ERIC Educational Resources Information Center
Greenhalgh-Spencer, Heather; Jerbi, Moja
2017-01-01
In this paper, we provide a design-actuality gap-analysis of the internet infrastructure that exists in developing nations and nations in the global South with the deployed internet computer technologies (ICT)-assisted programs that are designed to use internet infrastructure to provide educational opportunities. Programs that specifically…
Future internet architecture and cloud ecosystem: A survey
NASA Astrophysics Data System (ADS)
Wan, Man; Yin, Shiqun
2018-04-01
The Internet has gradually become a social infrastructure, the existing TCP/IP architecture faces many challenges. So future Internet architecture become hot research. This paper introduces two ways of idea about the future research of Internet structure system, probes into the future Internet architecture and the environment of cloud ecosystem. Finally, we focuses the related research, and discuss basic principles and problems of OpenStack.
Connectivity, interoperability and manageability challenges in internet of things
NASA Astrophysics Data System (ADS)
Haseeb, Shariq; Hashim, Aisha Hassan A.; Khalifa, Othman O.; Ismail, Ahmad Faris
2017-09-01
The vision of Internet of Things (IoT) is about interconnectivity between sensors, actuators, people and processes. IoT exploits connectivity between physical objects like fridges, cars, utilities, buildings and cities for enhancing the lives of people through automation and data analytics. However, this sudden increase in connected heterogeneous IoT devices takes a huge toll on the existing Internet infrastructure and introduces new challenges for researchers to embark upon. This paper highlights the effects of heterogeneity challenges on connectivity, interoperability, management in greater details. It also surveys some of the existing solutions adopted in the core network to solve the challenges of massive IoT deployment. The paper finally concludes that IoT architecture and network infrastructure needs to be reengineered ground-up, so that IoT solutions can be safely and efficiently deployed.
Broadcasting Engineering Laboratories--Audio/Video and Data--in Real-Time over the Internet
ERIC Educational Resources Information Center
Jain, Prashant K.; Gu, Yuxiang; Rizwan-uddin
2008-01-01
Internet extends the reach of existing laboratory and training infrastructure to beyond the walls of such facilities. Though nothing can replace the hands-on experience in a laboratory; a carefully developed web-based digital lab may be the next best thing. In some cases, there may be benefits associated with a "distance laboratory" that…
NASA Astrophysics Data System (ADS)
Bhattacharya, D.; Painho, M.
2017-09-01
The paper endeavours to enhance the Sensor Web with crucial geospatial analysis capabilities through integration with Spatial Data Infrastructure. The objective is development of automated smart cities intelligence system (SMACiSYS) with sensor-web access (SENSDI) utilizing geomatics for sustainable societies. There has been a need to develop automated integrated system to categorize events and issue information that reaches users directly. At present, no web-enabled information system exists which can disseminate messages after events evaluation in real time. Research work formalizes a notion of an integrated, independent, generalized, and automated geo-event analysing system making use of geo-spatial data under popular usage platform. Integrating Sensor Web With Spatial Data Infrastructures (SENSDI) aims to extend SDIs with sensor web enablement, converging geospatial and built infrastructure, and implement test cases with sensor data and SDI. The other benefit, conversely, is the expansion of spatial data infrastructure to utilize sensor web, dynamically and in real time for smart applications that smarter cities demand nowadays. Hence, SENSDI augments existing smart cities platforms utilizing sensor web and spatial information achieved by coupling pairs of otherwise disjoint interfaces and APIs formulated by Open Geospatial Consortium (OGC) keeping entire platform open access and open source. SENSDI is based on Geonode, QGIS and Java, that bind most of the functionalities of Internet, sensor web and nowadays Internet of Things superseding Internet of Sensors as well. In a nutshell, the project delivers a generalized real-time accessible and analysable platform for sensing the environment and mapping the captured information for optimal decision-making and societal benefit.
Cloud Infrastructure & Applications - CloudIA
NASA Astrophysics Data System (ADS)
Sulistio, Anthony; Reich, Christoph; Doelitzscher, Frank
The idea behind Cloud Computing is to deliver Infrastructure-as-a-Services and Software-as-a-Service over the Internet on an easy pay-per-use business model. To harness the potentials of Cloud Computing for e-Learning and research purposes, and to small- and medium-sized enterprises, the Hochschule Furtwangen University establishes a new project, called Cloud Infrastructure & Applications (CloudIA). The CloudIA project is a market-oriented cloud infrastructure that leverages different virtualization technologies, by supporting Service-Level Agreements for various service offerings. This paper describes the CloudIA project in details and mentions our early experiences in building a private cloud using an existing infrastructure.
2002-09-01
Protocol LAN Local Area Network LDAP Lightweight Directory Access Protocol LLQ Low Latency Queuing MAC Media Access Control MarCorSysCom Marine...Description Protocol SIP Session Initiation Protocol SMTP Simple Mail Transfer Protocol SPAWAR Space and Naval Warfare Systems Center SS7 ...PSTN infrastructure previously required to carry the conversation. The cost of accessing the PSTN is thereby eliminated. In cases where Internet
The Internet information infrastructure: Terrorist tool or architecture for information defense?
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kadner, S.; Turpen, E.; Rees, B.
The Internet is a culmination of information age technologies and an agent of change. As with any infrastructure, dependency upon the so-called global information infrastructure creates vulnerabilities. Moreover, unlike physical infrastructures, the Internet is a multi-use technology. While information technologies, such as the Internet, can be utilized as a tool of terror, these same technologies can facilitate the implementation of solutions to mitigate the threat. In this vein, this paper analyzes the multifaceted nature of the Internet information infrastructure and argues that policymakers should concentrate on the solutions it provides rather than the vulnerabilities it creates. Minimizing risks and realizingmore » possibilities in the information age will require institutional activities that translate, exploit and convert information technologies into positive solutions. What follows is a discussion of the Internet information infrastructure as it relates to increasing vulnerabilities and positive potential. The following four applications of the Internet will be addressed: as the infrastructure for information competence; as a terrorist tool; as the terrorist`s target; and as an architecture for rapid response.« less
Spatial structure of the internet traffic
NASA Astrophysics Data System (ADS)
Barthelemy, Marc; Gondran, Bernard; Guichard, Eric
2003-03-01
The Internet infrastructure is not virtual: its distribution is dictated by social, geographical, economical, or political constraints. However, the infrastructure's design does not determine entirely the information traffic and different sources of complexity such as the intrinsic heterogeneity of the network or human practices have to be taken into account. In order to manage the Internet expansion, plan new connections or optimize the existing ones, it is thus critical to understand correlations between emergent global statistical patterns of Internet activity and human factors. We analyze data from the French national ‘Renater’ network which has about 2 millions users and which consists in about 30 interconnected routers located in different regions of France and we report the following results. The Internet flow is strongly localized: most of the traffic takes place on a ‘spanning’ network connecting a small number of routers which can be classified either as ‘active centers’ looking for information or ‘databases’ providing information. We also show that the Internet activity of a region increases with the number of published papers by laboratories of that region, demonstrating the positive impact of the Web on scientific activity and illustrating quantitatively the adage ‘the more you read, the more you write’.
