Telecommunication Companies in Nigeria,. South Africa, Zimbabwe and Ethiopia ...

  11. Cross-layer QoS Support for Multimedia Delivery over Wireless Internet

    Directory of Open Access Journals (Sweden)

    Zhang Qian

    2005-01-01

    Full Text Available Delivering multimedia over wireless Internet is a very challenging task. Multimedia delivery inherently has strict quality of service (QoS requirement on bandwidth, delay, and delay jitter. However, the current Internet can only support best-effort service, which imposes varying network conditions during multimedia delivery. The advent of wireless networks further exacerbates the variance of network conditions and brings greater challenges for multimedia delivery. To improve perceived media quality by end users over wireless Internet, QoS supports can be addressed in different layers, including application layer, transport layer, link layer, and so forth. This paper presents a framework, which provides QoS support, for multimedia delivery over wireless Internet, across different layers. To provide efficient QoS support for different types of media over the best-effort networks, we first propose a cross-layer architecture, which combines the application-level, transport-layer, as well as link-layer controls, and then review recent advances in each individual component. Specifically, dynamic estimation of varying channel and network, adaptive and energy-efficient application and link-level error control, efficient congestion control, header compression, adaptive automatic repeat request (ARQ and priority-based scheduling, as well as QoS-adaptive proxy caching technologies are explicitly reviewed in this paper.

  12. Comparative study of internet cloud and cloudlet over wireless mesh networks for real-time applications

    Science.gov (United States)

    Khan, Kashif A.; Wang, Qi; Luo, Chunbo; Wang, Xinheng; Grecos, Christos

    2014-05-01

    Mobile cloud computing is receiving world-wide momentum for ubiquitous on-demand cloud services for mobile users provided by Amazon, Google etc. with low capital cost. However, Internet-centric clouds introduce wide area network (WAN) delays that are often intolerable for real-time applications such as video streaming. One promising approach to addressing this challenge is to deploy decentralized mini-cloud facility known as cloudlets to enable localized cloud services. When supported by local wireless connectivity, a wireless cloudlet is expected to offer low cost and high performance cloud services for the users. In this work, we implement a realistic framework that comprises both a popular Internet cloud (Amazon Cloud) and a real-world cloudlet (based on Ubuntu Enterprise Cloud (UEC)) for mobile cloud users in a wireless mesh network. We focus on real-time video streaming over the HTTP standard and implement a typical application. We further perform a comprehensive comparative analysis and empirical evaluation of the application's performance when it is delivered over the Internet cloud and the cloudlet respectively. The study quantifies the influence of the two different cloud networking architectures on supporting real-time video streaming. We also enable movement of the users in the wireless mesh network and investigate the effect of user's mobility on mobile cloud computing over the cloudlet and Amazon cloud respectively. Our experimental results demonstrate the advantages of the cloudlet paradigm over its Internet cloud counterpart in supporting the quality of service of real-time applications.

  13. A telemedicine system for wireless home healthcare based on Bluetooth and the Internet.

    Science.gov (United States)

    Zhao, Xiaoming; Fei, Ding-Yu; Doarn, Charles R; Harnett, Brett; Merrell, Ronald

    2004-01-01

    The VitalPoll Telemedicine System (VTS) was designed and developed for wireless home healthcare. The aims of this study were: to design the architecture and communication methods for a telemedicine system; to implement a physiologic routing hub to collect data from different medical devices and sensors; and to evaluate the feasibility of this system for applications in wireless home healthcare. The VTS was built using Bluetooth wireless and Internet technologies with client/server architecture. Several medical devices, which acquire vital signs, such as real-time electrocardiogram signals, heart rate, body temperature, and activity (physical motion), were integrated into the VTS. Medical information and data were transmitted over short-range interface (USB, RS232), wireless communication, and the Internet. The medical results were stored in a database and presented using a web browser. The patient's vital signals can be collected, transmitted, and displayed in real time by the VTS. The experiments verified no data loss during Bluetooth and Internet communication. Bluetooth and the Internet provide enough bandwidth channels to tranmit these vital signs. The experimental results show that VTS may be suitable for a practical telemedicine system in home healthcare.

  14. Topology of Wireless Sensor Network Based on the Perception Needs of the Internet of Things

    Directory of Open Access Journals (Sweden)

    Wu Yuanjun

    2018-02-01

    Full Text Available In order to adapt to the characteristics of multi network convergence of IOT, this paper sorts out and summarizes the development status and existing problems of Internet of things (IOT and wireless sensor network (WSN as well as the key points for future research. Based on the existing research, the wireless sensor topology SORCA protocol is improved, and an energy saving intrusion tolerant network topology SORCA-W generation method is proposed, which realizes the interconnection of multiple sensor networks. Firstly, according to the location of nodes, the network is divided into topology network composed of hexagonal units. Through adding different network nodes collection summary, the neighbor table is judged and modified, and the name of the network is added. As a result, it is concluded that a plurality of wireless sensor networks can be connected for communication, which realizes the multi network integration of perception layer of Internet of things

  15. Centralized optical-frequency-comb-based RF carrier generator for DWDM fiber-wireless access systems

    DEFF Research Database (Denmark)

    Pang, Xiaodan; Beltran, Marta; Sanchez, Jose

    2014-01-01

    In this paper, we report on a gigabit capacity fiber-wireless system that enables smooth integration between high-speed wireless networks and dense wavelength-division-multiplexing (DWDM) access networks. By employing a centralized optical frequency comb, both the wireline and the wireless servic...

  16. An Adaptive Channel Access Method for Dynamic Super Dense Wireless Sensor Networks.

    Science.gov (United States)

    Lei, Chunyang; Bie, Hongxia; Fang, Gengfa; Zhang, Xuekun

    2015-12-03

    Super dense and distributed wireless sensor networks have become very popular with the development of small cell technology, Internet of Things (IoT), Machine-to-Machine (M2M) communications, Vehicular-to-Vehicular (V2V) communications and public safety networks. While densely deployed wireless networks provide one of the most important and sustainable solutions to improve the accuracy of sensing and spectral efficiency, a new channel access scheme needs to be designed to solve the channel congestion problem introduced by the high dynamics of competing nodes accessing the channel simultaneously. In this paper, we firstly analyzed the channel contention problem using a novel normalized channel contention analysis model which provides information on how to tune the contention window according to the state of channel contention. We then proposed an adaptive channel contention window tuning algorithm in which the contention window tuning rate is set dynamically based on the estimated channel contention level. Simulation results show that our proposed adaptive channel access algorithm based on fast contention window tuning can achieve more than 95 % of the theoretical optimal throughput and 0 . 97 of fairness index especially in dynamic and dense networks.

  17. An Adaptive Channel Access Method for Dynamic Super Dense Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chunyang Lei

    2015-12-01

    Full Text Available Super dense and distributed wireless sensor networks have become very popular with the development of small cell technology, Internet of Things (IoT, Machine-to-Machine (M2M communications, Vehicular-to-Vehicular (V2V communications and public safety networks. While densely deployed wireless networks provide one of the most important and sustainable solutions to improve the accuracy of sensing and spectral efficiency, a new channel access scheme needs to be designed to solve the channel congestion problem introduced by the high dynamics of competing nodes accessing the channel simultaneously. In this paper, we firstly analyzed the channel contention problem using a novel normalized channel contention analysis model which provides information on how to tune the contention window according to the state of channel contention. We then proposed an adaptive channel contention window tuning algorithm in which the contention window tuning rate is set dynamically based on the estimated channel contention level. Simulation results show that our proposed adaptive channel access algorithm based on fast contention window tuning can achieve more than 95 % of the theoretical optimal throughput and 0 . 97 of fairness index especially in dynamic and dense networks.

  18. Security Issues in Networks with Internet Access

    National Research Council Canada - National Science Library

    Landwehr, Carl E; Goldschlag, David M

    1997-01-01

    .... The principles are illustrated by describing the security issues a hypothetical company faces as the networks that support its operations evolve from strictly private, through a mix of Internet...

  19. 78 FR 30226 - Accessibility Requirements for Internet Browsers

    Science.gov (United States)

    2013-05-22

    ... accessibility features and capabilities in the ACS web application retrieved and displayed by the browser... or directs the installation of an Internet browser that supports a specific web standard, approved... included Internet browser does not support a particular technology that is needed to make web-based...

  20. Adaptive Media Access Control for Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Dragoni, Nicola

    2012-01-01

    ODMAC (On-Demand Media Access Control) is a recently proposed MAC protocol designed to support individual duty cycles for Energy Harvesting — Wireless Sensor Networks (EH-WSNs). Individual duty cycles are vital for EH-WSNs, because they allow nodes to adapt their energy consumption to the ever......-changing environmental energy sources. In this paper, we present an improved and extended version of ODMAC and we analyze it by means of an analytical model that can approximate several performance metrics in an arbitrary network topology. The simulations and the analytical experiments show ODMAC's ability to satisfy...

  1. A novel and efficient user access control scheme for wireless body area sensor networks

    Directory of Open Access Journals (Sweden)

    Santanu Chatterjee

    2014-07-01

    Full Text Available Wireless body area networks (WBANs can be applied to provide healthcare and patient monitoring. However, patient privacy can be vulnerable in a WBAN unless security is considered. Access to authorized users for the correct information and resources for different services can be provided with the help of efficient user access control mechanisms. This paper proposes a new user access control scheme for a WBAN. The proposed scheme makes use of a group-based user access ID, an access privilege mask, and a password. An elliptic curve cryptography-based public key cryptosystem is used to ensure that a particular legitimate user can only access the information for which he/she is authorized. We show that our scheme performs better than previously existing user access control schemes. Through a security analysis, we show that our scheme is secure against possible known attacks. Furthermore, through a formal security verification using the AVISPA (Automated Validation of Internet Security Protocols and Applications tool, we show that our scheme is also secure against passive and active attacks.

  2. Access Routes of Internet Finance Dictionaries: Present Solutions ...

    African Journals Online (AJOL)

    ... dictionaries that can provide effective and efficient solutions to lexicographical problems. Keywords: Dictionary, Paper Dictionary, Internet Dictionary, Lsp Dictionary, Finance Dictionary, Financial Terms, Lexicography, Lexicographical Functions, Text Reception, User Needs, User Situation, Access Routes, Search Options, ...

  3. Using the Internet to access information inflates future use of the Internet to access other information.

    Science.gov (United States)

    Storm, Benjamin C; Stone, Sean M; Benjamin, Aaron S

    2017-07-01

    The ways in which people learn, remember, and solve problems have all been impacted by the Internet. The present research explored how people become primed to use the Internet as a form of cognitive offloading. In three experiments, we show that using the Internet to retrieve information alters a person's propensity to use the Internet to retrieve other information. Specifically, participants who used Google to answer an initial set of difficult trivia questions were more likely to decide to use Google when answering a new set of relatively easy trivia questions than were participants who answered the initial questions from memory. These results suggest that relying on the Internet to access information makes one more likely to rely on the Internet to access other information.

  4. Access Control with RFID in the Internet of Things

    DEFF Research Database (Denmark)

    Jensen, Steffen Elstrøm Holst; Jacobsen, Rune Hylsberg

    2013-01-01

    , to the Internet is suggested. The solution uses virtual representations of objects by using low-cost, passive RFID tags to give objects identities on the Internet. A prototype that maps an RFID identity into an IPv6 address is constructed. It is illustrated how this approach can be used in access control systems......Future Internet research is needed to bring the Internet and the Things closer to each other to form the Internet of Things. As objects in our daily life gradually become smarter, there is an increasing benefit of networking these objects. In this article, a method to couple objects, the Things...... based on open network protocols and packet filtering. The solution includes a novel RFID reader architecture that supports the internetworking of components of a future access control system based on network layer technology....

  5. Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview

    Science.gov (United States)

    Zhang, Junqing; Duong, Trung; Woods, Roger; Marshall, Alan

    2017-08-01

    The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of key generation and physical layer encryption. These schemes can be implemented and are lightweight, and thus offer practical solutions for providing effective IoT wireless security. Future research to make IoT-based physical layer security more robust and pervasive is also covered.

  6. Access to internet in rural and remote Canada.

    Science.gov (United States)

    Currie, Leanne M; Ronquillo, Charlene; Dick, Tania

    2014-01-01

    Canada is the second largest landmass country in the world, but has one of the lowest population densities. As of 2011, approximately 19% of the Canadian population lives in rural, or remote communities. The purpose of this study was to examine differences in rural and urban access to the Internet and device use in Canada, and to explore differences in access to broadband between Aboriginal and non-Aboriginal communities in Canada. In general rural-dwellers had lower levels of Internet access and despite efforts to increase access to high speed Internet, Aboriginal communities in some regions have limited access. Future research should explore computer and health literacy in the context of rural and remote communities in Canada.

  7. Adaptive Information Access on Multiple Applications Support Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2014-01-01

    information is challenged by dynamic nature of information elements. These challenges are more prominent in case of wireless sensor network (WSN) applications, as the information that the sensor node collects are mostly dynamic in nature (say, temperature). Therefore, it is likely that there can be a mismatch......Accessing information remotely to dynamically changing information elements cannot be avoided and has become a required functionality for various network services. Most applications require up-to-date information which is reliable and accurate. The information reliability in terms of using correct...... is used for safety and security monitoring purposes. In this paper, we evaluate different access strategies to remote dynamic information and compare between achieving information reliability (mismatch probability) and the associated power consumption. Lastly, based on the models, we propose an adaptive...

  8. Preservice Teachers' Internet Addiction in Terms of Gender, Internet Access, Loneliness and Life Satisfaction

    Science.gov (United States)

    Demirer, Veysel; Bozoglan, Bahadir; Sahin, Ismail

    2013-01-01

    The aim of this study is to investigate pre-service teachers' Internet addiction in terms of gender, Internet accessibility, loneliness and life satisfaction. Statistical analyses were completed on the data by the 247 preservice teachers that filled the surveys completely. According to findings, pre-service teachers' level of loneliness and…

  9. Internet search engines - Fluctuations in document accessibility

    NARCIS (Netherlands)

    W. Mettrop (Wouter); P. Nieuwenhuysen

    2001-01-01

    htmlabstractAn empirical investigation of the consistency of retrieval through Internet search engines is reported. Thirteen engines are evaluated: AltaVista, EuroFerret, Excite, HotBot, InfoSeek, Lycos, MSN, NorthernLight, Snap, WebCrawler and three national Dutch engines: Ilse, Search.nl and

  10. Internet access to scanned paper documents

    NARCIS (Netherlands)

    Worring, M.; Smeulders, A.W.M.; Witten, I.; Akscyn, R.; Shipman, F.M.

    1998-01-01

    In this contribution we identify the different structures to encounterin a hyperdocument. Methods are described for deriving those structures from scanned paper originals. The content and structure of the document is then made available in a form suited for an Internet browser. It provides

  11. 75 FR 55297 - Further Inquiry Into Two Under-Developed Issues in the Open Internet Proceeding

    Science.gov (United States)

    2010-09-10

    ...). The second is the application of open Internet rules to mobile wireless Internet access services...). The second is the application of open Internet rules to mobile wireless Internet access services... in the market. (B) Truth in Advertising: Prohibit broadband providers from marketing specialized...

  12. Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT

    OpenAIRE

    Luo, Ming; Luo, Yi; Wan, Yuwei; Wang, Ze

    2018-01-01

    Nowadays wireless sensor network (WSN) is increasingly being used in the Internet of Things (IoT) for data collection, and design of an access control scheme that allows an Internet user as part of IoT to access the WSN becomes a hot topic. A lot of access control schemes have been proposed for the WSNs in the context of the IoT. Nevertheless, almost all of these schemes assume that communication nodes in different network domains share common system parameters, which is not suitable for cros...

  13. Secure and Efficient Access Control Scheme for Wireless Sensor Networks in the Cross-Domain Context of the IoT

    Directory of Open Access Journals (Sweden)

    Ming Luo

    2018-01-01

    Full Text Available Nowadays wireless sensor network (WSN is increasingly being used in the Internet of Things (IoT for data collection, and design of an access control scheme that allows an Internet user as part of IoT to access the WSN becomes a hot topic. A lot of access control schemes have been proposed for the WSNs in the context of the IoT. Nevertheless, almost all of these schemes assume that communication nodes in different network domains share common system parameters, which is not suitable for cross-domain IoT environment in practical situations. To solve this shortcoming, we propose a more secure and efficient access control scheme for wireless sensor networks in the cross-domain context of the Internet of Things, which allows an Internet user in a certificateless cryptography (CLC environment to communicate with a sensor node in an identity-based cryptography (IBC environment with different system parameters. Moreover, our proposed scheme achieves known session-specific temporary information security (KSSTIS that most of access control schemes cannot satisfy. Performance analysis is given to show that our scheme is well suited for wireless sensor networks in the cross-domain context of the IoT.

  14. XACML to build access control policies for Internet of Things

    OpenAIRE

    Atlam, Hany F.; Alassafi, Madini, Obad; Alenezi, Ahmed; Walters, Robert; Wills, Gary

    2018-01-01

    Although the Internet of things (IoT) brought unlimited benefits, it also brought many security issues. The access control is one of the main elements to address these issues. It provides the access to system resources only to authorized users and ensures that they behave in an authorized manner during their access sessions. One of the significant components of any access control model is access policies. They are used to build the criteria to permit or deny any access request. Building an ef...

  15. Why People Aren't Using Wireless Internet

    DEFF Research Database (Denmark)

    Ahluwalia, Punit; Gimpel, Gregory; Varshney, Upkar

    2010-01-01

    This paper proposes a new model for understanding the adoption of internet services when competing technological standards can fulfil similar needs. Using prospect theory as its theoretical foundation, the model posits that reference prices, flat rate preference, and status quo bias constitute th...... through a field study. The paper discusses several implications for telecommunications policy and industry....

  16. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things

    Science.gov (United States)

    Yi, Meng; Chen, Qingkui; Xiong, Neal N.

    2016-01-01

    This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate. PMID:27827878

  17. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Meng Yi

    2016-11-01

    Full Text Available This paper considers the distributed access and control problem of massive wireless sensor networks’ data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  18. An Effective Massive Sensor Network Data Access Scheme Based on Topology Control for the Internet of Things.

    Science.gov (United States)

    Yi, Meng; Chen, Qingkui; Xiong, Neal N

    2016-11-03

    This paper considers the distributed access and control problem of massive wireless sensor networks' data access center for the Internet of Things, which is an extension of wireless sensor networks and an element of its topology structure. In the context of the arrival of massive service access requests at a virtual data center, this paper designs a massive sensing data access and control mechanism to improve the access efficiency of service requests and makes full use of the available resources at the data access center for the Internet of things. Firstly, this paper proposes a synergistically distributed buffer access model, which separates the information of resource and location. Secondly, the paper divides the service access requests into multiple virtual groups based on their characteristics and locations using an optimized self-organizing feature map neural network. Furthermore, this paper designs an optimal scheduling algorithm of group migration based on the combination scheme between the artificial bee colony algorithm and chaos searching theory. Finally, the experimental results demonstrate that this mechanism outperforms the existing schemes in terms of enhancing the accessibility of service requests effectively, reducing network delay, and has higher load balancing capacity and higher resource utility rate.

  19. Internet pharmacy: issues of access, quality, costs, and regulation.

    Science.gov (United States)

    Crawford, Stephanie Y

    2003-02-01

    Internet pharmacy has been the focus of heightened interest over the past 3 years since the first major Web site was introduced in the United States. This paper addresses issues pertaining to Internet pharmacies that sell prescriptions and other products to consumers at the retail level. The Internet pharmacy industry has shifted rapidly in the short time span. This paper begins with a summary of historical considerations and the shifting organization of Internet pharmacy. The advantages and disadvantages of online pharmacy practice are listed. Issues of access, quality, and cost are described. The challenges in regulation at the state and federal levels are presented. Advice to consumers is offered regarding the use of Internet pharmacy sites for purchasing prescription drug products.

  20. Medium Access Control in Energy Harvesting - Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon

    Focusing on Wireless Sensor Networks (WSN) that are powered by energy harvesting, this dissertation focuses on energy-efficient communication links between senders and receivers that are alternating between active and sleeping states of operation. In particular, the focus lies on Medium Access......, collision avoidance, provision of Quality of Service (QoS) and security. Focusing on the particular requirements of an energy harvesting application, the dissertation continues with the presentation of a MAC protocol, named ODMAC, which extends the receiver-initiated paradigm with several energy......-efficient features that aim to adapt the consumed energy to match the harvested energy, distribute the load with respect to the harvested energy, decrease the overhead of the communication, address the requirements for collision avoidance, prioritize urgent traffic and secure the system against beacon replay attacks...

  1. Efficient scheduling request algorithm for opportunistic wireless access

    KAUST Repository

    Nam, Haewoon

    2011-08-01

    An efficient scheduling request algorithm for opportunistic wireless access based on user grouping is proposed in this paper. Similar to the well-known opportunistic splitting algorithm, the proposed algorithm initially adjusts (or lowers) the threshold during a guard period if no user sends a scheduling request. However, if multiple users make requests simultaneously and therefore a collision occurs, the proposed algorithm no longer updates the threshold but narrows down the user search space by splitting the users into multiple groups iteratively, whereas the opportunistic splitting algorithm keeps adjusting the threshold until a single user is found. Since the threshold is only updated when no user sends a request, it is shown that the proposed algorithm significantly alleviates the burden of the signaling for the threshold distribution to the users by the scheduler. More importantly, the proposed algorithm requires a less number of mini-slots to make a user selection given a certain scheduling outage probability. © 2011 IEEE.

  2. Internet Access Practices and Employee Attitudes toward Internet Usage Policy Implementation in Selected Philippines Financial Institutions

    Directory of Open Access Journals (Sweden)

    Maria Sagrario R. Simbulan

    2004-06-01

    Full Text Available This study explores the employees’ concept of appropriate use of Internet facilities as well as their perception of the rights and liabilities, both of the individual and of the organization, associated with the grant of Internet access privileges in the workplace. It further examines how employees perceive their organization’s monitoring of employees online activities and the use of an Internet Usage Policy, whether these are seen as monitoring and control mechanisms or as ways to ensure that Internet access facilities are shared equitably and used responsibly. While the issue of the impact of Internet access on employee productivity will not directly be tackled, the study will provide insights into the frequency and type of usage of Internet facilities in the workplace. Considering the sizeable investment that an organization makes to provide Internet facilities, determining how employees use these facilities to achieve the goals of the organization is, in the very least, interesting and for most organizations concerned with their survival in difficult times, critically important.

  3. Wireless access to a pharmaceutical database: A demonstrator for data driven Wireless Application Prorocol (WAP) applications in medical information processing

    DEFF Research Database (Denmark)

    Hansen, Michael Schacht; Dørup, Jens

    2001-01-01

    script for easy update of the database. Data were distributed in 35 interrelated tables. Each pharmaceutical brand name was given its own card with links to general information about the drug, active substances, contraindications etc. Access was available through 1) browsing therapeutic groups and 2......) searching for a brand name. The database interface was programmed in the server-side scripting language PHP3. RESULTS: A free, open source Wireless Application Protocol gateway to a pharmaceutical catalogue was established to allow dial-in access independent of commercial Wireless Application Protocol...... service providers. The application was tested on the Nokia 7110 and Ericsson R320s cellular phones. CONCLUSIONS: We have demonstrated that Wireless Application Protocol-based access to a dynamic clinical database can be established using open source freeware. The project opens perspectives for a further...

  4. Quantum internet using code division multiple access

    Science.gov (United States)

    Zhang, Jing; Liu, Yu-xi; Özdemir, Şahin Kaya; Wu, Re-Bing; Gao, Feifei; Wang, Xiang-Bin; Yang, Lan; Nori, Franco

    2013-01-01

    A crucial open problem inS large-scale quantum networks is how to efficiently transmit quantum data among many pairs of users via a common data-transmission medium. We propose a solution by developing a quantum code division multiple access (q-CDMA) approach in which quantum information is chaotically encoded to spread its spectral content, and then decoded via chaos synchronization to separate different sender-receiver pairs. In comparison to other existing approaches, such as frequency division multiple access (FDMA), the proposed q-CDMA can greatly increase the information rates per channel used, especially for very noisy quantum channels. PMID:23860488

  5. Internet skill-related problems in accessing online health information.

    Science.gov (United States)

    van Deursen, Alexander J A M

    2012-01-01

    Despite the amount of health information available online, there are several barriers that limit the Internet from being adopted as a source of health information. The purpose of this study was to identify individual skill-related problems that users experience when accessing the Internet for health information and services. Between November 2009 and February 2010, 88 subjects participated in a performance test in which participants had to complete health-related assignments on the Internet. Subjects were randomly selected from a telephone book. A selective quota sample was used and was divided over equal subsamples of gender, age, and education. Each subject was required to complete nine assignments on the Internet. The general population experiences many Internet skill-related problems, especially those related to information and strategic Internet skills. Aging and lower levels of education seemed to contribute to the amount of operational and formal skill-related problems experienced. Saving files, bookmarking websites, and using search engines were troublesome for these groups of people. With respect to information skills, the higher the level of educational attainment, the less problems the participants experienced. Although younger subjects experienced far less operational and formal skill-related problems, it was revealed that older subjects were less likely to select and use irrelevant search results and unreliable sources. Concerning the strategic Internet skills it was revealed that older subjects were less likely to make inappropriate decisions based on information gathered. The amount of online health-related information and services is consistently growing; however, it appears that the general population experiences many skill-related problems, particularly those related to information and strategic Internet skills, and they become very important when it comes to health. These skills are also problematic for younger generations who are often seen as

  6. Non-Orthogonal Multiple Access for Ubiquitous Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Asim Anwar

    2018-02-01

    Full Text Available Ubiquitous wireless sensor networks (UWSNs have become a critical technology for enabling smart cities and other ubiquitous monitoring applications. Their deployment, however, can be seriously hampered by the spectrum available to the sheer number of sensors for communication. To support the communication needs of UWSNs without requiring more spectrum resources, the power-domain non-orthogonal multiple access (NOMA technique originally proposed for 5th Generation (5G cellular networks is investigated for UWSNs for the first time in this paper. However, unlike 5G networks that operate in the licensed spectrum, UWSNs mostly operate in unlicensed spectrum where sensors also experience cross-technology interferences from other devices sharing the same spectrum. In this paper, we model the interferences from various sources at the sensors using stochastic geometry framework. To evaluate the performance, we derive a theorem and present new closed form expression for the outage probability of the sensors in a downlink scenario under interference limited environment. In addition, diversity analysis for the ordered NOMA users is performed. Based on the derived outage probability, we evaluate the average link throughput and energy consumption efficiency of NOMA against conventional orthogonal multiple access (OMA technique in UWSNs. Further, the required computational complexity for the NOMA users is presented.

  7. Non-Orthogonal Multiple Access for Ubiquitous Wireless Sensor Networks.

    Science.gov (United States)

    Anwar, Asim; Seet, Boon-Chong; Ding, Zhiguo

    2018-02-08

    Ubiquitous wireless sensor networks (UWSNs) have become a critical technology for enabling smart cities and other ubiquitous monitoring applications. Their deployment, however, can be seriously hampered by the spectrum available to the sheer number of sensors for communication. To support the communication needs of UWSNs without requiring more spectrum resources, the power-domain non-orthogonal multiple access (NOMA) technique originally proposed for 5th Generation (5G) cellular networks is investigated for UWSNs for the first time in this paper. However, unlike 5G networks that operate in the licensed spectrum, UWSNs mostly operate in unlicensed spectrum where sensors also experience cross-technology interferences from other devices sharing the same spectrum. In this paper, we model the interferences from various sources at the sensors using stochastic geometry framework. To evaluate the performance, we derive a theorem and present new closed form expression for the outage probability of the sensors in a downlink scenario under interference limited environment. In addition, diversity analysis for the ordered NOMA users is performed. Based on the derived outage probability, we evaluate the average link throughput and energy consumption efficiency of NOMA against conventional orthogonal multiple access (OMA) technique in UWSNs. Further, the required computational complexity for the NOMA users is presented.

  8. Cellular 5G Access for Massive Internet of Things

    DEFF Research Database (Denmark)

    Madueño, Germán Corrales; Pratas, Nuno; Stefanovic, Cedomir

    2017-01-01

    The Internet of Things (IoT) refers to the paradigm of physical and virtual “things” that communicate and collaborate over the Internet, with minimal or no human intervention. There are multiple ways in which an IoT device can be connected to the Internet. Cellular technologies are seen as viable...... candidates in this respect, due to their maturity, worldwide availability and the use of reserved spectrum. However, current cellular systems are not well-equipped to efficiently and reliably support IoT traffic, particularly in the radio access part, as they are designed for low number of high......-rate connections and not for high number of low-rate IoT connections. In this chapter we outline the main features of the IoT traffic types, review operation of the current cellular access and provide some guidelines how to address its shortcomings and evolve it in order to support IoT services. However...

  9. Analysis of the Decoupled Access for Downlink and Uplink in Wireless Heterogeneous Networks

    DEFF Research Database (Denmark)

    Smiljkovikj, K.; Popovski, Petar; Gavrilovska, L.

    2015-01-01

    Wireless cellular networks evolve towards a heterogeneous infrastructure, featuring multiple types of Base Stations (BSs), such as Femto BSs (FBSs) and Macro BSs (MBSs). A wireless device observes multiple points (BSs) through which it can access the infrastructure and it may choose to receive...

  10. Internet access and use among Nigerian dental students ...

    African Journals Online (AJOL)

    Objective: The aim of this study was to determine access to internet /e-mail and its usage among Nigerian clinical dental students in year 4 to year 6. Methods: This is a cross-sectional study involving clinical dental students in year 4 to year 6 of the College of Medicine, University of Lagos. Information obtained from the ...

  11. Accessing And Utilizing Hinagoa Resources On The Internet By The ...

    African Journals Online (AJOL)

    This paper presents simple descriptive steps required in accessing full -text articles from the HINAGOA resources on the Internet. The primary aim is to enable NIFOR scientists search and obtain desired information from the HINAGOA resources much more precis ely and efficiently. The three portals that make up HINAGOA, ...

  12. Creation of an online multimedia radiology module access to Internet

    International Nuclear Information System (INIS)

    Alejo, J.P.; Vega, J.M.; Perez, R.

    1996-01-01

    Using freely distributed programs, we have created a radiology data server in the world wide web (WWW) system, which includes among its services a radiological teaching module developed entirely in Spanish. This server is linked to Internet, the extensive worldwide computer network, to which WWW subscribers have access. The data is presented in hypertext and hypermedia format. (Author) 9 refs

  13. EAP-Kerberos: A Low Latency EAP Authentication Method for Faster Handoffs in Wireless Access Networks

    Science.gov (United States)

    Zrelli, Saber; Okabe, Nobuo; Shinoda, Yoichi

    The wireless medium is a key technology for enabling ubiquitous and continuous network connectivity. It is becoming more and more important in our daily life especially with the increasing adoption of networking technologies in many fields such as medical care and transportation systems. Although most wireless technologies nowadays provide satisfying bandwidth and higher speeds, several of these technologies still lack improvements with regard to handoff performance. In this paper, we focus on wireless network technologies that rely on the Extensible Authentication Protocol for mutual authentication between the station and the access network. Such technologies include local area wireless networks (IEEE 802.11) as well as broadband wireless networks (IEEE 802.16). We present a new EAP authentication method based on a three party authentication scheme, namely Kerberos, that considerably shortens handoff delays. Compared to other methods, the proposed method has the advantage of not requiring any changes on the access points, making it readily deployable at reasonable costs.

  14. [Differences in access to Internet and Internet-based information seeking according to the type of psychiatric disorder].

    Science.gov (United States)

    Brunault, P; Bray, A; Rerolle, C; Cognet, S; Gaillard, P; El-Hage, W

    2017-04-01

    Internet has become a major tool for patients to search for health-related information and to communicate on health. We currently lack data on how patients with psychiatric disorders access and use Internet to search for information on their mental health. This study aimed to assess, in patients followed for a psychiatric disorder (schizophrenia, bipolar disorder, mood and anxiety disorder, substance-related and addictive disorders and eating disorders), prevalence of Internet access and use, and patient expectations and needs regarding the use of Internet to search for mental-health information depending on the psychiatric disorder. We conducted this cross-sectional study between May 2013 and July 2013 in 648 patients receiving psychiatric care in 8 hospitals from the Region Centre, France. We used multivariate logistic regression adjusted for age, gender, socio-educational level and professional status to compare use, expectations and needs regarding Internet-based information about the patient's psychiatric disorder (65-items self-administered questionnaires) as a function of the psychiatric disorders. We identified patients clusters with multiple correspondence analysis and ascending hierarchical classification. Although 65.6% of our population accessed Internet at home, prevalence for Internet access varied depending on the type of psychiatric disorder and was much more related to limited access to a computer and low income than to a lack of interest in the Internet. Most of the patients who used Internet were interested in having access to reliable Internet-based information on their health (76.8%), and most used Internet to search for Internet based health-information about their psychiatric disorder (58.8%). We found important differences in terms of expectations and needs depending on the patient's psychiatric disorder (e.g., higher interest in Internet-based information among patients with bipolar disorder, substance-related and addictive disorders

  15. Optimal Pricing of Spectrum Resources in Wireless Opportunistic Access

    Directory of Open Access Journals (Sweden)

    Hanna Bogucka

    2012-01-01

    Full Text Available We consider opportunistic access to spectrum resources in cognitive wireless networks. The users equipment, or the network nodes in general are able to sense the spectrum and adopt a subset of available resources (the spectrum and the power individually and independently in a distributed manner, that is, based on their local channel quality information and not knowing the Channel State Information (CSI of the other nodes' links in the considered network area. In such a network scenery, the competition of nodes for available resources is observed, which can be modeled as a game. To obtain spectrally efficient and fair spectrum allocation in this competitive environment with the nodes having no information on the other players, taxation of resources is applied to coerce desired behavior of the competitors. In the paper, we present mathematical formulation of the problem of finding the optimal taxation rate (common for all nodes and propose a reduced-complexity algorithm for this optimization. Simulation results for these derived optimal values in various scenarios are also provided.

  16. Seamless Optical Fiber-Wireless Millimeter- Wave Transmission Link for Access Networks

    DEFF Research Database (Denmark)

    Pang, Xiaodan; Lebedev, Alexander; Vegas Olmos, Juan José

    2013-01-01

    This paper presents an experimental demonstration of a millimeter-wave wireless bridge in the W-band for transparent broadband fiber access in the sub-urban areas, where full fiber connections are impracticable.......This paper presents an experimental demonstration of a millimeter-wave wireless bridge in the W-band for transparent broadband fiber access in the sub-urban areas, where full fiber connections are impracticable....

  17. Building and Delivering the Virtual World: Commercializing Services for Internet Access

    OpenAIRE

    Shane Greenstein

    2000-01-01

    This study analyzes the service offerings of Internet Service Providers (ISPs), the commercial suppliers of Internet access in the United States. It presents data on the services of 2089 ISPs in the summer of 1998. By this time, the Internet access industry had undergone its first wave of entry and many ISPs had begun to offer services other than basic access. This paper develops an Internet access industry product code which classifies these services. Significant heterogeneity across ISPs is...

  18. Internet access and usage by staff and students: a case study of ...

    African Journals Online (AJOL)

    This study focused on Internet access and usage by staff and students in the University of Jos Main Library. It investigated monthly number of users that queued to access Internet monthly and the number of users who actually had access to use the Internet between January – December 2006. Other things investigated ...

  19. The Effect of Information Access Strategy on Power Consumption and Reliability in Wireless Sensor Network

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2013-01-01

    This paper examines the effect of different information access strategies on power consumption and information reliability, considering the wireless sensor network as the source of information. Basically, the paper explores three different access strategies, namely; reactive, periodic and hybrid...... and computes power consumption and mismatch probability [1] in each of these access strategies. Based on our study, we make some recommendations when and where, which access strategy is suitable depending upon the application's requirements and network behavior. It also provides the model implementation...

  20. High-Capacity Hybrid Optical Fiber-Wireless Communications Links in Access Networks

    DEFF Research Database (Denmark)

    Pang, Xiaodan

    techniques with both coherent and incoherent optical sources are studied and demonstrated. Employments of advanced modulation formats including phase-shift keying (PSK), M-quadrature amplitude modulation (QAM) and orthogonal frequency-division multiplexing (OFDM) for high speed photonic-wireless transmission...... techniques. In conclusion, the results presented in the thesis show the feasibility of employing mm-wave signals, advanced modulation formats and spatial multiplexing technologies in next generation high capacity hybrid optical fiber-wireless access systems....

  1. INTEGRASI MIKROTIK DAN WIRELESS RADIO SEBAGAI MEDIA EFISIENSI INTERNET DI PERUSAHAAN (STUDI KASUS DI PT. BITS MILIARTHA SURABAYA

    Directory of Open Access Journals (Sweden)

    Andy Rachman

    2015-11-01

    Full Text Available Teknologi informasi merupakan salah satu bagian terpenting dalam kegiatan perusahaan saat ini.Setiap perusahaan yang ada di Indonesia saat ini telah terhubung dengan Internet.Sejalan dengan perkembangan teknologi informasi yang semakin maju, harga berlangganan bandwidthInternetpun semakin murah dari tahun ke tahun. Harga sewa Internet di warung Internet tahun 2013 turun 75% dari tahun 2000 dan harga berlangganan Internet pribadi tahun 2013 turun 86% dari tahun 2000. Penggunaan Internet pada suatu perusahaan yang memiliki gedung terpisah dengan gedung lainnya akan membutuhkan biaya yang sangat mahal untuk pengoperasiannya. Oleh karena itu, digunakanlah wireless radio sebagai media koneksi antar satu gedung dengan gedung lainnya dengan jarak antar gedung, sedangkan untuk pengaturan hak dan kegiatan berInternet digunakanlah mikrotik.Mikrotik merupakan salah satu jenis router yang handal dan banyak digunakan oleh perusahaan berukuran kecil sampai dengan berukuran menengah. Dengan menggunakan mikrotik yang mempunyai kemampuan sama dengan router-router lainnya dan dengan harga yang sangat murah, maka pengeluaran perusahaan untuk pengadaan router berkurang menjadi 97% serta dengan menggunakan wireless radio, perusahaan dapat mengefisiensi pembangunan Internet sampai dengan 50% dan kemudahan manajemen Internet perusahaan.

  2. Upper bound for energy efficiency in multi-cell fibre-wireless access systems

    DEFF Research Database (Denmark)

    Koonen, A.M.J.; Popov, M.; Wessing, Henrik

    2013-01-01

    Bringing radio access points closer to the end-users improves radio energy efficiency. However, taking into account both the radio and the optical parts of a fibre-wireless access system, the overall system energy efficiency has an upper bound determined by the relation between the energy...

  3. Democracy and the Internet: Access, Engagement and Deliberation

    Directory of Open Access Journals (Sweden)

    Roman Gerodimos

    2005-12-01

    Full Text Available The internet has the capacity to facilitate the creation of new forms of civic engagement, but the realisation of these opportunities requires institutional and cultural reinforcement. The democratic character of e-citizenship and the equal distribution of online resources to the public require the fulfilment of four conditions: access, engagement (incorporating education, motivation and trust, meaningful deliberation and a link between civic input and public policy output. Furthermore, the gap between the main features of cyberspace and the inherent prerequisites of democracy, such as a finite space and a set of rules, create tensions that need to be negotiated politically. Although the empirical evidence available includes some encouraging signs regarding the future use of the internet for civic engagement, the existing limitations and obstacles mean that the new media will complement, rather than replace, the old media as a democratic public sphere.

  4. Access Point Security Service for wireless ad-hoc communication

    NARCIS (Netherlands)

    Scholten, Johan; Nijdam, M.

    2006-01-01

    This paper describes the design and implementation of a security solution for ad-hoc peer-to-peer communication. The security solution is based on a scenario where two wireless devices require secure communication, but share no security relationship a priori. The necessary requirements for the

  5. Enabling multimode wireless access networks using remote radio heads

    DEFF Research Database (Denmark)

    Kardaras, Georgios; Soler, José; Dittmann, Lars

    2012-01-01

    the advantages of using distributed base station architectures to provide multimode capabilities. In particular, it focuses on the radio unit, commonly known in industry as remote radio head. Multimode radio units capable of operating according to different wireless standards (WCDMA, LTE and WiMAX) can be proven....... © 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering....

  6. Virtual Wireless Sensor Networks: Adaptive Brain-Inspired Configuration for Internet of Things Applications.

    Science.gov (United States)

    Toyonaga, Shinya; Kominami, Daichi; Murata, Masayuki

    2016-08-19

    Many researchers are devoting attention to the so-called "Internet of Things" (IoT), and wireless sensor networks (WSNs) are regarded as a critical technology for realizing the communication infrastructure of the future, including the IoT. Against this background, virtualization is a crucial technique for the integration of multiple WSNs. Designing virtualized WSNs for actual environments will require further detailed studies. Within the IoT environment, physical networks can undergo dynamic change, and so, many problems exist that could prevent applications from running without interruption when using the existing approaches. In this paper, we show an overall architecture that is suitable for constructing and running virtual wireless sensor network (VWSN) services within a VWSN topology. Our approach provides users with a reliable VWSN network by assigning redundant resources according to each user's demand and providing a recovery method to incorporate environmental changes. We tested this approach by simulation experiment, with the results showing that the VWSN network is reliable in many cases, although physical deployment of sensor nodes and the modular structure of the VWSN will be quite important to the stability of services within the VWSN topology.

  7. Virtual Wireless Sensor Networks: Adaptive Brain-Inspired Configuration for Internet of Things Applications

    Directory of Open Access Journals (Sweden)

    Shinya Toyonaga

    2016-08-01

    Full Text Available Many researchers are devoting attention to the so-called “Internet of Things” (IoT, and wireless sensor networks (WSNs are regarded as a critical technology for realizing the communication infrastructure of the future, including the IoT. Against this background, virtualization is a crucial technique for the integration of multiple WSNs. Designing virtualized WSNs for actual environments will require further detailed studies. Within the IoT environment, physical networks can undergo dynamic change, and so, many problems exist that could prevent applications from running without interruption when using the existing approaches. In this paper, we show an overall architecture that is suitable for constructing and running virtual wireless sensor network (VWSN services within a VWSN topology. Our approach provides users with a reliable VWSN network by assigning redundant resources according to each user’s demand and providing a recovery method to incorporate environmental changes. We tested this approach by simulation experiment, with the results showing that the VWSN network is reliable in many cases, although physical deployment of sensor nodes and the modular structure of the VWSN will be quite important to the stability of services within the VWSN topology.

  8. Reconfigurable radio access unit to dynamically distribute W-band signals in 5G wireless access networks

    DEFF Research Database (Denmark)

    Rodríguez Páez, Juan Sebastián; Rommel, Simon; Vegas Olmos, Juan José

    2017-01-01

    In this paper a new type of radio access unit is proposed and demonstrated. This unit is composed only of the reduced amount of components (compared to conventional unit designs) to optically generate wireless signals on the W-band (75–110 GHz) in combination with a switching system. The proposed...

  9. Delay guaranteed VoD services over group-based integrated fiber-wireless (FiWi) access networks with energy efficiency

    Science.gov (United States)

    Li, Yan; Dai, Shifang; Chang, Xiangmao

    2015-08-01

    In group-based fiber-wireless (FiWi) access networks, where wireless clients are divided into several groups according to their interested Internet services, VoD services will meet new challenges considering the diversity of video requesting probability for each wireless group. In this paper, we categorize wireless groups into "video-hot" group with great interest in VoD services and "video-cold" group with infrequent video requesting. For video requests from "video-hot" groups, we firstly propose an energy-efficient optical network unit (ONU) selection approach to reduce ONU power consumption by selecting a subset of ONUs to support such requests, then our previously proposed rebroadcast and patching scheme can be effectively applied. For video requests from "video-cold" groups, a batched multicasting scheme is presented for energy and bandwidth saving. Both of the VoD schemes mentioned in this study are with the aim to minimize worst-case playback delay (WPD) which is particularly important as Internet users. In view of that some ONUs may need to handle video requests from two kinds of group, optimal ONU channel assignment aims to minimize weighted overall WPD is also studied. The efficiency of the work is finally demonstrated by the simulations.

  10. EEM{sup TM} wireless supervision

    Energy Technology Data Exchange (ETDEWEB)

    Bilic, H. [Ericsson-Nikola Tesla d.d. Zagreb (Croatia)

    2000-07-01

    By adding the GSM network to the communication level of Energy Management systems, energy operating centres (EOC) can offer wireless access to the supervised equipment. Furthermore EOC can profit from rapid service development in the GSM networks. With implementation of GPRS to the GSM network EOC can instantly offer wireless access to external IP based networks such as Internet and corporate Intranets. The author describes architecture and key characteristic of Ericsson EnergyMaster{sup TM} (EEM{sup TM}) system for Energy Management, how and where to implement wireless supervision, wireless access to IP addresses and also how to implement new services provided by the GSM network. (orig.)

  11. QoS Provisioning Techniques for Future Fiber-Wireless (FiWi Access Networks

    Directory of Open Access Journals (Sweden)

    Martin Maier

    2010-04-01

    Full Text Available A plethora of enabling optical and wireless access-metro network technologies have been emerging that can be used to build future-proof bimodal fiber-wireless (FiWi networks. Hybrid FiWi networks aim at providing wired and wireless quad-play services over the same infrastructure simultaneously and hold great promise to mitigate the digital divide and change the way we live and work by replacing commuting with teleworking. After overviewing enabling optical and wireless network technologies and their QoS provisioning techniques, we elaborate on enabling radio-over-fiber (RoF and radio-and-fiber (R&F technologies. We describe and investigate new QoS provisioning techniques for future FiWi networks, ranging from traffic class mapping, scheduling, and resource management to advanced aggregation techniques, congestion control, and layer-2 path selection algorithms.