USDA-ARS?s Scientific Manuscript database
Service oriented architectures allow modelling engines to be hosted over the Internet abstracting physical hardware configuration and software deployments from model users. Many existing environmental models are deployed as desktop applications running on user's personal computers (PCs). Migration ...
Community Capacity Building: Starting with People Not Projects.
ERIC Educational Resources Information Center
Simpson, Lyn; Wood, Leanne; Daws, Leonie
2003-01-01
A remote Australian town's initiative to develop an Internet cafe was based on a foundation of community empowerment and capacity building. The project's failure illustrates factors that inhibit community control: overstretched local resources, failure to understand impact on existing social infrastructure and social networks, and lack of…
Radiochemistry, PET Imaging, and the Internet of Chemical Things
2016-01-01
The Internet of Chemical Things (IoCT), a growing network of computers, mobile devices, online resources, software suites, laboratory equipment, synthesis apparatus, analytical devices, and a host of other machines, all interconnected to users, manufacturers, and others through the infrastructure of the Internet, is changing how we do chemistry. While in its infancy across many chemistry laboratories and departments, it became apparent when considering our own work synthesizing radiopharmaceuticals for positron emission tomography (PET) that a more mature incarnation of the IoCT already exists. How does the IoCT impact our lives today, and what does it hold for the smart (radio)chemical laboratories of the future? PMID:27610410
Radiochemistry, PET Imaging, and the Internet of Chemical Things.
Thompson, Stephen; Kilbourn, Michael R; Scott, Peter J H
2016-08-24
The Internet of Chemical Things (IoCT), a growing network of computers, mobile devices, online resources, software suites, laboratory equipment, synthesis apparatus, analytical devices, and a host of other machines, all interconnected to users, manufacturers, and others through the infrastructure of the Internet, is changing how we do chemistry. While in its infancy across many chemistry laboratories and departments, it became apparent when considering our own work synthesizing radiopharmaceuticals for positron emission tomography (PET) that a more mature incarnation of the IoCT already exists. How does the IoCT impact our lives today, and what does it hold for the smart (radio)chemical laboratories of the future?
Mastering the broadband challenge: next-generation SONET in a packet world
NASA Astrophysics Data System (ADS)
Farhi, Eyal
2001-10-01
The continuing liberalization of the world's telecommunications markets and the progressive convergence of voice, data, video and Internet communication are prompting telecommunication service providers to both expand and enhance their service capabilities. As bandwidth-hungry applications proliferate, and the demand for data and data services grows, the requirement for broadband communications appears to be insatiable. To provide the expected level of service in this environment of rapidly increasing demand, telcos and service providers must invest in an expanded network. However, to remain competitive and profitable, they must also continue to leverage their existing infrastructure investment. This paper will examine the current challenges network operators are facing today with the deployment of broadband technologies as they strive to maintain existing infrastructure investments while providing new services to their customers and developing added value network operations. This paper will explore various broadband technologies (optical/wireless) that operate on the primary SDH/SONET standards, their topologies and inherent benefits, which provide operators with solutions to the broadband challenge. New customer demands, such as high-speed Data transmissions (increased Internet use), coupled with operators' continuous need for network optimization, have thrown a wrench into daily operations. Therefore, the need to modernize existing networks has become paramount.
Computers, the Internet and medical education in Africa.
Williams, Christopher D; Pitchforth, Emma L; O'Callaghan, Christopher
2010-05-01
OBJECTIVES This study aimed to explore the use of information and communications technology (ICT) in undergraduate medical education in developing countries. METHODS Educators (deans and heads of medical education) in English-speaking countries across Africa were sent a questionnaire to establish the current state of ICT at medical schools. Non-respondents were contacted firstly by e-mail, subsequently by two postal mailings at 3-month intervals, and finally by telephone. Main outcome measures included cross-sectional data about the availability of computers, specifications, Internet connection speeds, use of ICT by students, and teaching of ICT and computerised research skills, presented by country or region. RESULTS The mean computer : student ratio was 0.123. Internet speeds were rated as 'slow' or 'very slow' on a 5-point Likert scale by 25.0% of respondents overall, but by 58.3% in East Africa and 33.3% in West Africa (including Cameroon). Mean estimates showed that campus computers more commonly supported CD-ROM (91.4%) and sound (87.3%) than DVD-ROM (48.1%) and Internet (72.5%). The teaching of ICT and computerised research skills, and the use of computers by medical students for research, assignments and personal projects were common. CONCLUSIONS It is clear that ICT infrastructure in Africa lags behind that in other regions. Poor download speeds limit the potential of Internet resources (especially videos, sound and other large downloads) to benefit students, particularly in East and West (including Cameroon) Africa. CD-ROM capability is more widely available, but has not yet gained momentum as a means of distributing materials. Despite infrastructure limitations, ICT is already being used and there is enthusiasm for developing this further. Priority should be given to developing partnerships to improve ICT infrastructure and maximise the potential of existing technology.
Radiochemistry, PET Imaging, and the Internet of Chemical Things
Thompson, Stephen; Kilbourn, Michael R.; Scott, Peter J. H.