  12. Converged wireline and wireless signal distribution in optical fiber access networks

    DEFF Research Database (Denmark)

    Prince, Kamau

    This thesis presents results obtained during the course of my doctoral studies into the transport of fixed and wireless signaling over a converged otpical access infrastructure. In the formulation, development and assessment of a converged paradigma for multiple-services delivery via optical access...... networking infrastructure, I have demonstrated increased functionalities with existing optical technologies and commercially available optoelectronic devices. I have developed novel systems for extending the range of optical access systems, and have demonstrated the repurposing of standard digital devices...

  13. Knowledge-Based Multiple Access Protocol in Broadband Wireless ATM Networks

    DEFF Research Database (Denmark)

    Liu, Hong; Gliese, Ulrik Bo; Dittmann, Lars

    1999-01-01

    In this paper, we propose a knowledge-based multiple access protocol for the extension of wireline ATM to wireless networks. The objective is to enable effecient transmission of all kinds of ATM traffic in the wireless channel with guaranteed QoS.The proposed protocol utilixes knowledge of the main...... characteristics of the traffic for allocating bandwidth effeciently to CBR, VBR and ABR/UBR connections by a compromise of assignment, contetion, reservation and polling access techniques. Simulation results show that the proposed protocol can achieve a very high channel utilization of 90 % while providing...

  14. Wireless and wireline service convergence in next generation optical access networks - the FP7 WISCON project

    DEFF Research Database (Denmark)

    Vegas Olmos, Juan José; Pang, Xiaodan; Lebedev, Alexander

    2014-01-01

    . In this paper, we will present the Marie Curie Framework Program 7 project “Wireless and wireline service convergence in next generation optical access networks” (WISCON), which focuses on the conception and study of novel architectures for wavelength-division-multiplexing (WDM) optical multi-modulation format...... radio-over-fiber (RoF) systems; this is a promising solution to implement broadband seamless wireless -wireline access networks. This project successfully concluded in autumn 2013, and is being follow up by another Marie Curie project entitled “flexible edge nodes for dynamic optical interconnection...

  15. Household computer and Internet access: The digital divide in a pediatric clinic population

    Science.gov (United States)

    Carroll, Aaron E.; Rivara, Frederick P.; Ebel, Beth; Zimmerman, Frederick J.; Christakis, Dimitri A.

    2005-01-01

    Past studies have noted a digital divide, or inequality in computer and Internet access related to socioeconomic class. This study sought to measure how many households in a pediatric primary care outpatient clinic had household access to computers and the Internet, and whether this access differed by socio-economic status or other demographic information. We conducted a phone survey of a population-based sample of parents with children ages 0 to 11 years old. Analyses assessed predictors of having home access to a computer, the Internet, and high-speed Internet service. Overall, 88.9% of all households owned a personal computer, and 81.4% of all households had Internet access. Among households with Internet access, 48.3% had high speed Internet at home. There were statistically significant associations between parental income or education and home computer ownership and Internet access. However, the impact of this difference was lessened by the fact that over 60% of families with annual household income of $10,000–$25,000, and nearly 70% of families with only a high-school education had Internet access at home. While income and education remain significant predictors of household computer and internet access, many patients and families at all economic levels have access, and might benefit from health promotion interventions using these modalities. PMID:16779012

  16. Wireless mesh networks

    CERN Document Server

    Held, Gilbert

    2005-01-01

    Wireless mesh networking is a new technology that has the potential to revolutionize how we access the Internet and communicate with co-workers and friends. Wireless Mesh Networks examines the concept and explores its advantages over existing technologies. This book explores existing and future applications, and examines how some of the networking protocols operate.The text offers a detailed analysis of the significant problems affecting wireless mesh networking, including network scale issues, security, and radio frequency interference, and suggests actual and potential solutions for each pro

  17. Partial Interference and Its Performance Impact on Wireless Multiple Access Networks

    Directory of Open Access Journals (Sweden)

    Lau WingCheong

    2010-01-01

    Full Text Available To determine the capacity of wireless multiple access networks, the interference among the wireless links must be accurately modeled. In this paper, we formalize the notion of the partial interference phenomenon observed in many recent wireless measurement studies and establish analytical models with tractable solutions for various types of wireless multiple access networks. In particular, we characterize the stability region of IEEE 802.11 networks under partial interference with two potentially unsaturated links numerically. We also provide a closed-form solution for the stability region of slotted ALOHA networks under partial interference with two potentially unsaturated links and obtain a partial characterization of the boundary of the stability region for the general M-link case. Finally, we derive a closed-form approximated solution for the stability region for general M-link slotted ALOHA system under partial interference effects. Based on our results, we demonstrate that it is important to model the partial interference effects while analyzing wireless multiple access networks. This is because such considerations can result in not only significant quantitative differences in the predicted system capacity but also fundamental qualitative changes in the shape of the stability region of the systems.

  18. Group Centric Networking: A New Approach for Wireless Multi-Hop Networking to Enable the Internet of Things

    Science.gov (United States)

    2016-01-22

    promised po- tential of providing ubiquitous connectivity with mini- mal fixed infrastructure . Today, almost all of our wire- less devices are still...tethered to wired infrastructure such as cell towers or 802.11 access points. But with the forecasted explosion in terms of users and data rates [1– 3... smart -object”, with all of these de- vices being wirelessly connected and exchanging data. Due to this impending surge of wireless devices, there has been

  19. Integrated Coherent Radio-over-Fiber Units for Millimeter-Wave Wireless Access

    DEFF Research Database (Denmark)

    Stöhr, A.; Babiel, S.; Chuenchom, M.

    2015-01-01

    For providing wireless access as a complementary access technology to direct optical access, supporting 1–10 Gb/s per client, we propose a novel scheme based upon the transparent integration of coherent Radio-over-Fiber (CRoF) units with next generation optical access (NGOA) networks using dense...... WDM and a centralized electronic signal processing in the optical line termination to mitigate distortions and to achieve low costs. This paper will concentrate on recent key technological developments that were achieved within the European IPHOBAC-NG project for constructing such CRoF units capable......Ge-based millimeter-wave RF amplifier technology will be reported. In addition, a new coherent optical heterodyne radio-over–fiber scheme is proposed for seamless integration of next generation millimeter-wave wireless access systems into a next generation passive optical network employing dense or even ultra...

  20. A Novel Scheme for an Energy Efficient Internet of Things Based on Wireless Sensor Networks

    Science.gov (United States)

    Rani, Shalli; Talwar, Rajneesh; Malhotra, Jyoteesh; Ahmed, Syed Hassan; Sarkar, Mahasweta; Song, Houbing

    2015-01-01

    One of the emerging networking standards that gap between the physical world and the cyber one is the Internet of Things. In the Internet of Things, smart objects communicate with each other, data are gathered and certain requests of users are satisfied by different queried data. The development of energy efficient schemes for the IoT is a challenging issue as the IoT becomes more complex due to its large scale the current techniques of wireless sensor networks cannot be applied directly to the IoT. To achieve the green networked IoT, this paper addresses energy efficiency issues by proposing a novel deployment scheme. This scheme, introduces: (1) a hierarchical network design; (2) a model for the energy efficient IoT; (3) a minimum energy consumption transmission algorithm to implement the optimal model. The simulation results show that the new scheme is more energy efficient and flexible than traditional WSN schemes and consequently it can be implemented for efficient communication in the IoT. PMID:26569260

  1. A Novel Scheme for an Energy Efficient Internet of Things Based on Wireless Sensor Networks.

    Science.gov (United States)

    Rani, Shalli; Talwar, Rajneesh; Malhotra, Jyoteesh; Ahmed, Syed Hassan; Sarkar, Mahasweta; Song, Houbing

    2015-11-12

    One of the emerging networking standards that gap between the physical world and the cyber one is the Internet of Things. In the Internet of Things, smart objects communicate with each other, data are gathered and certain requests of users are satisfied by different queried data. The development of energy efficient schemes for the IoT is a challenging issue as the IoT becomes more complex due to its large scale the current techniques of wireless sensor networks cannot be applied directly to the IoT. To achieve the green networked IoT, this paper addresses energy efficiency issues by proposing a novel deployment scheme. This scheme, introduces: (1) a hierarchical network design; (2) a model for the energy efficient IoT; (3) a minimum energy consumption transmission algorithm to implement the optimal model. The simulation results show that the new scheme is more energy efficient and flexible than traditional WSN schemes and consequently it can be implemented for efficient communication in the IoT.

  2. A Novel Scheme for an Energy Efficient Internet of Things Based on Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Shalli Rani

    2015-11-01

    Full Text Available One of the emerging networking standards that gap between the physical world and the cyber one is the Internet of Things. In the Internet of Things, smart objects communicate with each other, data are gathered and certain requests of users are satisfied by different queried data. The development of energy efficient schemes for the IoT is a challenging issue as the IoT becomes more complex due to its large scale the current techniques of wireless sensor networks cannot be applied directly to the IoT. To achieve the green networked IoT, this paper addresses energy efficiency issues by proposing a novel deployment scheme. This scheme, introduces: (1 a hierarchical network design; (2 a model for the energy efficient IoT; (3 a minimum energy consumption transmission algorithm to implement the optimal model. The simulation results show that the new scheme is more energy efficient and flexible than traditional WSN schemes and consequently it can be implemented for efficient communication in the IoT.

  3. A TDMA based media access control protocol for wireless ad hoc networks

    Science.gov (United States)

    Yang, Qi; Tang, Biyu

    2013-03-01

    This paper presents a novel Time Division Multiplex Access (TDMA) based Media Access Control (MAC) protocol of wireless Ad Hoc network. To achieve collision free transmission, time slots in a MAC frame are cataloged into three types, that is access slot, control slot and traffic slot. Nodes in the network access to the network in the access slot, and an exclusive control is allocated subsequently. Data packets are transmission by dynamic schedule the traffic slots. Throughput and transmission delay are also analyzed by simulation experiment. The proposed protocol is capable of providing collision free transmission and achieves high throughput.

  4. Revenue-Maximizing Radio Access Technology Selection with Net Neutrality Compliance in Heterogeneous Wireless Networks

    OpenAIRE

    Khloussy, Elissar; Jiang, Yuming

    2018-01-01

    The net neutrality principle states that users should have equal access to all Internet content and that Internet Service Providers (ISPs) should not practice differentiated treatment on any of the Internet traffic. While net neutrality aims to restrain any kind of discrimination, it also grants exemption to a certain category of traffic known as specialized services (SS), by allowing the ISP to dedicate part of the resources for the latter. In this work, we consider a heterogeneous LTE/WiFi ...

  5. Patient access to complex chronic disease records on the Internet.

    Science.gov (United States)

    Bartlett, Cherry; Simpson, Keith; Turner, A Neil

    2012-08-06

    Access to medical records on the Internet has been reported to be acceptable and popular with patients, although most published evaluations have been of primary care or office-based practice. We tested the feasibility and acceptability of making unscreened results and data from a complex chronic disease pathway (renal medicine) available to patients over the Internet in a project involving more than half of renal units in the UK. Content and presentation of the Renal PatientView (RPV) system was developed with patient groups. It was designed to receive information from multiple local information systems and to require minimal extra work in units. After piloting in 4 centres in 2005 it was made available more widely. Opinions were sought from both patients who enrolled and from those who did not in a paper survey, and from staff in an electronic survey. Anonymous data on enrollment and usage were extracted from the webserver. By mid 2011 over 17,000 patients from 47 of the 75 renal units in the UK had registered. Users had a wide age range (90 yrs) but were younger and had more years of education than non-users. They were enthusiastic about the concept, found it easy to use, and 80% felt it gave them a better understanding of their disease. The most common reason for not enrolling was being unaware of the system. A minority of patients had security concerns, and these were reduced after enrolling. Staff responses were also strongly positive. They reported that it aided patient concordance and disease management, and increased the quality of consultations with a neutral effect on consultation length. Neither patient nor staff responses suggested that RPV led to an overall increase in patient anxiety or to an increased burden on renal units beyond the time required to enroll each patient. Patient Internet access to secondary care records concerning a complex chronic disease is feasible and popular, providing an increased sense of empowerment and understanding, with no

  6. Patient access to complex chronic disease records on the Internet

    Directory of Open Access Journals (Sweden)

    Bartlett Cherry

    2012-08-01

    Full Text Available Abstract Background Access to medical records on the Internet has been reported to be acceptable and popular with patients, although most published evaluations have been of primary care or office-based practice. We tested the feasibility and acceptability of making unscreened results and data from a complex chronic disease pathway (renal medicine available to patients over the Internet in a project involving more than half of renal units in the UK. Methods Content and presentation of the Renal PatientView (RPV system was developed with patient groups. It was designed to receive information from multiple local information systems and to require minimal extra work in units. After piloting in 4 centres in 2005 it was made available more widely. Opinions were sought from both patients who enrolled and from those who did not in a paper survey, and from staff in an electronic survey. Anonymous data on enrolments and usage were extracted from the webserver. Results By mid 2011 over 17,000 patients from 47 of the 75 renal units in the UK had registered. Users had a wide age range (90 yrs but were younger and had more years of education than non-users. They were enthusiastic about the concept, found it easy to use, and 80% felt it gave them a better understanding of their disease. The most common reason for not enrolling was being unaware of the system. A minority of patients had security concerns, and these were reduced after enrolling. Staff responses were also strongly positive. They reported that it aided patient concordance and disease management, and increased the quality of consultations with a neutral effect on consultation length. Neither patient nor staff responses suggested that RPV led to an overall increase in patient anxiety or to an increased burden on renal units beyond the time required to enrol each patient. Conclusions Patient Internet access to secondary care records concerning a complex chronic disease is feasible and popular

  7. A Low-Latency, Information-Centric Medium Access Protocol for Wireless Sensor Networks

    NARCIS (Netherlands)

    van Hoesel, L.F.W.; Havinga, Paul J.M.; Chatterjea, Supriyo

    In this paper we present a novel TDMA-based medium access control (MAC) protocol for wireless sensor networks. Unlike conventional MAC protocols which function independently of the application, we introduce an Adaptive, Information-centric and Lightweight MAC(AI-LMAC) protocol that adapts its

  8. Reconfigurable Radio Access Unit for DWDM to W-Band Wireless Conversion

    DEFF Research Database (Denmark)

    Chorchos, Łukasz; Rommel, Simon; Turkiewicz, Jarosław P.

    2017-01-01

    In this letter a reconfigurable Remote Access Unit (RAU) is proposed and demonstrated, interfacing dense wavelength division multiplexed (DWDM) optical and W-band wireless links. The RAU is composed of a tunable local oscillator, a narrow optical filter and a control unit, making it reconfigurable...

  9. One4All Cooperative Media Access Strategy in Infrastructure Based Distributed Wireless Networks

    DEFF Research Database (Denmark)

    Zhang, Qi; Fitzek, Frank H.P.; Iversen, Villy Bæk

    2008-01-01

    a cooperative cluster using their short-range air interface and one device contends the channel for all the devices within the cluster. This strategy reduces the number of mobile devices involved in the collision process for the wireless medium resulting in larger throughput, smaller access delay, and less...

  10. Multiple wireless protocol advertising system, enabling automatic access selection and local services

    NARCIS (Netherlands)

    Houben, S.A.; Baken, N.; Herve, P.; Smets, R.

    2006-01-01

    We examined efficiency within wireless access options for mobile devices and discovered that a classic pitfall is revisited. As with the proliferation of services in incumbents’ portfolios, leading to a number of coexisting so-called ‘stove-pipes’, we see an isomorphic phenomenon evolving in

  11. Joint estimation and contention-resolution protocol for wireless random access

    DEFF Research Database (Denmark)

    Stefanovic, Cedomir; Trillingsgaard, Kasper Fløe; Kiilerich Pratas, Nuno

    2013-01-01

    We propose a contention-based random-access protocol, designed for wireless networks where the number of users is not a priori known. The protocol operates in rounds divided into equal-duration slots, performing at the same time estimation of the number of users and resolution...

  12. Multiple access protocol for supporting multimedia services in wireless ATM networks

    DEFF Research Database (Denmark)

    Liu, Hong; Dittmann, Lars; Gliese, Ulrik Bo

    1999-01-01

    The furture broadband wireless asynchronous transfer mode (ATM) networks must provide seamless extension of multimedia services from the wireline ATM networks. This requires an effecient wireless access protocol to fulfill varying Quality-og-Service (QoS) requirements for multimedia applications....... In this paper, we propose a multiple access protocol using centralized and distributed channel access control techniques to provide QoS guarantees for multimedia services by taking advantage of the characteristics of different kinds of ATM traffics. Multimedia traffic, including constant bit rate (CBR......), variable bit rate (VBR) and available bit rate (ABR) with different kinds of applications, such as voice, video-conferening, MPEG video and Web-browising, is considered to evaluate the proposed protocol. Simulation results show that the proposed multiple access protocol can support a wide range...

  13. Adaptive Code Division Multiple Access Protocol for Wireless Network-on-Chip Architectures

    Science.gov (United States)

    Vijayakumaran, Vineeth

    Massive levels of integration following Moore's Law ushered in a paradigm shift in the way on-chip interconnections were designed. With higher and higher number of cores on the same die traditional bus based interconnections are no longer a scalable communication infrastructure. On-chip networks were proposed enabled a scalable plug-and-play mechanism for interconnecting hundreds of cores on the same chip. Wired interconnects between the cores in a traditional Network-on-Chip (NoC) system, becomes a bottleneck with increase in the number of cores thereby increasing the latency and energy to transmit signals over them. Hence, there has been many alternative emerging interconnect technologies proposed, namely, 3D, photonic and multi-band RF interconnects. Although they provide better connectivity, higher speed and higher bandwidth compared to wired interconnects; they also face challenges with heat dissipation and manufacturing difficulties. On-chip wireless interconnects is one other alternative proposed which doesn't need physical interconnection layout as data travels over the wireless medium. They are integrated into a hybrid NOC architecture consisting of both wired and wireless links, which provides higher bandwidth, lower latency, lesser area overhead and reduced energy dissipation in communication. However, as the bandwidth of the wireless channels is limited, an efficient media access control (MAC) scheme is required to enhance the utilization of the available bandwidth. This thesis proposes using a multiple access mechanism such as Code Division Multiple Access (CDMA) to enable multiple transmitter-receiver pairs to send data over the wireless channel simultaneously. It will be shown that such a hybrid wireless NoC with an efficient CDMA based MAC protocol can significantly increase the performance of the system while lowering the energy dissipation in data transfer. In this work it is shown that the wireless NoC with the proposed CDMA based MAC protocol

  14. Distributed Congestion Mitigation and Medium Access in Duty Cycling Wireless Sensor Networks

    OpenAIRE

    Liu, Hao; Liu, Ye

    2014-01-01

    Duty cycling is an efficient design approach to achieve energy efficiency in wireless sensor networks. However, it may aggravate congestion due to long access delay and amplified hidden/exposed terminal problems. This paper first investigates some key facts that impact congestion and deteriorate packet transmission. With above observations, we propose a queue length based contention window adjustment approach, which allows congested nodes having high priority to access the channel. Then, a ba...

  15. Internet Access: How to Design and Test an Internet Use/Management Policy

    National Research Council Canada - National Science Library

    Montgomery, Doris

    2001-01-01

    The Internet is filled with tremendous marketing potential and vulnerabilities, organizations should develop polices that offer both Internet Usage/Management policies that are consisted with their organization...

  16. Towards convergence of wireless and wireline signal transport in broadband access networks

    DEFF Research Database (Denmark)

    Yu, Xianbin; Prince, Kamau; Tafur Monroy, Idelfonso

    2010-01-01

    Hybrid optical wireless access networks are to play an important role in the realization of the vision of delivery of broadband services to the end-user any time, anywhere and at affordable costs. We present results of experiments conducted over a field deployed optical fibre links we successfull...... demonstrated converged wireless and wireline signal transport over a common fibre infrastructure. The type of signal used in this field deployed experiments cover WiMax, Impulse-radio ultra-wideband (UWB) and coherent transmission of baseband QPSK and radio-over-fibre signals....

  17. An examination of the patterns of access and use of the internet by ...

    African Journals Online (AJOL)

    The study also revealed that the Internet is mainly used as a communication and entertainment tool; the use of Internet for business and e-commerce is very insignificant. The strengths of the Internet were stated as easy, cheap and quick means of communication, easy access to academic materials via online libraries and ...

  18. Frequency-selective design of wireless power transfer systems for controlled access applications

    Science.gov (United States)

    Maschino, Tyler Stephen

    Wireless power transfer (WPT) has become a common way to charge or power many types of devices, ranging from cell phones to electric toothbrushes. WPT became popular through the introduction of a transmission mode known as strongly coupled magnetic resonance (SCMR). This means of transmission is non-radiative and enables mid-range WPT. Shortly after the development of WPT via SCMR, a group of researchers introduced the concept of resonant repeaters, which allows power to hop from the source to the device. These repeaters are in resonance with the WPT system, which enables them to propagate the power wirelessly with minimal losses to the environment. Resonant repeaters have rekindled the dream of ubiquitous wireless power. Inherent risks come with the realization of such a dream. One of the most prominent risks, which we set out in this thesis to address, is that of accessibility to the WPT system. We propose the incorporation of a controlled access schema within a WPT system to prevent unwarranted use of wireless power. Our thesis discusses the history of electromagnetism, examines the inception of WPT via SCMR, evaluates recent developments in WPT, and further elaborates on the controlled access schema we wish to contribute to the field.

  19. Mobility support for ubiquitous Internet

    NARCIS (Netherlands)

    Karagiannis, Georgios; Heijenk, Geert

    2000-01-01

    This document describes an architecture that is providing Internet access to mobile hosts, by allowing them to access this architecture through various access points and using various wireless technologies. In particular, this deliverable focuses on QoS and mobility between various IP subnetworks

  20. Location Authentication based on Wireless Access Point Information to Prevent Wormhole Attack in Samsung Pay

    Directory of Open Access Journals (Sweden)

    RYU, G.

    2017-08-01

    Full Text Available This paper proposes a location authentication method to prevent wormhole payment attack in Samsung Pay. The primary feature of this method is comparing wireless Access Point (AP information collected by the current Samsung Pay user and a wireless AP model (WM that was created from wireless AP information (WI sent by previous Samsung Pay users. To create the WM, an autoencoder is used. Unlike the existing location authentication techniques that use WI, our method does not require additional hardware, modification of the Point of Sale (POS software, or any pre-requisite information such as the location coordinates of the POS. We show that the proposed location authentication technique exhibits the minimum Equal Error Rate (EER of 2.4% in real payment environments.

  1. Digital Divide: How Do Home Internet Access and Parental Support Affect Student Outcomes?

    Directory of Open Access Journals (Sweden)

    Jing Lei

    2012-03-01

    Full Text Available This study examined the relationship between home Internet access/parental support and student outcomes. Survey data were collected from 1,576 middle school students in China. Data were analyzed using descriptive analysis, independent-samples T-test, and regression analysis. Results indicate that students who had home Internet access reported higher scores than those without home Internet on all three dimensions: Computer and Internet self-efficacy, Attitudes towards technology and Developmental outcomes. Home Internet access and parental support were significantly positively associated with technology self-efficacy, interest in technology, perceived importance of the Internet, and perceived impact of the Internet on learning. Findings from this study have significant implications for research and practice on how to narrow down the digital divide.

  2. Cognitive radio networks medium access control for coexistence of wireless systems

    CERN Document Server

    Bian, Kaigui; Gao, Bo

    2014-01-01

    This book gives a comprehensive overview of the medium access control (MAC) principles in cognitive radio networks, with a specific focus on how such MAC principles enable different wireless systems to coexist in the same spectrum band and carry out spectrum sharing.  From algorithm design to the latest developments in the standards and spectrum policy, readers will benefit from leading-edge knowledge of how cognitive radio systems coexist and share spectrum resources.  Coverage includes cognitive radio rendezvous, spectrum sharing, channel allocation, coexistence in TV white space, and coexistence of heterogeneous wireless systems.   • Provides a comprehensive reference on medium access control (MAC)-related problems in the design of cognitive radio systems and networks; • Includes detailed analysis of various coexistence problems related to medium access control in cognitive radio networks; • Reveals novel techniques for addressing the challenges of coexistence protocol design at a higher level ...

  3. Study on Wireless Network Communication in Stage Hydraulic Monitoring System Based on Internet of Things

    Directory of Open Access Journals (Sweden)

    Yue Dong

    2015-01-01

    Full Text Available A novel stage hydraulic monitoring system based on Internet of Things (IoT is proposed in this paper. Compared with the traditional wired system, the proposed system is a flexible working method and can save the cost. Furthermore, it has the low power consumption, high safety, and large scale network. The real-time pressure and flow data can be collected by using the nodes in ZigBee network. The fault detection and diagnosis process was used in this study, which was facilitated by measuring pressure of flow. When the monitored data exceeds the normal range, some failure may occur in the stage hydraulic system. If any failure occurs in the circuit, the maintainers can be informed immediately, which can greatly improve maintenance efficiency, ensuring the failure to be eliminated in time. Meanwhile, we can take advantage of wireless sensor network (WSN to connect the multiple loops and then monitor the loops by using ZigBee technology, which greatly improves the efficiency of monitoring.

  4. Monitoring System of Environmental Variables Using a Wireless Sensor Network and Platforms of Internet of Things

    Directory of Open Access Journals (Sweden)

    Manuel Quiñones-Cuenca

    2017-02-01

    Full Text Available This work proposes a system for collecting meteorological data using a Wireless Sensor Network (WSN, that is able to transmit data in real-time. The system automatizes the process of collecting the data in a continuous manner for long periods of time, for this, the module is equipped with a source of solar energy that allows autonomous operation. In order to obtain viability of design and prototype implementation, the construction of two systems was proposed based on DigiMesh and Wi-Fi; those prototypes could be applied to different scenarios such as urban and rural areas. Additionally, it was performed an evaluation of broadcasting of information to platforms of Internet of Things (IoT, where the data collected by the nodes will be managed and displayed. This system was conceived as a low-cost alternative compared with conventional weather stations that offer these facilities and are based on free hardware and software components. Finally, the validation of the obtained results was performed using a statistical analysis with the collected data of the weather station Davis Vantage Pro, obtaining a maximum average relative error of 4.93%.

  5. Internet access and usage by Nigerian academics: a case-study of ...

    African Journals Online (AJOL)

    This study investigated academics access to the computer and Internet, their purpose of using them and the problems they face. The academic staff of the Obafemi Awolowo University, Ile-Ife, Nigeria were used as a case study. The study reveals that a high percentage has access to both the computer and the Internet, ...

  6. Essential, Desirable or Optional? Making Distance E-Learning Courses Available to Those without Internet Access

    Science.gov (United States)

    Hancock, Val

    2010-01-01

    The Open University, an open distance learning institution, is increasingly using a Virtual Learning Environment (VLE) that requires internet access. This paper investigates how the move to a VLE has affected one group of students who do not have internet access--offender learners studying in prison. Members of the armed forces and secure hospital…

  7. Multigigabit W-Band (75–110 GHz) Bidirectional Hybrid Fiber-Wireless Systems in Access Networks

    DEFF Research Database (Denmark)

    Pang, Xiaodan; Lebedev, Alexander; Vegas Olmos, Juan José

    2014-01-01

    We experimentally demonstrate multigigabit capacity bidirectional hybrid fiber-wireless systems with RF carrier frequencies at the W-band (75-110 GHz) that enables the seamless convergence between wireless and fiber-optic data transmission systems in access networks. In this study, we evaluate...... compare the transmission performances in terms of achievable wireless distances with and without using a high-frequency electrical power amplifier at the wireless transmitter. A downlink 16-Gbit/s QPSK signal and an uplink 1.25-Gbit/s ASK signal transmission over the two implementations are experimentally...

  8. Internet Accessible Remote Experimentation: Setting the Right Course of Action

    Directory of Open Access Journals (Sweden)

    Abul K. M. Azad

    2010-08-01

    Full Text Available This paper will have two parts. In the first part the author will focus on the current status of remote experimentation designs and how this has impacted our education and research activities with a notion that whether we are moving too fast while its acceptance has not yet realized. While for the second part, the author will describe some of the developments of remote experiment designs through his own work. Researchers have been working on remote experimentations for a considerable period of time and are making remarkable breakthroughs utilizing cutting edge technologies and current understanding of educational and learning strategies. After all of these developments, the popularity of remote experimentations is still very limited and does not have the attention of the academic community to incorporate them as a part of their regular curriculum. There are a number of factors that hinder acceptance of remote laboratories as a part of a curriculum. These are integration of a number of areas, modular designs, commercial products, maintenance, and administrative support. The paper will address these issues and will highlight how we can move forward in a coordinated manner so there will be a viable remote experimentation infrastructure with a high degree of acceptance. The author has a number of federal research grants (USA where he has developed Internet accessible remote experimentation facilities. These facilities have features like use of single computer for accessing multiple experiments, manipulating experimental setup from remote locations, integrated assessment, and real-time learning management features. The developed facilities have used for delivering a number of experiment courses, while gathering data in terms of achieving learning outcomes and assessing the effectiveness of the system in terms of system designs.

  9. Adaptive Information Access on Multiple Applications Support Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2014-01-01

    is used for safety and security monitoring purposes. In this paper, we evaluate different access strategies to remote dynamic information and compare between achieving information reliability (mismatch probability) and the associated power consumption. Lastly, based on the models, we propose an adaptive...

  10. Predictive fair polling mechanism in a wireless access scheme

    NARCIS (Netherlands)

    Heijenk, Geert; Ait Yaiz, R.

    2002-01-01

    Method and system for controlling access to a communication channel. The method involves calculating an efficiency value for each communication device of a plurality of communication devices, calculating a fairness value for each communication device of the plurality of communication devices, and

  11. Remote Access Unit for Optic-to-Wireless Conversion

    DEFF Research Database (Denmark)

    Chorchos, Łukasz; Rommel, Simon; Turkiewicz, J. P.

    In this paper we propose a design of a reconfigurable Remote Access Unit (RAU) interfacing optical dense wavelength division multiplexed (DWDM) networks with radio communication links. To generate a radio signal the device utilizes a principles of incoherent heterodyne signal upconversion...

  12. A Practical Application Combining Wireless Sensor Networks and Internet of Things: Safety Management System for Tower Crane Groups

    Directory of Open Access Journals (Sweden)

    Dexing Zhong

    2014-07-01

    Full Text Available The so-called Internet of Things (IoT has attracted increasing attention in the field of computer and information science. In this paper, a specific application of IoT, named Safety Management System for Tower Crane Groups (SMS-TC, is proposed for use in the construction industry field. The operating status of each tower crane was detected by a set of customized sensors, including horizontal and vertical position sensors for the trolley, angle sensors for the jib and load, tilt and wind speed sensors for the tower body. The sensor data is collected and processed by the Tower Crane Safety Terminal Equipment (TC-STE installed in the driver’s operating room. Wireless communication between each TC-STE and the Local Monitoring Terminal (LMT at the ground worksite were fulfilled through a Zigbee wireless network. LMT can share the status information of the whole group with each TC-STE, while the LMT records the real-time data and reports it to the Remote Supervision Platform (RSP through General Packet Radio Service (GPRS. Based on the global status data of the whole group, an anti-collision algorithm was executed in each TC-STE to ensure the safety of each tower crane during construction. Remote supervision can be fulfilled using our client software installed on a personal computer (PC or smartphone. SMS-TC could be considered as a promising practical application that combines a Wireless Sensor Network with the Internet of Things.

  13. A practical application combining wireless sensor networks and Internet of Things: Safety Management System for Tower Crane Groups.

    Science.gov (United States)

    Zhong, Dexing; Lv, Hongqiang; Han, Jiuqiang; Wei, Quanrui

    2014-07-30

    The so-called Internet of Things (IoT) has attracted increasing attention in the field of computer and information science. In this paper, a specific application of IoT, named Safety Management System for Tower Crane Groups (SMS-TC), is proposed for use in the construction industry field. The operating status of each tower crane was detected by a set of customized sensors, including horizontal and vertical position sensors for the trolley, angle sensors for the jib and load, tilt and wind speed sensors for the tower body. The sensor data is collected and processed by the Tower Crane Safety Terminal Equipment (TC-STE) installed in the driver's operating room. Wireless communication between each TC-STE and the Local Monitoring Terminal (LMT) at the ground worksite were fulfilled through a Zigbee wireless network. LMT can share the status information of the whole group with each TC-STE, while the LMT records the real-time data and reports it to the Remote Supervision Platform (RSP) through General Packet Radio Service (GPRS). Based on the global status data of the whole group, an anti-collision algorithm was executed in each TC-STE to ensure the safety of each tower crane during construction. Remote supervision can be fulfilled using our client software installed on a personal computer (PC) or smartphone. SMS-TC could be considered as a promising practical application that combines a Wireless Sensor Network with the Internet of Things.

  14. Internet access and online cancer information seeking among Latino immigrants from safety net clinics.

    Science.gov (United States)

    Selsky, Claire; Luta, George; Noone, Anne-Michelle; Huerta, Elmer E; Mandelblatt, Jeanne S

    2013-01-01

    Internet use is widespread, but little is known about Internet use for cancer information among Latinos, especially those who rely on safety net clinics. The authors investigated access to and intended use of the Internet for cancer information among low income, immigrant Latinos predominately from Central and South America. A cross-sectional study of 1,273 Latinos 21 years and older attending safety net clinics or health fairs was conducted from June 2007 to November 2008. The authors used logistic regression models to evaluate associations of age, acculturation, psychosocial factors and other covariates with Internet access and intended use of the Internet for cancer information among those with access. Of the sample, 44% reported Internet access. Higher information self-efficacy and greater trust in the Internet were independently associated with Internet access (p = .05 and p Internet use for cancer information, considering covariates. In addition, those with high (vs. low) perceived risk of cancer (OR = 1.76; 95% CI [1.14, 2.73]; p = .01) and higher levels of trust in online health information (OR = 1.47 per one-point increase; 95% [CI 1.19, 1.82]; p = .0004) were more likely to intend to seek cancer information online. These findings that Internet access is fairly high in the immigrant Latino population and that the Internet is a trusted source of cancer information suggest that the Internet may be a channel for cancer control interventions.

  15. Delay-aware adaptive sleep mechanism for green wireless-optical broadband access networks

    Science.gov (United States)

    Wang, Ruyan; Liang, Alei; Wu, Dapeng; Wu, Dalei

    2017-07-01

    Wireless-Optical Broadband Access Network (WOBAN) is capacity-high, reliable, flexible, and ubiquitous, as it takes full advantage of the merits from both optical communication and wireless communication technologies. Similar to other access networks, the high energy consumption poses a great challenge for building up WOBANs. To shot this problem, we can make some load-light Optical Network Units (ONUs) sleep to reduce the energy consumption. Such operation, however, causes the increased packet delay. Jointly considering the energy consumption and transmission delay, we propose a delay-aware adaptive sleep mechanism. Specifically, we develop a new analytical method to evaluate the transmission delay and queuing delay over the optical part, instead of adopting M/M/1 queuing model. Meanwhile, we also analyze the access delay and queuing delay of the wireless part. Based on such developed delay models, we mathematically derive ONU's optimal sleep time. In addition, we provide numerous simulation results to show the effectiveness of the proposed mechanism.

  16. Computer access and Internet use by urban and suburban emergency department customers.

    Science.gov (United States)

    Bond, Michael C; Klemt, Ryan; Merlis, Jennifer; Kopinski, Judith E; Hirshon, Jon Mark

    2012-07-01

    Patients are increasingly using the Internet (43% in 2000 vs. 70% in 2006) to obtain health information, but is there a difference in the ability of urban and suburban emergency department (ED) customers to access the Internet? To assess computer and Internet resources available to and used by people waiting to be seen in an urban ED and a suburban ED. Individuals waiting in the ED were asked survey questions covering demographics, type of insurance, access to a primary care provider, reason for their ED visit, computer access, and ability to access the Internet for health-related matters. There were 304 individuals who participated, 185 in the urban ED and 119 in the suburban ED. Urban subjects were more likely than suburban to be women, black, have low household income, and were less likely to have insurance. The groups were similar in regard to average age, education, and having a primary care physician. Suburban respondents were more likely to own a computer, but the majority in both groups had access to computers and the Internet. Their frequency of accessing the Internet was similar, as were their reasons for using it. Individuals from the urban ED were less willing to schedule appointments via the Internet but more willing to contact their health care provider via e-mail. The groups were equally willing to use the Internet to fill prescriptions and view laboratory results. Urban and suburban ED customers had similar access to the Internet. Both groups were willing to use the Internet to access personal health information. Copyright © 2012 Elsevier Inc. All rights reserved.

  17. Adaptive Information Access in Multiple Applications Support Wireless Sensor Network

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2012-01-01

    specific WSN considering its resource constraints, neglecting the return-of-investment and usefulness of the system. In this paper, we bring out the WSN scenario which supports multiple applications and study the challenges that would pose in implementation as each specific application has its own specific...... set of requirements. Lastly, the paper suggests a mechanism by which the information access or acquisition can be adapted as per the requirements of the application. The main parameters focused in this paper are mismatch probability [1] and power dissipation with respect to sampling rate....

  18. A Unified Access Model for Interconnecting Heterogeneous Wireless Networks

    Science.gov (United States)

    2015-05-01

    Defined Networking, OpenFlow, WiFi , LTE 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU 18. NUMBER OF PAGES 18 19a. NAME OF...Bio vi 1. Introduction/Background 1 2. Experiment 2 2.1 Proof-of-Concept with WiFi and Carrier-Sense Multiple Access (CSMA) 3 2.2 Two Virtual...Machine Configurations with WiFi and LTE 4 2.3 Three Virtual Machine Configurations with WiFi and LTE 5 3. Results and Discussion 5 4. Summary and

  19. Accessibility and Utilization of Internet Service by Graduate Students in University of Lagos, Nigeria

    Directory of Open Access Journals (Sweden)

    Oyeronke Olufunmilola Ogunlade

    2012-07-01

    Full Text Available The major objective of the study was to examine the accessibility and utilization of Internet service by graduate students in university of Lagos, Nigeria. Specifically, the study made effort to determine the extent to which Internet service was accessible to staff and students of the university, how point of Internet access influenced its usage, factors motivating the use of Internet and what Internet was used for by graduate students in University of Lagos. The study adopted a descriptive survey design and data were collected by administering questionnaires to two hundred respondents randomly selected from faculty of Education in the University. Results of the findings revealed that students didn’t have as much access to Internet service as the staff (27.7 % and 62.4 % respectively. 47.9 % of respondents strongly agreed to visiting the cybercafé to access Internet. 53.1 % and 50.2 % of the respondents strongly agreed that proximity to cybercafé and valid information contained from the Internet were their major motivating factors for surfing the Internet. It also found that the respondents strongly agreed that the purposes for their surfing the Internet were to register courses, enroll for exams, gather information for literature review, send and receive mails, amongst others. Based on the findings, it is therefore recommended that since the Internet is being utilized in every sector such as Education, Banking, Medicine and others, the University should make Internet service assessible for students’ use. This study can further be conducted in other institutions in Nigeria.

  20. Using the Internet in Rural Special Education: Accessing Resources.

    Science.gov (United States)

    Bull, Kay S.; Kimball, Sarah L.

    This paper provides basic information on searching the Internet and describes sites of interest in the area of rural special education. The first section traces the evolution of the Internet through various phases--ARPANET, NSFNET, CERNET, and the beginnings of the World Wide Web--and describes various protocols (methods and tools) developed to…

  1. Access Routes of Internet Finance Dictionaries: Present Solutions ...

    African Journals Online (AJOL)

    rbr

    Internet finance dictionaries is needed, and, as De Schryver (2003: 188) states, a sound underlying theory is obviously needed in creating future electronic or. Internet dictionaries. 2. Theoretical Foundation. In order to improve the quality of IFDs, users should become the point of departure in creating the dictionary. This is in ...

  2. Joint power and multiple access control for wireless mesh network with Rose projection method.

    Science.gov (United States)

    Tang, Meiqin; Shang, Lili; Xin, Yalin; Liu, Xiaohua; Wei, Xinjiang

    2014-01-01

    This paper investigates the utility maximization problem for the downlink of the multi-interface multichannel wireless mesh network with orthogonal frequency division multiple access. A cross-layer joint power and multiple access control algorithm are proposed. Rosen projection matrix is combined with Solodov projection techniques to build a three-memory gradient Rosen projection method, which is applied to solve this optimization problem. The convergence analysis is given and simulations show that the proposed solution achieves significant throughput compared with existing approaches.

  3. Rogue AP Detection in the Wireless LAN for Large Scale Deployment

    Directory of Open Access Journals (Sweden)

    Sang-Eon Kim

    2006-10-01

    Full Text Available The wireless LAN standard, also known as WiFi, has begun to use commercial purposes. This paper describes access network architecture of wireless LAN for large scale deployment to provide public service. A metro Ethernet and digital subscriber line access network can be used for wireless LAN with access point. In this network architecture, access point plays interface between wireless node and network infrastructure. It is important to maintain access point without any failure and problems to public users. This paper proposes definition of rogue access point and classifies based on functional problem to access the Internet. After that, rogue access point detection scheme is described based on classification over the wireless LAN. The rogue access point detector can greatly improve the network availability to network service provider of wireless LAN.

  4. IP Connected Low Power Wireless Personal Area Networks in the Future Internet

    DEFF Research Database (Denmark)

    Jacobsen, Rune Hylsberg; Toftegaard, Thomas Skjødeberg; Kjærgaard, Jens Kristian

    2012-01-01

    The Internet of Things is a key concept of the Future Internet. The Internet of Things potentially interconnects billions of small devices in a large ubiquitous infrastructure based on the Internet Protocol (IP). Typically, these devices will be limited in computational capacity, memory......WPANs). The authors address the key mechanisms from network aspects down to device design aspects and discuss how technologies interplay to make real application deployment practical for the Internet of Things....

  5. Public internet access in areas of deprivation: The case of Glasgow

    OpenAIRE

    Anderson, Gillian; Whalley, Jason

    2013-01-01

    The Internet plays an increasingly central role in the lives of individuals. Through the Internet, individuals can engage in a wide array of activities such as shopping, participating in social networking activities, obtaining information and so forth. Given the extent to which the Internet is now used, those without access are placed at a disadvantage. They will miss out on the savings that occur when you shop online, lose contact with friends and family by not engaging in social networking ...

  6. Internet Access and Use among Students of Physical Education: A Study of Kurukshetra University, Kurukshetra

    Directory of Open Access Journals (Sweden)

    Kumar, Rajender

    2014-06-01

    Full Text Available This paper depicts a study conducted on the behavior of physical education students towards Internet usage at Kurukshetra University, Kurukshetra. Specially, the study aims to know the purposes for use of Internet resources and services, frequency of use, places and means of use, student's satisfaction level toward the Internet, and problems faced while using the Internet. A survey was carried out with a sample of 100 physical education students of Kurukshetra University and the response rate was 88%. A well-designed questionnaire was distributed to the students' sample. Amazingly, the results of the study reveal that usage of the Internet in research and education was not favored, whereas email, chatting, and sports websites were commonly used among students. The study also found that too much information on the Internet, slow access speeds, and finding relevant information were the main problems in using the Internet.

  7. Smart Contract-Based Access Control for the Internet of Things

    OpenAIRE

    Zhang, Yuanyu; Kasahara, Shoji; Shen, Yulong; Jiang, Xiaohong; Wan, Jianxiong

    2018-01-01

    This paper investigates a critical access control issue in the Internet of Things (IoT). In particular, we propose a smart contract-based framework, which consists of multiple access control contracts (ACCs), one judge contract (JC) and one register contract (RC), to achieve distributed and trustworthy access control for IoT systems. Each ACC provides one access control method for a subject-object pair, and implements both static access right validation based on predefined policies and dynami...

  8. ABCDecision: A Simulation Platform for Access Selection Algorithms in Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Guy Pujolle

    2010-01-01

    Full Text Available We present a simulation platform for access selection algorithms in heterogeneous wireless networks, called “ABCDecision”. The simulator implements the different parts of an Always Best Connected (ABC system, including Access Technology Selector (ATS, Radio Access Networks (RANs, and users. After describing the architecture of the simulator, we show an overview of the existing decision algorithms for access selection. Then we propose a new selection algorithm in heterogeneous networks and we run a set of simulations to evaluate the performance of the proposed algorithm in comparison with the existing ones. The performance results, in terms of the occupancy rate, show that our algorithm achieves a load balancing distribution between networks by taking into consideration the capacities of the available cells.

  9. Rural Health Care Information Access and the Use of the Internet: Opportunity for University Extension

    Science.gov (United States)

    Das, Biswa R.; Leatherman, John C.; Bressers, Bonnie M.

    2015-01-01

    The Internet has potential for improving health information delivery and strengthening connections between rural populations and local health service providers. An exploratory case study six rural health care markets in Kansas showed that about 70% of adults use the Internet, with substantial use for accessing health information. While there are…

  10. Perceptions of the Risks and Benefits of Internet Access and Use by People with Intellectual Disabilities

    Science.gov (United States)

    Chadwick, Darren D.; Quinn, Sally; Fullwood, Chris

    2017-01-01

    Background: Information and communication technologies, with the Internet at the forefront, have the potential to enhance the knowledge, service, employment, development and social interactional opportunities available to people with intellectual disabilities. Despite this, people with intellectual disabilities are not accessing the Internet to…

  11. Internet Access and Usage by Students of the College of Medicine ...

    African Journals Online (AJOL)

    Findings revealed that the Internet facilities at the time of this study were inadequate – hence many students did not have access. It also revealed that although quite a number of the students were aware of the immense benefits of the use of the Internet for academic studies. They lacked the necessary skill to make effective ...

  12. A Survey of Internet Access and Use by Students of Library and ...

    African Journals Online (AJOL)

    In order to achieve the aim of the research, five objectives were formulated which included: to determine whether the Students of Modibbo Adama University of Technology Library School Yola access and utilize Internet facilities, level of search skills, reasons for use of Internet, level of satisfaction and problems associated ...

  13. Access to and use of Internet by adolescents who have a physical disability: A comparative study

    NARCIS (Netherlands)

    Lathouwers, K.A.M.; Moor, J.M.H. de; Didden, H.C.M.

    2009-01-01

    The purpose of this study was to examine access to and use of Internet by 97 physically disabled adolescents. Four main objectives were to: (1) explore frequency and nature of Internet use and the role of care givers, (2) compare these results with non-disabled adolescents, (3) explore associations

  14. Access to and use of Internet by adolescents who have a physical disability: a comparative study.

    NARCIS (Netherlands)

    Lathouwers, K.A.M.; Moor, J.M.H. de; Didden, R.

    2009-01-01

    The purpose of this study was to examine access to and use of Internet by 97 physically disabled adolescents. Four main objectives were to: (1) explore frequency and nature of Internet use and the role of care givers, (2) compare these results with non-disabled adolescents, (3) explore associations

  15. Internet Access and Usage in Improving Students' Self-Directed Learning in Indonesia Open University

    Science.gov (United States)

    Rahardjo, Djoko; Sumardjo; Lubis, Djuara P.; Harijati, Sri Ir.

    2016-01-01

    Internet is well known nowadays, however higher distance education students who live in remote rural areas still have not been able to take advantages of this medium optimally for their learning process. For accessing the internet the students have to be available with the minimum prerequisites: the existence of adequate devices and the sufficient…

  16. Internet skill-related problems in accessing online health information and services

    NARCIS (Netherlands)

    van Deursen, Alexander Johannes Aloysius Maria

    2012-01-01

    Purpose Despite the amount of health information available online, there are several barriers that limit the Internet from being adopted as a source of health information. The purpose of this study was to identify individual skill-related problems that users experience when accessing the Internet

  17. INTERNET ACCESS AND USAGE IN IMPROVING STUDENTS’ SELF-DIRECTED LEARNING IN INDONESIA OPEN UNIVERSITY

    Directory of Open Access Journals (Sweden)

    Djoko RAHARDJO

    2016-04-01

    Full Text Available Internet is well known nowadays, however higher distance education students who live in remote rural areas still have not been able to take advantages of this medium optimally for their learning process. For accessing the internet the students have to be available with the minimum prerequisites: the existence of adequate devices and the sufficient capabilities. For education purposes, the students use the internet to meet their information and fulfill learning needs, facilitate interpersonal communications, and provide groups of discussion, as well as to be connected with friends in social media. This study aims to analyze the relationship between internet access and usage in improving students' self-directed learning which is using structural equation model method. The survey is conducted in seven districts in Surakarta Regional Office of Indonesia Open University with a sample size of 320 respondents. The result shows that the internet usage is still low due to limited internet facilities that affect the knowledge and willingness of students to access the internet. The strategy in improving student internet usage is applying social media as guidance that can be accessed through cellular phones.

  18. Evaluation of internet access and utilization by medical students in Lahore, Pakistan

    Directory of Open Access Journals (Sweden)

    Raza Ali

    2011-05-01

    Full Text Available Abstract Background The internet is increasingly being used worldwide in imparting medical education and improving its delivery. It has become an important tool for healthcare professionals training but the data on its use by medical students in developing countries is lacking with no study on the subject from Pakistan. This study was, therefore, carried out with an aim to evaluate the pattern of internet access and utilization by medical students in Pakistan. Methods A structured pre-tested questionnaire was administered to a group of 750 medical students in clinical years studying at various public and private medical colleges in Lahore. The questions were related to patterns of internet access, purpose of use and self reported confidence in performing various internet related tasks, use of health related websites to supplement learning and the problems faced by students in using internet at the institution. Results A total of 532 medical students (70.9% returned the questionnaire. The mean age of study participants was 21.04 years (SD 1.96 years. Majority of the respondents (84.0% reported experience with internet use. About half of the students (42.1% were using internet occasionally with 23.1%, 20.9% and 13.9% doing so frequently, regularly and rarely respectively. About two third of the students (61.0% stated that they use internet for both academic and professional activities. Most of the participants preferred to use internet at home (70.5%. Self reported ability to search for required article from PubMed and PakMedinet was reported by only 34.0% of the entire sample. Students were moderately confident in performing various internet related tasks including downloading medical books from internet, searching internet for classification of diseases and downloading full text article. Health related websites were being accessed by 55.1% students to supplement their learning process. Lack of time, inadequate number of available computers and

  19. Internet-accessible radiographic database of Vietnam War casualties for medical student education.

    Science.gov (United States)

    Critchley, Eric P; Smirniotopoulos, James G

    2003-04-01

    The purpose of this study was to determine the feasibility of archiving radiographic images from Vietnam era conflict casualties into a personal computer-based electronic database of text and images and displaying the data using an Internet-accessible database for preservation and educational purposes. Thirty-two patient cases were selected at random from a pool of 1,000 autopsy reports in which radiographs were available. A total of 74 radiographs from these cases were digitized using a commercial image scanner and then uploaded into an Internet accessible database. The quality of the digitized images was assessed by administering an image-based test to a group of 12 medical students. No statistically significant (p > 0.05) differences were found between test scores when using the original radiographs versus using the digitized radiographs on the Internet-accessible database. An Internet-accessible database is capable of effectively archiving Vietnam era casualty radiographs for educational purposes.

  20. Gastric cancer-related information on the Internet: incomplete, poorly accessible, and overly commercial.

    LENUS (Irish Health Repository)

    Killeen, Shane

    2011-02-01

    Patients increasingly use the Internet for gastric cancer information. However, the quality of the information is questionable. We evaluated the accuracy, completeness, accessibility, reliability, and readability of gastric cancer websites.

  1. Assessing the Impact of Internet Access on Household Income and Financial Performance of Small Farms

    OpenAIRE

    Khanal, Aditya R.; Mishra, Ashok K.

    2013-01-01

    With increased focus on survival strategies for small farm businesses, we investigate the impact of Internet access on income and farm expenses of small farm business and households. Using a nation-wide farm-level data in the U.S. and non-parametric matching estimators, the study finds a significant positive impact of Internet access on total household and off-farm income.

  2. Can internet access growth help reduce the global burden of noncommunicable diseases?

    Science.gov (United States)

    Kohler, Stefan

    2013-01-01

    Noncommunicable diseases, such as cardiovascular diseases, cancer, chronic respiratory diseases, and diabetes, are currently the leading causes of death in several regions of the world. The continuing fast increase in the global burden of noncommunicable diseases is accompanied by a speedy worldwide internet access growth. The worldwide number of internet users has doubled over the past five years. As the internet can make the access to information on a healthy lifestyle and disease prevention activities easier, internet access growth may help to promote good health. Against this background, I discuss the roles the internet and access to information can play in health promotion. I also present an open access web portal on local prevention and health promotion activities. It was initiated by two German states to link health information from disparate sources and to organize this information in a user-friendly way. The web portal focuses on reducing preventable lifestyle-related risk factors associated with noncommunicable diseases, including physical inactivity, unhealthy diet, tobacco use, and the harmful use of alcohol. This local initiative has the potential for scaling up and can serve as a blueprint for other areas that have or will acquire internet access.

  3. Combined single-mode/multimode fiber link supporting simplified in-building 60-GHz gigabit wireless access

    DEFF Research Database (Denmark)

    Pham, Tien Thang; Lebedev, Alexander; Beltrán, Marta

    2012-01-01

    In this paper, we propose and experimentally demonstrate a simple, cost-effective hybrid gigabit fiber-wireless system for in-building wireless access. Simplicity and cost-effectiveness are achieved in all parts of the system by utilizing direct laser modulation, optical frequency up-conversion, ......In this paper, we propose and experimentally demonstrate a simple, cost-effective hybrid gigabit fiber-wireless system for in-building wireless access. Simplicity and cost-effectiveness are achieved in all parts of the system by utilizing direct laser modulation, optical frequency up......-conversion, combined single mode/multimode fiber transmission and envelope detection. Error-free transmission of 2-Gbps data in 60-GHz band over a composite channel including 10-km standard single-mode fiber (SSMF)/1-km multimode fiber (MMF) and 6.5-m air transmission was successfully achieved....

  4. Digital predistortion of 75–110 GHz W-band frequency multiplier for fiber wireless short range access systems

    DEFF Research Database (Denmark)

    Zhao, Ying; Deng, Lei; Pang, Xiaodan

    2011-01-01

    We present a W-band fiber-wireless transmission system based on a nonlinear frequency multiplier for high-speed wireless short range access applications. By implementing a baseband digital signal predistortion scheme, intensive nonlinear distortions induced in a sextuple frequency multiplier can...... be effectively pre-compensated. Without using costly W-band components, a transmission system with 26km fiber and 4m wireless transmission operating at 99.6GHz is experimentally validated. Adjacent-channel power ratio (ACPR) improvements for IQ-modulated vector signals are guaranteed and transmission...

  5. Internet accessibility and disability policy: lessons for digital inclusion and equality from Australia

    Directory of Open Access Journals (Sweden)

    Gerard Goggin

    2017-03-01

    Full Text Available In the fifth decade of the internet, accessibility for all, especially those with disabilities, is central to digital inclusion. Yet internationally, the score card on internet and accessibility remains mixed, at best; and woefully inadequate, at worst. Via an Australian case study, we argue that it is imperative to better understand how internet technology interacts with the life worlds and dynamics of disability, and we suggest how policy can be articulated and improved to put people with disabilities on an equal basis to others in digital societies.

  6. On the Need of Novel Medium Access Control Schemes for Network Coding enabled Wireless Mesh Networks

    DEFF Research Database (Denmark)

    Paramanathan, Achuthan; Pahlevani, Peyman; Roetter, Daniel Enrique Lucani

    2013-01-01

    to the incoming and outgoing packet ratio. We describe the new protocol as an extension to the CSMA/CA protocol and implement the protocol on our own hardware platform. By means of our own testbed, we investigate two basic network structures, namely, the two-way relay and the cross topology. It is well known...... that network coding will improve the throughput in such systems, but our novel medium access scheme improves the performance in the cross topology by another 66 % for network coding and 150 % for classical forwarding in theory. These gains translate in a theoretical gain of 33 % of network coding over......This paper advocates for a new Medium Access Control (MAC) strategy for wireless meshed networks by identifying overload scenarios in order to provide additional channel access priority to the relay. The key behind our MAC protocol is that the relay will adjust its back off window size according...

  7. A scalable and continuous-upgradable optical wireless and wired convergent access network.

    Science.gov (United States)

    Sung, J Y; Cheng, K T; Chow, C W; Yeh, C H; Pan, C-L

    2014-06-02

    In this work, a scalable and continuous upgradable convergent optical access network is proposed. By using a multi-wavelength coherent comb source and a programmable waveshaper at the central office (CO), optical millimeter-wave (mm-wave) signals of different frequencies (from baseband to > 100 GHz) can be generated. Hence, it provides a scalable and continuous upgradable solution for end-user who needs 60 GHz wireless services now and > 100 GHz wireless services in the future. During the upgrade, user only needs to upgrade their optical networking unit (ONU). A programmable waveshaper is used to select the suitable optical tones with wavelength separation equals to the desired mm-wave frequency; while the CO remains intact. The centralized characteristics of the proposed system can easily add any new service and end-user. The centralized control of the wavelength makes the system more stable. Wired data rate of 17.45 Gb/s and w-band wireless data rate up to 3.36 Gb/s were demonstrated after transmission over 40 km of single-mode fiber (SMF).

  8. Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks -- Specific requirements -- Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications

    CERN Document Server

    International Organization for Standardization. Geneva

    1997-01-01

    Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks -- Specific requirements -- Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications

  9. Internet Addiction Risk in the Academic Environment

    Science.gov (United States)

    Ellis, William F.; McAleer, Brenda; Szakas, Joseph S.

    2015-01-01

    The Internet's effect on society is growing exponentially. One only has to look at the growth of e-commerce, social media, wireless data access, and mobile devices to see how communication is changing. The need and desire for the Internet, especially in such disciplines as Computer Science or Computer Information Systems, pose a unique risk for…

  10. Polarization division multiple access with polarization modulation for LOS wireless communications

    Directory of Open Access Journals (Sweden)

    Cao Bin

    2011-01-01

    Full Text Available Abstract In this paper, we discuss a potential multiple access and modulation scheme based on polarized states (PS of electromagnetic (EM waves for line-of-sight (LOS communications. The proposed scheme is theoretic different from the existing polar modulation for EDGE and WCDMA systems. We propose the detailed bit representation (modulation and multiple access scheme using PS. Because of the inflexibility of polarization information in the time and frequency domains, as well as independence of frequency and space, the polarization information can be used independently for wireless communications, i.e., another independent resource domain that can be utilized. Due to the independence between the PS and the specific features of signals (such as waveform, bandwidth and data rate, the discussed polarization division multiple access (PDMA and polarization modulation (PM are expected to improve the spectrum utilization effectively. It is proved that the polarization filtering technique can be adopted in the PDMA-PM wireless communications to separate the multiuser signals and demodulate the bit information representing by PS for desired user. Some theoretical analysis is done to demonstrate the feasibility of the proposed scheme, and the simulation results are made to evaluate the performance of the suggested system.

  11. A multi-gigabit W-Band bidirectional seamless fiber-wireless transmission system with simple structured access point

    DEFF Research Database (Denmark)

    Pang, Xiaodan; Vegas Olmos, Juan José; Lebedev, Alexander

    2013-01-01

    We propose a simple wireless access point for hybrid access networks and experimentally demonstrate bidirectional operation in W-Band. Photonic up-conversion and electrical downconversion are used in the downlink, while in the uplink both up- and down-conversion are conducted by electrical means....

  12. Receiver-initiated medium access control protocols for wireless sensor networks

    DEFF Research Database (Denmark)

    Fafoutis, Xenofon; Di Mauro, Alessio; Vithanage, Madava D.

    2015-01-01

    One of the fundamental building blocks of a Wireless Sensor Network (WSN) is the Medium Access Control (MAC) protocol, that part of the system governing when and how two independent neighboring nodes activate their respective transceivers to directly interact. Historically, data exchange has always...... such paradigm, the receiver is the one in charge of starting a direct communication with an eligible sender. This allows for new useful properties to be satisfied, novel schemes to be introduced and new challenges to be tackled. In this paper, we present a survey comprising of all the MAC protocols released...

  13. Towards a 100 Gb/s visible light wireless access network.

    Science.gov (United States)

    Tsonev, Dobroslav; Videv, Stefan; Haas, Harald

    2015-01-26

    Potential visible light communication (VLC) data rates at over 10 Gb/s have been recently demonstrated using light emitting diodes (LEDs). The disadvantage is, LEDs have an inherent trade-off between optical efficiency and bandwidth. Consequently, laser diodes (LDs) can be considered as a very promising alternative for better utilization of the visible light spectrum for communication purposes. This work investigates the communication capabilities of off-the-shelf LDs in a number of scenarios with illumination constraints. The results indicate that optical wireless access data rates in the excess of 100 Gb/s are possible at standard indoor illumination levels.

  14. A Fine-Grained Data Access Control System in Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Boniface K. Alese

    2015-12-01

    Full Text Available The evolving realities of Wireless Sensor Network (WSN deployed to various terrain of life require serving multiple applications. As large amount of sensed data are distributed and stored in individual sensors nodes, the illegal access to these sensitive data can be devastating. Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires the right set of users to access a particular data, based on their access privileges in the sensor networks. It is designed using Priccess Protocol with Access policy formulation adopting the principle of Bell Lapadula model as well as Attribute-Based Encryption (ABE to control access to sensor data. The functionality of the proposed system is simulated using Netbeans. The performance analysis of the proposed system using execution time and size of the key show that the higher the key size, the harder it becomes for the attacker to hack the system. Additionally, the time taken for the proposed work is lesser which makes the work faster than the existing work. Consequently, a well secure interactive web-based application that could facilitates the field officers access to stored data in safe and secure manner is developed.

  15. Easing Internet access of health information for elderly users

    NARCIS (Netherlands)

    Alpay, L.L.; Toussaint, P.J.; Ezendam, N.P.M.; Rövekamp, T.A.J.M.; Graafmans, W.C.; Westendorp, R.G.J.

    2004-01-01

    Elderly users are increasingly becoming active consumers of Internet technologies. Developing websites dedicated to this user group presents several design issues (such as that of 'design for all', participatory design, patient empowerment and cognitive usability assessment methods). SeniorGezond is

  16. Human Right and Internet Access : A philosophical investigation

    NARCIS (Netherlands)

    Wang, Xiaowei

    2016-01-01

    As of December 2014, there are three billion Internet users worldwide, of which 649 million are Chinese. This number will grow in the years to come. This technology, of course, possesses immense significance in our everyday life. What is currently new in international human rights practice is the

  17. Wireless home monitoring and health care activity management through the Internet in patients with chronic diseases.

    Science.gov (United States)

    Tura, Andrea; Quareni, Luca; Longo, David; Condoluci, Claudia; van Rijn, Astrid; Albertini, Giorgio

    2005-12-01

    A project was developed for the creation of an Internet-based network aimed at improved management of home care activities in brain-injured children. At the patient's side, a home care unit was provided, made of a portable medical device, and a tablet PC. Measured clinical data were blood oxygen saturation, heart rate, breath rate and quantity of movement. Thanks to device portability, the patient was free to move while measurements were taken. At prescribed time intervals, measured data were automatically transmitted to the tablet PC via Bluetooth. From the tablet PC, data were transmitted remotely to a Service Centre (via ADSL or GPRS) and made available for consultation by health care professionals through the project Web portal. At the portal, other functionalities were also available, both for patients and families, and for professionals (such as weekly planning agenda, access to relevant information resources, communication tools). Information was delivered for the right participant through a workflow engine. A first trial involving nine patients was performed for two months. At the end, although some improvements were suggested, good acceptance was detected, and 78% of patients and families claimed to be interested in further use of the platform.

  18. The association between internet and television access and disordered eating in a Chinese sample.

    Science.gov (United States)

    Peat, Christine M; Von Holle, Ann; Watson, Hunna; Huang, Lu; Thornton, Laura M; Zhang, Bing; Du, Shufa; Kleiman, Susan C; Bulik, Cynthia M

    2015-09-01

    China has historically reported a low prevalence of eating disorders. However, the rapid social and economic development of this country as well as Western ideals widely disseminated by television and the Internet have led to distinct patterns of behavioral choices that could affect eating disorder risk. Thus, the current study explored the relation between disordered eating and media use. Participants were females from the 2009 wave of the China Health and Nutrition Survey (N = 1,053). Descriptive statistics were obtained and logistic regression models, stratified by age (adolescents ages 12-17 years and adults ages 18-35 years), were used to evaluate the association of media use with disordered eating. In adolescents, 46.8% had access to the Internet and those with access averaged one hour per day each of Internet and television use. In adults, 41.4% had access to the Internet, and those with access averaged 1 h per day of Internet use and 2 h per day of television use. Internet access was significantly associated with a subjective belief of fatness (OR = 2.8, 95% CI: 1.6, 4.9) and worry over losing control over eating (OR = 4.8, 95% CI: 2.3, 9.8) only in adults. These findings help characterize the overall pattern of media use and report of eating disorder symptoms in a large sample of female Chinese adolescents and adults. That Internet access in adults was significantly associated with disordered eating cognitions might suggest that media access negatively influences these domains; however, more granular investigations are warranted. © 2014 Wiley Periodicals, Inc.

  19. The Association Between Internet and Television Access and Disordered Eating in a Chinese Sample

    Science.gov (United States)

    Peat, Christine M.; Von Holle, Ann; Watson, Hunna; Huang, Lu; Thornton, Laura M.; Zhang, Bing; Du, Shufa; Kleiman, Susan C.; Bulik, Cynthia M.

    2014-01-01

    Objective China has historically reported a low prevalence of eating disorders. However, the rapid social and economic development of this country as well as Western ideals widely disseminated by television and the Internet have led to distinct patterns of behavioral choices that could affect eating disorder risk. Thus, the current study explored the relation between disordered eating and media use. Method Participants were females from the 2009 wave of the China Health and Nutrition Survey (N = 1,053). Descriptive statistics were obtained and logistic regression models, stratified by age (adolescents ages 12-17 and adults ages 18-35), were used to evaluate the association of media use with disordered eating. Results In adolescents, 46.8% had access to the Internet and those with access averaged one hour per day each of Internet and television use. In adults, 41.4% had access to the Internet, and those with access averaged one hour per day of Internet use and two hours per day of television use. Internet access was significantly associated with a subjective belief of fatness (OR = 2.8, 95% CI: 1.6, 4.9) and worry over losing control over eating (OR = 4.8, 95% CI: 2.3, 9.8) only in adults. Discussion These findings help characterize the overall pattern of media use and report of eating disorder symptoms in a large sample of female Chinese adolescents and adults. That Internet access in adults was significantly associated with disordered eating cognitions might suggest that media access negatively influences these domains;however,more granular investigations are warranted. PMID:25346164

  20. Impact of the Digital Divide on Computer Use and Internet Access on the Poor in Nigeria

    Science.gov (United States)

    Tayo, Omolara; Thompson, Randall; Thompson, Elizabeth

    2016-01-01

    We recruited 20 community members in Ido Local Government Area, Oyo state and Yewa Local Government Area, Ogun state in Nigeria to explore experiences and perceptions of Internet access and computer use. Face-to-face interviews were conducted using open-ended questions to collect qualitative data regarding accessibility of information and…

  1. Providing Internet Access to the Ohio Career Information System for All Residents: A Feasibility Study.

    Science.gov (United States)

    Lewis, Morgan V.

    Expanded Internet access to the Ohio Career Information System (OCIS) would provide adults in Ohio who need to or wish to make career changes with the best available information about occupations, education and training programs, and financial aid. In order to determine the feasibility of improving access without cost to users, an advisory group,…

  2. Internet Access and Usage by Students of the University of Botswana

    African Journals Online (AJOL)

    ... those who had access used it essentially to search and retrieve information on entertainment, sports, and news from around the world. The study noted that the University has greatly influenced the students' use of the Internet to access information. (African Journal of Library, Archives and Information Science: 2002 11 (2): ...

  3. Proposal of solution for reliable access to the Internet

    Directory of Open Access Journals (Sweden)

    Radak Zlata D.

    2017-01-01

    Full Text Available Nowadays the rapid development of telecommunication services is increasingly evident and undeniable. In order to adapt to constant changes, telecommunication services providers and network operators must follow the requirements of the market and adapt service portfolio they offer. The existence of pre-defined package of services can meet the requirements of a labor market. Combining different services and their delivery to the location of the end user facilitates business to the companies. A flexible approach to creating solutions to connect to the Internet enables the operator to keep position among the leaders in the telecommunications market. However, large companies usually have complex and specific requirements. Specific requirements are usually related to the quality of data transmission and data security. Therefore, different solutions are tailor-made and applied by the business users. The specific requirements of the user described in this paper refer to the maximum availability of Internet connection at the location of the customer, which includes the delivery of two independent Internet links as well as adequate equipment to perform switching from the primary to the redundant (backup link in the event of interruption or major degradation of quality of service.

  4. Power Stabilization Strategy of Random Access Loads in Electric Vehicles Wireless Charging System at Traffic Lights

    Directory of Open Access Journals (Sweden)

    Linlin Tan

    2016-10-01

    Full Text Available An opportunity wireless charging system for electric vehicles when they stop and wait at traffic lights is proposed in this paper. In order to solve the serious power fluctuation caused by random access loads, this study presents a power stabilization strategy based on counting the number of electric vehicles in a designated area, including counting method, power source voltage adjustment strategy and choice of counting points. Firstly, the circuit model of a wireless power system with multi-loads is built and the equation of each load is obtained. Secondly, after the counting method of electric vehicles is stated, the voltage adjustment strategy, based on the number of electric vehicles when the system is at a steady state, is set out. Then, the counting points are chosen according to power curves when the voltage adjustment strategy is adopted. Finally, an experimental prototype is implemented to verify the power stabilization strategy. The experimental results show that, with the application of this strategy, the charging power is stabilized with the fluctuation of no more than 5% when loads access randomly.

  5. Accessibility and preferred use of online Web applications among WIC participants with Internet access.

    Science.gov (United States)

    Bensley, Robert J; Hovis, Amanda; Horton, Karissa D; Loyo, Jennifer J; Bensley, Kara M; Phillips, Diane; Desmangles, Claudia

    2014-01-01

    This study examined the current technology use of clients in the western Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) region and the preferences these current clients have for using new technologies to interact with WIC. Cross-sectional convenience sample for online survey of WIC clients over 2 months in 2011. A weighted sample of 8,144 participants showed that the majority of WIC clients have access to the Internet using a computer or mobile phone. E-mail, texting, and Facebook were technologies most often used for communication. Significant differences (P < .05) existed between age groups and Facebook use, education level and technology use for education delivery, and education level and use of video chat. Technologies should be considered for addressing WIC clients' needs, including use of text messaging and smartphone apps for appointments, education, and other WIC services; online scheduling and nutrition education; and a stronger Facebook presence for connecting with WIC clients and breastfeeding support. Published by Elsevier Inc.

  6. Design and implementation of fingerprint access control system based on ZigBee wireless network

    Directory of Open Access Journals (Sweden)

    Zhang Jin

    2017-01-01

    Full Text Available this paper mainly introduces a kind of fingerprint access control system based on ZigBee wireless network design and implementation method, specify when passengers should fingerprints collected and stored in the system at the information desk PC, and then assign rooms;Guests entered the room according to the fingerprint module, the system will be fingerprint information through ZigBee coordinator node module and network to transmit the fingerprint characteristic value to management system and the fingerprint information stored, if consistent with the electromagnetic lock open, allowed to enter the room, does not conform to the issued a warning sound.Additional access control system can control the corresponding fingerprint information storage room and remove, such as is required for a security incident broke in situation is special open mode can be set up.System software design consists of two aspects of the bottom and upper machine.

  7. Cell phone internet access, online sexual solicitation, partner seeking, and sexual risk behavior among adolescents.

    Science.gov (United States)

    Rice, Eric; Winetrobe, Hailey; Holloway, Ian W; Montoya, Jorge; Plant, Aaron; Kordic, Timothy

    2015-04-01

    Online partner seeking is associated with sexual risk behavior among young adults (specifically men who have sex with men), but this association has yet to be explored among a probability sample of adolescents. Moreover, cell phone internet access and sexual risk taking online and offline have not been explored. A probability sample (N = 1,831) of Los Angeles Unified School District high school students was collected in 2011. Logistic regression models assessed relationships between specific sexual risk behaviors (online sexual solicitation, seeking partners online, sex with internet-met partners, condom use) and frequency of internet use, internet access points, and demographics. Students with cell phone internet access were more likely to report being solicited online for sex, being sexually active, and having sex with an internet-met partner. Bisexual-identifying students reported higher rates of being approached online for sex, being sexually active, and not using condoms at last sex. Gay, lesbian, and questioning (GLQ) students were more likely to report online partner seeking and unprotected sex at last sex with an internet-met partner. Additionally, having sex with an internet-met partner was associated with being male, online sexual solicitation, and online partner seeking. Internet- and school-based sexual health programs should incorporate safety messages regarding online sexual solicitation, seeking sex partners online, and engaging in safer sex practices with all partners. Programs must target adolescents of all sexual identities, as adolescents may not yet be "out," and bisexual and GLQ adolescents are more likely to engage in risky sex behaviors.

  8. Beyond access: barriers to internet health information seeking among the urban poor.

    Science.gov (United States)

    McCloud, Rachel F; Okechukwu, Cassandra A; Sorensen, Glorian; Viswanath, K

    2016-11-01

    Communication inequalities deepen health disparities even when internet access is achieved. The goal of this study is to understand how a range of barriers may inhibit individuals from low socioeconomic position (SEP) from engaging with online health information even when it is freely available. Detailed data were collected from 118 low-SEP individuals from a randomized controlled trial providing internet access. Measures triangulated the health-seeking experience through internet use tracked in real-time, call log data, and self-reported barriers. Negative binomial regression models were fitted with technology and perceived predictors, and our outcome, health information seeking, and then stratified by medical status. Participants experienced a median of two computer issues (median 6 days) and two internet issues (median 6.5 days). Duration of internet problems was associated with a decrease in the rate of internet health information seeking by a factor of 0.990 (P = .03) for each additional day. Participants with a medical problem who were frustrated in their search for health information had half the rate of health information seeking of those who were not frustrated (incidence rate ratio = 0.395, P = .030). Despite IT support, participants still experienced internet connectivity issues that negatively impacted their health information seeking. Frustration in their search to find information may serve as an additional barrier to those who have medical issues. After initial internet access, a second-level digital divide emerged due to connectivity issues, highlighting the need to understand the complex network of barriers experienced by low-SEP internet users. © The Author 2016. Published by Oxford University Press on behalf of the American Medical Informatics Association. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  9. Subdividing the digital divide: differences in internet access and use among rural residents with medical limitations.

    Science.gov (United States)

    Wang, Jong-Yi; Bennett, Kevin; Probst, Janice

    2011-03-03

    Access to health care is often contingent upon an individual's ability to travel for services. Certain groups, such as those with physical limitations and rural residents, have more travel barriers than other groups, reducing their access to services. The use of the Internet may be a way for these groups to seek care or information to support their health care needs. The purpose of this study was to examine Internet use among those whose are, for medical reasons, limited in their ability to travel. We also examined disparities in Internet use by race/ethnicity and rural residence, particularly among persons with medical conditions. We used data from the 2001 National Household Travel Survey (NHTS), a nationally representative sample of US households, to examine Internet use among individuals with medical conditions, rural residents, and minority populations. Internet use was defined as any use within the past 6 months; among users, frequency of use and location of use were explored. Control variables included sociodemographics, family life cycle, employment status, region, and job density in the community. All analyses were weighted to reflect the complex NHTS sampling frame. Individuals with medical conditions were far less likely to report Internet use than those without medical conditions (32.6% vs 70.3%, P digital divide between urban and rural residents. Internet use and frequency was also lower among those reporting a medical condition than among those without a condition. After we controlled for many factors, however, African Americans and Hispanics were still less likely to use the Internet, and to use it less often, than whites. Policy makers should look for ways to improve the access to, and use of, the Internet among these populations.

  10. Beyond access: barriers to internet health information seeking among the urban poor

    Science.gov (United States)

    Okechukwu, Cassandra A; Sorensen, Glorian; Viswanath, K

    2016-01-01

    Objective Communication inequalities deepen health disparities even when internet access is achieved. The goal of this study is to understand how a range of barriers may inhibit individuals from low socioeconomic position (SEP) from engaging with online health information even when it is freely available. Materials and methods Detailed data were collected from 118 low-SEP individuals from a randomized controlled trial providing internet access. Measures triangulated the health-seeking experience through internet use tracked in real-time, call log data, and self-reported barriers. Negative binomial regression models were fitted with technology and perceived predictors, and our outcome, health information seeking, and then stratified by medical status. Results Participants experienced a median of two computer issues (median 6 days) and two internet issues (median 6.5 days). Duration of internet problems was associated with a decrease in the rate of internet health information seeking by a factor of 0.990 (P = .03) for each additional day. Participants with a medical problem who were frustrated in their search for health information had half the rate of health information seeking of those who were not frustrated (incidence rate ratio = 0.395, P = .030). Discussion Despite IT support, participants still experienced internet connectivity issues that negatively impacted their health information seeking. Frustration in their search to find information may serve as an additional barrier to those who have medical issues. Conclusion After initial internet access, a second-level digital divide emerged due to connectivity issues, highlighting the need to understand the complex network of barriers experienced by low-SEP internet users. PMID:27206459

  11. Internet usage and performance analysis of a rural wireless network in Macha, Zambia

    CSIR Research Space (South Africa)

    Johnson, DL

    2010-06-01

    Full Text Available -to-point links, hotspots and wireless mesh networks. Our analysis reveals largely web-based traffic as opposed to the peer-to-peer traffic dominance that one finds in urban areas. Social networking sites receive the most hits, and large file downloads from...

  12. Bridge over troubled water: An emerging right to access to the internet

    OpenAIRE

    Qerimi, Qerim

    2017-01-01

    This article is about the internet and its place in the current international legal order. The more precise inquiry concerns identifying the probable emergence of a legal entitlement, as opposed to the predominant focus on legal limitations or consequences of abuse of the right, to access to the internet. It seeks to identify the sources and shape of any such entitlement, along with investigating pertinent trends in political, legal, and judicial decision-making. It proposes the ...

  13. The role of Internet access in enabling individual’s rights and freedoms

    OpenAIRE

    LUCCHI, Nicola

    2013-01-01

    The paper discusses the scientific and policy debate as to whether access to the Internet can be considered so fundamental for human interaction as to deserve a special legal protection. In particular, it examines the impact of computer-mediated communication on the realization of individual’s rights and freedoms as well as on democratization processes. It then considers how Internet content governance is posing regulatory issues directly related to the growing importance of an equitable acce...

  14. An Ontology-Based Context Model for Wireless Sensor Network (WSN Management in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Adnan Al-Anbuky

    2013-09-01

    Full Text Available Wireless sensor networks (WSNs are an enabling technology of context-aware systems. The Internet of Things (IoT, which has attracted much attention in recent years, is an emerging paradigm where everyday objects and spaces are made context-aware and interconnected through heterogeneous networks on a global scale. However, the IoT system can suffer from poor performances when its underlying networks are not optimized. In this paper, an ontology model for representing and facilitating context sharing between network entities in WSNs is proposed for the first time. The context model aims to enable optimal context-aware management of WSNs in IoT, which will also harness the rich context knowledge of IoT systems.

  15. Wireless, battery-operated data acquisition system for mobile spectrometry applications and (potentially) for the Internet of things

    Science.gov (United States)

    Fitzgerald, Ryan; Karanassios, Vassili

    2017-05-01

    There are many applications requiring chemical analysis in the field and analytical results in (near) real-time. For example, when accidental spills occur. In others, collecting samples in the field followed by analysis in a lab increases costs and introduces time-delays. In such cases, "bring part of the lab to the sample" would be ideal. Toward this ideal (and to further reduce size and weight), we developed a relatively inexpensive, battery-operated, wireless data acquisition hardware system around an Arduino nano micro-controller and a 16-bit ADC (Analog-to- Digital Converter) with a max sampling rate of 860 samples/s. The hardware communicates the acquired data using low-power Bluetooth. Software for data acquisition and data display was written in Python. Potential ways of making the hardware-software approach described here a part of the Internet-of-Things (IoT) are presented.

  16. Internet access and sexual offences against children: an analysis of crime bureau statistics from India

    Directory of Open Access Journals (Sweden)

    Subahani Shaik

    2015-07-01

    Full Text Available Introduction: The association between pornography and sexual crime is controversial, with various researchers finding positive, no, or negative associations. Recent evidence suggests that there may be a specific association between child pornography, which is easily available on the Internet, and sexual offences against children. Methods: Using methodology similar to an earlier study from India, we obtained official statistics on sexual offences against children, namely rape and procurement of minor girls, for the period 2000-2012 from the National Crime Records Bureau. We analysed the association between the rates of these crimes and Internet access, measured by the number of users per 1,00,000 people. Results: Even after correcting for population growth, we found significant linear associations between Internet availability and the rates of both these offences against children. However, there was no correlation between the growth rate of Internet access and the rate of increase of these crimes. Discussion: While the association between pornography and the rape of adults is still under debate, our results provide indirect evidence of a possible association between Internet availability and sexual crimes against children. Regulation of the Internet to suppress access to child pornography may prevent at least some of these crimes.

  17. Combining wireless sensor networks and semantic middleware for an Internet of Things-based sportsman/woman monitoring application.

    Science.gov (United States)

    Rodríguez-Molina, Jesús; Martínez, José-Fernán; Castillejo, Pedro; López, Lourdes

    2013-01-31

    Wireless Sensor Networks (WSNs) are spearheading the efforts taken to build and deploy systems aiming to accomplish the ultimate objectives of the Internet of Things. Due to the sensors WSNs nodes are provided with, and to their ubiquity and pervasive capabilities, these networks become extremely suitable for many applications that so-called conventional cabled or wireless networks are unable to handle. One of these still underdeveloped applications is monitoring physical parameters on a person. This is an especially interesting application regarding their age or activity, for any detected hazardous parameter can be notified not only to the monitored person as a warning, but also to any third party that may be helpful under critical circumstances, such as relatives or healthcare centers. We propose a system built to monitor a sportsman/woman during a workout session or performing a sport-related indoor activity. Sensors have been deployed by means of several nodes acting as the nodes of a WSN, along with a semantic middleware development used for hardware complexity abstraction purposes. The data extracted from the environment, combined with the information obtained from the user, will compose the basis of the services that can be obtained.

  18. Combining Wireless Sensor Networks and Semantic Middleware for an Internet of Things-Based Sportsman/Woman Monitoring Application

    Directory of Open Access Journals (Sweden)

    Lourdes López

    2013-01-01

    Full Text Available Wireless Sensor Networks (WSNs are spearheading the efforts taken to build and deploy systems aiming to accomplish the ultimate objectives of the Internet of Things. Due to the sensors WSNs nodes are provided with, and to their ubiquity and pervasive capabilities, these networks become extremely suitable for many applications that so-called conventional cabled or wireless networks are unable to handle. One of these still underdeveloped applications is monitoring physical parameters on a person. This is an especially interesting application regarding their age or activity, for any detected hazardous parameter can be notified not only to the monitored person as a warning, but also to any third party that may be helpful under critical circumstances, such as relatives or healthcare centers. We propose a system built to monitor a sportsman/woman during a workout session or performing a sport-related indoor activity. Sensors have been deployed by means of several nodes acting as the nodes of a WSN, along with a semantic middleware development used for hardware complexity abstraction purposes. The data extracted from the environment, combined with the information obtained from the user, will compose the basis of the services that can be obtained.

  19. Computer and internet access for long-term care residents: perceived benefits and barriers.

    Science.gov (United States)

    Tak, Sunghee H; Beck, Cornelia; McMahon, Ed

    2007-05-01

    In this study, the authors examined residents' computer and Internet access, as well as benefits and barriers to access in nursing homes. Administrators of 64 nursing homes in a national chain completed surveys. Fourteen percent of the nursing homes provided computers for residents to use, and 11% had Internet access. Some residents owned personal computers in their rooms. Administrators perceived the benefits of computer and Internet use for residents as facilitating direct communication with family and providing mental exercise, education, and enjoyment. Perceived barriers included cost and space for computer equipment and residents' cognitive and physical impairments. Implications of residents' computer activities were discussed for nursing care. Further research is warranted to examine therapeutic effects of computerized activities and their cost effectiveness.

  20. Systematic review: investigating the effectiveness of assistive technology to enable internet access for individuals with deafblindness.

    Science.gov (United States)

    Perfect, Erin; Jaiswal, Atul; Davies, Theresa Claire

    2018-02-26

    The purpose of this study is to systematically review published evidence regarding the development, use and effectiveness of assistive devices and technologies that enable internet access for individuals who are deafblind. Eight electronic research databases (CINAHL, Embase, Engineering Village MEDLINE, PsycINFO, PubMed, Cochrane Library, and Web of Science) and three clinical trials registries (ISRCTN Registry, WHO ICTRP, and ClinicalTrials,gov) were searched. Seven articles met the inclusion criteria for this systematic review. The assistive technologies described were in the preliminary stages of development, with only three of the technologies having undergone any testing. The effectiveness of all seven assistive technologies was quantified in this review based on the proposed impacts of internet access on the domains of the World Health Organization's International Classification of Functioning, Disability and Health framework. Internet access technologies for individuals with deafblindness are in the early stages of development and are targeted towards specific functions of the internet. It is imperative that future device development and evaluation seek input from persons who are deafblind. There is also a need to address the gap between academic research which seeks to develop assistive technology to access the internet and the translation into real world use of this technology.

  1. QoS Differentiated and Fair Packet Scheduling in Broadband Wireless Access Networks

    Directory of Open Access Journals (Sweden)

    Zhang Yan

    2009-01-01

    Full Text Available This paper studies the packet scheduling problem in Broadband Wireless Access (BWA networks. The key difficulties of the BWA scheduling problem lie in the high variability of wireless channel capacity and the unknown model of packet arrival process. It is difficult for traditional heuristic scheduling algorithms to handle the situation and guarantee satisfying performance in BWA networks. In this paper, we introduce learning-based approach for a better solution. Specifically, we formulate the packet scheduling problem as an average cost Semi-Markov Decision Process (SMDP. Then, we solve the SMDP by using reinforcement learning. A feature-based linear approximation and the Temporal-Difference learning technique are employed to produce a near optimal solution of the corresponding SMDP problem. The proposed algorithm, called Reinforcement Learning Scheduling (RLS, has in-built capability of self-training. It is able to adaptively and timely regulate its scheduling policy according to the instantaneous network conditions. Simulation results indicate that RLS outperforms two classical scheduling algorithms and simultaneously considers: (i effective QoS differentiation, (ii high bandwidth utilization, and (iii both short-term and long-term fairness.

  2. A Lightweight Medium Access Protocol (LMAC) for Wireless Sensor Networks: Reducing Preamble Transmissions and Transceiver State Switches

    NARCIS (Netherlands)

    van Hoesel, L.F.W.; Havinga, Paul J.M.

    2004-01-01

    In this paper, we present an energy-efficient medium access protocol designed for wireless sensor networks. Although the protocol uses TDMA to give nodes in the WSN the opportunity to communicate collision-free, the network is self-organizing in terms of time slot assignment and synchronization. The

  3. Implementasi dan Evaluasi Kinerja Direct Sequence Spread Spectrum menggunakan Wireless Open-Access Research Platform (WARP

    Directory of Open Access Journals (Sweden)

    Aditya Sukmana Putra

    2015-03-01

    Full Text Available Dalam sistem komunikasi nirkabel, khususnya pada dunia komunikasi taktis atau militer, salah satu yang harus dihadapi adalah gangguan jamming.Salah satu sistem yang dapat mengatasi masalah tersebut adalah Direct Sequence Spread Spectrum (DSSS dimana informasi akan dikalikan secara langsung dengan pseudo-noise sequence yang mempunyai laju chip jauh lebih besar.Sistem ini dapat diimplementasikan pada Wireless Open-Access Research Platform (WARP yang merupakan salah satu dari jenis Software Define Radio (SDR.Modul WARP mampu diprogram secara langsung dengan software MATLAB.Kinerja sistem terbaik didapatkan ketika daya sinyal jamming lebih kecil atau sama dengan daya sinyal carrier sistem DSSS. Pada Single Tone Jamming (STJ sistem akan mencapai nilai BER 10E-3  saat daya sinyal jamming 125 % dari daya sinyal sistem DSSS, sedangkan pada Multi Tone Jamming (MTJ sistem akan mencapai BER 10E-3  saat daya sinyal jamming 100 % dari daya sistem DSSS.

  4. Internet access and use by COPD patients in the National Emphysema/COPD Association Survey

    Science.gov (United States)

    2014-01-01

    Background Technology offers opportunities to improve healthcare, but little is known about Internet use by COPD patients. We tested two hypotheses: Internet access is associated with socio-demographic disparities and frequency of use is related to perceived needs. Methods We analyzed data from a 2007–2008 national convenience sample survey of COPD patients to determine the relationship between Internet access and frequency of use with demographics, socio-economic status, COPD severity, and satisfaction with healthcare. Results Among survey respondents (response rate 7.2%; n = 914, 59.1% women, mean age 71.2 years), 34.2% reported lack of Internet access, and an additional 49% had access but used the Internet less than weekly. Multivariate models showed association between lack of access and older age (OR 1.10, 95% CI 1.07, 1.13), lower income (income below $30,000 OR 2.47, 95% CI 1.63, 3.73), less education (high school highest attainment OR 2.30, 95% CI 1.54, 3.45), comorbid arthritis or mobility-related disease (OR 1.56, 95% CI 1.05, 2.34). More frequent use (at least weekly) was associated with younger age (OR 0.95, 95% CI 0.93, 0.98), absence of cardiovascular disease (OR 0.48, 95% CI 0.29, 0.78), but with perception of needs insufficiently met by the healthcare system, including diagnostic delay (OR 1.72, 95% CI 1.06, 2.78), feeling treated poorly (OR 2.46, 95% CI 1.15, 5.24), insufficient physician time (OR 2.29, 95% CI 1.02, 5.13), and feeling their physician did not listen (OR 3.14, 95% CI 1.42, 6.95). Conclusions An analysis of the characteristics associated with Internet access and use among COPD patients identified two different patient populations. Lack of Internet access was a marker of socioeconomic disparity and mobility-associated diseases, while frequent Internet use was associated with less somatic disease but dissatisfaction with care. PMID:24755090

  5. Internet access and use by COPD patients in the National Emphysema/COPD Association Survey.

    Science.gov (United States)

    Martinez, Carlos H; St Jean, Beth L; Plauschinat, Craig A; Rogers, Barbara; Beresford, Julen; Martinez, Fernando J; Richardson, Caroline R; Han, Meilan K

    2014-04-22

    Technology offers opportunities to improve healthcare, but little is known about Internet use by COPD patients. We tested two hypotheses: Internet access is associated with socio-demographic disparities and frequency of use is related to perceived needs. We analyzed data from a 2007-2008 national convenience sample survey of COPD patients to determine the relationship between Internet access and frequency of use with demographics, socio-economic status, COPD severity, and satisfaction with healthcare. Among survey respondents (response rate 7.2%; n = 914, 59.1% women, mean age 71.2 years), 34.2% reported lack of Internet access, and an additional 49% had access but used the Internet less than weekly. Multivariate models showed association between lack of access and older age (OR 1.10, 95% CI 1.07, 1.13), lower income (income below $30,000 OR 2.47, 95% CI 1.63, 3.73), less education (high school highest attainment OR 2.30, 95% CI 1.54, 3.45), comorbid arthritis or mobility-related disease (OR 1.56, 95% CI 1.05, 2.34). More frequent use (at least weekly) was associated with younger age (OR 0.95, 95% CI 0.93, 0.98), absence of cardiovascular disease (OR 0.48, 95% CI 0.29, 0.78), but with perception of needs insufficiently met by the healthcare system, including diagnostic delay (OR 1.72, 95% CI 1.06, 2.78), feeling treated poorly (OR 2.46, 95% CI 1.15, 5.24), insufficient physician time (OR 2.29, 95% CI 1.02, 5.13), and feeling their physician did not listen (OR 3.14, 95% CI 1.42, 6.95). An analysis of the characteristics associated with Internet access and use among COPD patients identified two different patient populations. Lack of Internet access was a marker of socioeconomic disparity and mobility-associated diseases, while frequent Internet use was associated with less somatic disease but dissatisfaction with care.