2016-08-16
The Internet of Chemical Things (IoCT), a growing network of computers, mobile devices, online resources, software suites, laboratory equipment, synthesis apparatus, analytical devices, and a host of other machines, all interconnected to users, manufacturers, and others through the infrastructure of the Internet, is changing how we do chemistry. While in its infancy across many chemistry laboratories and departments, it became apparent when considering our own work synthesizing radiopharmaceuticals for positron emission tomography (PET) that a more mature incarnation of the IoCT already exists. Finally, how does the IoCT impact our lives today, and what does it hold for the smartmore » (radio)chemical laboratories of the future?« less
Radiochemistry, PET Imaging, and the Internet of Chemical Things
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thompson, Stephen; Kilbourn, Michael R.; Scott, Peter J. H.
The Internet of Chemical Things (IoCT), a growing network of computers, mobile devices, online resources, software suites, laboratory equipment, synthesis apparatus, analytical devices, and a host of other machines, all interconnected to users, manufacturers, and others through the infrastructure of the Internet, is changing how we do chemistry. While in its infancy across many chemistry laboratories and departments, it became apparent when considering our own work synthesizing radiopharmaceuticals for positron emission tomography (PET) that a more mature incarnation of the IoCT already exists. Finally, how does the IoCT impact our lives today, and what does it hold for the smartmore » (radio)chemical laboratories of the future?« less
The Interplanetary Internet: A Communications Infrastructure for Mars Exploration
NASA Astrophysics Data System (ADS)
Burleigh, S.; Cerf, V.; Durst, R.; Fall, K.; Hooke, A.; Scott, K.; Weiss, H.
2002-01-01
A successful program of Mars Exploration will depend heavily on a robust and dependable space communications infrastructure that is well integrated with the terrestrial Internet. In the same way that the underpinnings of the Internet are the standardized "TCP/IP" suite of protocols, an "Interplanetary Internet" will need a similar set of capabilities that can support reliable communications across vast distances and highly stressed communications environments. For the past twenty years, the Consultative Committee for Space Data Systems (CCSDS) has been developing standardized long- haul space link communications techniques that are now in use by over two hundred missions within the international space community. New CCSDS developments, shortly to be infused into Mars missions, include a proximity link standard and a store-and- forward file transfer protocol. As part of its `Next Generation Internet' initiative, the U.S. Defense Advanced Projects Agency (DARPA) recently supported an architectural study of a future "InterPlaNetary Internet" (IPN). The IPN architecture assumes that in short-delay environments - such as on and around Mars - standard Internet technologies will be adapted to the locally harsh environment and deployed within surface vehicles and orbiting relays. A long-haul interplanetary backbone network that includes Deep Space Network (DSN) gateways into the terrestrial Internet will interconnect these distributed internets that are scattered across the Solar System. Just as TCP/IP unites the Earth's "network of networks" to become the Internet, a new suite of protocols known as "Bundling" will enable the IPN to become a "network of internets" to support true interplanetary dialog. An InterPlaNetary Internet Research Group has been established within the Internet community to coordinate this research and NASA has begun to support the further development of the IPN architecture and the Bundling protocols. A strategy is being developed whereby the current set of standard CCSDS data communications protocols can be incrementally evolved so that true InterPlaNetary Internet operations are feasible by the end of the decade. The strategy - which is already in progress via the deployment of Mars relay links - needs individual missions to each contribute increments of capability so that a standard communications infrastructure can rapidly accrete. This paper will describe the IPN architectural concepts, discuss the current set of standard data communications capabilities that exist to support Mars exploration and review the proposed new developments. We will also postulate that the concept is scalable and can grow to support future scenarios where human intelligence is widely distributed across the Solar System and day-to-day communications dialog among planets is routine. 1 2 3 4 5
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kelic, Andjelka; Mitchell, Michael David; Shirah, Donald N.
The National Infrastructure Simulations and Analysis Center (NISAC) has developed a nationwide model of the Internet to study the potential impact of the loss of physical facilities on the network and on other infrastructures that depend on the Internet for services. The model looks at the Internet from the perspective of Internet Service Providers (ISPs) and their connectivity and can be used to determine how the network connectivity could be modified to assist in mitigating an event. In addition the model could be used to explore how portions of the network could be made more resilient to disruptive events.
NASA Astrophysics Data System (ADS)
Simonis, Ingo
2015-04-01
Transport infrastructure monitoring and analysis is one of the focus areas in the context of smart cities. With the growing number of people moving into densely populated urban metro areas, precise tracking of moving people and goods is the basis for profound decision-making and future planning. With the goal of defining optimal extensions and modifications to existing transport infrastructures, multi-modal transport has to be monitored and analysed. This process is performed on the basis of sensor networks that combine a variety of sensor models, types, and deployments within the area of interest. Multi-generation networks, consisting of a number of sensor types and versions, are causing further challenges for the integration and processing of sensor observations. These challenges are not getting any smaller with the development of the Internet of Things, which brings promising opportunities, but is currently stuck in a type of protocol war between big industry players from both the hardware and network infrastructure domain. In this paper, we will highlight how the OGC suite of standards, with the Sensor Web standards developed by the Sensor Web Enablement Initiative together with the latest developments by the Sensor Web for Internet of Things community can be applied to the monitoring and improvement of transport infrastructures. Sensor Web standards have been applied in the past to pure technical domains, but need to be broadened now in order to meet new challenges. Only cross domain approaches will allow to develop satisfying transport infrastructure approaches that take into account requirements coming form a variety of sectors such as tourism, administration, transport industry, emergency services, or private people. The goal is the development of interoperable components that can be easily integrated within data infrastructures and follow well defined information models to allow robust processing.
Shilton, Katie
2015-02-01
The technical details of Internet architecture affect social debates about privacy and autonomy, intellectual property, cybersecurity, and the basic performance and reliability of Internet services. This paper explores one method for practicing anticipatory ethics in order to understand how a new infrastructure for the Internet might impact these social debates. This paper systematically examines values expressed by an Internet architecture engineering team-the Named Data Networking project-based on data gathered from publications and internal documents. Networking engineers making technical choices also weigh non-technical values when working on Internet infrastructure. Analysis of the team's documents reveals both values invoked in response to technical constraints and possibilities, such as efficiency and dynamism, as well as values, including privacy, security and anonymity, which stem from a concern for personal liberties. More peripheral communitarian values espoused by the engineers include democratization and trust. The paper considers the contextual and social origins of these values, and then uses them as a method of practicing anticipatory ethics: considering the impact such priorities may have on a future Internet.
Integration of utilities infrastructures in a future internet enabled smart city framework.
Sánchez, Luis; Elicegui, Ignacio; Cuesta, Javier; Muñoz, Luis; Lanza, Jorge
2013-10-25
Improving efficiency of city services and facilitating a more sustainable development of cities are the main drivers of the smart city concept. Information and Communication Technologies (ICT) play a crucial role in making cities smarter, more accessible and more open. In this paper we present a novel architecture exploiting major concepts from the Future Internet (FI) paradigm addressing the challenges that need to be overcome when creating smarter cities. This architecture takes advantage of both the critical communications infrastructures already in place and owned by the utilities as well as of the infrastructure belonging to the city municipalities to accelerate efficient provision of existing and new city services. The paper highlights how FI technologies create the necessary glue and logic that allows the integration of current vertical and isolated city services into a holistic solution, which enables a huge forward leap for the efficiency and sustainability of our cities. Moreover, the paper describes a real-world prototype, that instantiates the aforementioned architecture, deployed in one of the parks of the city of Santander providing an autonomous public street lighting adaptation service. This prototype is a showcase on how added-value services can be seamlessly created on top of the proposed architecture.
Integration of Utilities Infrastructures in a Future Internet Enabled Smart City Framework
Sánchez, Luis; Elicegui, Ignacio; Cuesta, Javier; Muñoz, Luis; Lanza, Jorge
2013-01-01
Improving efficiency of city services and facilitating a more sustainable development of cities are the main drivers of the smart city concept. Information and Communication Technologies (ICT) play a crucial role in making cities smarter, more accessible and more open. In this paper we present a novel architecture exploiting major concepts from the Future Internet (FI) paradigm addressing the challenges that need to be overcome when creating smarter cities. This architecture takes advantage of both the critical communications infrastructures already in place and owned by the utilities as well as of the infrastructure belonging to the city municipalities to accelerate efficient provision of existing and new city services. The paper highlights how FI technologies create the necessary glue and logic that allows the integration of current vertical and isolated city services into a holistic solution, which enables a huge forward leap for the efficiency and sustainability of our cities. Moreover, the paper describes a real-world prototype, that instantiates the aforementioned architecture, deployed in one of the parks of the city of Santander providing an autonomous public street lighting adaptation service. This prototype is a showcase on how added-value services can be seamlessly created on top of the proposed architecture. PMID:24233072
Fredette, Thomas J; Foran, Christy M; Brasfield, Sandra M; Suedel, Burton C
2012-01-01
Navigation infrastructure such as channels, jetties, river training structures, and lock-and-dam facilities are primary components of a safe and efficient water transportation system. Planning for such infrastructure has until recently involved efforts to minimize impacts on the environment through a standardized environmental assessment process. More recently, consistent with environmental sustainability concepts, planners have begun to consider how such projects can also be constructed with environmental enhancements. This study examined the existing institutional conditions within the US Army Corps of Engineers and cooperating federal agencies relative to incorporating environmental enhancements into navigation infrastructure projects. The study sought to (1) investigate institutional attitudes towards the environmental enhancement of navigation infrastructure (EENI) concept, (2) identify potential impediments to implementation and solutions to such impediments, (3) identify existing navigation projects designed with the express intent of enhancing environmental benefit in addition to the primary project purpose, (4) identify innovative ideas for increasing environmental benefits for navigation projects, (5) identify needs for additional technical information or research, and (6) identify laws, regulations, and policies that both support and hinder such design features. The principal investigation tool was an Internet-based survey with 53 questions. The survey captured a wide range of perspectives on the EENI concept including ideas, concerns, research needs, and relevant laws and policies. Study recommendations included further promotion of the concept of EENI to planners and designers, documentation of existing projects, initiation of pilot studies on some of the innovative ideas provided through the survey, and development of national goals and interagency agreements to facilitate implementation. Copyright © 2011 SETAC.
Internet Research: Implications for The Future of Health Care
Shortliffe, Ted
1999-01-01
The phenomenal growth in Internet usage, largely due to the success of the World Wide Web, has stressed the international networking infrastructure in ways that were never contemplated when the early ARPAnet emerged from research laboratories in the 1970s. Some of the challenges are logistical and legal, and have to do with management of domain names, intellectual-property agreements, and international business activities. Others are technical, resulting both because we are envisioning applications that the current Internet cannot support, and because the existing infrastructure cannot scale to a world in which a huge portion of the world's population is online and individual homes and businesses may have IP addresses for tens of electronic devices, such as appliances, heating systems, or security alarms. In this presentation, I will discuss some of the US research and testbed activities that are currently underway in an effort to respond to the technical challenges. These include the Internet-2 testbed created by a consortium of academic institutions, and the federal government's Next Generation Internet research initiative. I will explain the difference between these two programs and identify some of the technical requirements other than a simple increase in bandwidth that have been identified for the evolving Internet. This will lead to a discussion of the limitations of the current Internet that have constrained its use in health care and that accordingly help to define the networking research agenda that is of greatest importance to the biomedical community. Policy and regulatory issues that arise because of health care's use of the Internet will also be discussed, as will those technical requirements that may be unique to biomedical applications. One goal of the discussion will be to motivate an international discussion of the ways in which the medical informatics community should be engaged in both basic and applied research in the area of networking and the future of the Internet."
An educational distributed Cosmic Ray detector network based on ArduSiPM
NASA Astrophysics Data System (ADS)
Bocci, V.; Chiodi, G.; Fresch, P.; Iacoangeli, F.; Recchia, L.
2017-10-01
The advent of high performance microcontrollers equipped with analog and digital peripherals, makes the design of a complete particle detector and a relative acquisition system on a single microcontroller chip possible. The existence of a world wide data infrastructure such as the internet, allows for the conception of a distributed network of cheap detectors able to elaborate and send data as well as to respond to setting commands. The internet infrastructure enables the distribution of the absolute time, with precision of a few milliseconds, to all devices independently of their physical location, when the sky view is accessible it possible to use a GPS module to reach synchronization of tens of nanoseconds. These devices can be far apart from each other and their relative distance can range from a few meters to thousands of kilometers. This allows for the design of a crowdsourcing experiment of citizen science, based on the use of many small scintillation-based particle detectors to monitor the high energetic cosmic ray and the radiation environment.
Infrastructure of electronic information management
Twitchell, G.D.