  6. DWDM Fiber-Wireless Access System with Centralized Optical Frequency Comb-based RF Carrier Generation

    DEFF Research Database (Denmark)

    Pang, Xiaodan; Beltrán, Marta; Sánchez, José

    2013-01-01

    We propose and experimentally demonstrate an optical wireless DWDM system at 60 GHz with optical incoherent heterodyne up-conversion using an optical frequency comb. Multiple users with wireline and wireless services are simultaneously supported.......We propose and experimentally demonstrate an optical wireless DWDM system at 60 GHz with optical incoherent heterodyne up-conversion using an optical frequency comb. Multiple users with wireline and wireless services are simultaneously supported....

  7. Converged wireline and wireless signal transport over optical fibre access links

    DEFF Research Database (Denmark)

    Tafur Monroy, Idelfonso; Prince, Kamau; Osadchiy, Alexey Vladimirovich

    2009-01-01

    This article reviews emerging trends in converged optical-wireless communication systems and outline the role that photonic technologies are playing in making the vision of a wireline-wireless converged signal transport network a reality.......This article reviews emerging trends in converged optical-wireless communication systems and outline the role that photonic technologies are playing in making the vision of a wireline-wireless converged signal transport network a reality....

  8. Who's Connected? Trends from 1999 to 2011 in Home Internet Access in North Carolina

    Directory of Open Access Journals (Sweden)

    Kenneth Wilson

    2013-06-01

    Full Text Available Using the Internet has become an essential part of many people's daily life activities. In this information age, the Internet is an indispensible tool for communicating and sharing of information. This transformation of technological incorporation into every aspect of social life has been relatively swift, although not all-inclusive. Lack of access to the Internet produces and perpetuates social inequality. In this paper we present results of a unique data set compiled from six studies conducted across twelve years in the state of North Carolina. Our results show differences in home access to the Internet are associated with various aspects of social stratification. The findings reveal that digital divide persists over time. At least one quarter of respondents with one or more of the following sociodemographic characteristics reported not having home Internet access: African Americans, those with only a high school degree or less, those without school-age children in the home, those with a household income less than $30,000, people age 69 years and older, and rural residents. Future research and policy recommendations are provided.

  9. Reducing the MAC Latency for IEEE 802.11 Vehicular Internet Access

    Directory of Open Access Journals (Sweden)

    Kang Moonsoo

    2010-01-01

    Full Text Available In an intermittently connected environment, access points are sparsely distributed throughout an area. As mobile users travel along the roadway, they can opportunistically connect, albeit temporarily, to roadside 802.11 (Wi-Fi APs for Internet access. Net-working characteristics of vehicular Internet access in an intermittently connected envi ronment face numerous challenges, such as short periods of connectivity and unpredictable connection times. To meet these challenges, we propose an Access Point Report (APR protocol where mobile stations opportunistically collaborate by broadcasting an APR to other mobile stations to fully utilize the short-lived connection periods. APR can optimize the use of short connection periods by minimizing the scanning delay and also act as a hint that enables mobile users to predict when connection can be established.

  10. An Access Control Protocol for Wireless Sensor Network Using Double Trapdoor Chameleon Hash Function

    Directory of Open Access Journals (Sweden)

    Tejeshwari Thakur

    2016-01-01

    Full Text Available Wireless sensor network (WSN, a type of communication system, is normally deployed into the unattended environment where the intended user can get access to the network. The sensor nodes collect data from this environment. If the data are valuable and confidential, then security measures are needed to protect them from the unauthorized access. This situation requires an access control protocol (ACP in the design of sensor network because of sensor nodes which are vulnerable to various malicious attacks during the authentication and key establishment and the new node addition phase. In this paper, we propose a secured ACP for such WSN. This protocol is based on Elliptic Curve Discrete Log Problem (ECDLP and double trapdoor chameleon hash function which secures the WSN from malicious attacks such as node masquerading attack, replay attack, man-in-the-middle attack, and forgery attacks. Proposed ACP has a special feature known as session key security. Also, the proposed ACP is more efficient as it requires only one modular multiplication during the initialization phase.

  11. 60 GHz Wireless Propagation Channels: Characterization, Modeling and Evaluation

    OpenAIRE

    Gustafson, Carl

    2014-01-01

    To be able to connect wirelessly to the internet is nowadays a part of everyday life and the number of wireless devices accessing wireless networks worldwide are increasing rapidly. However, with the increasing number of wireless devices and applications and the amount available bandwidth, spectrum shortage is an issue. A promising way to increase the amount of available spectrum is to utilize frequency bands in the mm-wave range of 30-300 GHz that previously have not been used for typical co...

  12. Access Routes of Internet Finance Dictionaries: Present Solutions and Future Opportunities

    Directory of Open Access Journals (Sweden)

    Deny Arnos Kwary

    2011-10-01

    Full Text Available

    ABSTRACT: Lexicographers working on finance dictionaries have not properly exploited the fast development of the Internet. This is revealed by the poor utilization of the access routes found in current Internet finance dictionaries. Consequently, users cannot effectively and efficiently find answers to their lexicographical problems. Firstly, there are Internet finance dictionaries which lack technological features and can simply be called meagre Internet dictionaries. Secondly, there are Internet finance dictionaries which utilize so many technological features that users incur high lexicographical information costs. In order to create better access routes, a sound theoretical foundation has to be established. This article shows that the implementation of the modern theory of lexicographical functions, which focuses on the users, results in a better design for future Internet finance dictionaries. With the proper theoretical basis, lexicographers will be able to create state-ofthe- art dictionaries that can provide effective and efficient solutions to lexicographical problems.

    OPSOMMING: Toegangsroetes van Internet- finansiële woordeboeke: Huidige oplossings en toekomstige geleenthede. Leksikograwe wat aan finansiële woordeboeke werk, het nie die vinnige ontwikkeling van die Internet behoorlik benut nie. Dit blyk uit die gebrekkige aanwending van die toegangsroetes wat in huidige Internet- finansiële woordeboeke aangetref word. Gevolglik kan gebruikers nie doeltreffend en doelmatig antwoorde kry op hul leksikografiese probleme nie. Eerstens is daar Internet- finansiële woordeboeke waarin tegnologiese kenmerke ontbreek en wat gewoon karige Internetwoordeboeke genoem kan word. Tweedens is daar Internet- finansiële woordeboeke wat so baie tegnologiese kenmerke aanwend dat gebruikers hoë leksikografiese inligtingskoste oploop. Om beter toegangsroetes te skep, moet 'n deeglike teoretiese grondslag gevestig word. Hierdie artikel toon

  13. TRICALCAR : Weaving Community Based Wireless Networks in ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... wireless champions by facilitating the exchange of knowledge between them and with other like-minded actors in the region. The training materials and knowledge gained during the experience will be documented and made available online. The idea is to improve Internet access in rural and urban marginalized areas at ...

  14. Gender Differences in Availability, Internet Access and Rate of Usage of Computers among Distance Education Learners.

    Science.gov (United States)

    Atan, Hanafi; Sulaiman, Fauziah; Rahman, Zuraidah Abd; Idrus, Rozhan Mohammed

    2002-01-01

    Explores the level of availability of computers, Internet accessibility, and the rate of usage of computers both at home and at the workplace between distance education learners according to gender. Results of questionnaires completed at the Universiti Sains Malaysia indicate that distance education reduces the gender gap. (Author/LRW)

  15. Internet Access and Use in Political Discourse by the Members of ...

    African Journals Online (AJOL)

    This paper is based on the research which examined access and use of internet resources and services by the Tanzanian Members of Parliament (MPs) and its impact on the political discourse. The study was conducted in June 2009 among selected parliamentarians. It employed qualitative and quantitative research ...

  16. Global Market Access in the Internet Era: South Africa's Wood Furniture Industry.

    Science.gov (United States)

    Moodley, Sagren

    2002-01-01

    Explores the link between Internet connectivity and access to global markets, and uses the South African wood furniture producers as they are integrated into global value chains and exposed to the demands of more sophisticated markets. Articulates policy recommendations to promote greater diffusion of e-commerce technologies in the wood furniture…

  17. e-Portfolios for Learning and Development: without constant internet or electrical grid access

    NARCIS (Netherlands)

    Casey, John; Calverley, Gayle; Greller, Wolfgang; Uhomoibhi, James

    2011-01-01

    Casey, J., Calverley, G., Greller, W., & Uhomoibhi, J. (2010, 26-28 May). e-Portfolios for Learning and Development: without constant internet or electrical grid access. Presentation at the 5th International Conference on ICT for Development, Education, and Training - eLearning Africa, Lusaka,

  18. Towards a tangible web: using physical objects to access and manipulate the Internet of Things

    CSIR Research Space (South Africa)

    Smith, Andrew C

    2013-09-01

    Full Text Available . This additional step has resulted in the phenomenon commonly referred to as the Internet of Things (IoT). In order to realise the full potential of the IoT, individuals need a mechanism to access and manipulate it. A potential mechanism for achieving...

  19. Use of Cybercafe for Internet Access by the Students of Rufus Giwa Polytechnic, Owo, Nigeria

    Science.gov (United States)

    Aladeniyi, Fasa Rachael; Fasae, Joseph Kehinde

    2013-01-01

    Purpose: The study aims to investigate the use of cybercafe for internet access by students of Rufus Giwa Polytechnic, Owo, Nigeria. Design/methodology/approach: Using descriptive design, 382 copies of a structured questionnaire were administered to students of the Rufus Giwa Polytechnic, Owo, who were using the institution cybercafe as at the…

  20. Internet Information-Seeking and Its Relation to Support for Access to Government Records

    Science.gov (United States)

    Cuillier, David; Piotrowski, Suzanne J.

    2009-01-01

    Public access to government records is essential for democratic self-governance, and attitudes toward that right can facilitate or hinder public policy regarding transparency. As more people use the internet for gathering information about their governments and communities, it is unknown whether such online information-seeking is related to…

  1. The Mole's Dilemma: Ethical Aspects of Public Internet Access in Academic Libraries.

    Science.gov (United States)

    Still, Julie; Kassabian, Vibiana

    1999-01-01

    Discusses ethical issues concerning public Internet access in academic libraries. Highlights include intellectual freedom, censorship, technical aspects of limiting or restricting use, legal liability for public use of computers for illegal purposes such as child pornography, and the importance of priority use of terminals by the primary academic…

  2. The Changing Role of Community Networks in Providing Citizen Access to the Internet.

    Science.gov (United States)

    Keenan, Thomas P.; Trotter, David Mitchell

    1999-01-01

    Examines the changing role of community network associations or freenets in providing Internet access by examining the case of the Calgary Community Network Association (CCNA) in Alberta, Canada. Discusses the withdrawal of states from the telecommunications field, priorities of the Canadian government, and the role of the private sector.…

  3. Outsourcing a High Speed Internet Access Project: An Information Technology Class Case Study in Three Parts

    Science.gov (United States)

    Platt, Richard G.; Carper, William B.; McCool, Michael

    2010-01-01

    In early 2004, the Hilton Hotels Corporation (HHC) required that all of its hotels (both owned and franchised) install high-speed Internet access (HSIA) in all of their rooms by June 2004. This case focuses on how one of its franchise properties located on the northern gulf coast of Florida (the Hilton Sandestin Beach Golf Resort &…

  4. Effect of access to ICT on the use of internet among farmers in South ...

    African Journals Online (AJOL)

    A study was conducted on effect of access to information and communication technology on the use of internet among farmers in South East Nigeria. A structured interview schedule was used to collect data from 270 respondents from the study area. Data analysis was by the use of mean scores and simple regression.

  5. Local government broadband policies for areas with limited Internet access

    Directory of Open Access Journals (Sweden)

    Yoshio Arai

    2014-03-01

    Full Text Available Despite their wide diffusion in developed countries, broadband services are still limited in areas where providing them is not profitable for private telecom carriers. To address this, many local governments in Japan have implemented broadband deployment projects subsidized by the national government. In this paper, we discuss local government broadband policies based on survey data collected from municipalities throughout the country. With the support of national promotion policies, broadband services were rapidly introduced to most local municipalities in Japan during the 2000s. Local government deployment policies helped to reduce the number of areas with no broadband access. A business model based on the Indefeasible Right of Use (IRU contract between a private telecom carrier and a local government has been developed in recent years. Even local governments without the technical capacity to operate a broadband business can introduce broadband services into their territory using the IRU business model.

  6. Illegal "no prescription" internet access to narrow therapeutic index drugs.

    Science.gov (United States)

    Liang, Bryan A; Mackey, Tim K; Lovett, Kimberly M

    2013-05-01

    Narrow therapeutic index (NTI) drugs, because of proximity of therapeutic amounts to toxic amounts, require close professional oversight, particularly when switching formulations. However, safe use may be compromised by unsupervised switching through access to online "no prescription" Web sites. We assessed no prescription online availability of NTI drugs, using an academically published list (core NTI drugs). Using the Google search term "buy DRUG no prescription," we reviewed the first 5 search result pages for marketing of no prescription NTI drugs. We further assessed if National Association of Boards of Pharmacy (NABP) Not Recommended vendors were marketing NTI drugs. Searches were conducted from November 3, 2012 to January 3, 2013. For core NTI drugs, we found 13 of 14 NTI drugs (92%) marketed as available without prescription, all from NABP Not Recommended vendors. On the basis of these initial findings, we expanded our core list to 12 additional NTI drugs; 11 of 12 of these drugs (92%) were available from no prescription Web sites. Overall, 24 of 26 NTI drugs (92%) were illegally marketed as available online without the need for a prescription. Suspect online NTI drug access from no prescription vendors represents a significant patient safety risk because of potential patient drug switching and risk of counterfeit versions. Further, state health care exchanges with coverage limitations may drive patients to seek formulations online. Food and Drug Administration harmonization with tighter international NTI drug standards should be considered, and aggressive action against suspect online marketers should be a regulatory and public health priority. Copyright © 2013 Elsevier HS Journals, Inc. All rights reserved.

  7. Enhancing Independent Internet Access for Individuals with Mental Retardation through Use of a Specialized Web Browser: A Pilot Study.

    Science.gov (United States)

    Davies, Daniel K.; Stock, Steven E.; Wehmeyer, Michael L.

    2001-01-01

    In this study, a prototype web browser, called Web Trek, that utilizes multimedia to provide access for individuals with cognitive disabilities was developed and pilot-tested with 12 adults with mental retardation. The Web Trek browser provided greater independence in accessing the Internet compared to Internet Explorer. (Contains references.)…

  8. Access to Internet of People With Disabilities Engellilerin Internet'e Erişimi Üzerine

    Directory of Open Access Journals (Sweden)

    Fatoş Subaşıoğlu

    2000-06-01

    Full Text Available The last decade has producted a revolution in the world of Internet and computer technology for many disabled people. Especially, with the help of adaptive technology, for example, deaf-blind people can communicate over telephone networks and severely visaully impaired people can read a computer screen directly with the help of speech synthesis or automatically generated Braille displays. People with physical disabilities can use personel computers by blowing. If s even possible to control computers by using the voice. However, currently, the largest problem is that WWW pages are increasingly developed with pictures, images, audio and video clips carrying much of the information. For this reason, the aims of this article are twofold: first, to give some information about products of adaptive technologies for people with disabilities, and second, to give some design examples about Web pages for this people. Son 10 yıl içinde, engellilere yönelik Internet ve bilgisayar teknolojisi alanında yeni bir oluşum yaşanmaya başlandı. Özellikle uyarlanmış teknoloji yardımıyla örneğin, sağır-kör insanlar telefon ağları ile iletişim kurabilmekte ve birçok görme engelli insan konuşma sentezi aracılığı ile bir bilgisayar ekranını ya da otomatik olarak üretilmiş Braille görüntülerini okuyabilmektedir. Fiziksel engelliler, üfleyerek bilgisayarlarını kullanabilmekte, hatta ses ile bilgisayarı kullanmak mümkün olmaktadır. Ancak, günümüzde en büyük sorun, WWW say falarının yoğunlukla resimler, görüntüler, ses ve video küpleri ile geliştirilmekte olduğudur. Bu nedenle bu makalenin amacı, öncelikle engellilere yönelik uyarlanmış teknoloji ürünleri alanında bilgi vermek ve bu bireylere yönelik Web tasarım örnekleri sunmaktır.

  9. Internet

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Internet. The latest communication revolution surrounds Internet. Some stats*:. 210 billion emails sent daily; 15 billion phone calls everyday; ~40 billion WWW links served everyday. * Source : The Radicati group.

  10. Accounting for Energy Cost When Designing Energy-Efficient Wireless Access Networks

    Directory of Open Access Journals (Sweden)

    Greta Vallero

    2018-03-01

    Full Text Available Because of the increase of the data traffic demand, wireless access networks, through which users access telecommunication services, have expanded, in terms of size and of capability and, consequently, in terms of power consumption. Therefore, costs to buy the necessary power for the supply of base stations of those networks is becoming very high, impacting the communication cost. In this study, strategies to reduce the amount of money spent for the purchase of the energy consumed by the base stations are proposed for a network powered by solar panels, energy batteries and the power grid. First, the variability of the energy prices is exploited. It provides a cost reduction of up to 30%, when energy is bought in advance. If a part of the base stations is deactivated when the energy price is higher than a given threshold, a compromise between the energy cost and the user coverage drop is needed. In the simulated scenario, the necessary energy cost can be reduced by more than 40%, preserving the user coverage by greater than 94%. Second, the network is introduced to the energy market: it buys and sells energy from/to the traditional power grid. Finally, costs are reduced by the reduction of power consumption of the network, achieved by using microcell base stations. In the considered scenario, up to a 31% cost reduction is obtained, without the deterioration of the quality of service, but a huge Capex expenditure is required.

  11. Directional Medium Access Control (MAC Protocols in Wireless Ad Hoc and Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    David Tung Chong Wong

    2015-06-01

    Full Text Available This survey paper presents the state-of-the-art directional medium access control (MAC protocols in wireless ad hoc and sensor networks (WAHSNs. The key benefits of directional antennas over omni-directional antennas are longer communication range, less multipath interference, more spatial reuse, more secure communications, higher throughput and reduced latency. However, directional antennas lead to single-/multi-channel directional hidden/exposed terminals, deafness and neighborhood, head-of-line blocking, and MAC-layer capture which need to be overcome. Addressing these problems and benefits for directional antennas to MAC protocols leads to many classes of directional MAC protocols in WAHSNs. These classes of directional MAC protocols presented in this survey paper include single-channel, multi-channel, cooperative and cognitive directional MACs. Single-channel directional MAC protocols can be classified as contention-based or non-contention-based or hybrid-based, while multi-channel directional MAC protocols commonly use a common control channel for control packets/tones and one or more data channels for directional data transmissions. Cooperative directional MAC protocols improve throughput in WAHSNs via directional multi-rate/single-relay/multiple-relay/two frequency channels/polarization, while cognitive directional MAC protocols leverage on conventional directional MAC protocols with new twists to address dynamic spectrum access. All of these directional MAC protocols are the pillars for the design of future directional MAC protocols in WAHSNs.

  12. Access to and use of the Internet by South African general practitioners.

    Science.gov (United States)

    Masters, Ken

    2008-11-01

    In the developed world, doctors use the Internet to support the delivery of health care. Their usage patterns are explained by Rogers' Diffusion of Innovations. There is no knowledge of Internet usage by doctors in the developing world. In July 2006, 2600 survey forms were posted in the first national survey of South African (SA) General Practitioners' (GPs) use of the Internet. A sample of non-responders was followed up. The aim was to determine SA GPs' Internet usage patterns, to compare them to world usage, and to examine them in the light of Diffusion of Innovations. A 10% usable response rate was a major weakness, but similar surveys are unlikely to be more representative. 89% of SA GPs have Internet access, home usage is high, and overall usage patterns are equivalent to the usage patterns of international studies. In spite of the overall technological under-development in South Africa, as predicted by Diffusion of Innovations, SA GPs have adopted the technology, and use it for health care in much the same way as their international counterparts. Further studies on some of the details will be valuable. The indications are that SA GPs will reap the benefits of the Internet as it continues to evolve, and translate these into improved health care delivery in South Africa.

  13. Data Transmission and Access Protection of Community Medical Internet of Things

    Directory of Open Access Journals (Sweden)

    Xunbao Wang

    2017-01-01

    Full Text Available On the basis of Internet of Things (IoT technologies, Community Medical Internet of Things (CMIoT is a new medical information system and generates massive multiple types of medical data which contain all kinds of user identity data, various types of medical data, and other sensitive information. To effectively protect users’ privacy, we propose a secure privacy data protection scheme including transmission protection and access control. For the uplink transmission data protection, bidirectional identity authentication and fragmented multipath data transmission are used, and for the downlink data protection, fine grained access control and dynamic authorization are used. Through theoretical analysis and experiment evaluation, it is proved that the community medical data can be effectively protected in the transmission and access process without high performance loss.

  14. Information Access Skills in Mothers as Containment of Internet Negative Impact

    Directory of Open Access Journals (Sweden)

    Putri Limilia

    2018-02-01

    Full Text Available Media and Information Literacy (MIL skills was one of the skills that must be possessed by netizens. These skills become important in the effort of coping with the negative impact of the internet. The high penetration of the internet is not followed by the high skill of MIL. Therefore, the writers are interested to know the skills of information and media literacy (access skills in mothers. This study uses descriptive quantitative method by using questionnaires as means of data collection. The result of the study shows that mothers tend to have moderate-level information access skills. The skills are reflected in the skills of mothers at moderate level in understanding the role of information, seeking sources of information, accessing information effectively and efficiently, and storing information.

  15. CAPAClTYANALYSIS OF WIRELESS MESH NET\\VORKS

    African Journals Online (AJOL)

    client lo obtain internet access. or as an acce s point which allows other WiFi devices and the nano stations to obtain network access as illustrated in Figure 2. The capacity o!"wireless rnesh networks is. a1Tec1ecl by many factors such as net\\\\ Ork architecture. node mobility. node density. trartic pallcrn and number or ...

  16. Wired/wireless access integrated RoF-PON with scalable generation of multi-frequency MMWs enabled by polarization multiplexed FWM in SOA.

    Science.gov (United States)

    Xiang, Yu; Chen, Chen; Zhang, Chongfu; Qiu, Kun

    2013-01-14

    In this paper, we propose and demonstrate a novel integrated radio-over-fiber passive optical network (RoF-PON) system for both wired and wireless access. By utilizing the polarization multiplexed four-wave mixing (FWM) effect in a semiconductor optical amplifier (SOA), scalable generation of multi-frequency millimeter-waves (MMWs) can be provided so as to assist the configuration of multi-frequency wireless access for the wire/wireless access integrated ROF-PON system. In order to obtain a better performance, the polarization multiplexed FWM effect is investigated in detail. Simulation results successfully verify the feasibility of our proposed scheme.

  17. Identity Establishment and Capability Based Access Control (IECAC) Scheme for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) become discretionary part of everyday life and could befall a threat if security is not considered before deployment. Authentication and access control in IoT is equally important to establish secure communication between devices. To protect IoT from man in middle, replay...... and denial of service attacks, the concept of capability for access control is introduced. This paper presents Identity establishment and capability based access control (IECAC) protocol using ECC (Elliptical Curve Cryptography) for IoT along with protocol evaluation, which protect against the aforementioned...

  18. Access to CERN from the Internet: termination of the VPN service

    CERN Document Server

    2007-01-01

    Due to the continued incidents and growing security risks from the service, access to CERN using the VPN (Virtual Private Network) service will be discontinued on Tuesday 29th January 2008. In addition, new registrations will no longer be accepted. Further information is linked from: http://cern.ch/security/vpn Users are requested to stop using VPN immediately and start using the recommended alternative methods for connecting to CERN from the Internet. These are outlined together with a set of FAQs at: http://cern.ch/security/Internet IT Department

  19. Access to CERN from the Internet: termination of the VPN service - Reminder

    CERN Document Server

    IT Department

    2008-01-01

    Due to the continued incidents and growing security risks associated with the service, access to CERN using the VPN (Virtual Private Network) service will be discontinued as of Tuesday, 29 January 2008. In addition, new registrations are no longer accepted. For further information see: http://cern.ch/security/vpn. Users are requested to stop using VPN immediately and to start to use the recommended alternative methods for connecting to CERN from the Internet. An outline of these methods and a set of FAQs are available at: http://cern.ch/security/Internet IT Department

  20. Access for Internet of Things using Smartphone as a Gateway utilizing LTE and WiFi

    DEFF Research Database (Denmark)

    Mathur, Prateek; Nielsen, Rasmus Hjorth; Prasad, Neeli R.

    2016-01-01

    Communicating the Internet of Things (IoT) data relying on Long-Term Evolution (LTE) and WiFi has been been presented in the relevant literature. However, this necessitates devices to have LTE/WiFi capability of their own, that has limitations in the form of power consumption, and radio access...... the data to the Internet. In this paper we present a system model wherein the smartphone functions as a gateway for the IoT devices operating on NFC, ZigBee and Bluetooth. The smartphone functioning as a gateway for transferring IoT data. The system modelled in the form of a Markov Chain based...

  1. Design and implementation of an Internet based effective controlling and monitoring system with wireless fieldbus communications technologies for process automation--an experimental study.

    Science.gov (United States)

    Cetinceviz, Yucel; Bayindir, Ramazan

    2012-05-01

    The network requirements of control systems in industrial applications increase day by day. The Internet based control system and various fieldbus systems have been designed in order to meet these requirements. This paper describes an Internet based control system with wireless fieldbus communication designed for distributed processes. The system was implemented as an experimental setup in a laboratory. In industrial facilities, the process control layer and the distance connection of the distributed control devices in the lowest levels of the industrial production environment are provided with fieldbus networks. In this paper, the Internet based control system that will be able to meet the system requirements with a new-generation communication structure, which is called wired/wireless hybrid system, has been designed on field level and carried out to cover all sectors of distributed automation, from process control, to distributed input/output (I/O). The system has been accomplished by hardware structure with a programmable logic controller (PLC), a communication processor (CP) module, two industrial wireless modules and a distributed I/O module, Motor Protection Package (MPP) and software structure with WinCC flexible program used for the screen of Scada (Supervisory Control And Data Acquisition), SIMATIC MANAGER package program ("STEP7") used for the hardware and network configuration and also for downloading control program to PLC. Copyright © 2012 ISA. Published by Elsevier Ltd. All rights reserved.

  2. Internet Of Things(IoTs) Enable Decoder Design For Wireless Sensor Network

    DEFF Research Database (Denmark)

    Madhok, Shivani; Mahajan, Ritika; Hussain, Dil muhammed Akbar

    2015-01-01

    temperature, heat sink profile and airflow then proceeding forward to plot the characteristics between power and ambient temperature, junction temperature and ambient temperature.As we are dealing with internet of things, we need an IP address to link with our decoder so in our code we have taken 2 inputs one...... for IPv6(Internet Protocol version 6) and other for a 6-bit input. Through IPv6 port, we can embed IP Address and can read it from our output pin that is IPAddress. We can allot an IP Address to our decoder and can command it’s working as we wish. There is 26-77% saving in power dissipation. In that way...

  3. Intrusion detection and monitoring for wireless networks.

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.; Stephano, Amanda (Indiana University); Tabriz, Parisa (University of Illinois at Urbana-Champaign); Pelon, Kristen (Cedarville University); McCoy, Damon (University of Colorado, Boulder); Lodato, Mark (Lafayette College); Hemingway, Franklin (University of New Mexico); Custer, Ryan P.; Averin, Dimitry (Polytechnic University); Franklin, Jason (Carnegie Mellon University); Kilman, Dominique Marie

    2005-11-01

    Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wireless networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more

  4. Insecurity of Wireless Networks

    Energy Technology Data Exchange (ETDEWEB)

    Sheldon, Frederick T [ORNL; Weber, John Mark [Dynetics, Inc.; Yoo, Seong-Moo [University of Alabama, Huntsville; Pan, W. David [University of Alabama, Huntsville

    2012-01-01

    Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA, allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.

  5. The digital divide: Trends in global mobile and broadband Internet access from 2000-2010.

    Science.gov (United States)

    Ronquillo, Charlene; Currie, Leanne

    2012-01-01

    The digital divide is described as the gap between those who do and do not have access to digital information and communications technologies (ICT). ICTs are viewed as an indicator of infrastructure and potential for development, and are a growing platform for health information and services delivery. This study compares the penetration of mobile and broadband Internet technologies by global region from 2000 to 2010. Results illustrate the rapid growth of mobile cellular telephone subscriptions in all global regions with trends suggesting a continued increase. Little to modest gains were made in fixed broadband Internet subscriptions globally. There is a growing popularity of mobile subscriptions with use of data communications, exceeding the numbers of fixed Internet subscriptions. This comparison reveals current strengths that can be built on and highlights the importance of awareness of global trends and using such knowledge to inform design and delivery of ICT-based health services.

  6. The digital divide: Trends in global mobile and broadband Internet access from 2000–2010

    Science.gov (United States)

    Ronquillo, Charlene; Currie, Leanne

    2012-01-01

    The digital divide is described as the gap between those who do and do not have access to digital information and communications technologies (ICT). ICTs are viewed as an indicator of infrastructure and potential for development, and are a growing platform for health information and services delivery. This study compares the penetration of mobile and broadband Internet technologies by global region from 2000 to 2010. Results illustrate the rapid growth of mobile cellular telephone subscriptions in all global regions with trends suggesting a continued increase. Little to modest gains were made in fixed broadband Internet subscriptions globally. There is a growing popularity of mobile subscriptions with use of data communications, exceeding the numbers of fixed Internet subscriptions. This comparison reveals current strengths that can be built on and highlights the importance of awareness of global trends and using such knowledge to inform design and delivery of ICT-based health services. PMID:24199118

  7. Identity driven Capability based Access Control (ICAC) Scheme for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2012-01-01

    Internet of Things (IoT) becomes discretionary part of everyday life. Scalability and manageability is daunting due to unbounded number of devices and services. Access control and authorization in IoT with least privilege is equally important to establish secure communication between multiple...... devices and services. In this paper, the concept of capability for access control is introduced where the identities of the involved devices are entrenched in the access capabilities. Identity driven capability based access control (ICAC) scheme presented in this paper helps to alleviate issues related...... to complexity and dynamics of device identities. ICAC is implemented for 802.11 and results shows that ICAC has less scalability issues and better performance analysis compared with other access control schemes. The ICAC evaluation by using security protocol verification tool shows that ICAC is secure against...

  8. Secure Your Wireless Network: Going Wireless Comes with Its Own Special Set of Security Concerns

    Science.gov (United States)

    Bloomquist, Jane; Musa, Atif

    2004-01-01

    Imagine a completely wireless school, an open network in which all students and staff can roam around using laptops or handheld computers to browse the Internet, access files and applications on the school server, and communicate with each other and the world via e-mail. It's a great picture--and at some schools the future is already here. But…

  9. Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things

    Directory of Open Access Journals (Sweden)

    Anup Kumar Maurya

    2017-10-01

    Full Text Available To improve the quality of service and reduce the possibility of security attacks, a secure and efficient user authentication mechanism is required for Wireless Sensor Networks (WSNs and the Internet of Things (IoT. Session key establishment between the sensor node and the user is also required for secure communication. In this paper, we perform the security analysis of A.K.Das’s user authentication scheme (given in 2015, Choi et al.’s scheme (given in 2016, and Park et al.’s scheme (given in 2016. The security analysis shows that their schemes are vulnerable to various attacks like user impersonation attack, sensor node impersonation attack and attacks based on legitimate users. Based on the cryptanalysis of these existing protocols, we propose a secure and efficient authenticated session key establishment protocol which ensures various security features and overcomes the drawbacks of existing protocols. The formal and informal security analysis indicates that the proposed protocol withstands the various security vulnerabilities involved in WSNs. The automated validation using AVISPA and Scyther tool ensures the absence of security attacks in our scheme. The logical verification using the Burrows-Abadi-Needham (BAN logic confirms the correctness of the proposed protocol. Finally, the comparative analysis based on computational overhead and security features of other existing protocol indicate that the proposed user authentication system is secure and efficient. In future, we intend to implement the proposed protocol in real-world applications of WSNs and IoT.

  10. An orthogonal wavelet division multiple-access processor architecture for LTE-advanced wireless/radio-over-fiber systems over heterogeneous networks

    Science.gov (United States)

    Mahapatra, Chinmaya; Leung, Victor CM; Stouraitis, Thanos

    2014-12-01

    The increase in internet traffic, number of users, and availability of mobile devices poses a challenge to wireless technologies. In long-term evolution (LTE) advanced system, heterogeneous networks (HetNet) using centralized coordinated multipoint (CoMP) transmitting radio over optical fibers (LTE A-ROF) have provided a feasible way of satisfying user demands. In this paper, an orthogonal wavelet division multiple-access (OWDMA) processor architecture is proposed, which is shown to be better suited to LTE advanced systems as compared to orthogonal frequency division multiple access (OFDMA) as in LTE systems 3GPP rel.8 (3GPP, http://www.3gpp.org/DynaReport/36300.htm). ROF systems are a viable alternative to satisfy large data demands; hence, the performance in ROF systems is also evaluated. To validate the architecture, the circuit is designed and synthesized on a Xilinx vertex-6 field-programmable gate array (FPGA). The synthesis results show that the circuit performs with a clock period as short as 7.036 ns (i.e., a maximum clock frequency of 142.13 MHz) for transform size of 512. A pipelined version of the architecture reduces the power consumption by approximately 89%. We compare our architecture with similar available architectures for resource utilization and timing and provide performance comparison with OFDMA systems for various quality metrics of communication systems. The OWDMA architecture is found to perform better than OFDMA for bit error rate (BER) performance versus signal-to-noise ratio (SNR) in wireless channel as well as ROF media. It also gives higher throughput and mitigates the bad effect of peak-to-average-power ratio (PAPR).

  11. Access Selection Algorithm of Heterogeneous Wireless Networks for Smart Distribution Grid Based on Entropy-Weight and Rough Set

    Science.gov (United States)

    Xiang, Min; Qu, Qinqin; Chen, Cheng; Tian, Li; Zeng, Lingkang

    2017-11-01

    To improve the reliability of communication service in smart distribution grid (SDG), an access selection algorithm based on dynamic network status and different service types for heterogeneous wireless networks was proposed. The network performance index values were obtained in real time by multimode terminal and the variation trend of index values was analyzed by the growth matrix. The index weights were calculated by entropy-weight and then modified by rough set to get the final weights. Combining the grey relational analysis to sort the candidate networks, and the optimum communication network is selected. Simulation results show that the proposed algorithm can implement dynamically access selection in heterogeneous wireless networks of SDG effectively and reduce the network blocking probability.

  12. Evolution of Network Access Points (NAPs and agreements among Internet Service Providers (ISPs in South America

    Directory of Open Access Journals (Sweden)

    Fernando Beltrán

    2006-05-01

    Full Text Available Este artículo presenta los aspectos principales del desarrollo histórico y de asuntos actuales en el mercado suramericano de acceso a Internet: los acuerdos de interconexión para el intercambio de tráfico local y regional en Suramérica, los incentivos que tienen los proveedores de acceso a Internet para mantener o modificar la naturaleza de los acuerdos y los métodos de recuperación de costos en los puntos de intercambio de tráfico. El artículo también identifica algunas amenazas a la estabilidad de los puntos de intercambio de tráfico y las ilustra con dos casos. / This paper presents the main aspects of the historical development and the current issues at stake in the South American Internet access market: the interconnection schemes for the exchange of local and regional traffic in the South American region, the incentives Internet access providers have for keeping or modifying the nature of the agreements, and the cost recovery methods at the traffic exchange points. Some threats to the stability of the scheme for domestic traffic exchange adopted throughout the region are also identified and subsequently illustrated with country-cases.

  13. Security analysis and improvements of authentication and access control in the Internet of Things.

    Science.gov (United States)

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  14. Optical network unit placement in Fiber-Wireless (FiWi) access network by Moth-Flame optimization algorithm

    Science.gov (United States)

    Singh, Puja; Prakash, Shashi

    2017-07-01

    Hybrid wireless-optical broadband access network (WOBAN) or Fiber-Wireless (FiWi) is the integration of wireless access network and optical network. This hybrid multi-domain network adopts the advantages of wireless and optical domains and serves the demand of technology savvy users. FiWi exhibits the properties of cost effectiveness, robustness, flexibility, high capacity, reliability and is self organized. Optical Network Unit (ONU) placement problem in FiWi contributes in simplifying the network design and enhances the performance in terms of cost efficiency and increased throughput. Several individual-based algorithms, such as Simulated Annealing (SA), Tabu Search, etc. have been suggested for ONU placement, but these algorithms suffer from premature convergence (trapping in a local optima). The present research work undertakes the deployment of FiWi and proposes a novel nature-inspired heuristic paradigm called Moth-Flame optimization (MFO) algorithm for multiple optical network units' placement. MFO is a population based algorithm. Population-based algorithms are better in handling local optima avoidance. The simulation results are compared with the existing Greedy and Simulated Annealing algorithms to optimize the position of ONUs. To the best of our knowledge, MFO algorithm has been used for the first time in this domain, moreover it has been able to provide very promising and competitive results. The performance of MFO algorithm has been analyzed by varying the 'b' parameter. MFO algorithm results in faster convergence than the existing strategies of Greedy and SA and returns a lower value of overall cost function. The results exhibit the dependence of the objective function on the distribution of wireless users also.

  15. Parity-Check Network Coding for Multiple Access Relay Channel in Wireless Sensor Cooperative Communications

    Directory of Open Access Journals (Sweden)

    Du Bing

    2010-01-01

    Full Text Available A recently developed theory suggests that network coding is a generalization of source coding and channel coding and thus yields a significant performance improvement in terms of throughput and spatial diversity. This paper proposes a cooperative design of a parity-check network coding scheme in the context of a two-source multiple access relay channel (MARC model, a common compact model in hierarchical wireless sensor networks (WSNs. The scheme uses Low-Density Parity-Check (LDPC as the surrogate to build up a layered structure which encapsulates the multiple constituent LDPC codes in the source and relay nodes. Specifically, the relay node decodes the messages from two sources, which are used to generate extra parity-check bits by a random network coding procedure to fill up the rate gap between Source-Relay and Source-Destination transmissions. Then, we derived the key algebraic relationships among multidimensional LDPC constituent codes as one of the constraints for code profile optimization. These extra check bits are sent to the destination to realize a cooperative diversity as well as to approach MARC decode-and-forward (DF capacity.

  16. Towards Mitigating Heterogeneous Wireless Interference in Spectrum Bands with Unlicensed Access

    Science.gov (United States)

    Nychis, George P.

    2013-01-01

    In the past two decades, we have seen an unprecedented rise in unlicensed wireless devices and applications of wireless technology. To meet various application constraints, we continually customize the radios and their protocols to the application domain which has led to significant diversity in spectrum use. Unfortunately, this diversity (coupled…

  17. Medium access control and network layer design for 60 GHz wireless personal area networks

    NARCIS (Netherlands)

    An, X.

    2010-01-01

    The unlicensed frequency band around 60 GHz is a very promising spectrum due to its potential to provide multiple gigabits per second based data rates for short range wireless communication. Hence, 60 GHz radio is an attractive candidate to enable ultra high rate Wireless Personal Area Networks

  18. Opportunity for All: How the American Public Benefits from Internet Access at U.S. Libraries

    Science.gov (United States)

    Becker, Samantha; Crandall, Michael D.; Fisher, Karen E.; Kinney, Bo; Landry, Carol; Rocha, Anita

    2010-01-01

    Over the past decade and a half, free access to computers and the Internet in U.S. public libraries evolved from a rare commodity into a core service. Now, people from all walks of life rely on this service every day to look for jobs, find health care, and read the latest news. As the nation struggled through a historic recession, nearly one-third…

  19. Black Open Access in Ukraine: Analysis of Downloading Sci-Hub Publications by Ukrainian Internet Users

    OpenAIRE

    Nazarovets, Serhii

    2018-01-01

    Introduction. High subscription fees to scholarly research journals provoke researchers to use illegal channels of access to scientific information. Analysis of statistical data on downloads of scholarly research papers by Ukrainian Internet users from illegal web resource can help to define gaps in information provision at the institutional or the state level for each scientific field. Problem Statement. To conduct an analysis of behavior and geography of downloads of scholarly research p...

  20. Data Access Based on a Guide Map of the Underwater Wireless Sensor Network

    Science.gov (United States)

    Wei, Zhengxian; Song, Min; Yin, Guisheng; Wang, Hongbin; Cheng, Albert M. K.

    2017-01-01

    Underwater wireless sensor networks (UWSNs) represent an area of increasing research interest, as data storage, discovery, and query of UWSNs are always challenging issues. In this paper, a data access based on a guide map (DAGM) method is proposed for UWSNs. In DAGM, the metadata describes the abstracts of data content and the storage location. The center ring is composed of nodes according to the shortest average data query path in the network in order to store the metadata, and the data guide map organizes, diffuses and synchronizes the metadata in the center ring, providing the most time-saving and energy-efficient data query service for the user. For this method, firstly the data is stored in the UWSN. The storage node is determined, the data is transmitted from the sensor node (data generation source) to the storage node, and the metadata is generated for it. Then, the metadata is sent to the center ring node that is the nearest to the storage node and the data guide map organizes the metadata, diffusing and synchronizing it to the other center ring nodes. Finally, when there is query data in any user node, the data guide map will select a center ring node nearest to the user to process the query sentence, and based on the shortest transmission delay and lowest energy consumption, data transmission routing is generated according to the storage location abstract in the metadata. Hence, specific application data transmission from the storage node to the user is completed. The simulation results demonstrate that DAGM has advantages with respect to data access time and network energy consumption. PMID:29039757

  1. Data Access Based on a Guide Map of the Underwater Wireless Sensor Network.

    Science.gov (United States)

    Wei, Zhengxian; Song, Min; Yin, Guisheng; Song, Houbing; Wang, Hongbin; Ma, Xuefei; Cheng, Albert M K

    2017-10-17

    Underwater wireless sensor networks (UWSNs) represent an area of increasing research interest, as data storage, discovery, and query of UWSNs are always challenging issues. In this paper, a data access based on a guide map (DAGM) method is proposed for UWSNs. In DAGM, the metadata describes the abstracts of data content and the storage location. The center ring is composed of nodes according to the shortest average data query path in the network in order to store the metadata, and the data guide map organizes, diffuses and synchronizes the metadata in the center ring, providing the most time-saving and energy-efficient data query service for the user. For this method, firstly the data is stored in the UWSN. The storage node is determined, the data is transmitted from the sensor node (data generation source) to the storage node, and the metadata is generated for it. Then, the metadata is sent to the center ring node that is the nearest to the storage node and the data guide map organizes the metadata, diffusing and synchronizing it to the other center ring nodes. Finally, when there is query data in any user node, the data guide map will select a center ring node nearest to the user to process the query sentence, and based on the shortest transmission delay and lowest energy consumption, data transmission routing is generated according to the storage location abstract in the metadata. Hence, specific application data transmission from the storage node to the user is completed. The simulation results demonstrate that DAGM has advantages with respect to data access time and network energy consumption.

  2. Assessing internet access and use in a medically underserved population: implications for providing enhanced health information services.

    Science.gov (United States)

    Zach, Lisl; Dalrymple, Prudence W; Rogers, Michelle L; Williver-Farr, Heather

    2012-03-01

    The relationship between health information seeking, patient engagement and health literacy is not well understood. This is especially true in medically underserved populations, which are often viewed as having limited access to health information. To improve communication between an urban health centre and the community it serves, a team of library and information science researchers undertook an assessment of patients' level and methods of access to and use of the Internet. Data were collected in 53 face-to-face anonymous interviews with patients at the centre. Interviews were tape-recorded for referential accuracy, and data were analysed to identify patterns of access and use. Seventy-two percentage of study participants reported having access to the Internet through either computers or cell phones. Barriers to Internet access were predominantly lack of equipment or training rather than lack of interest. Only 21% of those with Internet access reported using the Internet to look for health information. The findings suggest that lack of access to the Internet in itself is not the primary barrier to seeking health information in this population and that the digital divide exists not at the level of information access but rather at the level of information use. © 2011 The authors. Health Information and Libraries Journal © 2011 Health Libraries Group.