2004-01-01
The information technology infrastructure of an organization, whether it is a private, non-profit, federal, or academic institution, is key to delivering timely and high-quality products and services to its customers and stakeholders. With the evolution of the Internet and the World Wide Web, resources that were once "centralized" in nature are now distributed across the organization in various locations and often remote regions of the country. This presents tremendous challenges to the information technology managers, users, and CEOs of large world-wide corporations who wish to exchange information or get access to resources in today's global marketplace. Several tools and technologies have been developed over recent years that play critical roles in ensuring that the proper information infrastructure exists within the organization to facilitate this global information marketplace Such tools and technologies as JAVA, Proxy Servers, Virtual Private Networks (VPN), multi-platform database management solutions, high-speed telecommunication technologies (ATM, ISDN, etc.), mass storage devices, and firewall technologies most often determine the organization's success through effective and efficient information infrastructure practices. This session will address several of these technologies and provide options related to those that may exist and can be readily applied within Eastern Europe. ?? 2004 - IOS Press and the authors. All rights reserved.
A Comprehensive and Cost-Effective Computer Infrastructure for K-12 Schools
NASA Technical Reports Server (NTRS)
Warren, G. P.; Seaton, J. M.
1996-01-01
Since 1993, NASA Langley Research Center has been developing and implementing a low-cost Internet connection model, including system architecture, training, and support, to provide Internet access for an entire network of computers. This infrastructure allows local area networks which exceed 50 machines per school to independently access the complete functionality of the Internet by connecting to a central site, using state-of-the-art commercial modem technology, through a single standard telephone line. By locating high-cost resources at this central site and sharing these resources and their costs among the school districts throughout a region, a practical, efficient, and affordable infrastructure for providing scale-able Internet connectivity has been developed. As the demand for faster Internet access grows, the model has a simple expansion path that eliminates the need to replace major system components and re-train personnel. Observations of optical Internet usage within an environment, particularly school classrooms, have shown that after an initial period of 'surfing,' the Internet traffic becomes repetitive. By automatically storing requested Internet information on a high-capacity networked disk drive at the local site (network based disk caching), then updating this information only when it changes, well over 80 percent of the Internet traffic that leaves a location can be eliminated by retrieving the information from the local disk cache.
POTS to broadband ... cable modems.
Kabachinski, Jeff
2003-01-01
There have been 3 columns talking about broadband communications and now at the very end when it's time to compare using a telco or cableco, I'm asking does it really matter? So what if I can actually get the whole 30 Mbps with a cable network when the website I'm connecting to is running on an ISDN line at 128 Kbps? Broadband offers a lot more bandwidth than the connections many Internet servers have today. Except for the biggest websites, many servers connect to the Internet with a switched 56-Kbps, ISDN, or fractional T1 line. Even with the big websites, my home network only runs a 10 Mbps Ethernet connection to my cable modem. Maybe it doesn't matter that the cable lines are shared or that I can only get 8 Mbps from an ADSL line. Maybe the ISP that I use has a T1 line connection to the Internet so my new ADSL modem has a fatter pipe than my provider! (See table 1). It all makes me wonder what's in store for us in the future. PC technology has increased exponentially in the last 10 years with super fast processor speeds, hard disks of hundreds of gigabytes, and amazing video and audio. Internet connection speeds have failed to keep the same pace. Instead of hundreds of times better or faster--modem speeds are barely 10 times faster. Broadband connections offer some additional speed but still not comparable growth as broadband connections are still in their infancy. Rather than trying to make use of existing communication paths, maybe we need a massive infrastructure makeover of something new. How about national wireless access points so we can connect anywhere, anytime? To use the latest and fastest wireless technology you will simply need to buy another $9.95 WLAN card or download the latest super slick WLAN compression/encryption software. Perhaps it is time for a massive infra-restructuring. Consider the past massive infrastructure efforts. The telcos needed to put in their wiring infrastructure starting in the 1870s before telephones were useful to the masses. CATV was a minor player in the TV broadcast business before they installed their cabling infrastructure and went national. Even automobiles were fairly useless until roads were paved and the highway infrastructure was built!
The Interplanetary Internet: a communications infrastructure for Mars exploration.
Burleigh, Scott; Cerf, Vinton; Durst, Robert; Fall, Kevin; Hooke, Adrian; Scott, Keith; Weiss, Howard
2003-01-01
A strategy is being developed whereby the current set of internationally standardized space data communications protocols can be incrementally evolved so that a first version of an operational "Interplanetary Internet" is feasible by the end of the decade. This paper describes its architectural concepts, discusses the current set of standard space data communications capabilities that exist to support Mars exploration and reviews proposed new developments. We also speculate that these current capabilities can grow to support future scenarios where human intelligence is widely distributed across the Solar System and day-to-day communications dialog between planets is routine. c2003 American Institute of Aeronautics and Astronautics. Published by Elsevier Science Ltd. All rights reserved.
The Interplanetary Internet: a communications infrastructure for Mars exploration
NASA Technical Reports Server (NTRS)
Burleigh, Scott; Cerf, Vinton; Durst, Robert; Fall, Kevin; Hooke, Adrian; Scott, Keith; Weiss, Howard
2003-01-01
A strategy is being developed whereby the current set of internationally standardized space data communications protocols can be incrementally evolved so that a first version of an operational "Interplanetary Internet" is feasible by the end of the decade. This paper describes its architectural concepts, discusses the current set of standard space data communications capabilities that exist to support Mars exploration and reviews proposed new developments. We also speculate that these current capabilities can grow to support future scenarios where human intelligence is widely distributed across the Solar System and day-to-day communications dialog between planets is routine. c2003 American Institute of Aeronautics and Astronautics. Published by Elsevier Science Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Yang, Wei; Hall, Trevor
2012-12-01
The Internet is entering an era of cloud computing to provide more cost effective, eco-friendly and reliable services to consumer and business users and the nature of the Internet traffic will undertake a fundamental transformation. Consequently, the current Internet will no longer suffice for serving cloud traffic in metro areas. This work proposes an infrastructure with a unified control plane that integrates simple packet aggregation technology with optical express through the interoperation between IP routers and electrical traffic controllers in optical metro networks. The proposed infrastructure provides flexible, intelligent, and eco-friendly bandwidth on demand for cloud computing in metro areas.