  3. Wireless robot teleoperation via internet using IPv6 over a bluetooth personal area network

    Directory of Open Access Journals (Sweden)

    Carlos Araque Rodríguez

    2010-01-01

    Full Text Available En este artículo se presenta el diseño, construcción y pruebas de un sistema que permite la manipulación y visualización del robot Microbot Teachmover usando una conexión inalámbrica Bluetooth con dirección IPv6, brindando la posibilidad de manejar el robot desde diferentes escenarios: desde un dispositivo móvil que se encuentra en la misma piconet del robot; desde un computador que se encuentre en la misma piconet del robot y desde un computador que se encuentre conectado a Internet con una dirección IPv6.

  4. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2013-01-01

    In the last few years the Internet of Things (IoT) has seen widespread application and can be found in each field. Authentication and access control are important and critical functionalities in the context of IoT to enable secure communication between devices. Mobility, dynamic network topology...... and weak physical security of low power devices in IoT networks are possible sources for security vulnerabilities. It is promising to make an authentication and access control attack resistant and lightweight in a resource constrained and distributed IoT environment. This paper presents the Identity...... Authentication and Capability based Access Control (IACAC) model with protocol evaluation and performance analysis. To protect IoT from man-in-the-middle, replay and denial of service (Dos) attacks, the concept of capability for access control is introduced. The novelty of this model is that, it presents...

  5. Seamless and secure communications over heterogeneous wireless networks

    CERN Document Server

    Cao, Jiannong

    2014-01-01

    This brief provides an overview of the requirements, challenges, design issues and major techniques for seamless and secure communications over heterogeneous wireless networks. It summarizes and provides detailed insights into the latest research on handoff management, mobility management, fast authentication and security management to support seamless and secure roaming for mobile clients. The reader will also learn about the challenges in developing relevant technologies and providing ubiquitous Internet access over heterogeneous wireless networks. The authors have extensive experience in im

  6. Pervasive access to images and data--the use of computing grids and mobile/wireless devices across healthcare enterprises.

    Science.gov (United States)

    Pohjonen, Hanna; Ross, Peeter; Blickman, Johan G; Kamman, Richard

    2007-01-01

    Emerging technologies are transforming the workflows in healthcare enterprises. Computing grids and handheld mobile/wireless devices are providing clinicians with enterprise-wide access to all patient data and analysis tools on a pervasive basis. In this paper, emerging technologies are presented that provide computing grids and streaming-based access to image and data management functions, and system architectures that enable pervasive computing on a cost-effective basis. Finally, the implications of such technologies are investigated regarding the positive impacts on clinical workflows.

  7. Internet accessible hot cell with gamma spectroscopy at the Missouri S and T nuclear reactor

    International Nuclear Information System (INIS)

    Grant, Edwin; Mueller, Gary; Castano, Carlos; Usman, Shoaib; Kumar, Arvind

    2011-01-01

    Highlights: → A dual-chambered internet-accessible heavily shielded facility has been built. → The facility allows distance users to analyze neutron irradiated samples remotely. → The Missouri S and T system uses computer automation with user feedback. → The system can analyze multiple samples and assist several researchers concurrently. - Abstract: A dual-chambered internet-accessible heavily shielded facility with pneumatic access to the University of Missouri Science and Technology (Missouri S and T) 200 kW Research Nuclear Reactor (MSTR) core has been built and is currently available for irradiation and analysis of samples. The facility allows authorized distance users engaged in collaborative activities with Missouri S and T to remotely manipulate and analyze neutron irradiated samples. The system consists of two shielded compartments, one for multiple sample storage, and the other dedicated exclusively for radiation measurements and spectroscopy. The second chamber has multiple detector ports, with graded shielding, and has the capability to support gamma spectroscopy using radiation detectors such as an HPGe detector. Both these chambers are connected though a rapid pneumatic system with access to the MSTR nuclear reactor core. This new internet-based system complements the MSTR's current bare pneumatic tube (BPT) and cadmium lined pneumatic tube (CPT) facilities. The total transportation time between the core and the hot cell, for samples weighing 10 g, irradiated in the MSTR core, is roughly 3.0 s. This work was funded by the DOE grant number DE-FG07-07ID14852 and expands the capabilities of teaching and research at the MSTR. It allows individuals who do not have on-site access to a nuclear reactor facility to remotely participate in research and educational activities.

  8. 77 FR 69820 - Access to Confidential Business Information by Electronic Consulting Services, Inc., and Its...

    Science.gov (United States)

    2012-11-21

    ... software; access to the EPA wide area network (WAN) and the Internet; technical refresh of EPAs computing... infrastructure IT service providers (e.g. VoIP, PBX, switches, routers, hubs, Wireless LANs, network wiring...

  9. Accessing On-Line Services with Synthetic Speech: America Online, CompuServe, and Internet Service Providers.

    Science.gov (United States)

    Earl, Crista L.; Leventhal, Jay D.

    1998-01-01

    This product evaluation reviews two of the most popular online Internet service providers, America Online and CompuServe, and describes their advantages and disadvantages for synthetic speech-users compared to services that offer Internet access only, such as Concentric or Netcome. It concludes that CompuServe is a better choice for individuals…

  10. 36 CFR 1254.32 - What rules apply to public access use of the Internet on NARA-supplied computers?

    Science.gov (United States)

    2010-07-01

    ... access use of the Internet on NARA-supplied computers? 1254.32 Section 1254.32 Parks, Forests, and Public Property NATIONAL ARCHIVES AND RECORDS ADMINISTRATION PUBLIC AVAILABILITY AND USE USING RECORDS AND DONATED... for Internet use in all NARA research rooms. The number of workstations varies per location. We...

  11. GPRS based real-time reporting and internet accessible sea level gauge for monitoring storm surge and tsunami

    Digital Repository Service at National Institute of Oceanography (India)

    Desai, R.G.P.; Joseph, A; Agarvadekar, Y.; Dabholkar, N.; Mehra, P.; Gouveia, A; Tengali, S.; VijayKumar, K.; Parab, A

    Development and implementation of a real-time reporting and Internet-accessible sea level gauge is described. The paper addresses the application of mobile communication technology and particularly the use of General Packet Radio Service (GPRS...

  12. How can wireless, mobile data acquisition be used for taking part of the lab to the sample, and how can it join the internet of things?

    Science.gov (United States)

    Trzcinski, Peter; Karanassios, Vassili

    2016-05-01

    During the last several years, the world has moved from wired communications (e.g., a wired ethernet, wired telephone) to wireless communications (e.g., cell phones, smart phones, tablets). However, data acquisition has lagged behind and for the most part, data in laboratory settings are still acquired using wired communications (or even plug in boards). In this paper, approaches that can be used for wireless data acquisition are briefly discussed using a conceptual model of a future, mobile, portable micro-instrument as an example. In addition, past, present and near-future generations of communications are discussed; processors, operating systems and benchmarks are reviewed; networks that may be used for data acquisition in the field are examined; and, the possibility of connecting sensor or micro-instrument networks to the internet of things is postulated.

  13. Reconfigurable Digital Coherent Receiver for Hybrid Optical Fiber/Wireless Metro-Access Networks

    DEFF Research Database (Denmark)

    Arlunno, Valeria; Guerrero Gonzalez, Neil; Caballero Jambrina, Antonio

    Single reconfigurable DSP coherent receiver is experimentally demonstrated for mixed-format and bit-rates including QPSK, OFDM, IR-UWB for wireline and wireless signal types. Successful transmission and detection over a deployed fiber link is achieved.......Single reconfigurable DSP coherent receiver is experimentally demonstrated for mixed-format and bit-rates including QPSK, OFDM, IR-UWB for wireline and wireless signal types. Successful transmission and detection over a deployed fiber link is achieved....

  14. CLUSTER BASED TIME DIVISION MULTIPLE ACCESS SCHEDULING SCHEME FOR ZIGBEE WIRELESS SENSOR NETWORKS

    OpenAIRE

    P. Anandhakumar; B. Meenakshi

    2012-01-01

    In IEEE 802.15.4 ZigBee Wireless Sensor Networks, an efficient scheduling mechanism is required for reliable data transmission. Further, concurrent transmission of huge data through CSMA/CA incurs more packet collision rate. This complicated condition has to be eliminated to improve the system throughput. In this study, we propose to deploy cluster based TDMA scheduling mechanism for IEEE 802.15.4 ZigBee Wireless Sensor Networks. This TDMA slot allocation strategy allocates slots to the nodes...

  15. Using Internet of Things inspired wireless sensor networks to monitor cryospheric processes

    Science.gov (United States)

    Hart, J. K.; Martinez, K.

    2017-12-01

    In order to understand how modern climate change is effecting cryospheric environments we need to monitor these remote environments. There are few measurements of current day conditions because of the logistical difficulties. In particular, the whole year needs to be monitored, as well as accessing challenging environments (such as beneath the glacier). We demonstrate from Norway, Iceland and Scotland how embedded sensors along with geophysical (GPR)and surveying data (dGPS, TLS, UAV and time-lapse photography) can be used to investigate recent dramatic environmental changes associated with climate change. This includes: i) a comparison between stable and unstable glacier retreat (the subglacial hydrology, glacier motion, englacial structure and till behaviour of a rapid subaqueous glacier break-up compared with slower terrestrial retreat); and iii) an investigation of future ground stability and greenhouse gas release associated with periglacial conditions.

  16. Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Abdul Razaque

    2014-03-01

    Full Text Available This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC for wireless sensor networks (WSNs, which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN, which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS, which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS, which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  17. Energy-efficient boarder node medium access control protocol for wireless sensor networks.

    Science.gov (United States)

    Razaque, Abdul; Elleithy, Khaled M

    2014-03-12

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware hybrid protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC protocols. Like contention-based MAC protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other hybrid MAC protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi

  18. Do Patients Who Access Clinical Information on Patient Internet Portals Have More Primary Care Visits?

    Science.gov (United States)

    Leveille, Suzanne G; Mejilla, Roanne; Ngo, Long; Fossa, Alan; Elmore, Joann G; Darer, Jonathan; Ralston, James D; Delbanco, Tom; Walker, Jan

    2016-01-01

    As health care costs alarm the nation and the debate increases about the impact of health information technologies, patients are reviewing their medical records increasingly through secure Internet portals. Important questions remain about the impact of portal use on office visits. To evaluate whether use of patient Internet portals to access records is associated with increased primary care utilization. A prospective cohort study. Primary care patients registered on patient Internet portals, within an integrated health system serving rural Pennsylvania and an academic medical center in Boston. Frequency of "clinical portal use" (days/2 mo intervals over 2 y) included secure messaging about clinical issues and viewing laboratory and radiology findings. In year 2, a subset of patients also gained access to their primary care doctor's visit notes. The main outcome was number of primary care office visits. In the first 2 months of the 2-year period, 14% of 44,951 primary care patients engaged in clinical portal use 2 or more days per month, 31% did so 1 day per month, and the remainder had no clinical portal use. Overall, adjusted for age, sex, and chronic conditions, clinical portal use was not associated with subsequent office visits. Fewer than 0.1% of patients engaged in high levels of clinical portal use (31 or more login days in 2 mo) that were associated with 1 or more additional visits in the subsequent 2 months (months 3 and 4). However, the reverse was true: office visits led to subsequent clinical portal use. Similar trends were observed among patients with or without access to visit notes. Patients turn to their portals following visits, but clinical portal use does not contribute to an increase in primary care visits.

  19. Accessing data transfer reliability for duty cycled mobile wireless sensor network

    International Nuclear Information System (INIS)

    Shaikh, F.K.

    2014-01-01

    Mobility in WSNs (Wireless Sensor Networks) introduces significant challenges which do not arise in static WSNs. Reliable data transport is an important aspect of attaining consistency and QoS (Quality of Service) in several applications of MWSNs (Mobile Wireless Sensor Networks). It is important to understand how each of the wireless sensor networking characteristics such as duty cycling, collisions, contention and mobility affects the reliability of data transfer. If reliability is not managed well, the MWSN can suffer from overheads which reduce its applicability in the real world. In this paper, reliability assessment is being studied by deploying MWSN in different indoor and outdoor scenarios with various duty cycles of the motes and speeds of the mobile mote. Results show that the reliability is greatly affected by the duty cycled motes and the mobility using inherent broadcast mechanisms. (author)

  20. Channel capacity of TDD-OFDM-MIMO for multiple access points in a wireless single-frequency-network

    DEFF Research Database (Denmark)

    Takatori, Y.; Fitzek, Frank; Tsunekawa, K.

    2005-01-01

    MIMO data transmission scheme, which combines Single-Frequency-Network (SFN) with TDD-OFDM-MIMO applied for wireless LAN networks. In our proposal, we advocate to use SFN for multiple access points (MAP) MIMO data transmission. The goal of this approach is to achieve very high channel capacity in both...... LOS and non line of sight (NLOS) environments. The channel capacity of the proposed method is derived for the direct path environments and it confirms the effectiveness of the proposed scheme in the LOS scenario. Moreover, solid computer simulation results confirm the effectiveness of the proposed...

  1. Advertisement-Based Energy Efficient Medium Access Protocols for Wireless Sensor Networks

    Science.gov (United States)

    Ray, Surjya Sarathi

    One of the main challenges that prevents the large-scale deployment of Wireless Sensor Networks (WSNs) is providing the applications with the required quality of service (QoS) given the sensor nodes' limited energy supplies. WSNs are an important tool in supporting applications ranging from environmental and industrial monitoring, to battlefield surveillance and traffic control, among others. Most of these applications require sensors to function for long periods of time without human intervention and without battery replacement. Therefore, energy conservation is one of the main goals for protocols for WSNs. Energy conservation can be performed in different layers of the protocol stack. In particular, as the medium access control (MAC) layer can access and control the radio directly, large energy savings is possible through intelligent MAC protocol design. To maximize the network lifetime, MAC protocols for WSNs aim to minimize idle listening of the sensor nodes, packet collisions, and overhearing. Several approaches such as duty cycling and low power listening have been proposed at the MAC layer to achieve energy efficiency. In this thesis, I explore the possibility of further energy savings through the advertisement of data packets in the MAC layer. In the first part of my research, I propose Advertisement-MAC or ADV-MAC, a new MAC protocol for WSNs that utilizes the concept of advertising for data contention. This technique lets nodes listen dynamically to any desired transmission and sleep during transmissions not of interest. This minimizes the energy lost in idle listening and overhearing while maintaining an adaptive duty cycle to handle variable loads. Additionally, ADV-MAC enables energy efficient MAC-level multicasting. An analytical model for the packet delivery ratio and the energy consumption of the protocol is also proposed. The analytical model is verified with simulations and is used to choose an optimal value of the advertisement period

  2. Editing Wikipedia content by screen reader: easier interaction with the Accessible Rich Internet Applications suite.

    Science.gov (United States)

    Buzzi, Marina; Leporini, Barbara

    2009-07-01

    This study aims to improve Wikipedia usability for the blind and promote the application of standards relating to Web accessibility and usability. First, accessibility and usability of Wikipedia home, search result and edit pages are analysed using the JAWS screen reader; next, suggestions for improving interaction are proposed and a new Wikipedia editing interface built. Most of the improvements were obtained using the Accessible Rich Internet Applications (WAI-ARIA) suite, developed by the World Wide Web Consortium (W3C) within the framework of the Web Accessibility Initiative (WAI). Last, a scenario of use compares interaction of blind people with the original and the modified interfaces. Our study highlights that although all contents are accessible via screen reader, usability issues exist due to the user's difficulties when interacting with the interface. The scenario of use shows how building an editing interface with the W3C WAI-ARIA suite eliminates many obstacles that can prevent blind users from actively contributing to Wikipedia. The modified Wikipedia editing page is simpler to use via a screen reader than the original one because ARIA ensures a page overview, rapid navigation, and total control of what is happening in the interface.

  3. TCP with header checksum option for wireless links: An analytical ...

    Indian Academy of Sciences (India)

    TCP was designed for wired networks, where packet losses are mainly due to congestion. In today's world, more and more people use their mobile devices to access the Internet either for work or entertainment, where TCP runs over wireless links and is subjected to more corruption losses as compared to congestion losses.

  4. A tutorial survey of topics in wireless networking: Part I

    Indian Academy of Sciences (India)

    smith 2005), which will be entirely based on CDMA technology, and will carry multimedia traffic (i.e. store and forward data, packetised telephony, interactive video, and streaming video). Cellular networks were developed with the primary objective of providing wireless access for mobile users. With the growth of the Internet ...

  5. Consumer access to health information on the internet: health policy implications.

    Science.gov (United States)

    Scott, W Guy; Scott, Helen M; Auld, Terry S

    2005-06-28

    Providers of health care usually have much better information about health and health care interventions than do consumers. The internet is an important and rapidly evolving source of global health-related information and could provide a means of correcting for asymmetric information. However, little is known about who accesses this information and how it is used in New Zealand. The aims of this research were to: determine the nature of the health information sought, how respondents use the information, how helpful they perceive the information to be, and the self-assessed value of such information. The researchers conducted an anonymous five minute telephone and mall intercept survey of randomly selected Wellington residents who had searched for health-related information on the internet. Investigators entered the data into an Excel spreadsheet and transferred it to SPSS for data cleaning, data exploration and statistical analysis. Search time costs were based on the opportunity cost of income foregone and respondents were asked to provide a money value for the information found. Eighty-three percent of respondents accessed the internet from home, and 87% conducted the search for themselves. Forty-five percent of people were looking for general health and nutrition information, 42% for data about a specific illness and 40% for a medicine. After finding the information, 58% discussed it with a family member/friend/workmate, 36% consulted a general practitioner, 33% changed their eating or drinking habits, and 13% did nothing. Respondents found the information very quick to find and useful. It took them on average 0.47 hours and cost $12 (opportunity cost of time) to find the information. The average value of the data found was $60 and the net benefit to the consumer was $48 ($60 - $12). The results of this research could assist providers of health information via the internet to tailor their websites to better suit users' needs. Given the high perceived value of

  6. Associations among Different Internet Access Time, Gender and Cyberbullying Behaviors in Taiwan’s Adolescents

    Science.gov (United States)

    Chao, Cheng-Min; Yu, Tai-Kuei

    2017-01-01

    With the increasing convenience of social networking sites and their interconnectedness with human interaction, verbal and image bullying have turned digital, making cyberbullying a new form of bullying attracting the attention of researchers, social workers, and schools. This study focuses on the status quo of attitude toward cyberbullying and cyberbullying behavior, explores associations of attitude toward behavior on cyberbullying behavior in gender and different internet access times. In a cross-sectional survey, adolescents were surveyed through self-report questionnaires, 13,864 respondents were received among 150 high schools in Taiwan. Statistical analyses were performed using structural equation modeling (SEM). The study revealed that attitude toward cyberbullying has a direct effect on cyberbullying behavior; among the greatest direct impact were when students use the Internet during the time frame 10:00–14:00. Parents and schoolteachers pay special attention to students using the Internet during this time frame 10:00–14:00 and give guidance, express care, and help those being bullied to communicate and use the Internet in a correct manner. Among genders, male student attitude toward behavior has a greater effect than those of female students. Both male and female students know what cyberbullying is and have witnessed, heard of, or personally encountered cyberbullying behavior. We recommend students talk to parents or teachers or other people who care to reduce the negative effects of cyberbullying. We hopeful that the conceptualization model presented in this study serves as an activator for researches on attitude toward cyberbullying and cyberbullying behavior, and serves a guide and a call to attract more researches in this area. PMID:28713309

  7. Associations among Different Internet Access Time, Gender and Cyberbullying Behaviors in Taiwan's Adolescents.

    Science.gov (United States)

    Chao, Cheng-Min; Yu, Tai-Kuei

    2017-01-01

    With the increasing convenience of social networking sites and their interconnectedness with human interaction, verbal and image bullying have turned digital, making cyberbullying a new form of bullying attracting the attention of researchers, social workers, and schools. This study focuses on the status quo of attitude toward cyberbullying and cyberbullying behavior, explores associations of attitude toward behavior on cyberbullying behavior in gender and different internet access times. In a cross-sectional survey, adolescents were surveyed through self-report questionnaires, 13,864 respondents were received among 150 high schools in Taiwan. Statistical analyses were performed using structural equation modeling (SEM). The study revealed that attitude toward cyberbullying has a direct effect on cyberbullying behavior; among the greatest direct impact were when students use the Internet during the time frame 10:00-14:00. Parents and schoolteachers pay special attention to students using the Internet during this time frame 10:00-14:00 and give guidance, express care, and help those being bullied to communicate and use the Internet in a correct manner. Among genders, male student attitude toward behavior has a greater effect than those of female students. Both male and female students know what cyberbullying is and have witnessed, heard of, or personally encountered cyberbullying behavior. We recommend students talk to parents or teachers or other people who care to reduce the negative effects of cyberbullying. We hopeful that the conceptualization model presented in this study serves as an activator for researches on attitude toward cyberbullying and cyberbullying behavior, and serves a guide and a call to attract more researches in this area.

  8. Associations among Different Internet Access Time, Gender and Cyberbullying Behaviors in Taiwan’s Adolescents

    Directory of Open Access Journals (Sweden)

    Cheng-Min Chao

    2017-06-01

    Full Text Available With the increasing convenience of social networking sites and their interconnectedness with human interaction, verbal and image bullying have turned digital, making cyberbullying a new form of bullying attracting the attention of researchers, social workers, and schools. This study focuses on the status quo of attitude toward cyberbullying and cyberbullying behavior, explores associations of attitude toward behavior on cyberbullying behavior in gender and different internet access times. In a cross-sectional survey, adolescents were surveyed through self-report questionnaires, 13,864 respondents were received among 150 high schools in Taiwan. Statistical analyses were performed using structural equation modeling (SEM. The study revealed that attitude toward cyberbullying has a direct effect on cyberbullying behavior; among the greatest direct impact were when students use the Internet during the time frame 10:00–14:00. Parents and schoolteachers pay special attention to students using the Internet during this time frame 10:00–14:00 and give guidance, express care, and help those being bullied to communicate and use the Internet in a correct manner. Among genders, male student attitude toward behavior has a greater effect than those of female students. Both male and female students know what cyberbullying is and have witnessed, heard of, or personally encountered cyberbullying behavior. We recommend students talk to parents or teachers or other people who care to reduce the negative effects of cyberbullying. We hopeful that the conceptualization model presented in this study serves as an activator for researches on attitude toward cyberbullying and cyberbullying behavior, and serves a guide and a call to attract more researches in this area.

  9. Sensors on speaking terms: Schedule-based medium access control protocols for wireless sensor networks

    NARCIS (Netherlands)

    van Hoesel, L.F.W.

    2007-01-01

    Wireless sensor networks make the previously unobservable, observable. The basic idea behind these networks is straightforward: all wires are cut in traditional sensing systems and the sensors are equipped with batteries and radio's to virtually restore the cut wires. The resulting sensors can be

  10. ANALISIS MASALAH KEAMANAN JARINGAN WIRELESS KOMPUTER MENGGUNAKAN CAIN

    Directory of Open Access Journals (Sweden)

    Edy Victor Haryanto

    2014-02-01

    Full Text Available Akhir-akhir ini penggunaan jaringan wireless dalam pembangunnan akses internet pada suatu instansi atau perusahaan sangat pesat. Hal ini karena sistem jaringan wireless lebih efisien dalam pembangunaanya dan juga kefleksibilitasnya karena tanpa penggunaan kabel yang merepotkan. Tetapi jaringan wireless memiliki masalah pada keamanan yaitu pada konfigurasi dan enkripsi yang digunakan. Untuk membantu dalam mencoba tingkat keamanan suatu access point wireless dalam upaya untuk memecahkan permasalahan jaringan, maka dapat digunakan tools yang berfungsi mensniffing paket-paket yang ada pada jaringan yang bernama Cain. Cain dapat menganalalisis protocol di dalam jaringan, selain itu Cain dapat diterapkan pada berbagai interface seperti LAN dan Wireless LAN. Dalam hal menganalisis jaringan Cain memiliki banyak fitur yang sangat baik dan handal dalam penggunaanya.

  11. Accessing suicide-related information on the internet: a retrospective observational study of search behavior.

    Science.gov (United States)

    Wong, Paul Wai-Ching; Fu, King-Wa; Yau, Rickey Sai-Pong; Ma, Helen Hei-Man; Law, Yik-Wa; Chang, Shu-Sen; Yip, Paul Siu-Fai

    2013-01-11

    The Internet's potential impact on suicide is of major public health interest as easy online access to pro-suicide information or specific suicide methods may increase suicide risk among vulnerable Internet users. Little is known, however, about users' actual searching and browsing behaviors of online suicide-related information. To investigate what webpages people actually clicked on after searching with suicide-related queries on a search engine and to examine what queries people used to get access to pro-suicide websites. A retrospective observational study was done. We used a web search dataset released by America Online (AOL). The dataset was randomly sampled from all AOL subscribers' web queries between March and May 2006 and generated by 657,000 service subscribers. We found 5526 search queries (0.026%, 5526/21,000,000) that included the keyword "suicide". The 5526 search queries included 1586 different search terms and were generated by 1625 unique subscribers (0.25%, 1625/657,000). Of these queries, 61.38% (3392/5526) were followed by users clicking on a search result. Of these 3392 queries, 1344 (39.62%) webpages were clicked on by 930 unique users but only 1314 of those webpages were accessible during the study period. Each clicked-through webpage was classified into 11 categories. The categories of the most visited webpages were: entertainment (30.13%; 396/1314), scientific information (18.31%; 240/1314), and community resources (14.53%; 191/1314). Among the 1314 accessed webpages, we could identify only two pro-suicide websites. We found that the search terms used to access these sites included "commiting suicide with a gas oven", "hairless goat", "pictures of murder by strangulation", and "photo of a severe burn". A limitation of our study is that the database may be dated and confined to mainly English webpages. Searching or browsing suicide-related or pro-suicide webpages was uncommon, although a small group of users did access websites that contain

  12. Computer and Internet Interventions to Optimize Listening and Learning for People With Hearing Loss: Accessibility, Use, and Adherence.

    Science.gov (United States)

    Ferguson, Melanie; Henshaw, Helen

    2015-09-01

    The aim of this research forum article was to examine accessibility, use, and adherence to computerized and online interventions for people with hearing loss. Four intervention studies of people with hearing loss were examined: 2 auditory training studies, 1 working memory training study, and 1 study of multimedia educational support. A small proportion (approximately 15%) of participants had never used a computer, which may be a barrier to the accessibility of computer and Internet-based interventions. Computer competence was not a factor in intervention use or adherence. Computer skills and Internet access influenced participant preference for the delivery method of the multimedia educational support program. It is important to be aware of current barriers to computer and Internet-delivered interventions for people with hearing loss. However, there is a clear need to develop and future-proof hearing-related applications for online delivery.

  13. Advanced routing protocols for wireless networks

    CERN Document Server

    Campista , Miguel Elias Mitre

    2014-01-01

    This text introduces the principles of routing protocols and metrics as they affect wireless networking environments, specifically in urban areas. Timely because of the recent rise in small city life, this topic includes the consideration of ad hoc, mesh, vehicular, sensor, and delay tolerant networks. These approaches are each unique, and author Miguel Mitre Campista provides a thorough, but accessible, explanation of their individual characteristics for engineers, computer scientists, IT professionals, and curious Internet users.

  14. Energy efficient medium access protocol for wireless medical body area sensor networks.

    Science.gov (United States)

    Omeni, O; Wong, A; Burdett, A J; Toumazou, C

    2008-12-01

    This paper presents a novel energy-efficient MAC Protocol designed specifically for wireless body area sensor networks (WBASN) focused towards pervasive healthcare applications. Wireless body area networks consist of wireless sensor nodes attached to the human body to monitor vital signs such as body temperature, activity or heart-rate. The network adopts a master-slave architecture, where the body-worn slave node periodically sends sensor readings to a central master node. Unlike traditional peer-to-peer wireless sensor networks, the nodes in this biomedical WBASN are not deployed in an ad hoc fashion. Joining a network is centrally managed and all communications are single-hop. To reduce energy consumption, all the sensor nodes are in standby or sleep mode until the centrally assigned time slot. Once a node has joined a network, there is no possibility of collision within a cluster as all communication is initiated by the central node and is addressed uniquely to a slave node. To avoid collisions with nearby transmitters, a clear channel assessment algorithm based on standard listen-before-transmit (LBT) is used. To handle time slot overlaps, the novel concept of a wakeup fallback time is introduced. Using single-hop communication and centrally controlled sleep/wakeup times leads to significant energy reductions for this application compared to more ldquoflexiblerdquo network MAC protocols such as 802.11 or Zigbee. As duty cycle is reduced, the overall power consumption approaches the standby power. The protocol is implemented in hardware as part of the Sensiumtrade system-on-chip WBASN ASIC, in a 0.13- mum CMOS process.

  15. On Radio over Fiber for Heterogeneous Wireless Networks

    DEFF Research Database (Denmark)

    Riaz, M. Tahir; Nielsen, Rasmus Hjorth; Pedersen, Jens Myrup

    2009-01-01

    The paper provides an overview of the radio over fiber (RoF) technology and its potential use in heterogeneous wireless networks. Wireless communications have seen a huge growth in the last decade. It has been estimated that five in every six people in the entire world will have a mobile phone...... in 2010. The vast growing use of Internet on the mobile devices has also been increased significantly. In order to provide a broadband access for mobile communications, a new wireless infrastructure (fiber optic networks for distributed, extendible heterogeneous radio architectures and service...... provisioning - FUTON) based on RoF technology has been introduced. The project adopts centralized processing of radio signals for number of wireless base stations can enhance the network performance in terms of bandwidth, and QoS parameters. The simplified remote access units (RAU) are expected to not only...

  16. Web based dosimetry system for reading and monitoring dose through internet access

    International Nuclear Information System (INIS)

    Perle, S.C.; Bennett, K.; Kahilainen, J.; Vuotila, M.

    2010-01-01

    The Instadose TM dosemeter from Mirion Technologies is a small, rugged device based on patented direct ion storage technology and is accredited by the National Voluntary Laboratory Accreditation Program (NVLAP) through NIST, bringing radiation monitoring into the digital age. Smaller than a flash drive, this dosemeter provides an instant read-out when connected to any computer with internet access and a USB connection. Instadose devices provide radiation workers with more flexibility than today's dosemeters. Non Volatile Analog Memory Cell surrounded by a Gas Filled Ion Chamber. Dose changes the amount of Electric Charge in the DIS Analog Memory. The total charge storage capacity of the memory determines the available dose range. The state of the Analog Memory is determined by measuring the voltage across the memory cell. AMP (Account Management Program) provides secure real time access to account details, device assignments, reports and all pertinent account information. Access can be restricted based on the role assignment assigned to an individual. A variety of reports are available for download and customizing. The Advantages of the Instadose dosemeter are: - Unlimited reading capability, - Concerns about a possible exposure can be addressed immediately, - Re-readability without loss of exposure data, with cumulative exposure maintained. (authors)

  17. The Association Between Having Access To Computers And Internet And Educational Achievement For Primary Students In Brazil

    OpenAIRE

    Wainer; Jacques; Vieira; Paula; Melguizo; Tatiana

    2016-01-01

    This study tests the association between having home access to a computer and to the Internet and the educational achievement of primary students on a standardized test in Brazil for the years 2007-2011. The results show a significant (both practical and statistical) benefit of owning a computer for 5th and 9th graders. The effect sizes range from 0.2 to 0.4 and are similar across different socioeconomic status. On the other hand, the correlation between having access to the Internet with hig...

  18. Collaborative Virtual 3D Environment for Internet-Accessible Physics Experiments

    Directory of Open Access Journals (Sweden)

    Bettina Scheucher

    2009-08-01

    Full Text Available Abstract—Immersive 3D worlds have increasingly raised the interest of researchers and practitioners for various learning and training settings over the last decade. These virtual worlds can provide multiple communication channels between users and improve presence and awareness in the learning process. Consequently virtual 3D environments facilitate collaborative learning and training scenarios. In this paper we focus on the integration of internet-accessible physics experiments (iLabs combined with the TEALsim 3D simulation toolkit in Project Wonderland, Sun's toolkit for creating collaborative 3D virtual worlds. Within such a collaborative environment these tools provide the opportunity for teachers and students to work together as avatars as they control actual equipment, visualize physical phenomenon generated by the experiment, and discuss the results. In particular we will outline the steps of integration, future goals, as well as the value of a collaboration space in Wonderland's virtual world.

  19. Menores y acceso a Internet en el hogar: las normas familiares Internet Access by Minors at Home: Usage Norms Imposed by Parents

    Directory of Open Access Journals (Sweden)

    Mercè Morey López

    2010-03-01

    Full Text Available Este artículo analiza el establecimiento de normas por parte de los progenitores a sus hijos sobre la utilización de Internet en los hogares. Los datos se han obtenido mediante encuestación sobre una muestra representativa de los menores de las Islas Baleares de entre 6 y 16 años, habiéndose analizado las siguientes dimensiones: acceso de los menores a Internet desde el hogar; grado de autonomía o acompañamiento en la navegación; normativización impuesta en el hogar por parte de sus padres y madres; tipos de normas impuestas; relación entre normas y género; valoración de los menores de los conocimientos y habilidades de sus progenitores para navegar por Internet y, finalmente, el acompañamiento de los padres y madres a la hora de navegar por Internet. Se constata que poco más del 53% de los menores de entre 6 y 14 años, y del 62% de los de 15 y 16 años navegan a través de Internet sin que sus progenitores les establezcan limitaciones. Cuando establecen algún tipo de normas, éstas se refieren, principalmente, a restricciones de carácter temporal. Por tanto, se infiere que los padres y madres no son conscientes de los peligros de la Red o que, al menos, actúan de forma poco razonable. Ello muestra la necesidad de sensibilizar y formar a las familias para que asuman su responsabilidad educativa.This paper examines and discusses the rules and standards set by parents for their children on Internet usage at home. Data that supports the paper have been obtained by surveying a representative sample of children in the Balearic Islands aged between 6 and 16 years; the analysis dimensions are: access by minors to the Internet from home; location of the computer from which have online access; level of autonomy or accompaniment while surfing the Net; norms imposed by their parents; types of rules imposed; relationship between norms and gender; the minors’ opinion and assessment of the knowledge and abilities of their parents on use of

  20. The level of Internet access and ICT training for health information professionals in sub-Saharan Africa.

    Science.gov (United States)

    Ajuwon, Grace Ada; Rhine, Lenny

    2008-09-01

    Information and Communication Technologies (ICTs) are important tools for development. Despite its significant growth on a global scale, Internet access is limited in sub-Saharan Africa (SSA). Few studies have explored Internet access, use of electronic resources and ICT training among health information professionals in Africa. The study assessed Internet access, use of electronic resources and ICT training among health information professionals in SSA. A 26-item self-administered questionnaire in English and French was used for data collection. The questionnaire was completed by health information professionals from five Listservs and delegates at the 10th biannual Congress of the Association of Health Information and Libraries in Africa (AHILA). A total of 121 respondents participated in the study and, of those, 68% lived in their countries' capital. The majority (85.1%) had Internet access at work and 40.8% used cybercafes as alternative access points. Slightly less than two-thirds (61.2%) first learned to use ICT through self-teaching, whilst 70.2% had not received any formal training in the previous year. Eighty-eight per cent of respondents required further ICT training. In SSA, freely available digital information resources are underutilized by health information professionals. ICT training is recommended to optimize use of digital resources. To harness these resources, intergovernmental and non-governmental organizations must play a key role.

  1. Biobjective Optimization of Radio Access Technology Selection and Resource Allocation in Heterogeneous Wireless Networks

    DEFF Research Database (Denmark)

    Zakrzewska, Anna; D’Andreagiovanni, Fabio; Ruepp, Sarah Renée

    2013-01-01

    We propose a novel optimization model for resource assignment in heterogeneous wireless network. The model adopts two objective functions maximizing the number of served users and the minimum granted utility at once. A distinctive feature of our new model is to consider two consecutive time slots......, in order to include handover as an additional decision dimension. Furthermore, the solution algorithm that we propose refines a heuristic solution approach recently proposed in literature, by considering a real joint optimization of the considered resources. The simulation study shows that the new model...

  2. www.mydrugdealer.com: Ethics and legal implications of Internet-based access to substances of abuse.

    Science.gov (United States)

    Klein, Carolina A; Kandel, Surendra

    2011-01-01

    The Internet has increasingly become an intrinsic part of everyday life, offering countless possibilities for education, services, recreation, and more. In fact, an entire virtual life within the digitalized World Wide Web is possible and common among many Internet users. Today's psychiatrists must therefore incorporate this dimension of human life into clinical practice, to achieve an adequate assessment of the tools and risks available to the patient. We focus on the Internet as a portal for the trade of and access to substances of abuse. We review the legal regulations that may inform care and standards of practice and analyze the difficulties that arise in assessment and monitoring of the current situation. We consider the potential impact of Internet-based narcotics trade on addiction morbidities and the practice of clinical psychiatry, as well as on the potential legal implications that the forensic expert may face.

  3. The Digital Divide and Patient Portals: Internet Access Explained Differences in Patient Portal Use for Secure Messaging by Age, Race, and Income.

    Science.gov (United States)

    Graetz, Ilana; Gordon, Nancy; Fung, Vick; Hamity, Courtnee; Reed, Mary E

    2016-08-01

    Online access to health records and the ability to exchange secure messages with physicians can improve patient engagement and outcomes; however, the digital divide could limit access to web-based portals among disadvantaged groups. To understand whether sociodemographic differences in patient portal use for secure messaging can be explained by differences in internet access and care preferences. Cross-sectional survey to examine the association between patient sociodemographic characteristics and internet access and care preferences; then, the association between sociodemographic characteristics and secure message use with and without adjusting for internet access and care preference. One thousand forty-one patients with chronic conditions in a large integrated health care delivery system (76% response rate). Internet access, portal use for secure messaging, preference for in-person or online care, and sociodemographic and health characteristics. Internet access and preference mediated some of the differences in secure message use by age, race, and income. For example, using own computer to access the internet explained 52% of the association between race and secure message use and 60% of the association between income and use (Sobel-Goodman mediation test, Pinternet access and preference. As the availability and use of patient portals increase, it is important to understand which patients have limited access and the barriers they may face. Improving internet access and making portals available across multiple platforms, including mobile, may reduce some disparities in secure message use.

  4. Dynamic Spectrum Access for Internet of Things Service in Cognitive Radio-Enabled LPWANs.

    Science.gov (United States)

    Moon, Bongkyo

    2017-12-05

    In this paper, we focus on a dynamic spectrum access strategy for Internet of Things (IoT) applications in two types of radio systems: cellular networks and cognitive radio-enabled low power wide area networks (CR-LPWANs). The spectrum channel contention between the licensed cellular networks and the unlicensed CR-LPWANs, which work with them, only takes place within the cellular radio spectrum range. Our aim is to maximize the spectrum capacity for the unlicensed users while ensuring that it never interferes with the licensed network. Therefore, in this paper we propose a dynamic spectrum access strategy for CR-LPWANs operating in both licensed and unlicensed bands. The simulation and the numerical analysis by using a matrix geometric approach for the strategy are presented. Finally, we obtain the blocking probability of the licensed users, the mean dwell time of the unlicensed user, and the total carried traffic and combined service quality for the licensed and unlicensed users. The results show that the proposed strategy can maximize the spectrum capacity for the unlicensed users using IoT applications as well as keep the service quality of the licensed users independent of them.

  5. Dynamic Spectrum Access for Internet of Things Service in Cognitive Radio-Enabled LPWANs

    Directory of Open Access Journals (Sweden)

    Bongkyo Moon

    2017-12-01

    Full Text Available In this paper, we focus on a dynamic spectrum access strategy for Internet of Things (IoT applications in two types of radio systems: cellular networks and cognitive radio-enabled low power wide area networks (CR-LPWANs. The spectrum channel contention between the licensed cellular networks and the unlicensed CR-LPWANs, which work with them, only takes place within the cellular radio spectrum range. Our aim is to maximize the spectrum capacity for the unlicensed users while ensuring that it never interferes with the licensed network. Therefore, in this paper we propose a dynamic spectrum access strategy for CR-LPWANs operating in both licensed and unlicensed bands. The simulation and the numerical analysis by using a matrix geometric approach for the strategy are presented. Finally, we obtain the blocking probability of the licensed users, the mean dwell time of the unlicensed user, and the total carried traffic and combined service quality for the licensed and unlicensed users. The results show that the proposed strategy can maximize the spectrum capacity for the unlicensed users using IoT applications as well as keep the service quality of the licensed users independent of them.

  6. Accessing Suicide-Related Information on the Internet: A Retrospective Observational Study of Search Behavior

    Science.gov (United States)

    2013-01-01

    Background The Internet’s potential impact on suicide is of major public health interest as easy online access to pro-suicide information or specific suicide methods may increase suicide risk among vulnerable Internet users. Little is known, however, about users’ actual searching and browsing behaviors of online suicide-related information. Objective To investigate what webpages people actually clicked on after searching with suicide-related queries on a search engine and to examine what queries people used to get access to pro-suicide websites. Methods A retrospective observational study was done. We used a web search dataset released by America Online (AOL). The dataset was randomly sampled from all AOL subscribers’ web queries between March and May 2006 and generated by 657,000 service subscribers. Results We found 5526 search queries (0.026%, 5526/21,000,000) that included the keyword "suicide". The 5526 search queries included 1586 different search terms and were generated by 1625 unique subscribers (0.25%, 1625/657,000). Of these queries, 61.38% (3392/5526) were followed by users clicking on a search result. Of these 3392 queries, 1344 (39.62%) webpages were clicked on by 930 unique users but only 1314 of those webpages were accessible during the study period. Each clicked-through webpage was classified into 11 categories. The categories of the most visited webpages were: entertainment (30.13%; 396/1314), scientific information (18.31%; 240/1314), and community resources (14.53%; 191/1314). Among the 1314 accessed webpages, we could identify only two pro-suicide websites. We found that the search terms used to access these sites included “commiting suicide with a gas oven”, “hairless goat”, “pictures of murder by strangulation”, and “photo of a severe burn”. A limitation of our study is that the database may be dated and confined to mainly English webpages. Conclusions Searching or browsing suicide-related or pro-suicide webpages was

  7. Use of internet for accessing healthcare information among patients in an outpatient department of a Tertiary Care Center

    Directory of Open Access Journals (Sweden)

    Lakshmi Renganathan

    2017-01-01

    Full Text Available Background: Health information is one of the most accessed topics online. Worldwide, about 4.5% of all Internet searches are for health-related informationand more than 70, 000 websites disseminate health information. However, critics question the quality and credibility of online health information as contents are mostly a result of limited research or are commercialised. There is a need to train people to locate relevant websites where they can efficiently retrieve evidence based information and evaluate the same. The study was conducted with the objectives of determining the prevalence of use of internet for accessing healthcare information amongst literate adult population in an urban area and to assess the association between the demography and the reasons of internet use. Methodology: We used an anonymous, cross sectional survey completed by a sample of out patients of 408 individuals who came to a tertiary care centre at Pune during the year 2015. The survey consisted of 17 questions related to behavioural, attitudinal and demographic items. Results: Out of the total of 408 individuals, 256 (63.2% individuals used internet for health information though 332 (82.4% of them were aware of authorised websites for health information and 69 (16.9% thought information available in the internet can be harmful. Also, 63 out of 256 (24.6% agreed to the fact that they ask questions to their doctors based on the information that they acquired from internet while surfing about that particular disease/ ailment. More individuals (p<0.05 who were working and who were educated, graduates and above, were using internet for health information. Conclusion: Our results suggest the great potential for using the internet to disseminate the information and awareness to the public about health and healthcare facilities. However, it is important to disseminate credible information from reliable and authorised websites assigned for health since online healthcare

  8. Converged Wireless and Wireline Access System Based on Optical Phase Modulation for Both Radio-Over-Fiber and Baseband Signals

    DEFF Research Database (Denmark)

    Yu, Xianbin; Jensen, Jesper Bevensee; Zibar, Darko

    2008-01-01

    -to-zero differential quaternary phase-shift keyed signal and a 5.25-GHz RoF carrying 1.25 Gb/s, enables the use of identical optical receiver structures. The experimental results show that both receivers achieve error-free operation after 80-km standard single-mode fiber transmission. The proposed scheme has potential......We propose and experimentally investigate a scheme for transmitting a phase-modulated radio-over-fiber (RoF) signal along an existing fiber infrastructure without degradation of the existing baseband signal. Optical phase encoding of both signals, namely a baseband 21.4-Gb/s nonreturn...... applications for converged wireless and wireline optical access networks....

  9. Real-time Measurements of an Optical Reconfigurable Radio Access Unit for 5G Wireless Access Networks

    DEFF Research Database (Denmark)

    Rodríguez, Sebastián; Morales Vicente, Alvaro; Rommel, Simon

    2017-01-01

    A reconfigurable radio access unit able to switch wavelength, RF carrier frequency and optical path is experimentally demonstrated. The system is able to do the switching processes correctly, while achieving BER values below FEC limit.......A reconfigurable radio access unit able to switch wavelength, RF carrier frequency and optical path is experimentally demonstrated. The system is able to do the switching processes correctly, while achieving BER values below FEC limit....

  10. M2M massive wireless access: Challenges, research issues, and ways forward

    NARCIS (Netherlands)

    Zanella, A.; Zorzi, M.; Dos Santos, A.F.; Popovski, P.; Pratas, N.; Stefanovic, C.; Dekorsy, A.; Bockelmann, C.; Busropan, B.; Norp, A.H.J.