Internet-enabled collaborative agent-based supply chains
NASA Astrophysics Data System (ADS)
Shen, Weiming; Kremer, Rob; Norrie, Douglas H.
2000-12-01
This paper presents some results of our recent research work related to the development of a new Collaborative Agent System Architecture (CASA) and an Infrastructure for Collaborative Agent Systems (ICAS). Initially being proposed as a general architecture for Internet based collaborative agent systems (particularly complex industrial collaborative agent systems), the proposed architecture is very suitable for managing the Internet enabled complex supply chain for a large manufacturing enterprise. The general collaborative agent system architecture with the basic communication and cooperation services, domain independent components, prototypes and mechanisms are described. Benefits of implementing Internet enabled supply chains with the proposed infrastructure are discussed. A case study on Internet enabled supply chain management is presented.
NASA Astrophysics Data System (ADS)
Kitsios, Aristidis; Bousakas, Konstantinos; Salame, Takla; Bogno, Bachirou; Papageorgas, Panagiotis; Vokas, Georgios A.; Mauffay, Fabrice; Petit, Pierre; Aillerie, Michel; Charles, Jean-Pierre
2017-02-01
In this paper, the energy efficiency of a contemporary Smart Grid that is based on Distributed Renewable Energy Sources (DRES) is examined under the scope of the communication systems utilized between the energy loads and the energy sources. What is evident is that the Internet of Things (IoT) technologies that are based on the existing Web infrastructure can be heavily introduced in this direction especially when combined with long range low bandwidth networking technologies, power line communication technologies and optimization methodologies for renewable energy generation. The renewable energy generation optimization will be based on devices embedded in the PV panels and the wind power generators, which will rely on bidirectional communications with local gateways and remote control stations for achieving energy efficiency. Smart meters and DRES combined with IoT communications will be the enabling technologies for the ultimate fusion of Internet technology and renewable energy generation realizing the Energy Internet.
Ooe, Yosuke; Anamizu, Hiromitsu; Tatsumi, Haruyuki; Tanaka, Hiroshi
2008-07-01
The financial condition of the Japanese health insurance system is said to be compounded with the aging of the population. The government argues that the application of IT and networking is required in order to streamline health care services while avoiding its collapse. The Internet environment has been furnished with broadband connection and multimedia in the span of one year or shorter, and is becoming more and more convenient. It is true that the Internet is now a part of Tokyo's infrastructure along with electricity and water supply, as it is the center of politics. However, in local cities, development of the Internet environment is still insufficient. In order to use the network as a common infrastructure at health care facilities, we need to be aware of this digital divide. This study investigated the development status of network infrastructure in regional cities.
Psychometric Validation of Internet Addiction Test with Indian Adolescents
ERIC Educational Resources Information Center
Dhir, Amandeep; Chen, Sufen; Nieminen, Marko
2015-01-01
The past few years have witnessed great developments in Internet infrastructure, which have led to increased Internet usage among people of various age groups. However, at the same time, there have been some negative implications associated with increased Internet usage for some individuals. "Internet addiction" (IA) is one such negative…
Closing the Gap: Cybersecurity for U.S. Forces and Commands
2017-03-30
Dickson, Ph.D. Professor of Military Studies , JAWS Thesis Advisor Kevin Therrien, Col, USAF Committee Member Stephen Rogers, Colonel, USA Director...infrastructures, and includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers in critical industries.”5...of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and
Space Internet Architectures and Technologies for NASA Enterprises
NASA Technical Reports Server (NTRS)
Bhasin, Kul; Hayden, Jeffrey L.
2001-01-01
NASA's future communications services will be supplied through a space communications network that mirrors the terrestrial Internet in its capabilities and flexibility. The notional requirements for future data gathering and distribution by this Space Internet have been gathered from NASA's Earth Science Enterprise (ESE), the Human Exploration and Development in Space (HEDS), and the Space Science Enterprise (SSE). This paper describes a communications infrastructure for the Space Internet, the architectures within the infrastructure, and the elements that make up the architectures. The architectures meet the requirements of the enterprises beyond 2010 with Internet 'compatible technologies and functionality. The elements of an architecture include the backbone, access, inter-spacecraft and proximity communication parts. From the architectures, technologies have been identified which have the most impact and are critical for the implementation of the architectures.
Real-Time Multimedia on the Internet: What Will It Take?
ERIC Educational Resources Information Center
Sodergren, Mike
1998-01-01
Considers the requirements for real-time, interactive multimedia over the Internet. Topics include demand for interactivity; new pricing models for Internet service; knowledgeable suppliers; consumer education on standards; enhanced infrastructure, including bandwidth; and new technology, including RSVP, and end-to-end Internet-working protocol.…
ERIC Educational Resources Information Center
Zhao, Weiyi
2011-01-01
Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. They have numerous applications, such as broadband Internet access, building automation, and intelligent transportation systems. One research challenge for Internet-based WMNs is to design efficient mobility…
Unconventional Cyber Warfare: Cyber Opportunities in Unconventional Warfare
2014-06-01
thanks to Tunisia’s modern communications infrastructure , pervasive Internet, and mobile phone network.”151 Although the use of information and...and physical space. Tunisia had a well-developed mobile phone and Internet infrastructure with nearly nine out of 10 Tunisians owning a mobile phone...OF TABLES Table 1. Top 20 countries of mobile phones per 100 people .........................................60 Table 2. Top 20 countries by number
ERIC Educational Resources Information Center
Maule, R. William
1994-01-01
Discusses prototype information infrastructure projects in northern California's Silicon Valley. The strategies of the public and private telecommunications carriers vying for backbone services and industries developing end-user infrastructure technologies via office networks, set-top box networks, Internet multimedia, and "smart homes"…
A Cloud-Based Global Flood Disaster Community Cyber-Infrastructure: Development and Demonstration
NASA Technical Reports Server (NTRS)
Wan, Zhanming; Hong, Yang; Khan, Sadiq; Gourley, Jonathan; Flamig, Zachary; Kirschbaum, Dalia; Tang, Guoqiang
2014-01-01
Flood disasters have significant impacts on the development of communities globally. This study describes a public cloud-based flood cyber-infrastructure (CyberFlood) that collects, organizes, visualizes, and manages several global flood databases for authorities and the public in real-time, providing location-based eventful visualization as well as statistical analysis and graphing capabilities. In order to expand and update the existing flood inventory, a crowdsourcing data collection methodology is employed for the public with smartphones or Internet to report new flood events, which is also intended to engage citizen-scientists so that they may become motivated and educated about the latest developments in satellite remote sensing and hydrologic modeling technologies. Our shared vision is to better serve the global water community with comprehensive flood information, aided by the state-of-the- art cloud computing and crowdsourcing technology. The CyberFlood presents an opportunity to eventually modernize the existing paradigm used to collect, manage, analyze, and visualize water-related disasters.