    2013-01-01

    In order to make the Internet of Things a reality, ubiquitous coverage and low-complexity connectivity are required. Cellular networks are hence the most straightforward and realistic solution to enable a massive deployment of always connected Machines around the globe. Nevertheless, a paradigm

  11. The Potential of Using a Mobile Phone to Access the Internet for Learning EFL Listening Skills within a Korean Context

    Science.gov (United States)

    Nah, Ki Chune; White, Peter; Sussex, Roland

    2008-01-01

    Interest in the use of a mobile phone to access the Internet for learning English in general, and listening skills in particular, has been increasing in Korea over the last few years. However, there has been only a small number of studies on this topic in Korea. The present paper investigates the potential of using a mobile phone to browse…

  12. Filtering Access to Internet Content at Higher Education Institutions: Stakeholder Perceptions and Their Impact on Research and Academic Freedom

    Science.gov (United States)

    Orenstein, David I.

    2009-01-01

    Hardware and software filters, which sift through keywords placed in Internet search engines and online databases, work to limit the return of information from these sources. By their very purpose, filters exist to decrease the amount of information researchers can access. The purpose of this study is to gain insight into the perceptions key…

  13. A client/server system for Internet access to biomedical text/image databanks.

    Science.gov (United States)

    Thoma, G R; Long, L R; Berman, L E

    1996-01-01

    Internet access to mixed text/image databanks is finding application in the medical world. An example is a database of medical X-rays and associated data consisting of demographic, socioeconomic, physician's exam, medical laboratory and other information collected as part of a nationwide health survey conducted by the government. Another example is a collection of digitized cryosection images, CT and MR taken of cadavers as part of the National Library of Medicine's Visible Human Project. In both cases, the challenge is to provide access to both the image and the associated text for a wide end user community to create atlases, conduct epidemiological studies, to develop image-specific algorithms for compression, enhancement and other types of image processing, among many other applications. The databanks mentioned above are being created in prototype form. This paper describes the prototype system developed for the archiving of the data and the client software to enable a broad range of end users to access the archive, retrieve text and image data, display the data and manipulate the images. System design considerations include; data organization in a relational database management system with object-oriented extensions; a hierarchical organization of the image data by different resolution levels for different user classes; client design based on common hardware and software platforms incorporating SQL search capability, X Window, Motif and TAE (a development environment supporting rapid prototyping and management of graphic-oriented user interfaces); potential to include ultra high resolution display monitors as a user option; intuitive user interface paradigm for building complex queries; and contrast enhancement, magnification and mensuration tools for better viewing by the user.

  14. Cross-layer design for radio resource allocation based on priority scheduling in OFDMA wireless access network

    Directory of Open Access Journals (Sweden)

    Chen Yen-Wen

    2011-01-01

    Full Text Available Abstract The orthogonal frequency-division multiple access (OFDMA system has the advantages of flexible subcarrier allocation and adaptive modulation with respect to channel conditions. However, transmission overhead is required in each frame to broadcast the arrangement of radio resources to all mobile stations within the coverage of the same base station. This overhead greatly affects the utilization of valuable radio resources. In this paper, a cross layer scheme is proposed to reduce the number of traffic bursts at the downlink of an OFDMA wireless access network so that the overhead of the media access protocol (MAP field can be minimized. The proposed scheme considers the priorities and the channel conditions of quality of service (QoS traffic streams to arrange for them to be sent with minimum bursts in a heuristic manner. In addition, the trade-off between the degradation of the modulation level and the reduction of traffic bursts is investigated. Simulation results show that the proposed scheme can effectively reduce the traffic bursts and, therefore, increase resource utilization.

  15. Multiple Access Techniques for Next Generation Wireless: Recent Advances and Future Perspectives

    Directory of Open Access Journals (Sweden)

    Shree Krishna Sharma

    2016-01-01

    Full Text Available The advances in multiple access techniques has been one of the key drivers in moving from one cellular generation to another. Starting from the first generation, several multiple access techniques have been explored in different generations and various emerging multiplexing/multiple access techniques are being investigated for the next generation of cellular networks. In this context, this paper first provides a detailed review on the existing Space Division Multiple Access (SDMA related works. Subsequently, it highlights the main features and the drawbacks of various existing and emerging multiplexing/multiple access techniques. Finally, we propose a novel concept of clustered orthogonal signature division multiple access for the next generation of cellular networks. The proposed concept envisions to employ joint antenna coding in order to enhance the orthogonality of SDMA beams with the objective of enhancing the spectral efficiency of future cellular networks.

  16. Internet Use and Access Among Pregnant Women via Computer and Mobile Phone: Implications for Delivery of Perinatal Care.

    Science.gov (United States)

    Peragallo Urrutia, Rachel; Berger, Alexander A; Ivins, Amber A; Beckham, A Jenna; Thorp, John M; Nicholson, Wanda K

    2015-03-30

    The use of Internet-based behavioral programs may be an efficient, flexible method to enhance prenatal care and improve pregnancy outcomes. There are few data about access to, and use of, the Internet via computers and mobile phones among pregnant women. We describe pregnant women's access to, and use of, computers, mobile phones, and computer technologies (eg, Internet, blogs, chat rooms) in a southern United States population. We describe the willingness of pregnant women to participate in Internet-supported weight-loss interventions delivered via computers or mobile phones. We conducted a cross-sectional survey among 100 pregnant women at a tertiary referral center ultrasound clinic in the southeast United States. Data were analyzed using Stata version 10 (StataCorp) and R (R Core Team 2013). Means and frequency procedures were used to describe demographic characteristics, access to computers and mobile phones, and use of specific Internet modalities. Chi-square testing was used to determine whether there were differences in technology access and Internet modality use according to age, race/ethnicity, income, or children in the home. The Fisher's exact test was used to describe preferences to participate in Internet-based postpartum weight-loss interventions via computer versus mobile phone. Logistic regression was used to determine demographic characteristics associated with these preferences. The study sample was 61.0% white, 26.0% black, 6.0% Hispanic, and 7.0% Asian with a mean age of 31.0 (SD 5.1). Most participants had access to a computer (89/100, 89.0%) or mobile phone (88/100, 88.0%) for at least 8 hours per week. Access remained high (>74%) across age groups, racial/ethnic groups, income levels, and number of children in the home. Internet/Web (94/100, 94.0%), email (90/100, 90.0%), and Facebook (50/100, 50.0%) were the most commonly used Internet technologies. Women aged less than 30 years were more likely to report use of Twitter and chat rooms

  17. The Blind Can 'Seeing' Tourist Destinations in the Internet? An Analysis of the Accessibility of Official Websites of Brazilian States

    Directory of Open Access Journals (Sweden)

    Francisco Vicente Sales Melo

    2013-08-01

    Full Text Available This paper analyzes the accessibility of official websites of Brazilian states with regard to seeking information about their destinations by blind people. We evaluated all tourism portals of each state through two software accessibility evaluators. Then, two blind people who are users of the Internet and has a habit of traveling for leisure accessed portals. After analysis, it was found that only the tourism website of the State of Paraná presented as accessible both in analysis of the software for the evaluation of the participants, indicating that almost all Brazilian portals are not accessible to these people. The study does not present practical solutions to improve the accessibility of Brazilian tourism portals, just from a descriptive analysis, but especially relevant, raise issues and provoke discussion about the topic in question.

  18. Impact of language anxiety and self-efficacy on accessing Internet sites.

    Science.gov (United States)

    Yang, Hui-Jen; Lay, Yun-Long; Tsao, Wen-Yu; Liou, Yi-Chin; Lin, Cheng-Kun

    2007-04-01

    Language interface plays a critical role as the foundation of communication. Possessing greater fluency in the host language can lead to increased opportunities for interaction with host members. This research is to examine the impact of language and Internet usage anxiety and self-efficacy on the intended uses of Internet sites, respectively. By the same token, whether Internet/language self-efficacy would mediate the effects of Internet/language anxiety on the intention of the Internet site use is also examined. A valid sample of 368 undergraduates was tested in this study. The path analysis results mostly supported the model tested. The results display that the anxiety of language and Internet use have significantly influenced self-efficacy of Internet use and language, respectively. Anxiety about language and Internet use have also significantly influenced the intention to use Internet sites individually. Furthermore, language self-efficacy has significantly influenced the intention to use Internet sites, but Internet self-efficacy has not. The implications are discussed at the end of the paper.

  19. A Reinforcement Learning Approach to Access Management in Wireless Cellular Networks

    Directory of Open Access Journals (Sweden)

    Jihun Moon

    2017-01-01

    Full Text Available In smart city applications, huge numbers of devices need to be connected in an autonomous manner. 3rd Generation Partnership Project (3GPP specifies that Machine Type Communication (MTC should be used to handle data transmission among a large number of devices. However, the data transmission rates are highly variable, and this brings about a congestion problem. To tackle this problem, the use of Access Class Barring (ACB is recommended to restrict the number of access attempts allowed in data transmission by utilizing strategic parameters. In this paper, we model the problem of determining the strategic parameters with a reinforcement learning algorithm. In our model, the system evolves to minimize both the collision rate and the access delay. The experimental results show that our scheme improves system performance in terms of the access success rate, the failure rate, the collision rate, and the access delay.

  20. The digital divide: Examining socio-demographic factors associated with health literacy, access and use of internet to seek health information.

    Science.gov (United States)

    Estacio, Emee Vida; Whittle, Rebecca; Protheroe, Joanne

    2017-02-01

    This article aims to examine the socio-demographic characteristics associated with access and use of Internet for health-related purposes and its relationship with health literacy. Data were drawn from a health literacy survey ( N = 1046) and analysed using logistic regression. Results show a strong association between health literacy, internet access and use. Socio-demographic characteristics particularly age, education, income, perceived health and social isolation also predict internet access. Thus, in addition to widening access, the movement towards digitisation of health information and services should also consider digital skills development to enable people to utilise digital technology more effectively, especially among traditionally hard-to-reach communities.

  1. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  2. A fragmentation model of earthquake-like behavior in internet access activity

    Science.gov (United States)

    Paguirigan, Antonino A.; Angco, Marc Jordan G.; Bantang, Johnrob Y.

    We present a fragmentation model that generates almost any inverse power-law size distribution, including dual-scaled versions, consistent with the underlying dynamics of systems with earthquake-like behavior. We apply the model to explain the dual-scaled power-law statistics observed in an Internet access dataset that covers more than 32 million requests. The non-Poissonian statistics of the requested data sizes m and the amount of time τ needed for complete processing are consistent with the Gutenberg-Richter-law. Inter-event times δt between subsequent requests are also shown to exhibit power-law distributions consistent with the generalized Omori law. Thus, the dataset is similar to the earthquake data except that two power-law regimes are observed. Using the proposed model, we are able to identify underlying dynamics responsible in generating the observed dual power-law distributions. The model is universal enough for its applicability to any physical and human dynamics that is limited by finite resources such as space, energy, time or opportunity.

  3. DESIGN OF CAUCUS MEDIUM ACCESS CONTROL (C-MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS IN SMART GRIDS

    Directory of Open Access Journals (Sweden)

    JEETU SHARMA

    2017-10-01

    Full Text Available A Caucus-based medium access control protocol (C-MAC is proposed to reduce the end to end delay and battery consumption of the sensor nodes deployed in the monitoring of various smart grid regions, such as substation, pole and wires, perimeter security, real time and non-real-time monitoring using wireless sensor networks. The objective is to prolong the network lifetime and to reduce the end to end delay by mitigating the energy-hole problem and by eliminating bottlenecks significantly by using caucus based efficient synchronization techniques in multi-hop square grid topology of the wireless sensor networks (WSNs. The protocol self-reliantly and adaptively schedules node’s wake-up times, decreases idle listening and collisions, increases network throughput, and extends network lifetime. It induces a low duty cycle for adjusting wake-up times of sensor nodes. The appropriate selection of active and sleep time slots and next hop relay nodes are proposed to minimize the data transmission latency and to reduce battery consumption to increase the network lifetime. The uniform and synchronized transmission of the data packets is of prime importance to improve the network performance. Simulation results justify that the proposed C-MAC protocol increases the network lifetime, successful data transmission ratio along-with the reduction in end to end delay. The objective of this paper is to envisage benefits and utilization of C-MAC protocol for WSNs deployed in smart grids and to draw the attention of researchers in this area.

  4. The 'grey digital divide': Perception, exclusion and barriers of access to the Internet for older people

    OpenAIRE

    Millward, Peter

    2003-01-01

    Focussing upon the elderly, this article utilises data discovered as researcher for Age Concern in Wigan (U.K.) and examines the feelings of older people toward the Internet. It explores the reasons why some clients and volunteers choose to use the Internet, whilst others do not, relating these perspectives to the organisations, alongside broader national (U.K.) and EU, commitments to reduce the digital divide. The article argues that for the elderly Internet usability is based upon more than...

  5. Optimal Plant Growth in Smart Farm Hydroponics System using the Integration of Wireless Sensor Networks into Internet of Things

    Directory of Open Access Journals (Sweden)

    Nathaphon Boonnam

    2017-07-01

    Full Text Available Greenhouse cultivation is easy to keep up and control important factors such as light, temperature, and humidity. Using of sensors and actuators in the greenhouse to capture different values allows for the control of the equipment, it can also be optimized for growth at optimal temperature and humidity of various crops planted. We use wireless sensor networks’ system by sending results to the cloud service, monitoring values, and devices’s controlling via smart phone. The results of this study are useful for growing crops not only in technical parts, but also in physical part; it was evaluated by questionnaire using technology acceptance model.

  6. Mobility management techniques for the next-generation wireless networks

    Science.gov (United States)

    Sun, Junzhao; Howie, Douglas P.; Sauvola, Jaakko J.

    2001-10-01

    The tremendous demands from social market are pushing the booming development of mobile communications faster than ever before, leading to plenty of new advanced techniques emerging. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Mobility management is an important issue in the area of mobile communications, which can be best solved at the network layer. One of the key features of the next generation wireless networks is all-IP infrastructure. This paper discusses the mobility management schemes for the next generation mobile networks through extending IP's functions with mobility support. A global hierarchical framework model for the mobility management of wireless networks is presented, in which the mobility management is divided into two complementary tasks: macro mobility and micro mobility. As the macro mobility solution, a basic principle of Mobile IP is introduced, together with the optimal schemes and the advances in IPv6. The disadvantages of the Mobile IP on solving the micro mobility problem are analyzed, on the basis of which three main proposals are discussed as the micro mobility solutions for mobile communications, including Hierarchical Mobile IP (HMIP), Cellular IP, and Handoff-Aware Wireless Access Internet Infrastructure (HAWAII). A unified model is also described in which the different micro mobility solutions can coexist simultaneously in mobile networks.

  7. Flexible and Lightweight Access Control for Online Healthcare Social Networks in the Context of the Internet of Things

    Directory of Open Access Journals (Sweden)

    Zhen Qin

    2017-01-01

    Full Text Available Online healthcare social networks (OHSNs play an essential role in sharing information among medical experts and patients who are equipped with similar experiences. To access other patients’ data or experts’ diagnosis anywhere and anytime, it is necessary to integrate the OHSN into the Internet as part of the Internet of Things (IoT. Therefore, it is crucial to design an efficient and versatile access control scheme that can grant and revoke a user to access the OHSN. In this paper, we propose novel attribute-based encryption (ABE features with user revocation and verifiable decryption outsourcing to control the access privilege of the users. The security of the proposed ABE scheme is given in the well-studied random oracle model. With the proposed ABE scheme, the malicious users can be excluded from the system and the user can offload most of the overhead in the decryption to an untrusted cloud server in a verifiable manner. An access control scheme for the OHSN has been given in the context of the IoT based on the proposed ABE scheme. The simulation demonstrates that our access control mechanism is practical.

  8. Channel access delay and buffer distribution of two-user opportunistic scheduling schemes in wireless networks

    KAUST Repository

    Hossain, Md Jahangir

    2010-07-01

    In our earlier works, we proposed rate adaptive hierarchical modulation-assisted two-best user opportunistic scheduling (TBS) and hybrid two-user scheduling (HTS) schemes. The proposed schemes are innovative in the sense that they include a second user in the transmission opportunistically using hierarchical modulations. As such the frequency of information access of the users increases without any degradation of the system spectral efficiency (SSE) compared to the classical opportunistic scheduling scheme. In this paper, we analyze channel access delay of an incoming packet at the base station (BS) buffer when our proposed TBS and HTS schemes are employed at the BS. Specifically, using a queuing analytic model we derive channel access delay as well as buffer distribution of the packets that wait at BS buffer for down-link (DL) transmission. We compare performance of the TBS and HTS schemes with that of the classical single user opportunistic schemes namely, absolute carrier-to-noise ratio (CNR)-based single user scheduling (ASS) and normalized CNR-based single user scheduling (NSS). For an independent and identically distributed (i.i.d.) fading environment, our proposed scheme can improve packet\\'s access delay performance compared to the ASS. Selected numerical results in an independent but non-identically distributed (i.n.d.) fading environment show that our proposed HTS achieves overall good channel access delay performance. © 2010 IEEE.

  9. A 15-meter Multi-Gigabit W-band Bidirectional Wireless Bridge in Fiber-Optic Access Networks

    DEFF Research Database (Denmark)

    Pang, Xiaodan; Vegas Olmos, Juan José; Lebedev, Alexander

    2013-01-01

    . The down-converted signal is re-modulated on to the lightwave and transmit further through the fiber-optic system. In the uplink, both up-and down-conversion are performed by electrical means. Furthermore, we investigate both passive and active wireless transmitters in this work for both downlink...... and uplink transmissions. With an active wireless transmitter, up to 15 meters wireless transmission is successfully achieved with a BER below the 7% FEC limit in the downlink....

  10. Design of pulse waveform for waveform division multiple access UWB wireless communication system.

    Science.gov (United States)

    Yin, Zhendong; Wang, Zhirui; Liu, Xiaohui; Wu, Zhilu

    2014-01-01

    A new multiple access scheme, Waveform Division Multiple Access (WDMA) based on the orthogonal wavelet function, is presented. After studying the correlation properties of different categories of single wavelet functions, the one with the best correlation property will be chosen as the foundation for combined waveform. In the communication system, each user is assigned to different combined orthogonal waveform. Demonstrated by simulation, combined waveform is more suitable than single wavelet function to be a communication medium in WDMA system. Due to the excellent orthogonality, the bit error rate (BER) of multiuser with combined waveforms is so close to that of single user in a synchronous system. That is to say, the multiple access interference (MAI) is almost eliminated. Furthermore, even in an asynchronous system without multiuser detection after matched filters, the result is still pretty ideal and satisfactory by using the third combination mode that will be mentioned in the study.

  11. Design of Pulse Waveform for Waveform Division Multiple Access UWB Wireless Communication System

    Directory of Open Access Journals (Sweden)

    Zhendong Yin

    2014-01-01

    Full Text Available A new multiple access scheme, Waveform Division Multiple Access (WDMA based on the orthogonal wavelet function, is presented. After studying the correlation properties of different categories of single wavelet functions, the one with the best correlation property will be chosen as the foundation for combined waveform. In the communication system, each user is assigned to different combined orthogonal waveform. Demonstrated by simulation, combined waveform is more suitable than single wavelet function to be a communication medium in WDMA system. Due to the excellent orthogonality, the bit error rate (BER of multiuser with combined waveforms is so close to that of single user in a synchronous system. That is to say, the multiple access interference (MAI is almost eliminated. Furthermore, even in an asynchronous system without multiuser detection after matched filters, the result is still pretty ideal and satisfactory by using the third combination mode that will be mentioned in the study.

  12. Access to the Internet among drinkers, smokers and illicit drug users: is it a barrier to the provision of interventions on the World Wide Web?

    Science.gov (United States)

    Cunningham, John A; Selby, Peter L; Kypri, Kypros; Humphreys, Keith N

    2006-03-01

    Expanding Internet-based interventions for substance use will have little benefit if heavy substance users are unlikely to have Internet access. This paper explored whether access to the Internet was a potential barrier to the provision of services for smokers, drinkers and illicit drug users. As part of a general population telephone survey of adults in Ontario, Canada, respondents were asked about their use of different drugs and also about their use of the Internet. Pack-a-day smokers were less likely (48%) to have home Internet access than non-smokers (69%), and current drinkers (73%) were more likely to have home access than abstainers (50%). These relationships remained true even after controlling for demographic characteristics. Internet access was less clearly associated with cannabis or cocaine use. Even though there is variation in access among smokers, drinkers and illicit drug users, the World Wide Web remains an excellent opportunity to potentially provide services for substance abusers who might never access treatment in person because, in absolute terms, the majority of substance abusers do use the Internet.

  13. 77 FR 1708 - Cooperative Research and Development Agreement: Technology To Provide Wireless Precise Time...

    Science.gov (United States)

    2012-01-11

    ... ``Actions'' column. If you do not have access to the Internet, you may view the docket online by visiting... technology or services. Since the goal of this CRADA is to identify and investigate the advantages, disadvantages, performance, costs, and other issues associated with using alternative wireless time technology...

  14. Quality criteria and access characteristics of Web sites: proposal for the design of a health Internet directory.

    Science.gov (United States)

    Joubert, M; Aymard, S; Fieschi, D; Fieschi, M

    1999-01-01

    The increasing volume of information available on the Internet today is a problem for health care professionals who want to access rapidly data of high quality. Usual search engines and directories are not sufficient to satisfy their needs. Moreover, the information published by Web sites is not always guaranteed. Some institutions around the word deal with the definition of a set of criteria for the evaluation of medical Web sites. We base our current work on the technologies we developed previously in order to integrate sources of information of various kinds using the "Unified Medical Language System" knowledge bases. This paper focuses on quality criteria and access characteristics Web sites should satisfy to be registered in a "Health Internet Directory". The design of such a system is proposed and discussed.

  15. The influence of the digital divide on face preferences in El Salvador: people without internet access prefer more feminine men, more masculine women, and women with higher adiposity.

    Science.gov (United States)

    Batres, Carlota; Perrett, David I

    2014-01-01

    Previous studies on face preferences have found that online and laboratory experiments yield similar results with samples from developed countries, where the majority of the population has internet access. No study has yet explored whether the same holds true in developing countries, where the majority of the population does not have internet access. This gap in the literature has become increasingly important given that several online studies are now using cross-country comparisons. We therefore sought to determine if an online sample is representative of the population in the developing country of El Salvador. In studies of Hispanic men and women aged 18-25, we tested facial masculinity and adiposity preferences by collecting data in person as well as online. Our results showed that there were no differences in preferences between people who reported having internet access, whether they were tested online or in person. This provides evidence that testing style does not bias preferences among the same population. On the other hand, our results showed multiple differences in preferences between people who reported having internet access and people who reported not having internet access. More specifically, we found that people without internet access preferred more feminine men, more masculine women, and women with higher adiposity than people with internet access. We also found that people without internet access had fewer resources (e.g. running water) than people with internet access, suggesting that harshness in the environment may be influencing face preferences. These findings suggest that online studies may provide a distorted perspective of the populations in developing countries.

  16. The influence of the digital divide on face preferences in El Salvador: people without internet access prefer more feminine men, more masculine women, and women with higher adiposity.

    Directory of Open Access Journals (Sweden)

    Carlota Batres

    Full Text Available Previous studies on face preferences have found that online and laboratory experiments yield similar results with samples from developed countries, where the majority of the population has internet access. No study has yet explored whether the same holds true in developing countries, where the majority of the population does not have internet access. This gap in the literature has become increasingly important given that several online studies are now using cross-country comparisons. We therefore sought to determine if an online sample is representative of the population in the developing country of El Salvador. In studies of Hispanic men and women aged 18-25, we tested facial masculinity and adiposity preferences by collecting data in person as well as online. Our results showed that there were no differences in preferences between people who reported having internet access, whether they were tested online or in person. This provides evidence that testing style does not bias preferences among the same population. On the other hand, our results showed multiple differences in preferences between people who reported having internet access and people who reported not having internet access. More specifically, we found that people without internet access preferred more feminine men, more masculine women, and women with higher adiposity than people with internet access. We also found that people without internet access had fewer resources (e.g. running water than people with internet access, suggesting that harshness in the environment may be influencing face preferences. These findings suggest that online studies may provide a distorted perspective of the populations in developing countries.

  17. Quality criteria and access characteristics of Web sites: proposal for the design of a health Internet directory.

    OpenAIRE

    Joubert, M.; Aymard, S.; Fieschi, D.; Fieschi, M.

    1999-01-01

    The increasing volume of information available on the Internet today is a problem for health care professionals who want to access rapidly data of high quality. Usual search engines and directories are not sufficient to satisfy their needs. Moreover, the information published by Web sites is not always guaranteed. Some institutions around the word deal with the definition of a set of criteria for the evaluation of medical Web sites. We base our current work on the technologies we developed pr...

  18. Internet access, awareness and utilisation of web based evidence: a survey of ANZ and Singaporean radiation oncology registrars in 2003

    International Nuclear Information System (INIS)

    Wong, K.; Veness, M.

    2003-01-01

    The past decade has seen an 'explosion' in electronically archived evidence available on the Internet. Access to, and awareness of, pre-appraised web based evidence such as is available at the Cochrane Library, and more recently the Cancer Library, is now easily accessible to both clinicians and patients. A postal survey was recently sent out to all Radiation Oncology registrars in Australia, New Zealand and Singapore. The aim of the survey was to ascertain previous training in literature searching and critical appraisal, the extent of Internet access and use of web based evidence and awareness of databases including the Cochrane Library. Sixty six (66) out of ninety (90) registrars responded (73% response rate). Fifty five percent of respondents had previously undertaken some form of training related to literature searching or critical appraisal. The majority (68%) felt confident in performing a literature search, although 80% of respondents indicated interest in obtaining further training. The majority (68%) reported accessing web-based evidence for literature searching in the previous week, and 92% in the previous month. Nearly all respondents (89%) accessed web-based evidence at work. Most (94%) were aware of the Cochrane Library with 48% of respondents having used this database. Sixty-eight percent were aware of the Cancer Library. In 2000 a similar survey revealed only 68% of registrars aware and 30% having used the Cochrane Library. These findings reveal almost universal access to the Internet and use of web-based evidence amongst Radiation Oncology registrars. There has been a marked increase in awareness and use of the Cochrane Library with the majority also aware of the recently introduced Cancer Library

  19. Dynamic optical fiber delivery of Ka-band packet transmissions for wireless access networks

    DEFF Research Database (Denmark)

    Rodríguez Páez, Juan Sebastián; Madsen, Peter; Tafur Monroy, Idelfonso

    2017-01-01

    A Reconfigurable Radio Access Unit is presented and experimentally demonstrated. In the unit, an optical switching system is set to dynamically deliver different packets to different points in the network. The packets are transmitted wirelesslty on the Ka-band (26–40 GHz), achieving BER values...

  20. Request-TDMA: A multiple-access protocol for wireless multimedia networks

    NARCIS (Netherlands)

    Linnenbank, G.R.J.; Havinga, Paul J.M.; Smit, Gerardus Johannes Maria; Mullender, Sape J.; Smulders, P.; van den Meerendonk, H.

    1995-01-01

    This paper describes a cellular multiple-access scheme based on TDMA for multimedia communication networks. The scheme proposes an admission control of two different multimedia application stream types: real-time and non-real-time. We do not consider interference between cells. The proposed

  1. Using the Internet to access health-related information: results from a nationally representative sample of New Zealand secondary school students.

    Science.gov (United States)

    Utter, Jennifer; Lucassen, Mathijs; Denny, Simon; Fleming, Terry; Peiris-John, Roshini; Clark, Terryann

    2017-11-23

    Objective To determine if secondary school students in New Zealand who report greater health concerns (e.g. significant depressive symptoms) are more likely to use the Internet to access health-related information. Methods A nationally representative health and wellbeing survey was undertaken in 2012 (n = 8500). Multiple regression models were used to examine the associations between students' use of the Internet to access health-related information and selected outcomes or indicators. Results Over 90% of students used the Internet on a daily basis, with 15.4% of students reporting that they had used the Internet to access health-related information. Students experiencing household poverty were more likely to report not using the Internet daily (17.4% compared to 4.2%). Odds ratios (ORs) for accessing the Internet for this sort of information were highest for students who reported self-harm [OR 2.7, 95% confidence interval (CI) 2.3-3.3], disordered eating (OR 2.7, 95% CI 2.4-3.2), or a suicide attempt (OR 2.5, 95% CI 1.9-3.3). Conclusion Our findings suggest that Internet-based health interventions may be a viable way to reach young people with high health needs, but consideration needs to be given to those with limited Internet access.

  2. Are people with severe mental illness ready for online interventions? Access and use of the Internet in Australian mental health service users.

    Science.gov (United States)

    Thomas, Neil; Foley, Fiona; Lindblom, Katrina; Lee, Stuart

    2017-06-01

    The Internet is increasingly used in mental health service delivery, but there are significant potential barriers to Internet access for persons with severe mental illness (SMI). There is a need to understand this group's access to, and confidence with using, the Internet, and current views on using online resources as part of mental healthcare. A survey was conducted of 100 consumers attending a specialist mental health service in Melbourne, Australia. Approximately three-quarters of participants had regular access to the Internet, and two-thirds used the Internet weekly or more. Half of the sample used email at least weekly, and a third were regular users of social networking sites. Internet access was often via mobile devices. Only a minority of participants used the Internet for mental health information, with video streaming and general websites accessed more often than peer forums for mental health content. Most participants were positive about their mental health worker using tablet computers with them in appointments for delivery of mental health materials. Most people with SMI are active Internet users and, therefore, able to use interventions online.

  3. The impact of Internet access for people with spinal cord injuries: a descriptive analysis of a pilot study.

    Science.gov (United States)

    Houlihan, Bethlyn Vergo; Drainoni, Mari-Lynn; Warner, Grace; Nesathurai, Shanker; Wierbicky, Jane; Williams, Steven

    2003-04-22

    A pilot study was undertaken regarding the effect of Internet access on health-related quality of life (HRQoL) and self-reported impact for people with spinal cord injuries (SCI). This study is unique in providing free Internet access and looking at benefits for people with disabilities. HRQoL was measured using indicators of global health and social isolation at baseline and after 6 to 19 months of use via telephone interviews on a convenience sample of 23 adults with SCI. Additionally, monthly telephone surveys measured usage patterns, recreation, and self-reported impact. Both quantitative and qualitative analyses were conducted. Bivariate tests for differences in proportions and paired T-tests were conducted. Qualitatively, conceptual categories of impact were created using the Constant Comparative Method. Qualitatively, the predominant benefit was quality of life, mentioned by 61% of participants 46% of months surveyed, with quantitative trends towards improved emotional health. Ease of access to information, social connection, and quality of information were also frequently reported, with modest support from quantitative data. The study's persuasive qualitative results suggest the Internet has particular benefit to people with disabilities and that rehabilitation goals should include leisure. Further scientific research is strongly warranted.

  4. Access Point Backhaul Resource Aggregation as a Many-to-One Matching Game in Wireless Local Area Networks

    Directory of Open Access Journals (Sweden)

    Kawther Hassine

    2017-01-01

    Full Text Available This paper studies backhaul bandwidth aggregation in the context of a wireless local area network composed of two different types of access points: those with spare backhaul capacity (which we term providers and those in shortage of it (beneficiaries; the aim is to transfer excess capacity from providers to beneficiaries. We model the system as a matching game with many-to-one setting wherein several providers can be matched to one beneficiary and adopt the so-called deferred acceptance algorithm to reach an optimal and stable solution. We consider two flavors, when the beneficiaries are limited in their resource demands and when they are not, and two scenarios, when resources are abundant and when they are scarce. Our results show that the many-to-one setting outperforms the one-to-one case in terms of overall throughput gain, resource usage, and individual beneficiaries satisfaction by up to 50%, whether resources are scarce or abundant. As of the limited versus nonlimited case, the former ensures more fair sharing of spectral resources and higher satisfaction percentage between beneficiaries.

  5. Apparatus and method supporting wireless access to multiple security layers in an industrial control and automation system or other system

    Science.gov (United States)

    Chen, Yu-Gene T.

    2013-04-16

    A method includes receiving a message at a first wireless node. The first wireless node is associated with a first wired network, and the first wired network is associated with a first security layer. The method also includes transmitting the message over the first wired network when at least one destination of the message is located in the first security layer. The method further includes wirelessly transmitting the message for delivery to a second wireless node when at least one destination of the message is located in a second security layer. The second wireless node is associated with a second wired network, and the second wired network is associated with the second security layer. The first and second security layers may be associated with different security paradigms and/or different security domains. Also, the message could be associated with destinations in the first and second security layers.

  6. A Seamless Handoff Scheme with Access Point Load Balance for Real-Time Services Support in 802.11 Wireless LANs

    Science.gov (United States)

    Manodham, Thavisak; Loyola, Luis; Miki, Tetsuya

    IEEE 802.11 wirelesses LANs (WLANs) have been rapidly deployed in enterprises, public areas, and households. Voice-over-IP (VoIP) and similar applications are now commonly used in mobile devices over wireless networks. Recent works have improved the quality of service (QoS) offering higher data rates to support various kinds of real-time applications. However, besides the need for higher data rates, seamless handoff and load balancing among APs are key issues that must be addressed in order to continue supporting real-time services across wireless LANs and providing fair services to all users. In this paper, we introduce a novel access point (AP) with two transceivers that improves network efficiency by supporting seamless handoff and traffic load balancing in a wireless network. In our proposed scheme, the novel AP uses the second transceiver to scan and find neighboring STAs in the transmission range and then sends the results to neighboring APs, which compare and analyze whether or not the STA should perform a handoff. The initial results from our simulations show that the novel AP module is more effective than the conventional scheme and a related work in terms of providing a handoff process with low latency and sharing traffic load with neighbor APs.

  7. Media Access Time-Rearrangement of Wireless LAN for a Multi-Radio Collocated Platform

    Science.gov (United States)

    Shin, Sang-Heon; Kim, Chul; Park, Sang Kyu

    With the advent of new Radio Access Technologies (RATs), it is inevitable that several RATs will co-exist, especially in the license-exempt band. In this letter, we present an in-depth adaptation of the proactive time-rearrangement (PATRA) scheme for IEEE 802.11 WLAN. The PATRA is a time division approach for reducing interference from a multi-radio device. Because IEEE 802.11 is based on carrier sensing and contention mechanism, it is the most suitable candidate to adapt the PATRA.

  8. ICT Adoption in Micro and Small Firms: Can Internet Access Improve Labour Productivity?

    OpenAIRE

    Viollaz, Mariana

    2018-01-01

    The rapid spread of information and communication technologies may increase firms’ productivity with important consequences for job creation and for economic growth. This article contributes to this discussion by analysing the impact of internet adoption on labour productivity and the mechanisms shaping this relationship in Peruvian micro and small manufacturing firms over the period 2011-2013. The article estimates a reduced form where labour productivity is a function of internet adoptio...

  9. On the Impact of Closed Access and Users Identities in Spectrum-Shared Overlaid Wireless Networks

    KAUST Repository

    Radaydeh, Redha M.

    2016-03-28

    © 2015 IEEE. This paper develops analytical models to investigate the impact of various operation terms and parameters on the downlink performance of spectrum-shared overlaid networks under closed-access small cells deployment. It is considered that closed-access small cells (i.e., femtocells) can not reuse available channels, and can serve only active authorized user equipments (UEs). On the other hand, the macrocell base station can unconditionally reuse available channels to serve active macrocell UEs. The analysis characterizes UEs identities, their likelihoods of being active, and their likelihoods of initiating interference. Moreover, it quantifies interference sources observed from effective femtocells considering their over-loaded and under-loaded cell scenarios. The developed results to characterize an active UE performance and the impact of the number of available channels are thoroughly examined. The obtained results are generally applicable for any performance measure and any network channel models. Numerical and simulation examples are presented to clarify the main outcomes of this paper.

  10. An Adaptive Time-Spread Multiple-Access Policy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Konstantinos Oikonomou

    2007-05-01

    Full Text Available Sensor networks require a simple and efficient medium access control policy achieving high system throughput with no or limited control overhead in order to increase the network lifetime by minimizing the energy consumed during transmission attempts. Time-spread multiple-access (TSMA policies that have been proposed for ad hoc network environments, can also be employed in sensor networks, since no control overhead is introduced. However, they do not take advantage of any cross-layer information in order to exploit the idiosyncrasies of the particular sensor network environment such as the presence of typically static nodes and a common destination for the forwarded data. An adaptive probabilistic TSMA-based policy, that is proposed and analyzed in this paper, exploits these idiosyncrasies and achieves higher system throughput than the existing TSMA-based policies without any need for extra control overhead. As it is analytically shown in this paper, the proposed policy always outperforms the existing TSMA-based policies, if certain parameter values are properly set; the analysis also provides for these proper values. It is also shown that the proposed policy is characterized by a certain convergence period and that high system throughput is achieved for long convergence periods. The claims and expectations of the provided analysis are supported by simulation results presented in this paper.

  11. Wireless sensor networks for monitoring physiological signals of multiple patients.

    Science.gov (United States)

    Dilmaghani, R S; Bobarshad, H; Ghavami, M; Choobkar, S; Wolfe, C

    2011-08-01

    This paper presents the design of a novel wireless sensor network structure to monitor patients with chronic diseases in their own homes through a remote monitoring system of physiological signals. Currently, most of the monitoring systems send patients' data to a hospital with the aid of personal computers (PC) located in the patients' home. Here, we present a new design which eliminates the need for a PC. The proposed remote monitoring system is a wireless sensor network with the nodes of the network installed in the patients' homes. These nodes are then connected to a central node located at a hospital through an Internet connection. The nodes of the proposed wireless sensor network are created by using a combination of ECG sensors, MSP430 microcontrollers, a CC2500 low-power wireless radio, and a network protocol called the SimpliciTI protocol. ECG signals are first sampled by a small portable device which each patient carries. The captured signals are then wirelessly transmitted to an access point located within the patients' home. This connectivity is based on wireless data transmission at 2.4-GHz frequency. The access point is also a small box attached to the Internet through a home asynchronous digital subscriber line router. Afterwards, the data are sent to the hospital via the Internet in real time for analysis and/or storage. The benefits of this remote monitoring are wide ranging: the patients can continue their normal lives, they do not need a PC all of the time, their risk of infection is reduced, costs significantly decrease for the hospital, and clinicians can check data in a short time.

  12. Wired and wireless convergent extended-reach optical access network using direct-detection of all-optical OFDM super-channel signal.

    Science.gov (United States)

    Chow, C W; Yeh, C H; Sung, J Y; Hsu, C W

    2014-12-15

    We propose and demonstrate the feasibility of using all-optical orthogonal frequency division multiplexing (AO-OFDM) for the convergent optical wired and wireless access networks. AO-OFDM relies on all-optically generated orthogonal subcarriers; hence, high data rate (> 100 Gb/s) can be easily achieved without hitting the speed limit of electronic digital-to-analog and analog-to-digital converters (DAC/ADC). A proof-of-concept convergent access network using AO-OFDM super-channel (SC) is demonstrated supporting 40 - 100 Gb/s wired and gigabit/s 100 GHz millimeter-wave (MMW) ROF transmissions.

  13. Chromhome: A rich internet application for accessing comparative chromosome homology maps

    Directory of Open Access Journals (Sweden)

    Cox Tony

    2008-03-01

    Full Text Available Abstract Background Comparative genomics has become a significant research area in recent years, following the availability of a number of sequenced genomes. The comparison of genomes is of great importance in the analysis of functionally important genome regions. It can also be used to understand the phylogenetic relationships of species and the mechanisms leading to rearrangement of karyotypes during evolution. Many species have been studied at the cytogenetic level by cross species chromosome painting. With the large amount of such information, it has become vital to computerize the data and make them accessible worldwide. Chromhome http://www.chromhome.org is a comprehensive web application that is designed to provide cytogenetic comparisons among species and to fulfil this need. Results The Chromhome application architecture is multi-tiered with an interactive client layer, business logic and database layers. Enterprise java platform with open source framework OpenLaszlo is used to implement the Rich Internet Chromhome Application. Cross species comparative mapping raw data are collected and the processed information is stored into MySQL Chromhome database. Chromhome Release 1.0 contains 109 homology maps from 51 species. The data cover species from 14 orders and 30 families. The homology map displays all the chromosomes of the compared species as one image, making comparisons among species easier. Inferred data also provides maps of homologous regions that could serve as a guideline for researchers involved in phylogenetic or evolution based studies. Conclusion Chromhome provides a useful resource for comparative genomics, holding graphical homology maps of a wide range of species. It brings together cytogenetic data of many genomes under one roof. Inferred painting can often determine the chromosomal homologous regions between two species, if each has been compared with a common third species. Inferred painting greatly reduces the need to

  14. Chromhome: A rich internet application for accessing comparative chromosome homology maps

    Science.gov (United States)

    Nagarajan, Sridevi; Rens, Willem; Stalker, James; Cox, Tony; Ferguson-Smith, Malcolm A

    2008-01-01

    Background Comparative genomics has become a significant research area in recent years, following the availability of a number of sequenced genomes. The comparison of genomes is of great importance in the analysis of functionally important genome regions. It can also be used to understand the phylogenetic relationships of species and the mechanisms leading to rearrangement of karyotypes during evolution. Many species have been studied at the cytogenetic level by cross species chromosome painting. With the large amount of such information, it has become vital to computerize the data and make them accessible worldwide. Chromhome is a comprehensive web application that is designed to provide cytogenetic comparisons among species and to fulfil this need. Results The Chromhome application architecture is multi-tiered with an interactive client layer, business logic and database layers. Enterprise java platform with open source framework OpenLaszlo is used to implement the Rich Internet Chromhome Application. Cross species comparative mapping raw data are collected and the processed information is stored into MySQL Chromhome database. Chromhome Release 1.0 contains 109 homology maps from 51 species. The data cover species from 14 orders and 30 families. The homology map displays all the chromosomes of the compared species as one image, making comparisons among species easier. Inferred data also provides maps of homologous regions that could serve as a guideline for researchers involved in phylogenetic or evolution based studies. Conclusion Chromhome provides a useful resource for comparative genomics, holding graphical homology maps of a wide range of species. It brings together cytogenetic data of many genomes under one roof. Inferred painting can often determine the chromosomal homologous regions between two species, if each has been compared with a common third species. Inferred painting greatly reduces the need to map entire genomes and helps focus only on relevant

  15. Analysis of an FBMC/OQAM scheme for asynchronous access in wireless communications

    Science.gov (United States)

    Mattera, Davide; Tanda, Mario; Bellanger, Maurice

    2015-12-01

    The OFDM/OQAM transceiver belongs to the filter-bank-based multicarrier (FBMC) family and, unlike OFDM schemes, it is particularly able to meet the requirements of the physical layer of cognitive radio networks such as high level of adjacent channel leakage ratio and asynchronous communications. The paper proposes and analyzes a new implementation structure, named frequency spreading, for the OFDM/OQAM transceiver. On flat channels, it is equivalent to the standard one in terms of input-output relations, though more complex. On multipath channels, it offers a crucial advantage in terms of equalization, which is performed in the frequency domain, leading to high performance and no additional delay. With its flexibility and level of performance, the analyzed scheme has the potential to outperform OFDM in the asynchronous access context and in cognitive radio networks.

  16. Design of handoff procedures for broadband wireless access IEEE 802.16 based networks

    Directory of Open Access Journals (Sweden)

    V. Rangel–Licea

    2008-01-01

    Full Text Available IEEE 802.16 is a protocol for fixed broad band wire less access that is currently trying to add mobility among mobile users in the standard. However, mobility adds some technical barriers that should be solved first, this is the case of HO "handoff" (change of connection between two base stations "BS" by a mobile user. In this paper, the problem of HO in IEEE 802.16 is approached try ing to maintain the quality of service (QoS of mobile users. A mechanism for changing connection during HO is pre sented. A simulation model based on OPNET MODELER1 was developed to evaluate the performance of the proposed HO mechanism. Finally, this paper demonstrates that it is possible to implement a seam less HO mech a nism over IEEE 802.16 even for users with de manding applications such as voice over IP.

  17. Assessment of LTE Wireless Access for Monitoring of Energy Distribution in the Smart Grid

    DEFF Research Database (Denmark)

    Madueño, Germán Corrales; Nielsen, Jimmy Jessen; Min Kim, Dong

    2016-01-01

    While LTE is becoming widely rolled out for human-type services, it is also a promising solution for cost-efficient connectivity of the smart grid monitoring equipment. This is a type of machine-to-machine (M2M) traffic that consists mainly of sporadic uplink transmissions. In such a setting......, the amount of traffic that can be served in a cell is not constrained by the data capacity, but rather by the signaling constraints in the PRACH, PDCCH, and PUSCH channels. In this paper we explore these limitations using a detailed simulation of the LTE access reservation protocol (ARP). We find that 1...... method, with reduced number of signaling messages, needs to be considered in standardization for M2M applications. Additionally we propose a tractable analytical model that accurately evaluates the outage for a given scenario at click-speed. The model accounts for the features of the PRACH, PDCCH, PDSCH...

  18. Evaluation of an open-access CBT-based Internet program for social anxiety: Patterns of use, retention, and outcomes.