AN INTERNET RACK MONITOR-CONTROLLER FOR APS LINAC RF ELECTRONICS UPGRADE
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ma, Hengjie; Smith, Terry; Nassiri, Alireza
To support the research and development in APS LINAC area, the existing LINAC rf control performance needs to be much improved, and thus an upgrade of the legacy LINAC rf electronics becomes necessary. The proposed upgrade plan centers on the concept of using a modern, network-attached, rackmount digital electronics platform –Internet Rack Monitor-Controller (or IRMC) to achieve the goal of modernizing the rf electronics at a lower cost. The system model of the envisioned IRMC is basically a 3-tier stack with a high-performance DSP in the mid-layer to perform the core tasks of real-time rf data processing and controls. Themore » Digital Front-End (DFE) attachment layer at bottom bridges the applicationspecific rf front-ends to the DSP. A network communication gateway, together with an embedded event receiver (EVR) in the top layer merges the Internet Rack MonitorController node into the networks of the accelerator controls infrastructure. Although the concept is very much in trend with today’s Internet-of-Things (IoT), this implementation has actually been used in the accelerators for over two decades.« less
Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version
Babu, M. Rajesh; Dian, S. Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan
2015-01-01
The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things. PMID:26495430
Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version.
Babu, M Rajesh; Dian, S Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan
2015-01-01
The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things.
NASA Technical Reports Server (NTRS)
Ivancic, William D.; Glover, Daniel R.; vonDeak, Thomas C.; Bhasin, Kul B.
1998-01-01
The realization of the full potential of the National Information Infrastructure (NH) and Global Information Infrastructure (GII) requires seamless interoperability of emerging satellite networks with terrestrial networks. This requires a cooperative effort between industry, academia and government agencies to develop and advocate new, satellite-friendly communication protocols and modifications to existing communication protocol standards. These groups have recently come together to actively participating in a number of standards making bodies including: the Internet Engineering Task Force (IETF), the Asynchronous Transfer Mode (ATM) Forum, the International Telecommunication Union (ITU) and the Telecommunication Industry Association MA) to ensure that issues regarding efficient use of these protocols over satellite links are not overlooked. This paper will summarize the progress made toward standards development to achieve seamless integration and accelerate the deployment of multimedia applications.
Schwab-Reese, Laura M; Hovdestad, Wendy; Tonmyr, Lil; Fluke, John
2018-01-20
Collecting child maltreatment data is a complicated undertaking for many reasons. As a result, there is an interest by child maltreatment researchers to develop methodologies that allow for the triangulation of data sources. To better understand how social media and internet-based technologies could contribute to these approaches, we conducted a scoping review to provide an overview of social media and internet-based methodologies for health research, to report results of evaluation and validation research on these methods, and to highlight studies with potential relevance to child maltreatment research and surveillance. Many approaches were identified in the broad health literature; however, there has been limited application of these approaches to child maltreatment. The most common use was recruiting participants or engaging existing participants using online methods. From the broad health literature, social media and internet-based approaches to surveillance and epidemiologic research appear promising. Many of the approaches are relatively low cost and easy to implement without extensive infrastructure, but there are also a range of limitations for each method. Several methods have a mixed record of validation and sources of error in estimation are not yet understood or predictable. In addition to the problems relevant to other health outcomes, child maltreatment researchers face additional challenges, including the complex ethical issues associated with both internet-based and child maltreatment research. If these issues are adequately addressed, social media and internet-based technologies may be a promising approach to reducing some of the limitations in existing child maltreatment data. Copyright © 2018 The Author(s). Published by Elsevier Ltd.. All rights reserved.
Toward Information Infrastructure Studies: Ways of Knowing in a Networked Environment
NASA Astrophysics Data System (ADS)
Bowker, Geoffrey C.; Baker, Karen; Millerand, Florence; Ribes, David
This article presents Information Infrastructure Studies, a research area that takes up some core issues in digital information and organization research. Infrastructure Studies simultaneously addresses the technical, social, and organizational aspects of the development, usage, and maintenance of infrastructures in local communities as well as global arenas. While infrastructure is understood as a broad category referring to a variety of pervasive, enabling network resources such as railroad lines, plumbing and pipes, electrical power plants and wires, this article focuses on information infrastructure, such as computational services and help desks, or federating activities such as scientific data repositories and archives spanning the multiple disciplines needed to address such issues as climate warming and the biodiversity crisis. These are elements associated with the internet and, frequently today, associated with cyberinfrastructure or e-science endeavors. We argue that a theoretical understanding of infrastructure provides the context for needed dialogue between design, use, and sustainability of internet-based infrastructure services. This article outlines a research area and outlines overarching themes of Infrastructure Studies. Part one of the paper presents definitions for infrastructure and cyberinfrastructure, reviewing salient previous work. Part two portrays key ideas from infrastructure studies (knowledge work, social and political values, new forms of sociality, etc.). In closing, the character of the field today is considered.
Yoshino, A; Shigemura, J; Kobayashi, Y; Nomura, S; Shishikura, K; Den, R; Wakisaka, H; Kamata, S; Ashida, H
2001-09-01
We assessed the reliability of remote video psychiatric interviews conducted via the internet using narrow and broad bandwidths. Televideo psychiatric interviews conducted with 42 in-patients with chronic schizophrenia using two bandwidths (narrow, 128 kilobits/s; broad, 2 megabits/s) were assessed in terms of agreement with face-to-face interviews in a test-retest fashion. As a control, agreement was assessed between face-to-face interviews. Psychiatric symptoms were rated using the Oxford version of the Brief Psychiatric Rating Scale (BPRS), and agreement between interviews was estimated as the intraclass correlation coefficient (ICC). The ICC was significantly lower in the narrow bandwidth than in the broad bandwidth and the control for both positive symptoms score and total score. While reliability of televideo psychiatric interviews is insufficient using the present narrow-band internet infrastructure, the next generation of infrastructure (broad-band) may permit reliable diagnostic interviews.