    Science.gov (United States)

    Dryman, M Taylor; McTeague, Lisa M; Olino, Thomas M; Heimberg, Richard G

    2017-10-01

    Internet-delivered cognitive-behavioral therapy (ICBT) has been established as both efficacious and effective in reducing symptoms of social anxiety. However, most research has been conducted in controlled settings, and little is known regarding the utility of such programs in an open-access format. The present study examined the use, adherence, and effectiveness of Joyable, an open-access, Internet-delivered, coach-supported CBT-based intervention for social anxiety. Participants were 3,384 registered users (Mage [SD] = 29.82 [7.89]; 54% male) that created an account between 2014 and 2016. Characteristics of use, factors related to attrition and adherence, and within-group outcomes were examined. The primary outcome measure was the Social Phobia Inventory. On average, participants remained in the program for 81.02 days (SD = 60.50), during which they completed 12.14 activities (SD = 11.09) and 1.53 exposures (SD = 3.18). About half (57%) had contact with a coach. Full adherence to the program was achieved by 16% of participants, a rate higher than previously published open-access studies of ICBT. Social anxiety symptoms were significantly reduced for participants that engaged in the program, with medium within-group effects from baseline through the cognitive restructuring module (d = 0.63-0.76) and large effects from baseline through the exposure module (d = 1.40-1.83). Response rates were high (72%). Exposures and coach contact were significant predictors of retention and outcome. This open-access online CBT-based program is effective in reducing social anxiety symptoms and has the potential to extend Internet-based mental health services to socially anxious individuals unwilling or unable to seek face-to-face evidence-based therapy. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  19. Accessible Internet-of-Things and Internet-of-Content Services for All in the Home or on the Move

    Directory of Open Access Journals (Sweden)

    Dimitris Tektonidis

    2012-10-01

    Full Text Available Public authorities and national healthcare service providers across the European Union and beyond are increasingly under pressure to deliver better services with diminishing resources. Users, quite rightly, demand a high standard of service and increasingly also convenience focused on the needs of the users rather than how the services are organised to deliver them. Users, on the whole, also prefer to be supported in their homes, and be free to move as much as possible. While users without impairments and generally well provided for, there are increasingly also users who have special needs, including the aged and those with a range of physical and mental disabilities who are unable to make effective use of such services from their homes due to the lack of proactive and accessible services. The idea we promote in the chapter is to provide better support to users with disabilities and impairments from the comfort of their home by means of providing them with a set of scalable services which can be either offered for free or purchased through some central form of a marketplace repository.

  20. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things

    Directory of Open Access Journals (Sweden)

    José L. Hernández-Ramos

    2015-07-01

    Full Text Available As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.

  1. Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things.

    Science.gov (United States)

    Hernández-Ramos, José L; Bernabe, Jorge Bernal; Moreno, M Victoria; Skarmeta, Antonio F

    2015-07-01

    As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society. Given the Machine-to-Machine (M2M) nature of these emerging scenarios, the application of current privacy-friendly technologies needs to be reconsidered and adapted to be deployed in such global ecosystem. This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography. The resulting alternatives are intended to enable an anonymous and accountable access control approach to be deployed on large-scale scenarios, such as Smart Cities. Furthermore, the proposed mechanisms have been deployed on constrained devices, in order to assess their suitability for a secure and privacy-preserving M2M-enabled Internet of Things.

  2. Internet Use and Access, Behavior, Cyberbullying, and Grooming: Results of an Investigative Whole City Survey of Adolescents.

    Science.gov (United States)

    Vismara, Marco Flavio Michele; Toaff, Joseph; Pulvirenti, Giuliana; Settanni, Chiara; Colao, Emma; Lavano, Serena Marianna; Cemicetti, Riccardo; Cotugno, David; Perrotti, Giuseppe; Meschesi, Viviana; Montera, Roberto; Zepponi, Barbara; Rapetto, Umberto; Marotta, Rosa

    2017-08-29

    According to the Digital Agenda for Europe, the way children use the Internet and mobile technologies has changed dramatically in the past years. The aims of this study were to: (1) breakdown the modalities of access and use of the Internet by teenagers to assess risks and risky behaviors; and (2) provide scientific data to evaluate and counsel safe use of the Internet and new technologies by teenagers. The study was conducted under the program "Strategies for a Better Internet for Children" started in May 2012 by the European Commission. It represents the main result of the project launched by Telecom Italia, "Anche io ho qualcosa da dire" (I too have something to say), thanks to which many contributions were collected and used to develop a survey. The questionnaire was structured in 45 questions, covering three macro areas of interest. It was approved by the Department Board at University of Magna Graecia's School of Medicine. After authorization from the regional high school authority, it was administered to all 1534 students (aged 13-19 years) in the city of Catanzaro, Italy. The data was broken down into three main groups: (1) describing education and access to the Internet; (2) methods of use and social networking; and (3) perception and evaluation of risk and risky behaviors. Among noteworthy results in the first group, we can mention that the average age of first contact with information technologies was around 9 years. Moreover, 78.87% (1210/1534) of the interviewed students reported having access to a smartphone or a tablet. Among the results of the second group, we found that the most used social networks were Facebook (85.78%, 1316/1534), YouTube (61.14%, 938/1534), and Google+ (51.56%, 791/1534). About 71.31% (1094/1534) of the interviewed teenagers use their name and surname on social networks, and 40.09% (615/1534) of them knew all their Facebook contacts personally. Among the results of the third group, we found that 7.69% (118/1534) of the

  3. Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture

    Science.gov (United States)

    McCown, Steven H [Rigby, ID; Derr, Kurt W [Idaho Falls, ID; Rohde, Kenneth W [Idaho Falls, ID

    2012-05-08

    Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture are described. According to one embodiment, a wireless device monitoring method includes accessing device configuration information of a wireless device present at a secure area, wherein the device configuration information comprises information regarding a configuration of the wireless device, accessing stored information corresponding to the wireless device, wherein the stored information comprises information regarding the configuration of the wireless device, comparing the device configuration information with the stored information, and indicating the wireless device as one of authorized and unauthorized for presence at the secure area using the comparing.

  4. Broadband Access

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Broadband Access. Worldwide market for broadband access $30 Billion! Over 200 million broadband subscribers worldwide! Various Competing Broadband access. Digital Subscriber line; Wireless; Optical Fiber.

  5. Mobile Energy Internet

    OpenAIRE

    Liu, Mingqing; Xiong, Mingliang; Deng, Hao; Liu, Qingwen; Wu, Jun; Xia, Pengfei

    2018-01-01

    Similar to the evolution from wired Internet to mobile Internet (MI), the growing demand of power delivery anywhere and anytime appeals for power grid transformation from wired to mobile domain. We propose here the next generation of power delivery network -- mobile energy internet (MEI) for wireless energy transfer within a mobile range from several meters to tens of meters. MEI will be a significant complement for Internet of things (IoT), because battery charging is one of the biggest head...

  6. Mobile RFID of Wireless Mesh Network for Intelligent Safety Care System

    Directory of Open Access Journals (Sweden)

    Chwen-Fu Horng

    2009-12-01

    Full Text Available This paper presents the Wi-Fi phone with RFID (Radio frequency identification of student entered the school, via Wireless Access Points (APs of school will transmit MAC address with RFID of Wi-Fi phone to Internet Data Center (IDC for server and then the message exchanged by using GSM (or 3G has been transmitted message (or mail to the mobile user of parents (or client user. The wireless access points support broadcasting multiple SSIDs, each of which can have a different set of security and network setting. The RADIUS server is used to authenticate the Wireless Access Point (AP and mobile nodes. In safety case system, we used the several authentication and encryption options for the WLAN. We will discuss the use of Wi-Fi protected Access (WPA, RFID, IP Security (IPSec, and Secure Socket Layer (SSL, and there are high Quality of service (QoS and performance.

  7. 2x2 MIMO-OFDM Gigabit fiber-wireless access system based on polarization division multiplexed WDM-PON

    DEFF Research Database (Denmark)

    Deng, Lei; Pang, Xiaodan; Zhao, Ying

    2012-01-01

    We propose a spectral efficient radio over wavelength division multiplexed passive optical network (WDM-PON) system by combining optical polarization division multiplexing (PDM) and wireless multiple input multiple output (MIMO) spatial multiplexing techniques. In our experiment, a training...

  8. Evaluation of an Affordable Wireless Node Sensor (Mote69) Designed for Internet of Thing (IoT) Device

    Science.gov (United States)

    Ruhiyat, Z. F.; Somantri, Y.; Wahyudin, D.; Hakim, D. L.

    2018-02-01

    This research aims to determine the student’s response to the implementation of Internet of Things (IoT) device based on RFM69, called Mote69, for practical work of Aircraft Electronic Circuits and Controllers. Participants in this study were students of a vocational high school of Aircraft Electronics which consisted of three groups. The first group is the students who have grades above the average class. The second group is the students who have grade the average class. The third group is the students who have grades below the average class. The research phase consisted of (1). Observation and Assessment of Empirical Issues; (2). Testing of Media Feasibility and Research Instruments; (3). Accumulate and Processing of Field Data; and (4). Results and Data Conclusions. The result of media feasibility showed that Mote69 is appropriate to be used in practical work of Aircraft Electronic Circuits and Controllers subject.

  9. Contribution aux protocoles et aux architectures de communication de bout en bout pour la QdS dans l'internet

    OpenAIRE

    Chassot, Christophe

    2005-01-01

    These latest years, the evolutions of computer science and telecommunications led to a radical modification of the communication landscape, and consequently of the Internet and its services: applications are now multimedia, multi users and co-operatives; networks now provide high transmission rates, at local scale or long distance, and make it possible to be connected to the Internet via various types of terminals and wire/wireless access points. In spite of these advances, the Internet commu...

  10. Persistent digital divide in access to and use of the Internet as a resource for health information: Results from a California population-based study.

    Science.gov (United States)

    Nguyen, Amy; Mosadeghi, Sasan; Almario, Christopher V

    2017-07-01

    Access to the Internet has grown dramatically over the past two decades. Using data from a population-based survey, we aimed to determine the prevalence and predictors of (i) access to the Internet, and (ii) use of the Internet to search for health information. We analyzed data from the 2011-12 California Health Interview Survey (CHIS) and included all individuals 18 years of age and older. Our outcomes were (i) prior use of the Internet, and (ii) use of the Internet to find health or medical information within the past year. We performed survey-weighted logistic regression models on our outcomes to adjust for potentially confounding demographic and socioeconomic factors. Our study included an unweighted and survey-weighted sample of 42,935 and 27,796,484 individuals, respectively. We found that 81.5% of the weighted sample reported having previously used the Internet. Among Internet users, 64.5% stated that they used the Internet within the past year to find health or medical information. Racial/ethnic minorities, older individuals, and those who lived in lower income households and rural areas were less likely to have access to and use the Internet to search for health information. Conversely, English-proficiency and increasing levels of education were positively associated with online health information-seeking. We found that most Californians have access to and use the Internet to search for health information, but still noted a persistent digital divide. Interventions to narrow the divide are needed, otherwise this may lead to a continued widening of existing healthcare disparities. Copyright © 2017 Elsevier B.V. All rights reserved.

  11. Evaluating the Impact of Free Access to Legislation over the Internet ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Moreover, it makes the work of judges and lawyers easier and renders the national judicial system more transparent. Although free distribution of legislation over the Internet is available in several countries around the world, there has been no research to date aimed at understanding its impact. One of the prime objectives ...

  12. Toward a Multifaceted Model of Internet Access for Understanding Digital Divides: An Empirical Investigation

    NARCIS (Netherlands)

    van Deursen, Alexander Johannes Aloysius Maria; van Dijk, Johannes A.G.M.

    2015-01-01

    In this investigation, a multifaceted model of Internet appropriation that encompasses four types of access—motivational, material, skills, and usage—is tested with a representative sample of the Dutch population. The analysis indicates that while the digital divide policies' focus has moved to

  13. A Study of Internet Access and Usage among Students in the ...

    African Journals Online (AJOL)

    The study recommended upgrade of bandwidth and provision of alternative power supply. For enhanced excellent library service the study suggest university library to seize the opportunity by providing adequate internet services and so be business conscious for this is an avenue of generating income for the library.

  14. Internet Access and Youth of Yakutia Awareness on the Health-Promotion Factor

    Science.gov (United States)

    Barakhsanova, Elizabeth Afanasyevna; Ignatyev, Vladimir Petrovich; Savvinov, Vasily Mikhaylovich; Olesova, Sargulana Gavrilievna

    2016-01-01

    Thematic justification is determined by the fact that in the conditions of the steady growth of mobile technology the youth accurately does not represent health promotion value when using the Internet at home, at school and other entertainment leisure recreation. With respect thereto this paper is aimed at monitoring general awareness of seniors…

  15. Estricted Access to The Internet and the Offense to the Covenant on Civil and Political Rights : An Analysis From Consideration

    Directory of Open Access Journals (Sweden)

    Fernando Navarro Vince

    2016-06-01

    Full Text Available The UN considers Internet access a human right and understand that restrict in any way the population's connection to the World Wide Web hurts freedom of expression and information. Some countries, however, edited laws that limit the use of the virtual space on the grounds of public policy issues , such as national security and the individual's own protection. In this feeling , it will be sought through the deductive method of scientific research, assess whether the foreign legislation is not legitimate , that is, it is compatible with the precepts of international treaties

  16. Towards Controlling Latency in Wireless Networks

    KAUST Repository

    Bouacida, Nader

    2017-04-24

    Wireless networks are undergoing an unprecedented revolution in the last decade. With the explosion of delay-sensitive applications in the Internet (i.e., online gaming and VoIP), latency becomes a major issue for the development of wireless technology. Taking advantage of the significant decline in memory prices, industrialists equip the network devices with larger buffering capacities to improve the network throughput by limiting packets drops. Over-buffering results in increasing the time that packets spend in the queues and, thus, introducing more latency in networks. This phenomenon is known as “bufferbloat”. While throughput is the dominant performance metric, latency also has a huge impact on user experience not only for real-time applications but also for common applications like web browsing, which is sensitive to latencies in order of hundreds of milliseconds. Concerns have arisen about designing sophisticated queue management schemes to mitigate the effects of such phenomenon. My thesis research aims to solve bufferbloat problem in both traditional half-duplex and cutting-edge full-duplex wireless systems by reducing delay while maximizing wireless links utilization and fairness. Our work shed lights on buffer management algorithms behavior in wireless networks and their ability to reduce latency resulting from excessive queuing delays inside oversized static network buffers without a significant loss in other network metrics. First of all, we address the problem of buffer management in wireless full-duplex networks by using Wireless Queue Management (WQM), which is an active queue management technique for wireless networks. Our solution is based on Relay Full-Duplex MAC (RFD-MAC), an asynchronous media access control protocol designed for relay full-duplexing. Compared to the default case, our solution reduces the end-to-end delay by two orders of magnitude while achieving similar throughput in most of the cases. In the second part of this thesis

  17. Resource management in wireless networking

    CERN Document Server

    Cardei, Mihaela; Du, Ding-Zhu

    2005-01-01

    This is the first book that provides readers with a deep technical overview of recent advances in resource management for wireless networks at different layers of the protocol stack. The subject is explored in various wireless networks, such as ad hoc wireless networks, 3G/4G cellular, IEEE 802.11, and Bluetooth personal area networks.Survey chapters give an excellent introduction to key topics in resource management for wireless networks, while experts will be satisfied by the technical depth of the knowledge imparted in chapters exploring hot research topics.The subject area discussed in this book is very relevant today, considering the recent remarkable growth of wireless networking and the convergence of wireless personal communications, internet technologies and real-time multimedia.This volume is a very good companion for practitioners working on implementing solutions for multimedia and Quality of Service - sensitive applications over wireless networks.Written for:Researchers, faculty members, students...

  18. PERANCANGAN DAN IMPLEMENTASI SERVER VOICE OVER INTERNET PROTOKAL (VOIP DENGAN TRIXBOX PADA WIRELESS LOCAL AREA NETWORK MENGGUNAKAN SMARTPHONE

    Directory of Open Access Journals (Sweden)

    Muhammad Iqbal Nahwi

    2014-06-01

    Full Text Available At this time telecommunications data is very important in human life , both in terms of the relationship between the human being and the fulfillment of information and entertainment . While obviously, a current cost of communication in the country including Indonesia is still expensive . The utilization of VoIP technology in communication cheap , safe with good enough quality is very appropriate to be applied in this country . In this VoIP technology to communicate over the phone not only can be done by relying on a conventional telephone or mobile phone , but through the Internet can also be done . In this study, the methodology used is to implement Trixbox VoIP system on linux . VoIP network infrastructure protocols designed using SIP (session initiation protocol as the communication protocol , making use of free software as the operating system Linux Trixbox , asterisk as application servers , and on the client side using the X - Lite softphone Keyyo VoIP application used for client on smartphone.

  19. Increasing Public Awareness of Direct-to-Consumer Genetic Tests: Health Care Access, Internet Use, and Population Density Correlates

    International Nuclear Information System (INIS)

    Rutten, L. J. F.; Gollust, S. E.; Naveed, S.; Moser, R. P.

    2012-01-01

    Uncertainty around the value of and appropriate regulatory models for direct-to-consumer (DTC) genetic testing underscores the importance of tracking public awareness of these services. We analyzed nationally representative, cross-sectional data from the Health Information National Trends Survey in 2008 (n=7, 674) and 2011 (n=3, 959) to assess population-level changes in awareness of DTC genetic testing in the U.S. and to explore socio demographic, health care, Internet use, and population density correlates. Overall, awareness increased significantly from 29% in 2008 to 37% in 2011. The observed increase in awareness from 2008 to 2011 remained significant (OR=1.39) even when adjusted for socio demographic variables, health care access, Internet use, and population density. Independent of survey year, the odds of awareness of DTC genetic tests were significantly higher for those aged 50-64 (OR=1.64), and 65-74 (O R=1.60); college graduates (OR=2.02 ); those with a regular source of health care (OR=1.27); those with a prior cancer diagnosis (OR=1.24); those who use the Internet (OR=1.27); and those living in urban areas ( OR=1.25). Surveillance of awareness-along with empirical data on use of and response to genetic risk information-can inform public health and policy efforts to maximize benefits and minimize risks of DTC genetic testing.

  20. "La Comunidad Habla": Using Internet Community-Based Information Interventions to Increase Empowerment and Access to Health Care of Low Income Latino/a Immigrants

    Science.gov (United States)

    Ginossar, Tamar; Nelson, Sara

    2010-01-01

    The innovative educational communication interventions described in this paper include the use of bi-lingual, low literacy level websites and training created by low income Latina women to increase access to health care, health information, and the internet. We focus on one grassroots intervention, aimed at increasing access to health care for…

  1. Accessibility of health information on the internet to the visually impaired user.

    Science.gov (United States)

    Lüchtenberg, Marc; Kuhli-Hattenbach, Claudia; Sinangin, Yesim; Ohrloff, Christian; Schalnus, Rainer

    2008-01-01

    Web sites containing health information should be accessible to visually impaired persons. 139 web sites containing medical information addressing laymen or patients were evaluated with respect to their accessibility. A quantitative checklist which is based upon the Web Content Accessibility Guidelines of the World Wide Web Consortium (W3C) was used. Only 18% (15 sites) achieved WAI (Web Accessibility Initiative) level A or AA. WAI level AA was reached by only 1% (1 site) of the web sites. None of the web sites reached level AAA; 82% of the assessed web sites offering consumer health information are not fully accessible to visually impaired persons. The accessibility of web-based health content to visually impaired users should be improved. Health information on the web should at least meet the requirements of priority 1 (level A), preferably priority 2 (level AA) of the W3C guidelines. (c) 2008 S. Karger AG, Basel

  2. Validation of an adaptive risk-based access control model for the Internet of Things

    OpenAIRE

    Atlam, Hany, F.; Alenezi, Ahmed; Hussein, Raid, Khalid Hussein; Wills, Gary

    2018-01-01

    The Internet of Things (IoT) has spread into multiple dimensions that incorporate different physical and virtual things. These things are connected together using different communication technologies to provide unlimited services. These services help not only to improve the quality of our daily lives, but also to provide a communication platform for increasing object collaboration and information sharing. Like all new technologies, the IoT has many security challenges that stand as a barrier ...

  3. New Paradigms in Access to Scientific Information and the Role of the Internet

    Directory of Open Access Journals (Sweden)

    Bülent Karasözen

    1996-09-01

    Full Text Available The Internet transforms the scholarly communication world-wide. Electronic pre­print archives, electronic journals, discussion groups are some of the new ways to get acccss to information. This paper discusses some of these new developments from the perspective of scholarly communication. Among the topics covered are quality control of scientif ic publications in the electronic world, information overload, the impact of electronic publishing on librai'ies and publishers, and the economics of electronic publishing.

  4. Wireless Sensor Network for Indoor Air Quality Monitoring

    Directory of Open Access Journals (Sweden)

    Jun Li

    2014-06-01

    Full Text Available Indoor air quality monitoring system consists of wireless sensor device, nRF24L01 wireless transceiver modules, C8051MCU, STM32103 remote monitoring platform, alarm device and data server. Distributed in the interior space of wireless sensors measure parameters of the local air quality, wireless transceiver module of the MCU to transmit data to the remote monitoring platform for analysis which displayed and stored field environment data or charts. The data collecting from wireless sensors to be send by wireless Access Point to the remote data server based on B/S architecture, intelligent terminals such as mobile phone, laptop, tablet PC on the Internet monitor indoor air quality in real-time. When site environment air quality index data exceeds the threshold in the monitoring device, the remote monitoring platform sends out the alarm SMS signal to inform user by GSM module. Indoor air quality monitoring system uses modular design method, has the portability and scalability has the low manufacture cost, real-time monitoring data and man-machine interaction.

  5. Infoscience technology: the impact of internet accessible melanoid data on health issues

    Directory of Open Access Journals (Sweden)

    J W Grzymała-Busse

    2006-01-01

    Full Text Available In this paper the development of a new internet information system for analyzing and classifying melanocytic dat, is briefly described. This system also has some teaching functions, improves the analysis of datasets based on calculating the values of the TDS (Total Dermatoscopy Score (Braun-Falco, Stolz, Bilek, Merkle, & Landthaler, 1990; Hippe, Bajcar, Blajdo, Grzymala-Busse, Grzymala-Busse, & Knap, et al., 2003 parameter. Calculations are based on two methods: the classical ABCD formula (Braun-Falco et al., 1990 and the optimized ABCD formula (Alvarez, Bajcar, Brown, Grzymala-Busse, & Hippe, 2003. A third method of classification is devoted to quasi-optimal decision trees (Quinlan, 1993. The developed internet-based tool enables users to make an early, non-invasive diagnosis of melanocytic lesions. This is possible using a built-in set of instructions that animates the diagnosis of the four basic lesions types: benign nevus, blue nevus, suspicious nevus and melanoma malignant. This system is available on the Internet website: http://www.wsiz.rzeszow.pl/ksesi.

  6. Breast cancer information on the internet: analysis of accessibility and accuracy.

    LENUS (Irish Health Repository)

    Quinn, E M

    2012-02-18

    Studies show internet sourced information often has poor accuracy. However, it is rapidly becoming a major source of patient information. Our aim was to assess accuracy of breast cancer-related information on the internet. The top five breast cancer-related search terms were identified using the commercial program "Wordtracker". These terms were searched using the search-engine "Google" and the top 100 webpages per topic analysed for applicability and accuracy of information. Overall 500 webpages were analysed. 42% were inapplicable to the question asked. Applicable accuracy rates were variable amongst the five terms: "breast cancer symptoms" 84%, "breast cancer care" 87%, "breast cancer stage" 88%, "breast cancer survival" 91% and "breast cancer signs" 78%. Educational websites were more likely to be accurate(p < 0.001) and interest group administered websites less likely to be accurate(p = 0.018) than other websites. Finding accurate breast cancer information on the internet is difficult due to large numbers of inapplicable unregulated websites preferentially returned via search engines.

  7. Breaking the internet: making Stephen Hawking's PhD thesis available open access

    OpenAIRE

    Ammon, Matthias; Smith, Arthur

    2018-01-01

    Slides from a lightning talk (5 minute presentation) by Matthias Ammon (Research Support Librarian, MML Library, University of Cambridge) and Arthur Smith (Open Access Team, Office of Scholarly Communication, University of Cambridge). Presented at Cambridge Libraries Conference 2018. The talk discussed the process and impact of making Stephen Hawking's PhD thesis available as open access.

  8. Digital Predistortion of 75-110GHzW-Band Frequency Multiplier for Fiber Wireless Short Range Access Systems

    DEFF Research Database (Denmark)

    Zhao, Ying; Pang, Xiaodan; Deng, Lei

    2011-01-01

    We present a digital predistortion technique to effectively compensate high nonlinearity of a sextuple multiplier operating at 99.6GHz. An 18.9dB adjacent-channel power ratio (ACPR) improvement is guaranteed and a W-band fiber-wireless system is experimentally investigated.......We present a digital predistortion technique to effectively compensate high nonlinearity of a sextuple multiplier operating at 99.6GHz. An 18.9dB adjacent-channel power ratio (ACPR) improvement is guaranteed and a W-band fiber-wireless system is experimentally investigated....

  9. Smart Home Wireless Sensor Nodes

    DEFF Research Database (Denmark)

    Lynggaard, Per

    Smart homes are further development of intelligent buildings and home automation, where context awareness and autonomous behaviour are added. They are based on a combination of the Internet and emerging technologies like wireless sensor nodes. These wireless sensor nodes are challenging because....... This paper introduces an approach that considerably lowers the wireless sensor node power consumption and the amount of transmitted sensor events. It uses smart objects that include artificial intelligence to efficiently process the sensor event on location and thereby saves the costly wireless...

  10. Smart Home Wireless Sensor Nodes

    DEFF Research Database (Denmark)

    Lynggaard, Per

    . This paper introduces an approach that considerably lowers the wireless sensor node power consumption and the amount of transmitted sensor events. It uses smart objects that include artificial intelligence to efficiently process the sensor event on location and thereby saves the costly wireless......Smart homes are further development of intelligent buildings and home automation, where context awareness and autonomous behaviour are added. They are based on a combination of the Internet and emerging technologies like wireless sensor nodes. These wireless sensor nodes are challenging because...

  11. Testing the associations between different aspects of seafarers' employment contract and on-board internet access and their job and life satisfaction and health.

    Science.gov (United States)

    Slišković, Ana; Penezić, Zvjezdan

    2016-12-01

    The aim of this study was to test for associations between different aspects of contract and on-board internet access and seafarers' satisfaction and health. Altogether 298 Croatian seafarers, all officers, employed on cargo ships, with a minimum work experience of two years with their current shipping company, participated in an online survey. The questionnaire included sociodemographic items, questions relating to their employment contract and internet access, and measures of job satisfaction, life satisfaction, mental health, and gastrointestinal and cardiovascular symptoms. Their job- and lifesatisfaction levels were higher for shorter duration on board, favourable ratio of work to non-work days, and compliance with the employment contract regarding the changes to work and non-work days. Mental health differed likewise but only in relation to two aspects of the contract: on-board duration and compliance with the contract. The level of gastrointestinal symptoms was lower in cases of shorter on-board duration and compliance with the contract, and in seafarers who have free, unlimited internet access on board. Lower level of cardiovascular symptoms was found in seafarers with free, unlimited internet access on board. Our findings suggest that in promoting satisfaction and health in seafaring, attention should be given to reducing on-board duration, compliance with the contract, and internet accessibility on board.

  12. IP communication optimization for 6LoWPAN-Based Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Li MA

    2014-07-01

    Full Text Available The emergence of 6LoWPAN makes it possible that Wireless Sensor Networks access to the Internet. However, the cost of IP communication between 6LoWPAN wireless sensor node and external internet node is still relatively high. This paper proposed a new addressing configuration and compression scheme in 6LoWPAN network called IPHC-NAT, which largely reduced the proportion of the IP header in 6LoWPAN packet, designed and constructed a bidirectional data transmission gateway to connect 6LoWPAN wireless sensor node with IPv6 client. The experimental results show the feasibility of the design of IPHC-NAT and the data transmission efficiency has significantly been improved compared to the original 6LoWPAN network.

  13. Analysis of the Main Access Municipal Project Free and Free Internet in Public Squares: Digital Inclusion in the Present Corporate Information Globalized

    Directory of Open Access Journals (Sweden)

    Anderson Nogueira Oliveira

    2015-12-01

    Full Text Available The present study has as its theme the role of municipalities in the current global information society. So it has the general objective analysis on the free access to the internet in public places as a means of digital inclusion, with such spaces known as digital o hotspots squares. In this case we will present concepts, definitions and brief historical development of the objects of study of this research, namely, globalization, the information society and digital inclusion. We emphasize that this research will analyze recent data on internet access in Brazil, and will check the key municipal projects freely and free internet access in public squares. For this research we use the hypothetical-deductive method by the methodology of analysis of books, scientific papers and official data by renamed institutions to present a scientifically valid conclusion.

  14. Data converters for wireless standards

    CERN Document Server

    Shi, Chunlei

    2002-01-01

    Wireless communication is witnessing tremendous growth with proliferation of different standards covering wide, local and personal area networks (WAN, LAN and PAN). The trends call for designs that allow 1) smooth migration to future generations of wireless standards with higher data rates for multimedia applications, 2) convergence of wireless services allowing access to different standards from the same wireless device, 3) inter-continental roaming. This requires designs that work across multiple wireless standards, can easily be reused, achieve maximum hardware share at a minimum power consumption levels particularly for mobile battery-operated devices.

  15. A Low Collision and High Throughput Data Collection Mechanism for Large-Scale Super Dense Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chunyang Lei

    2016-07-01

    Full Text Available Super dense wireless sensor networks (WSNs have become popular with the development of Internet of Things (IoT, Machine-to-Machine (M2M communications and Vehicular-to-Vehicular (V2V networks. While highly-dense wireless networks provide efficient and sustainable solutions to collect precise environmental information, a new channel access scheme is needed to solve the channel collision problem caused by the large number of competing nodes accessing the channel simultaneously. In this paper, we propose a space-time random access method based on a directional data transmission strategy, by which collisions in the wireless channel are significantly decreased and channel utility efficiency is greatly enhanced. Simulation results show that our proposed method can decrease the packet loss rate to less than 2 % in large scale WSNs and in comparison with other channel access schemes for WSNs, the average network throughput can be doubled.

  16. Generic medicines: an evaluation of the accuracy and accessibility of information available on the Internet.

    Science.gov (United States)

    Dunne, Suzanne S; Cummins, Niamh M; Hannigan, Ailish; Shannon, Bill; Dunne, Colum; Cullen, Walter

    2013-10-07

    Internationally, generic medicines are increasingly seen as a key strategy to reduce healthcare expenditure, therefore awareness and knowledge transfer regarding generic medicines are valid areas of research. Although the Internet is a frequently used source of medical information, the accuracy of material found online is variable. The aim of this study was to evaluate information provided on the Internet regarding generic medicines in terms of quality of information and readability. Internet searches for information regarding generic medicine were completed, with a pre-defined search term, using the Google search engine, in five English-speaking geographical regions (US, UK, Ireland, Canada and Australia). Search results likely to be looked at by a searcher were collated and assessed for the quality of generic medicine-related information in the websites, using a novel customised Website Quality Assessment (WQA) tool; and for readability, using existing methods. The reproducibility of the tools between two independent reviewers was evaluated and correlations between WQA score, readability statistics and Google search engine results page ranking were assessed. Wikipedia was the highest-ranking search result in 100% of searches performed. Considerable variability of search results returned between different geographical regions was observed, including that websites identified in the Australian search generated the highest number of country specific websites; searches performed using computers with Irish, British, American and Canadian IP addresses appear to be more similar to each other than the google.com search performed in Australia; and the Canadian google.ca results show a notable difference from any of the other searches. Of the 24 websites assessed, none scored a perfect WQA score. Notably, strong correlation was seen between WQA and readability scores and ranking on google.com search results. This novel evaluation of websites providing information on generic

  17. Broadband and the Internet.

    Science.gov (United States)

    Gutierrez, Vicente

    2002-01-01

    The Internet is a tool one can use every day to get information. In every location, the way you can access the Internet is different. The purpose of this article is to review the different types of Internet access available with emphasis on broadband. The advantages and disadvantages of every type of access are discussed.

  18. Social disparities in internet patient portal use in diabetes: evidence that the digital divide extends beyond access.

    Science.gov (United States)

    Sarkar, Urmimala; Karter, Andrew J; Liu, Jennifer Y; Adler, Nancy E; Nguyen, Robert; López, Andrea; Schillinger, Dean

    2011-05-01

    The authors investigated use of the internet-based patient portal, kp.org, among a well-characterized population of adults with diabetes in Northern California. Among 14,102 diverse patients, 5671 (40%) requested a password for the patient portal. Of these, 4311 (76%) activated their accounts, and 3922 (69%), logged on to the patient portal one or more times; 2990 (53%) participants viewed laboratory results, 2132 (38%) requested medication refills, 2093 (37%) sent email messages, and 835 (15%) made medical appointments. After adjustment for age, gender, race/ethnicity, immigration status, educational attainment, and employment status, compared to non-Hispanic Caucasians, African-Americans and Latinos had higher odds of never logging on (OR 2.6 (2.3 to 2.9); OR 2.3 (1.9 to 2.6)), as did those without an educational degree (OR compared to college graduates, 2.3 (1.9 to 2.7)). Those most at risk for poor diabetes outcomes may fall further behind as health systems increasingly rely on the internet and limit current modes of access and communication.

  19. Who is NOT likely to access the Internet for health information? Findings from first-time mothers in southwest Sydney, Australia.

    Science.gov (United States)

    Wen, Li Ming; Rissel, Chris; Baur, Louise A; Lee, Eric; Simpson, Judy M

    2011-06-01

    This study aimed to explore inequities in access to online health information and its relation to socioeconomic status, and to inform the development of the use of the Internet for health promotion. We analyzed cross-sectional baseline survey data for 664 first-time mothers from the Healthy Beginnings Trial conducted in Southwest Sydney, Australia during 2007-2010. First-time mothers' reports of their computer ownership, sources of health information including Internet access and self-rated health as well as demographic data were collected through face-to-face interviews. Multivariate analysis was performed using log-binomial regression. We found that 37% of first-time mothers reported not using the Internet for health information. Maternal education level, household income level and having a computer at home were significant factors associated with the use of the Internet for health information after adjusting for other factors. Mothers who only had school certificate or lower were 1.5 times more likely not to use the Internet for health information than those with university/tertiary education [adjusted risk ratio (ARR) 1.50, 95% CI 1.06-2.12, P=0.03]. Mothers with a household income of less than $40,000 per year were 1.7 times more likely not to use the Internet for health information than those with a household income over $80,000 per year (ARR 1.66, 95% CI 1.24-2.12, P=0.001). These findings have important implications for using the Internet for health promotion among young women. A substantial number of first-time mothers do not access the Internet for health information, in particular among those with lower levels of education, lower household income and without a computer at home. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.

  20. Identity Management Framework for Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.

    -configuring capability and is termed as Internet of Things (IoT). The vision of IoT is to connect every object with computing, communication and sensing ability to the Internet. IoT contains varied range of devices from RFID tags, sensor nodes to the even shoes. Thus, IoT enable nomadic collaboration and communication...... between users and devices, between devices themselves and devices to services. Due to rapid technological advancements in the wireless communications, information coming from uncountable applications and services converged on user devices, communication infrastructure and the Internet are integral part...... that are public can be part of the personal space of multiple users at the same time. Secure interaction in and with IoT, secure data management and exchange, authentication, distributed access control and IdM of the devices are the main challenges. The work carried out in the scope of this thesis addresses...

  1. 75 FR 28249 - Comment Sought on Measures Designed To Assist U.S. Wireless Consumers To Avoid “Bill Shock”

    Science.gov (United States)

    2010-05-20

    ... Union (EU) regulations that would provide wireless voice, text, and data consumers in the United States... similar usage controls as those now required by the EU. DATES: Comments are due on or before July 6, 2010...: Comments may be filed electronically using the Internet by accessing the Commission's Electronic comment...

  2. A Multifactor Secure Authentication System for Wireless Payment

    Science.gov (United States)

    Sanyal, Sugata; Tiwari, Ayu; Sanyal, Sudip

    Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. The vulnerability is that access is based on only single factor authentication which is not secure to protect user data, there is a need of multifactor authentication. This paper proposes a new protocol based on multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce another security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy with in a limited resources that does not require any change in infrastructure or underline protocol of wireless network. This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases faith of the user and business organizations on wireless financial transaction using mobile devices.

  3. Multi-Channel Multi-Radio Using 802.11 Based Media Access for Sink Nodes in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kok-Keong Loo

    2011-05-01

    Full Text Available The next generation surveillance and multimedia systems will become increasingly deployed as wireless sensor networks in order to monitor parks, public places and for business usage. The convergence of data and telecommunication over IP-based networks has paved the way for wireless networks. Functions are becoming more intertwined by the compelling force of innovation and technology. For example, many closed-circuit TV premises surveillance systems now rely on transmitting their images and data over IP networks instead of standalone video circuits. These systems will increase their reliability in the future on wireless networks and on IEEE 802.11 networks. However, due to limited non-overlapping channels, delay, and congestion there will be problems at sink nodes. In this paper we provide necessary conditions to verify the feasibility of round robin technique in these networks at the sink nodes by using a technique to regulate multi-radio multichannel assignment. We demonstrate through simulations that dynamic channel assignment scheme using multi-radio, and multichannel configuration at a single sink node can perform close to optimal on the average while multiple sink node assignment also performs well. The methods proposed in this paper can be a valuable tool for network designers in planning network deployment and for optimizing different performance objectives.

  4. Multi-channel multi-radio using 802.11 based media access for sink nodes in wireless sensor networks.

    Science.gov (United States)

    Campbell, Carlene E-A; Khan, Shafiullah; Singh, Dhananjay; Loo, Kok-Keong

    2011-01-01

    The next generation surveillance and multimedia systems will become increasingly deployed as wireless sensor networks in order to monitor parks, public places and for business usage. The convergence of data and telecommunication over IP-based networks has paved the way for wireless networks. Functions are becoming more intertwined by the compelling force of innovation and technology. For example, many closed-circuit TV premises surveillance systems now rely on transmitting their images and data over IP networks instead of standalone video circuits. These systems will increase their reliability in the future on wireless networks and on IEEE 802.11 networks. However, due to limited non-overlapping channels, delay, and congestion there will be problems at sink nodes. In this paper we provide necessary conditions to verify the feasibility of round robin technique in these networks at the sink nodes by using a technique to regulate multi-radio multichannel assignment. We demonstrate through simulations that dynamic channel assignment scheme using multi-radio, and multichannel configuration at a single sink node can perform close to optimal on the average while multiple sink node assignment also performs well. The methods proposed in this paper can be a valuable tool for network designers in planning network deployment and for optimizing different performance objectives.

  5. Comportamento de busca na internet: umestudo exploratório em salas comunitárias Information seeking behaviour on the internet: An exploratory study in community access centres

    Directory of Open Access Journals (Sweden)

    Ariadne Chlöe Mary Furnival

    2008-01-01

    Full Text Available Estudo sobre o comportamento de busca de informação dos usuários das salas deInternet existentes em duas instituições numa cidade do interior do estado de São Paulo,que promovem o acesso gratuito à comunidade, assim contribuindo ativamente ao processo de inclusão digital; A análise do comportamento de busca de informação dos usuários visou identificar a estratégia global de busca empregada, compreendendo a utilização da sintaxe e semântica de busca, as fontes de informação e os usos da Internet; Foram aplicados 61 questionários com perguntas fechadas e abertas_ e os resultados permitem afirmar que os usuários possuem pouca familiaridade com a Internet, efetuam em média 1 a 2 buscas e empregam poucos termos na formulação da expressão de busca, ainda que recuperem as informações que necessitam.The information seeking behaviour of the users of Internet access centres that are located in two organizations in a town in the interior of the state of Sâo Paulo was studied. These organizations promote free internet access to the community, thereby contributing to the process of digial inclusion. The analysis of the users´information searching behaviour sought to identify what global search strategy the users used, including search syntax and semantics, information sources and for what the Internet was used. Sixty-one questionnaires with open and closed questions were applied, and the results point to the fact that the users have little familiarity with the Internet, that they carry out one to two searches on average, and that they use few terms in the formulation of the search expression, despite retrieving the information that they require.

  6. Lively data: discover, browse and access ocean altimetry data on internet

    Directory of Open Access Journals (Sweden)

    V. Rosmorduc

    2006-01-01

    Full Text Available The Products and Services (P&S department in the Space Oceanography Division at CLS (Collecte, Localisation, Satellites is in charge of distributing and promoting altimetry and operational oceanography data. The department is thus involved in the Aviso satellite altimetry project (the French service which distributes altimetry products since 1992, in the Mercator ocean operational forecasting system, and in the European Godae/Mersea ocean portal. Aiming to a standardisation and a common vision and management of all these ocean data, all these projects, led to the implementation of several Opendap/LAS Internet servers (Baudel et al., 2004. Some of the possibilities of the tools, as well as how-to information will be highlighted, as they are in the "Lively data'' section of Aviso website (see http://www.aviso.oceanobs.com/html/donnees/las/. Moreover, with a two-year experience we now have some feedback and analysis of how people – users, would-be users and students alike – are using this tool, some ideas for possible enhancements, etc.

  7. U.S. Government Open Internet Access to Sub-meter Satellite Data

    Science.gov (United States)

    Neigh, Christopher S. R> Masek, Jeffery G.; Nickeson, Jaime E.

    2012-01-01

    The National Geospatial-Intelligence Agency (NGA) has contracted United States commercial remote sensing companies GeoEye and Digital Globe to provide very high resolution commercial quality satellite imagery to federal/state government agencies and those projects/people who support government interests. Under NextView contract terms, those engaged in official government programs/projects can gain online access to NGA's vast global archive. Additionally, data from vendor's archives of IKONOS-2 (IK-2), OrbView-3 (OB-3), GeoEye-1 (GE-1), QuickBird-1 (QB-1), WorldView-1 (WV-1), and WorldView-2 (WV-2), sensors can also be requested under these agreements. We report here the current extent of this archive, how to gain access, and the applications of these data by Earth science investigators to improve discoverability and community use of these data. Satellite commercial quality imagery (CQI) at very high resolution (data source to U.S. federal, state, and local governments for many different purposes. The rapid growth of free global CQI data has been slow to disseminate to NASA Earth Science community and programs such as the Land-Cover Land-Use Change (LCLUC) program which sees potential benefit from unprecedented access. This article evolved from a workshop held on February 23rd, 2012 between representatives from NGA, NASA, and NASA LCLUC Scientists discussion on how to extend this resource to a broader license approved community. Many investigators are unaware of NGA's archive availability or find it difficult to access CQI data from NGA. Results of studies, both quality and breadth, could be improved with CQI data by combining them with other moderate to coarse resolution passive optical Earth observation remote sensing satellites, or with RADAR or LiDAR instruments to better understand Earth system dynamics at the scale of human activities. We provide the evolution of this effort, a guide for qualified user access, and describe current to potential use of these

  8. Predicting fluctuations in widespread interest: memory decay and goal-related memory accessibility in internet search trends.

    Science.gov (United States)

    Masicampo, E J; Ambady, Nalini

    2014-02-01

    Memory and interest respond in similar ways to people's shifting needs and motivations. We therefore tested whether memory and interest might produce similar, observable patterns in people's responses over time. Specifically, the present studies examined whether fluctuations in widespread interest (as measured by Internet search trends) resemble two well-established memory patterns: memory decay and goal-related memory accessibility. We examined national and international events (e.g., Nobel Prize selections, holidays) that produced spikes in widespread interest in certain people and foods. When the events that triggered widespread interest were incidental (e.g., the death of a celebrity), widespread interest conformed to memory decay patterns: It rose quickly, fell slowly according to a power function, and was higher after the event than before it. When the events that triggered widespread interest were goal related (e.g., political elections), widespread interest conformed to patterns of goal-related memory accessibility: It rose slowly, fell quickly according to a sigmoid function, and was lower after the event than before it. Fluctuations in widespread interest over time are thus similar to standard memory patterns observed at the individual level due perhaps to common mechanisms and functions.

  9. Remote Internet access to advanced analytical facilities: a new approach with Web-based services.

    Science.gov (United States)

    Sherry, N; Qin, J; Fuller, M Suominen; Xie, Y; Mola, O; Bauer, M; McIntyre, N S; Maxwell, D; Liu, D; Matias, E; Armstrong, C

    2012-09-04

    Over the past decade, the increasing availability of the World Wide Web has held out the possibility that the efficiency of scientific measurements could be enhanced in cases where experiments were being conducted at distant facilities. Examples of early successes have included X-ray diffraction (XRD) experimental measurements of protein crystal structures at synchrotrons and access to scanning electron microscopy (SEM) and NMR facilities by users from institutions that do not possess such advanced capabilities. Experimental control, visual contact, and receipt of results has used some form of X forwarding and/or VNC (virtual network computing) software that transfers the screen image of a server at the experimental site to that of the users' home site. A more recent development is a web services platform called Science Studio that provides teams of scientists with secure links to experiments at one or more advanced research facilities. The software provides a widely distributed team with a set of controls and screens to operate, observe, and record essential parts of the experiment. As well, Science Studio provides high speed network access to computing resources to process the large data sets that are often involved in complex experiments. The simple web browser and the rapid transfer of experimental data to a processing site allow efficient use of the facility and assist decision making during the acquisition of the experimental results. The software provides users with a comprehensive overview and record of all parts of the experimental process. A prototype network is described involving X-ray beamlines at two different synchrotrons and an SEM facility. An online parallel processing facility has been developed that analyzes the data in near-real time using stream processing. Science Studio and can be expanded to include many other analytical applications, providing teams of users with rapid access to processed results along with the means for detailed

  10. Development of a functional, internet-accessible department of surgery outcomes database.

    Science.gov (United States)

    Newcomb, William L; Lincourt, Amy E; Gersin, Keith; Kercher, Kent; Iannitti, David; Kuwada, Tim; Lyons, Cynthia; Sing, Ronald F; Hadzikadic, Mirsad; Heniford, B Todd; Rucho, Susan

    2008-06-01

    The need for surgical outcomes data is increasing due to pressure from insurance companies, patients, and the need for surgeons to keep their own "report card". Current data management systems are limited by inability to stratify outcomes based on patients, surgeons, and differences in surgical technique. Surgeons along with research and informatics personnel from an academic, hospital-based Department of Surgery and a state university's Department of Information Technology formed a partnership to develop a dynamic, internet-based, clinical data warehouse. A five-component model was used: data dictionary development, web application creation, participating center education and management, statistics applications, and data interpretation. A data dictionary was developed from a list of data elements to address needs of research, quality assurance, industry, and centers of excellence. A user-friendly web interface was developed with menu-driven check boxes, multiple electronic data entry points, direct downloads from hospital billing information, and web-based patient portals. Data were collected on a Health Insurance Portability and Accountability Act-compliant server with a secure firewall. Protected health information was de-identified. Data management strategies included automated auditing, on-site training, a trouble-shooting hotline, and Institutional Review Board oversight. Real-time, daily, monthly, and quarterly data reports were generated. Fifty-eight publications and 109 abstracts have been generated from the database during its development and implementation. Seven national academic departments now use the database to track patient outcomes. The development of a robust surgical outcomes database requires a combination of clinical, informatics, and research expertise. Benefits of surgeon involvement in outcomes research include: tracking individual performance, patient safety, surgical research, legal defense, and the ability to provide accurate information

  11. Managing healthcare information using short message service (SMS) in wireless broadband networks

    Science.gov (United States)

    Documet, Jorge; Tsao, Sinchai; Documet, Luis; Liu, Brent J.; Zhou, Zheng; Joseph, Anika O.

    2007-03-01

    Due to the ubiquity of cell phones, SMS (Short Message Service) has become an ideal means to wirelessly manage a Healthcare environment and in particular PACS (Picture Archival and Communications System) data. SMS is a flexible and mobile method for real-time access and control of Healthcare information systems such as HIS (Hospital Information System) or PACS. Unlike conventional wireless access methods, SMS' mobility is not limited by the presence of a WiFi network or any other localized signal. It provides a simple, reliable yet flexible method to communicate with an information system. In addition, SMS services are widely available for low costs from cellular phone service providers and allows for more mobility than other services such as wireless internet. This paper aims to describe a use case of SMS as a means of remotely communicating with a PACS server. Remote access to a PACS server and its Query-Retrieve services allows for a more convenient, flexible and streamlined radiology workflow. Wireless access methods such as SMS will increase dedicated PACS workstation availability for more specialized DICOM (Digital Imaging and Communications in Medicine) workflow management. This implementation will address potential security, performance and cost issues of applying SMS as part of a healthcare information management system. This is in an effort to design a wireless communication system with optimal mobility and flexibility at minimum material and time costs.

  12. Characterizing Deficiencies of Path-Based Routing for Wireless Multi-Hop Networks

    Science.gov (United States)

    2017-05-01

    how effective routing is for reliably and efficiently delivering data in a wireless network. With the emergence of the Internet of Things , there is a...But with the advent of the Internet of Things , the number of wireless networked devices is expected to reach into the billions [1–3]. To support this...of the wireless environ- ment inherently make link-based routing unsuitable for wireless networking. Requirements for the future Internet of Things are

  13. Medication errors with the use of allopurinol and colchicine : A retrospective study of a national, anonymous Internet-accessible error reporting system

    NARCIS (Netherlands)

    Mikuls, TR; Curtis, [No Value; Allison, JJ; Hicks, RW; Saag, KG

    Objectives. To more closely assess medication errors in gout care, we examined data from a national, Internet-accessible error reporting program over a 5-year reporting period. Methods. We examined data from the MEDMARX (TM) database, covering the period from January 1, 1999 through December 31,

  14. Examining Internet Access and Social Media Application Use for Online Nutrition Education in SNAP-Ed Participants in Rural Illinois.

    Science.gov (United States)

    Loehmer, Emily; Smith, Sylvia; McCaffrey, Jennifer; Davis, Jeremy

    2018-01-01

    To examine Internet access and interest in receiving nutrition education via social media applications among low-income adults participating in the Supplemental Nutrition Assistance Program Education (SNAP-Ed). A cross-sectional survey was distributed during 25 SNAP-Ed classes throughout the 16 southernmost counties of Illinois. From 188 responses, the majority of participants had Internet access (76%). Among participants aged 18-32 years (n = 51), 92% owned a smartphone with Internet access and 57% indicated that they would use online nutrition education, with most interest in e-mail (41%), Facebook (40%), and text messaging (35%). There was little interest in using blogs, Vine, Twitter, Tumblr, and Pinterest. Overall, 49% of middle-aged adults aged 33-64 years and 87% of seniors aged ≥65 years reported they would not use online nutrition education. Results indicated similar Internet accessibility in southern Illinois among low-income populations compared with national rural rates. Interest in using online nutrition education varied among SNAP-Ed participants according to age. Young adults appeared to be the most captive audience regarding online nutrition education. Results may be useful to agencies implementing SNAP-Ed to supplement current curriculum with online nutrition education for audiences aged ≤32 years. Copyright © 2017 Society for Nutrition Education and Behavior. Published by Elsevier Inc. All rights reserved.

  15. VoIP Accessibility: A Usability Study of Voice over Internet Protocol (VoIP) Systems and A Survey of VoIP Users with Vision Loss

    Science.gov (United States)

    Packer, Jaclyn; Reuschel, William

    2018-01-01

    Introduction: Accessibility of Voice over Internet Protocol (VoIP) systems was tested with a hands-on usability study and an online survey of VoIP users who are visually impaired. The survey examined the importance of common VoIP features, and both methods assessed difficulty in using those features. Methods: The usability test included four paid…

  16. The Lure of Wireless Encryption

    CERN Multimedia

    Computer Security Team

    2013-01-01

    Following our article entitled “Jekyll or Hyde? Better browse securely” in the last issue of the Bulletin, some people wondered why the CERN wireless network is not encrypted…   There are many arguments why it is not. The simplest is usability: the communication and management of the corresponding access keys would be challenging given the sheer number of wireless devices the CERN network hosts. Keys would quickly become public, e.g. at conferences, and might be shared, written on whiteboards, etc. Then there are all the devices which cannot be easily configured to use encryption protocols - a fact which would create plenty of calls to the CERN Service Desk… But our main argument is that wireless encryption is DECEPTIVE. Wireless encryption is deceptive as it only protects the wireless network against unauthorised access (and the CERN network already has other means to protect against that). Wireless encryption however, does not really help you. You ...

  17. Internet tool box for rural GPs to access mental health services information.

    Science.gov (United States)

    Ollerenshaw, Alison

    2009-01-01

    Rural GPs play a significant role in the mental health care of their patients. It is therefore crucial that they have access to reputable support and advice that enhances their existing knowledge. This article outlines a recent project initiated by the Australian rural Ballarat and District Division of General Practice (BDDGP) to develop and implement an online resource to facilitate local implementation and delivery of the 'Better Access to Mental Health Care' (BAMHC) program. This 12 month project was initiated in response to a request from local GPs for additional information about and support in using the BAMHC program. The project is the culmination of significant collaboration among key stakeholders that includes local GPs, GP advisors from BDDGP, BDDGP staff, and two University of Ballarat research centres (the Centre for Health Research and Practice, and the Centre for Electronic Commerce and Communication). This article documents the key stages involved in the project from initiation to implementation, and reports on the use of this resource 12 months after its launch. The BDDGP represents 107 GPs and six GP registrars and covers a large rural/semi-rural area of 7300 km2 and a catchment population of more than 120,000. The format and design of the project entailed four distinct but interrelated stages of development: (1) developing the program specifications and localising it to the BDDGP catchment; (2) constructing a decision-making support tool with 7 sequential steps comprising key questions and links to detailed answers; (3) developing and populating an online service directory of local allied health professionals; and (4) constructing the website for easy access and navigation for GPs and other service providers. The website was publicly launched in December 2007 and is hosted by BDDGP. Since then it has received strong support. In the 12 months since its launch the website received regular and continuous visits (2847 visits/11,500 pages accessed). In

  18. Channel capacity of TDD-OFDM-MIMO for multiple access points in a wireless single-frequency-network

    DEFF Research Database (Denmark)

    Takatori, Y.; Fitzek, Frank; Tsunekawa, K.

    2005-01-01

    The multiple-input-multiple-output (MIMO) technique is the most attractive candidate to improve the spectrum efficiency in the next generation wireless communication systems. However, the efficiency of MIMO techniques reduces in the line of sight (LOS) environments. In this paper, we propose a new...... LOS and non line of sight (NLOS) environments. The channel capacity of the proposed method is derived for the direct path environments and it confirms the effectiveness of the proposed scheme in the LOS scenario. Moreover, solid computer simulation results confirm the effectiveness of the proposed...

  19. Analisis Performansi VOIP (Voice Over Internet Protocol Pada Jaringan Wimax (Worldwide Interoperability For Microwave Access Di Wilayah DKI Jakarta

    Directory of Open Access Journals (Sweden)

    Widhiatmoko Widhiatmoko

    2011-05-01

    Full Text Available VoIP is a system that uses the Internet network to transmit voice packets from one place to another using IP protocols intermediaries. With VoIP technology can be much cheaper call charges, especially for communicating overseas because of voice and data using the same network ie the Internet network. VoIP is a service that is very susceptible to delay while the existing access network is currently providing a significant delay for VoIP. One alternative network that can be used to overcome these problems is to use WiMAX technology because WiMAX can provide speed data services up to 70 Mbps.From the research,  results of one way delay, jitter and packet loss still at the value recommended by ITU-T, which is the maximum value of one way delay measurement is 159.87 ms, for jitter 7.52 ms and for packet loss is 3.175%. The one way delay and packet loss from the measurement used to find the MOS score which is the value for quality of VoIP. MOS value range obtained from the calculation of 3.6 to 4.2, which means VoIP feasible to apply to the WiMAX network. The maximum value can reach 2.8 Mbps throughput to 0.575 Mbps for downlink and uplink. From the research also found that the SQI values that are above the standard value of the device will provide a high SNR value, and the higher SQI values then its RSSI value is also bigger.

  20. Internet Addiction among Adolescence

    Science.gov (United States)

    Sargin, Nurten

    2012-01-01

    Each innovation brings along many risks. One of the risks related with the Internet use is Internet addiction. The aim of this study is to examine Internet addiction in adolescence in terms of gender, Internet access at home and grades. The research design used was survey method. The study population consisted of second stage students attending…

  1. Design and Implementation of an IoT Access Point for Smart Home

    Directory of Open Access Journals (Sweden)

    Chih-Yung Chang

    2015-12-01

    Full Text Available Network communication and micro-electro-mechanical embedded technologies have attracted much attention in recent years. Through these technologies, the capabilities of sensing, identification, and communication can be embedded in various smart devices. These smart devices can automatically connect to the Internet and form an intelligent network called Internet of Things (IoT. However, these devices are embedded with different wireless communication interfaces such as Wi-Fi and ZigBee. This paper presents the design and implementation of an IoT access point that supports functionalities of coordination of various wireless transmission protocols. Based on the existing Wi-Fi access point, we have embedded a ZigBee module and implemented ZigBee and UPnP protocols into the designed IoT access point, which supports ZigBee communication capabilities over the Internet.

  2. Wireless home networking for dummies

    CERN Document Server

    Briere, Danny; Ferris, Edward

    2010-01-01

    The perennial bestseller shows you how share your files and Internet connection across a wireless network. Fully updated for Windows 7 and Mac OS X Snow Leopard, this new edition of this bestseller returns with all the latest in wireless standards and security. This fun and friendly guide shows you how to integrate your iPhone, iPod touch, smartphone, or gaming system into your home network. Veteran authors escort you through the various financial and logisitical considerations that you need to take into account before building a wireless network at home.: Covers the basics of planning, instal

  3. An Analysis Of Wireless Security

    OpenAIRE

    Salendra Prasad

    2017-01-01

    The WLAN security includes Wired Equivalent Primary WEP and WI-FI protected Access WPA. Today WEP is regarded as very poor security standard. WEP was regarded as very old security standard and has many security issues which users need to be addressed. In this Paper we will discuss Wireless Security and ways to improve on wireless security.

  4. Hybrid algorithm: A cost efficient solution for ONU placement in Fiber-Wireless (FiWi) network

    Science.gov (United States)

    Bhatt, Uma Rathore; Chouhan, Nitin; Upadhyay, Raksha

    2015-03-01

    Fiber-Wireless (FiWi) network is a promising access technology as it integrates the technical merits of optical and wireless access networks. FiWi provides large bandwidth and high stability of optical network and lower cost of wireless network respectively. Therefore, FiWi gives users to access broadband services in an "anywhere-anytime" way. One of the key issues in FiWi network is its deployment cost, which depends on the number of ONUs in the network. Therefore optimal placement of ONUs is desirable to design a cost effective network. In this paper, we propose an algorithm for optimal placement of ONUs. First we place an ONU in the center of each grid then we form a set of wireless routers associated with each ONU according to wireless hop number. The number of ONUs are minimized in such a way, that all the wireless routers can communicate to at least one of the ONUs. The number of ONUs in the network further reduced by using genetic algorithm. The effectiveness of the proposed algorithm is tested by considering Internet traffic as well as peer-to-peer (p2p) traffic in the network, which is a current need. Simulation results show that the proposed algorithm is better than existing algorithms in minimizing number of ONUs in the network for both types of traffics. Hence proposed algorithm offers cost effective solution to design the FiWi network.

  5. Wireless telecommunication systems

    CERN Document Server

    Terré, Michel; Vivier, Emmanuelle

    2013-01-01

    Wireless telecommunication systems generate a huge amount of interest. In the last two decades, these systems have experienced at least three major technological leaps, and it has become impossible to imagine how society was organized without them. In this book, we propose a macroscopic approach on wireless systems, and aim at answering key questions about power, data rates, multiple access, cellular engineering and access networks architectures.We present a series of solved problems, whose objective is to establish the main elements of a global link budget in several radiocommunicati

  6. Internet Access, Use and Gratification among University Students: A Case Study of the Islamia University of Bahawalpur, Pakistan

    Directory of Open Access Journals (Sweden)

    Shakeel Ahmad Khan

    2011-12-01

    Full Text Available This study aims to investigate the attitude s of students at the Islamia University of Bahawalpur, Pakistan towards learning through the Internet. A structured questionnaire was used for data collection. It was found that a vast majority of the students learnt how to use the Internet by themselves or with the assistance of their friends. The findings showed that their attitude towards the Internet was very positive and they used it mainly for study purpose. They used online databases, dictionaries, encyclopedias and online courses. Google was the most popular search engine for retrieving information on the Internet. However, the use of free database services provide d by the Higher Education Commission (HEC of Pakistan was not satisfactory. The respondents were also dissatisfied with the Internet service provision, slow speed of the Internet connection and inadequate number of computers in computer labs.

  7. A Forensic Readiness Model for Wireless Networks

    OpenAIRE

    Ngobeni, Sipho; Venter, Hein; Burke, Ivan

    2010-01-01

    International audience; Over the past decade, wireless mobile communications technology based on IEEE 802.11 wireless local area networks (WLANs) has been adopted worldwide on a massive scale. However, as the number of wireless users has soared, so has the possibility of cyber crime, where criminals deliberately and actively break into WLANs with the intent to cause harm or access sensitive information. WLAN digital forensics is seen not only as a response to cyber crime in wireless environme...

  8. Internet-accessed sexually transmitted infection (e-STI testing and results service: A randomised, single-blind, controlled trial.

    Directory of Open Access Journals (Sweden)

    Emma Wilson

    2017-12-01

    Full Text Available Internet-accessed sexually transmitted infection testing (e-STI testing is increasingly available as an alternative to testing in clinics. Typically this testing modality enables users to order a test kit from a virtual service (via a website or app, collect their own samples, return test samples to a laboratory, and be notified of their results by short message service (SMS or telephone. e-STI testing is assumed to increase access to testing in comparison with face-to-face services, but the evidence is unclear. We conducted a randomised controlled trial to assess the effectiveness of an e-STI testing and results service (chlamydia, gonorrhoea, HIV, and syphilis on STI testing uptake and STI cases diagnosed.The study took place in the London boroughs of Lambeth and Southwark. Between 24 November 2014 and 31 August 2015, we recruited 2,072 participants, aged 16-30 years, who were resident in these boroughs, had at least 1 sexual partner in the last 12 months, stated willingness to take an STI test, and had access to the internet. Those unable to provide consent and unable to read English were excluded. Participants were randomly allocated to receive 1 text message with the web link of an e-STI testing and results service (intervention group or to receive 1 text message with the web link of a bespoke website listing the locations, contact details, and websites of 7 local sexual health clinics (control group. Participants were free to use any other services or interventions during the study period. The primary outcomes were self-reported STI testing at 6 weeks, verified by patient record checks, and self-reported STI diagnosis at 6 weeks, verified by patient record checks. Secondary outcomes were the proportion of participants prescribed treatment for an STI, time from randomisation to completion of an STI test, and time from randomisation to treatment of an STI. Participants were sent a £10 cash incentive on submission of self-reported data. We

  9. Internet-accessed sexually transmitted infection (e-STI) testing and results service: A randomised, single-blind, controlled trial.

    Science.gov (United States)

    Wilson, Emma; Free, Caroline; Morris, Tim P; Syred, Jonathan; Ahamed, Irrfan; Menon-Johansson, Anatole S; Palmer, Melissa J; Barnard, Sharmani; Rezel, Emma; Baraitser, Paula

    2017-12-01

    Internet-accessed sexually transmitted infection testing (e-STI testing) is increasingly available as an alternative to testing in clinics. Typically this testing modality enables users to order a test kit from a virtual service (via a website or app), collect their own samples, return test samples to a laboratory, and be notified of their results by short message service (SMS) or telephone. e-STI testing is assumed to increase access to testing in comparison with face-to-face services, but the evidence is unclear. We conducted a randomised controlled trial to assess the effectiveness of an e-STI testing and results service (chlamydia, gonorrhoea, HIV, and syphilis) on STI testing uptake and STI cases diagnosed. The study took place in the London boroughs of Lambeth and Southwark. Between 24 November 2014 and 31 August 2015, we recruited 2,072 participants, aged 16-30 years, who were resident in these boroughs, had at least 1 sexual partner in the last 12 months, stated willingness to take an STI test, and had access to the internet. Those unable to provide consent and unable to read English were excluded. Participants were randomly allocated to receive 1 text message with the web link of an e-STI testing and results service (intervention group) or to receive 1 text message with the web link of a bespoke website listing the locations, contact details, and websites of 7 local sexual health clinics (control group). Participants were free to use any other services or interventions during the study period. The primary outcomes were self-reported STI testing at 6 weeks, verified by patient record checks, and self-reported STI diagnosis at 6 weeks, verified by patient record checks. Secondary outcomes were the proportion of participants prescribed treatment for an STI, time from randomisation to completion of an STI test, and time from randomisation to treatment of an STI. Participants were sent a £10 cash incentive on submission of self-reported data. We completed all

  10. Multi-channel Dual Clocks three-dimensional probability Random Multiple Access protocol for Wireless Public Bus Networks based on RTS/CTS mechanism

    Directory of Open Access Journals (Sweden)

    Zhou Sheng Jie

    2016-01-01

    Full Text Available A MAC protocol for public bus networks, called Bus MAC protocol, designed to provide high quality Internet service for bus passengers. The paper proposed a multi-channel dual clocks three-demission probability random multiple access protocol based on RTS/CTS mechanism, decreasing collisions caused by multiple access from multiple passengers. Use the RTS/CTS mechanism increases the reliability and stability of the system, reducing the collision possibility of the information packets to a certain extent, improves the channel utilization; use the multi-channel mechanism, not only enables the channel load balancing, but also solves the problem of the hidden terminal and exposed terminal. Use the dual clocks mechanism, reducing the system idle time. At last, the different selection of the three-dimensional probabilities can make the system throughput adapt to the network load which could realize the maximum of the system throughput.

  11. Access to care and use of the Internet to search for health information: results from the US National Health Interview Survey.

    Science.gov (United States)

    Amante, Daniel J; Hogan, Timothy P; Pagoto, Sherry L; English, Thomas M; Lapane, Kate L

    2015-04-29

    The insurance mandate of the Affordable Care Act has increased the number of people with health coverage in the United States. There is speculation that this increase in the number of insured could make accessing health care services more difficult. Those who are unable to access care in a timely manner may use the Internet to search for information needed to answer their health questions. The aim was to determine whether difficulty accessing health care services for reasons unrelated to insurance coverage is associated with increased use of the Internet to obtain health information. Survey data from 32,139 adults in the 2011 National Health Interview Study (NHIS) were used in this study. The exposure for this analysis was reporting difficulty accessing health care services or delaying getting care for a reason unrelated to insurance status. To define this exposure, we examined 8 questions that asked whether different access problems occurred during the previous 12 months. The outcome for this analysis, health information technology (HIT) use, was captured by examining 2 questions that asked survey respondents if they used an online health chat room or searched the Internet to obtain health information in the previous 12 months. Several multinomial logistic regressions estimating the odds of using HIT for each reported access difficulty were conducted to accomplish the study objective. Of a survey population of 32,139 adults, more than 15.90% (n=5109) reported experiencing at least one access to care barrier, whereas 3.63% (1168/32,139) reported using online health chat rooms and 43.55% (13,997/32,139) reported searching the Internet for health information. Adults who reported difficulty accessing health care services for reasons unrelated to their health insurance coverage had greater odds of using the Internet to obtain health information. Those who reported delaying getting care because they could not get an appointment soon enough (OR 2.2, 95% CI 1.9-2.5), were

  12. OPTICAL WIRELESS COMMUNICATION SYSTEM

    Directory of Open Access Journals (Sweden)

    JOSHUA L.Y. CHIENG

    2016-02-01

    Full Text Available The growing demand of bandwidth in this modern internet age has been testing the existing telecommunication infrastructures around the world. With broadband speeds moving towards the region of Gbps and Tbps, many researches have begun on the development of using optical wireless technology as feasible and future methods to the current wireless technology. Unlike the existing radio frequency wireless applications, optical wireless uses electromagnetic spectrums that are unlicensed and free. With that, this project aim to understand and gain better understanding of optical wireless communication system by building an experimental and simulated model. The quality of service and system performance will be investigated and reviewed. This project employs laser diode as the propagation medium and successfully transferred audio signals as far as 15 meters. On its quality of service, results of the project model reveal that the bit error rate increases, signal-to-noise ratio and quality factor decreases as the link distance between the transmitter and receiver increases. OptiSystem was used to build the simulated model and MATLAB was used to assist signal-to-noise ratio calculations. By comparing the simulated and experimental receiver’s power output, the experimental model’s efficiency is at 66.3%. Other than the system’s performance, challenges and factors affecting the system have been investigated and discussed. Such challenges include beam divergence, misalignment and particle absorption.

  13. Science and Technology Undergraduate Students' Use of the Internet, Cell Phones and Social Networking Sites to Access Library Information

    Science.gov (United States)

    Salisbury, Lutishoor; Laincz, Jozef; Smith, Jeremy J.

    2012-01-01

    Many academic libraries and publishers have developed mobile-optimized versions of their web sites and catalogs. Almost all database vendors and major journal publishers have provided a way to connect to their resources via the Internet and the mobile web. In light of this pervasive use of the Internet, mobile devices and social networking, this…

  14. The Internet Playground: Children's Access, Entertainment, and Mis-Education. Second Printing. Popular Culture and Everyday Life Volume 10

    Science.gov (United States)

    Seiter, Ellen

    2007-01-01

    Based on four years of experience teaching computers to 8-12 year olds, media scholar Ellen Seiter offers parents and educators practical advice on what children need to know about the Internet and when they need to know it. "The Internet Playground" argues that, contrary to the promises of technology boosters, teaching with computers is…

  15. Bridging the Digital Divide : How Enterprise Ownership and Foreign Competition Affect Internet Access in Eastern Europe and Central Asia

    OpenAIRE

    Clarke, George R.G.

    2001-01-01

    Many observers attributed the rapid productivity growth observed in the United States in the mid- to late 1990s, to the growing use of information, and the Internet. This in turn created concern that developing, and transition economies - where use of information technology, and the Internet was less widespread - would be left behind as productivity, and growth accelerated in technological...

  16. A Multimetric Approach for Handoff Decision in Heterogeneous Wireless Networks

    Science.gov (United States)

    Kustiawan, I.; Purnama, W.

    2018-02-01

    Seamless mobility and service continuity anywhere at any time are an important issue in the wireless Internet. This research proposes a scheme to make handoff decisions effectively in heterogeneous wireless networks using a fuzzy system. Our design lies in an inference engine which takes RSS (received signal strength), data rate, network latency, and user preference as strategic determinants. The logic of our engine is realized on a UE (user equipment) side in faster reaction to network dynamics while roaming across different radio access technologies. The fuzzy system handles four metrics jointly to deduce a moderate decision about when to initiate handoff. The performance of our design is evaluated by simulating move-out mobility scenarios. Simulation results show that our scheme outperforms other approaches in terms of reducing unnecessary handoff.

  17. An Internet of Things based physiological signal monitoring and receiving system for virtual enhanced health care network.

    Science.gov (United States)

    Rajan, J Pandia; Rajan, S Edward

    2018-01-01

    Wireless physiological signal monitoring system designing with secured data communication in the health care system is an important and dynamic process. We propose a signal monitoring system using NI myRIO connected with the wireless body sensor network through multi-channel signal acquisition method. Based on the server side validation of the signal, the data connected to the local server is updated in the cloud. The Internet of Things (IoT) architecture is used to get the mobility and fast access of patient data to healthcare service providers. This research work proposes a novel architecture for wireless physiological signal monitoring system using ubiquitous healthcare services by virtual Internet of Things. We showed an improvement in method of access and real time dynamic monitoring of physiological signal of this remote monitoring system using virtual Internet of thing approach. This remote monitoring and access system is evaluated in conventional value. This proposed system is envisioned to modern smart health care system by high utility and user friendly in clinical applications. We claim that the proposed scheme significantly improves the accuracy of the remote monitoring system compared to the other wireless communication methods in clinical system.

  18. Implementing honeypots as part of a simple cost effective wireless intrusion detection system

    CSIR Research Space (South Africa)

    Velupillai, HM

    2007-09-01

    Full Text Available of wireless networks to implement the wired network design of a honeypot. The paper also provides a script that allows the Atheros chipset to be modified to implement multiple wireless access points on one wireless card...

  19. Application of AN Automated Wireless Structural Monitoring System for Long-Span Suspension Bridges

    Science.gov (United States)

    Kurata, M.; Lynch, J. P.; van der Linden, G. W.; Hipley, P.; Sheng, L.-H.

    2011-06-01

    This paper describes an automated wireless structural monitoring system installed at the New Carquinez Bridge (NCB). The designed system utilizes a dense network of wireless sensors installed in the bridge but remotely controlled by a hierarchically designed cyber-environment. The early efforts have included performance verification of a dense network of wireless sensors installed on the bridge and the establishment of a cellular gateway to the system for remote access from the internet. Acceleration of the main bridge span was the primary focus of the initial field deployment of the wireless monitoring system. An additional focus of the study is on ensuring wireless sensors can survive for long periods without human intervention. Toward this end, the life-expectancy of the wireless sensors has been enhanced by embedding efficient power management schemes in the sensors while integrating solar panels for power harvesting. The dynamic characteristics of the NCB under daily traffic and wind loads were extracted from the vibration response of the bridge deck and towers. These results have been compared to a high-fidelity finite element model of the bridge.

  20. Next-generation wireless technologies 4G and beyond

    CERN Document Server

    Chilamkurti, Naveen; Chaouchi, Hakima

    2013-01-01

    This comprehensive text/reference examines the various challenges to secure, efficient and cost-effective next-generation wireless networking. Topics and features: presents the latest advances, standards and technical challenges in a broad range of emerging wireless technologies; discusses cooperative and mesh networks, delay tolerant networks, and other next-generation networks such as LTE; examines real-world applications of vehicular communications, broadband wireless technologies, RFID technology, and energy-efficient wireless communications; introduces developments towards the 'Internet o

  1. A wireless smart sensor network for automated monitoring of cable tension

    International Nuclear Information System (INIS)

    Sim, Sung-Han; Cho, Soojin; Li, Jian; Jo, Hongki; Park, Jong-Woong; Jung, Hyung-Jo; Spencer Jr, Billie F

    2014-01-01

    As cables are primary load carrying members in cable-stayed bridges, monitoring the tension forces of the cables provides valuable information regarding structural soundness. Incorporating wireless smart sensors with vibration-based tension estimation methods provides an efficient means of autonomous long-term monitoring of cable tensions. This study develops a wireless cable tension monitoring system using MEMSIC’s Imote2 smart sensors. The monitoring system features autonomous operation, sustainable energy harvesting and power consumption, and remote access using the internet. To obtain the tension force, an in-network data processing strategy associated with the vibration-based tension estimation method is implemented on the Imote2-based sensor network, significantly reducing the wireless data transmission and the power consumption. The proposed monitoring system has been deployed and validated on the Jindo Bridge, a cable-stayed bridge located in South Korea. (paper)

  2. A wireless smart sensor network for automated monitoring of cable tension

    Science.gov (United States)

    Sim, Sung-Han; Li, Jian; Jo, Hongki; Park, Jong-Woong; Cho, Soojin; Spencer, Billie F., Jr.; Jung, Hyung-Jo

    2014-02-01

    As cables are primary load carrying members in cable-stayed bridges, monitoring the tension forces of the cables provides valuable information regarding structural soundness. Incorporating wireless smart sensors with vibration-based tension estimation methods provides an efficient means of autonomous long-term monitoring of cable tensions. This study develops a wireless cable tension monitoring system using MEMSIC’s Imote2 smart sensors. The monitoring system features autonomous operation, sustainable energy harvesting and power consumption, and remote access using the internet. To obtain the tension force, an in-network data processing strategy associated with the vibration-based tension estimation method is implemented on the Imote2-based sensor network, significantly reducing the wireless data transmission and the power consumption. The proposed monitoring system has been deployed and validated on the Jindo Bridge, a cable-stayed bridge located in South Korea.

  3. Does Internet Reporting Improve the Accessibility of Financial Information in a Global World? A Comparative Study of New Zealand and Indian Companies

    Directory of Open Access Journals (Sweden)

    Bikram Chatterjee

    2008-12-01

    Full Text Available The accessibility of business reporting, including financial reports on companywebsites is not necessarily increased by providing more information on websites. Thequality of Internet-based information is affected by both the accessibility and quantityof information provided. However, the accessibility of the information is an underresearched area. This paper contributes to the existing body of knowledge on webbasedbusiness reporting, by considering the dimension of accessibility in terms ofwebsite appearance and visual design from four different perspectives. The aim is toconsider the differences that occur in website organisation as a way of considering theaccessibility of information provided on company websites. The paper considers thedifferences in the accessibility of website information between New Zealand andIndian companies as a means of demonstrating the variation that can occur acrosscountries as well as within the same reporting structure. We conclude that Internetfinancial reporting does provide the illusion of comparability but without a moresustained focus on the harmonisation of terminology and attributes included inInternet reporting, the potential for comparison is reduced.

  4. Performance of Non-Orthogonal Multiple Access (NOMA) in mmWave wireless communications for 5G networks

    DEFF Research Database (Denmark)

    Marcano, Andrea; Christiansen, Henrik Lehrmann

    2017-01-01

    Among the key technologies that have been identified as capacity boosters for fifth generation - 5G - mobile networks, are millimeter wave (mmWave) transmissions and non-orthogonal multiple access (NOMA). The large amount of spectrum available at mmWave frequencies combined with a more effective...... use of available resources, helps improving the overall capacity. NOMA, unlike orthogonal multiple access (OMA) methods, allows sharing the same frequency resources at the same time, by implementing adaptive power allocation. In this paper we present a performance analysis of NOMA in mmWave cells...

  5. Analisis Performansi Konektifitas Pada Jaringan Wireless Broadband di Bandung

    Directory of Open Access Journals (Sweden)

    OTNIEL TONAPA

    2016-02-01

    Full Text Available Abstrak Perkembangan teknologi komunikasi Wireless mengarah ke teknologi yang berbasis jaringan IP (Internet Protocol. Access Point adalah suatu perangkat Wireless Router.  Access point membentuk hot spot, sedangkan Wireless Router mengatur lalu lintas data. Parameter yang diukur pada penelitian ini yaitu Quality of Service (QoS, antara lain pengukuran jitter, delay, dan packet loss yang dihasilkan dalam layanan paket data. Nilai jitter rata-rata sesama pengguna modem ADSL yang terhubung dengan access point pada smartphone bernilai 143.36 ms sedangkan pada laptop berada pada nilai 45.6 ms. Nilai jitter sesama penguna modem GPON, nilai rata-rata pada smartphone bernilai 133.12 ms, sedangkan pada laptop berada pada nilai 45.56 ms. Nilai rata-rata delay sesama pengguna modem ADSL pada smartphone bernilai 99.04 ms, sedangkan pada laptop sebesar 56.33 ms. Nilai rata-rata delay pada sesama pengguna modem GPON pada smartphone adalah 97.96 ms sedangkan pada laptop sebesar 56.15 ms.  Packet loss dari hasil pengujian keduanya memiliki presentase sama yaitu 1%. Kata kunci: Teknologi Digital Subscriber Line, Jaringan Optik Pasif, Dynamic Host Configuration Protocol (DHCP, Quality of Service (QoS Abstract Wireless communication technology development leading to technologies that network-based IP (Internet Protocol. Access Point Wireless Router is a device. Access point forming a hot spot, while the router manage data traffic. Parameters measured in this research is Quality of Service (QoS. among other things, measuring jitter, delay, and packet loss. resulting in packet data service. Jitter value among ADSL fellow have the average on smartphones 143.36 ms. On laptop average be at 45.6 ms. While jitter value among GPON fellow user have the average on smartphone 133.12 ms. On laptop average be at 45.56 ms. The average value of the delay to ADSL fellow users on smartphones 99.04 ms and on laptop average be at 56.33 ms. While delay value among GPON fellow user

  6. Mobility- Aware Cache Management in Wireless Environment

    Science.gov (United States)

    Kaur, Gagandeep; Saini, J. S.

    2010-11-01

    In infrastructure wireless environments, a base station provides communication links between mobile client and remote servers. Placing a proxy cache at the base station is an effective way of managing the wireless Internet bandwidth efficiently. However, in the situation of non-uniform heavy traffic, requests of all the mobile clients in the service area of the base station may cause overload in the cache. If the proxy cache has to release some cache space for the new mobile client in the environment, overload occurs. In this paper, we propose a novel cache management strategy to decrease the penalty of overloaded traffic on the proxy and to reduce the number of remote accesses by increasing the cache hit ratio. We predict the number of overload ahead of time based on its history and adapt the cache for the heavy traffic to be able to provide continuous and fair service to the current mobile clients and incoming ones. We have tested the algorithms over a real implementation of the cache management system in presence of fault tolerance and security. In our cache replacement algorithm, mobility of the clients, predicted overload number, size of the cached packets and their access frequencies are considered altogether. Performance results show that our cache management strategy outperforms the existing policies with less number of overloads and higher cache hit ratio.

  7. Networking wireless sensors

    National Research Council Canada - National Science Library

    Krishnamachari, Bhaskar

    2005-01-01

    ... by networking techniques across multiple layers. The topics covered include network deployment, localization, time synchronization, wireless radio characteristics, medium-access, topology control, routing, data-centric techniques, and transport protocols. Ideal for researchers and designers seeking to create new algorithms and protocols and enginee...

  8. Feasibility and Applications of a Wireless Firewall

    OpenAIRE

    Wilhelm, Matthias

    2016-01-01

    Most of today’s wireless communication devices operate on unlicensed bands with uncoordinated spectrum access, with the consequence that RF interference and collisions are impairing the overall performance of wireless networks. In the classical design of network protocols, both packets in a collision are considered lost, such that channel access mechanisms attempt to avoid collisions proactively. However, with the current proliferation of wireless applications, e.g., WLANs, car-to-car network...

  9. Wireless Fidelity (Wi-Fi) Broadband Network Technology: An ...

    African Journals Online (AJOL)

    Wireless Fidelity (Wi-Fi) broadband network technology has made tremendous impact in the growth of broadband wireless networks. There exists today several Wi-Fi access points that allow employees, partners and customers to access corporate data from almost anywhere and anytime. Wireless broadband networks are ...

  10. University Undergraduate Students, Perceptions of The Wireless ...

    African Journals Online (AJOL)

    The study focused on Uni versity Undergraduate students' perceptions of the use of the wireless internet of Abubakar Tafawa Balewa University, Bauchi, Nigeria. Using emperical and new field data, this exploratory study investigated the students' perceptions of internet use in relation to library use. The study adopted a ...

  11. Implementasi dan Evaluasi Kinerja Multi Input SingleOutput Orthogonal Frequency Division Multiplexing (MISO OFDM Menggunakan Wireless Open Access Research Platform (WARP

    Directory of Open Access Journals (Sweden)

    Galih Permana Putra

    2017-01-01

    Full Text Available Teknologi komunikasi nirkabel terus berkembang untuk memenuhi kebutuhan manusia akan koneksi informasi yang cepat, pengiriman data yang berkapasitas besar dan dapat diandalkan. Di dalam proses tersebut banyak sekali gangguan yang dapat mempengaruhi penurunan kinerja komunikasi diantaranya adalah multipath fading [1]. Multi Input Single Output (MISO merupakan salah satu teknik space diversity yang menggunakan banyak antena dengan tujuan untuk mengatasi multipath fading. Adapun pada proses transmisi digunakan teknik Orthogonal Frequency-Division Multiplexing (OFDM yang bertujuan memberikan keuntungan dalam hal efisiensi pada saat transmisi data dan mampu menghindari Inter Simbol Interference (ISI. Pada penelitian ini akan dibandingkan kinerja sistem MISO OFDM dan SISO OFDM yang akan disimulasikan dan di implementasikan pada modul Wireless Open Access Penelitian Platform (WARP untuk mengevaluasi kinerja BER sebagai fungsi dari daya pancar dan jarak variasi. Parameter yang digunakan di dalam pengukuran berdasarkan IEEE 802.11 a/g karena menggunakan frekuensi 2,4 Ghz. Terdapat dua skema pengukuran yaitu SISO OFDM dan MISO OFDM dengan variasi jarak 4,6 dan 8 meter dengan variasi daya pancar -35 s/d -4 dBm dengan peningkatan gain 5 kali secara berkala. Dari dua skema yang dilaksanakan dapat disimpulkan bahwa semakin jauh jarak antara pemancar dan penerima maka dibutuhkan penambahan gain untuk menjaga kualitas data yang dikirimkan. Disamping itu, terdapat perbedaan nilai gain untuk mencapai nilai BER = dibutuhkan penambahan gain = - 33 sedangkan pada SISO OFM dibutuhkan penambahan gain = -18.

  12. THE INFLUENCE OF MAC BUFFER ON THE CONTENTION-BASED ACCESS SCHEME WITH BURSTING OPTION FOR IEEE 802.11E WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    S. SELVAKENNEDY

    2006-12-01

    Full Text Available Wireless LANs are increasingly being used for inelastic applications. Currently, there is little support for quality of service in the IEEE 802.11 MAC protocol, and IEEE task group E has defined the 802.11e MAC extension. Enhanced distributed channel access (EDCA is a contention-based scheme of the 802.11e standard. To allow a station to transmit more than one frame from a single contention, an optional feature known as controlled frame-bursting (CFB is introduced in the standard. In this paper, we initially performed an average analysis to determine a suitable burst duration limit. Then, a detailed evaluation and comparison of the EDCA protocol with the CFB option is carried out through simulation to quantify its performance gain. The impact of the MAC transmit buffer size is also incorporated. Accordingly, we have proposed a suitable approach to guide the configuration of the burst duration limit. It is demonstrated that an optimized CFB configuration allows the MAC protocol to achieve 30% more capacity than the basic EDCA scheme.

  13. Wireless communications algorithmic techniques

    CERN Document Server

    Vitetta, Giorgio; Colavolpe, Giulio; Pancaldi, Fabrizio; Martin, Philippa A

    2013-01-01

    This book introduces the theoretical elements at the basis of various classes of algorithms commonly employed in the physical layer (and, in part, in MAC layer) of wireless communications systems. It focuses on single user systems, so ignoring multiple access techniques. Moreover, emphasis is put on single-input single-output (SISO) systems, although some relevant topics about multiple-input multiple-output (MIMO) systems are also illustrated.Comprehensive wireless specific guide to algorithmic techniquesProvides a detailed analysis of channel equalization and channel coding for wi

  14. Internet from Above.

    Science.gov (United States)

    Sullivan, Laura

    1998-01-01

    Explains how fast and reliable Internet access can be obtained by using satellite communications based on experiences at a high school in Mississippi. Discusses Internet communications; how it was implemented in the media center; local area networks; the need for Ethernet-based connection to the Internet; and price. (LRW)

  15. Internet access is NOT restricted globally to high income countries: so why are evidenced based prevention and treatment programs for mental disorders so rare?

    Science.gov (United States)

    Watts, Sarah E; Andrews, Gavin

    2014-08-01

    Mental disorders are widespread and universal. They are frequently accompanied by considerable harmful consequences for the individual and come at a significant economic cost to a community. Yet while effective evidence based prevention and treatment exists, there are a number of barriers to access, implement and disseminate. Cognitive behavior therapy programs, such as those available at www.thiswayup.com.au are widely available using the Internet in high income countries, such as Australia. With the ubiquitous uptake of Internet users globally, it is suggested that low and middle income countries should consider ways to embrace and scale up these cost effective programs. An explanation of why and some suggestions as to how this can be done are presented. Crown Copyright © 2014. Published by Elsevier B.V. All rights reserved.

  16. INTERNET OCH PERSONER MED FUNKTIONSHINDER

    OpenAIRE

    Al Attar, Haidar; Melle, Ghada

    2009-01-01

    People with disabilities constitute a big group of Internet users. Due to great advances in adaptive technology for people with disabilities more and more disabled will have access to Internet. For that reason it is extremely important for a web developer to be aware of different disabilities that complicate or prevent using Internet, different adaptive technologies that facilitate using Internet and different methods, both in design and programming, that make Internet accessible for people w...

  17. A NOVEL QOS SCHEDULING FOR WIRELESS BROADBAND NETWORKS

    Directory of Open Access Journals (Sweden)

    D. David Neels Pon Kumar

    2010-09-01

    Full Text Available During the last few years, users all over the world have become more and more familiar to the availability of broadband access. When users want broadband Internet service, they are generally restricted to a DSL (Digital Subscribers Line, or cable-modem-based connection. Proponents are advocating worldwide interoperability for microwave access (WiMAX, a technology based on an evolving standard for point-to multipoint wireless networking. Scheduling algorithms that support Quality of Service (QoS differentiation and guarantees for wireless data networks are crucial to the deployment of broadband wireless networks. The performance affecting parameters like fairness, bandwidth allocation, throughput, latency are studied and found out that none of the conventional algorithms perform effectively for both fairness and bandwidth allocation simultaneously. Hence it is absolutely essential for an efficient scheduling algorithm with a better trade off for these two parameters. So we are proposing a novel Scheduling Algorithm using Fuzzy logic and Artificial neural networks that addresses these aspects simultaneously. The initial results show that a fair amount of fairness is attained while keeping the priority intact. Results also show that maximum channel utilization is achieved with a negligible increment in processing time.

  18. Ubiquitous wireless ECG recording: a powerful tool physicians should embrace.

    Science.gov (United States)

    Saxon, Leslie A

    2013-04-01

    The use of smart phones has increased dramatically and there are nearly a billion users on 3G and 4G networks worldwide. Nearly 60% of the U.S. population uses smart phones to access the internet, and smart phone sales now surpass those of desktop and laptop computers. The speed of wireless communication technology on 3G and 4G networks and the widespread adoption and use of iOS equipped smart phones (Apple Inc., Cupertino, CA, USA) provide infrastructure for the transmission of wireless biomedical data, including ECG data. These technologies provide an unprecedented opportunity for physicians to continually access data that can be used to detect issues before symptoms occur or to have definitive data when symptoms are present. The technology also greatly empowers and enables the possibility for unprecedented patient participation in their own medical education and health status as well as that of their social network. As patient advocates, physicians and particularly cardiac electrophysiologists should embrace the future and promise of wireless ECG recording, a technology solution that can truly scale across the global population. © 2013 Wiley Periodicals, Inc.

  19. Challenges in Second-Generation Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Pescapé Antonio

    2008-01-01

    Full Text Available Wireless mesh networks have the potential to provide ubiquitous high-speed Internet access at low costs. The good news is that initial deployments of WiFi meshes show the feasibility of providing ubiquitous Internet connectivity. However, their performance is far below the necessary and achievable limit. Moreover, users' subscription in the existing meshes is dismal even though the technical challenges to get connectivity are low. This paper provides an overview of the current status of mesh networks' deployment, and highlights the technical, economical, and social challenges that need to be addressed in the next years. As a proof-of-principle study, we discuss the above-mentioned challenges with reference to three real networks: (i MagNets, an operator-driven planned two-tier mesh network; (ii Berlin Freifunk network as a pure community-driven single-tier network; (iii Weimar Freifunk network, also a community-driven but two-tier network.

  20. Challenges in Second-Generation Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Thomas Huehn

    2008-10-01

    Full Text Available Wireless mesh networks have the potential to provide ubiquitous high-speed Internet access at low costs. The good news is that initial deployments of WiFi meshes show the feasibility of providing ubiquitous Internet connectivity. However, their performance is far below the necessary and achievable limit. Moreover, users' subscription in the existing meshes is dismal even though the technical challenges to get connectivity are low. This paper provides an overview of the current status of mesh networks' deployment, and highlights the technical, economical, and social challenges that need to be addressed in the next years. As a proof-of-principle study, we discuss the above-mentioned challenges with reference to three real networks: (i MagNets, an operator-driven planned two-tier mesh network; (ii Berlin Freifunk network as a pure community-driven single-tier network; (iii Weimar Freifunk network, also a community-driven but two-tier network.