Chameleons in Marketspace: Industry Transformation in the New Electronic Marketing Environment.
ERIC Educational Resources Information Center
Pattinson, Hugh; Brown, Linden
1996-01-01
Discusses the new information infrastructure and its possible influences on marketing. Highlights include an alternative perspective of industrial economic history based on infrastructure development; the Internet and its positioning within the new information infrastructure; future possibilities and impacts on organizational structure; and…
Biswas, Amitava; Liu, Chen; Monga, Inder; ...
2016-01-01
For last few years, there has been a tremendous growth in data traffic due to high adoption rate of mobile devices and cloud computing. Internet of things (IoT) will stimulate even further growth. This is increasing scale and complexity of telecom/internet service provider (SP) and enterprise data centre (DC) compute and network infrastructures. As a result, managing these large network-compute converged infrastructures is becoming complex and cumbersome. To cope up, network and DC operators are trying to automate network and system operations, administrations and management (OAM) functions. OAM includes all non-functional mechanisms which keep the network running.
Honda, Kiyoshi; Shrestha, Aadit; Witayangkurn, Apichon; Chinnachodteeranun, Rassarin; Shimamura, Hiroshi
2009-01-01
The fieldserver is an Internet based observation robot that can provide an outdoor solution for monitoring environmental parameters in real-time. The data from its sensors can be collected to a central server infrastructure and published on the Internet. The information from the sensor network will contribute to monitoring and modeling on various environmental issues in Asia, including agriculture, food, pollution, disaster, climate change etc. An initiative called Sensor Asia is developing an infrastructure called Sensor Service Grid (SSG), which integrates fieldservers and Web GIS to realize easy and low cost installation and operation of ubiquitous field sensor networks. PMID:22574018
NASA Astrophysics Data System (ADS)
Wu, Liang T.
2004-04-01
The concept of Next Generation Network (NGN) was conceived around 1998 as an integrated solution to combine the quality and features of the PSTN with the low cost and routing flexibility of the Internet to provide a single infrastructure for the future public network. This carrier grade Internet solution calls for the creation of a consolidated, packet transport and switching infrastructure and the development of a flexible, open, software switch (softswitch) to handle voice telephony as well as multimedia services. Almost all the telecom equipment manufacturers as well as some Internet equipment vendors immediately subscribed to this vision and joined the race to create convergent products for the NGN market.
NASA Astrophysics Data System (ADS)
Huang, C. Y.; Wu, C. H.
2016-06-01
The Internet of Things (IoT) is an infrastructure that interconnects uniquely-identifiable devices using the Internet. By interconnecting everyday appliances, various monitoring and physical mashup applications can be constructed to improve people's daily life. However, IoT devices created by different manufacturers follow different proprietary protocols and cannot communicate with each other. This heterogeneity issue causes different products to be locked in multiple closed ecosystems that we call IoT silos. In order to address this issue, a common industrial solution is the hub approach, which implements connectors to communicate with IoT devices following different protocols. However, with the growing number of proprietary protocols proposed by device manufacturers, IoT hubs need to support and maintain a lot of customized connectors. Hence, we believe the ultimate solution to address the heterogeneity issue is to follow open and interoperable standard. Among the existing IoT standards, the Open Geospatial Consortium (OGC) SensorThings API standard supports comprehensive conceptual model and query functionalities. The first version of SensorThings API mainly focuses on connecting to IoT devices and sharing sensor observations online, which is the sensing capability. Besides the sensing capability, IoT devices could also be controlled via the Internet, which is the tasking capability. While the tasking capability was not included in the first version of the SensorThings API standard, this research aims on defining the tasking capability profile and integrates with the SensorThings API standard, which we call the extended-SensorThings API in this paper. In general, this research proposes a lightweight JSON-based web service description, the "Tasking Capability Description", allowing device owners and manufacturers to describe different IoT device protocols. Through the extended- SensorThings API, users and applications can follow a coherent protocol to control IoT devices that use different communication protocols, which could consequently achieve the interoperable Internet of Things infrastructure.
Séror, Ann C
2002-12-01
The Internet and emergent telecommunications infrastructures are transforming the future of health care management. The costs of health care delivery systems, products, and services continue to rise everywhere, but performance of health care delivery is associated with institutional and ideological considerations as well as availability of financial and technological resources. to identify the effects of ideological differences on health care market infrastructures including the Internet and telecommunications technologies by a comparative case analysis of two large health care organizations: the British National Health Service and the California-based Kaiser Permanente health maintenance organization. A qualitative comparative analysis focusing on the British National Health Service and the Kaiser Permanente health maintenance organization to show how system infrastructures vary according to market dynamics dominated by health care institutions ("push") or by consumer demand ("pull"). System control mechanisms may be technologically embedded, institutional, or behavioral. The analysis suggests that telecommunications technologies and the Internet may contribute significantly to health care system performance in a context of ideological diversity. The study offers evidence to validate alternative models of health care governance: the national constitution model, and the enterprise business contract model. This evidence also suggests important questions for health care policy makers as well as researchers in telecommunications, organizational theory, and health care management.
2002-01-01
Background The Internet and emergent telecommunications infrastructures are transforming the future of health care management. The costs of health care delivery systems, products, and services continue to rise everywhere, but performance of health care delivery is associated with institutional and ideological considerations as well as availability of financial and technological resources. Objective To identify the effects of ideological differences on health care market infrastructures including the Internet and telecommunications technologies by a comparative case analysis of two large health care organizations: the British National Health Service and the California-based Kaiser Permanente health maintenance organization. Methods A qualitative comparative analysis focusing on the British National Health Service and the Kaiser Permanente health maintenance organization to show how system infrastructures vary according to market dynamics dominated by health care institutions ("push") or by consumer demand ("pull"). System control mechanisms may be technologically embedded, institutional, or behavioral. Results The analysis suggests that telecommunications technologies and the Internet may contribute significantly to health care system performance in a context of ideological diversity. Conclusions The study offers evidence to validate alternative models of health care governance: the national constitution model, and the enterprise business contract model. This evidence also suggests important questions for health care policy makers as well as researchers in telecommunications, organizational theory, and health care management. PMID:12554552
Recommended Practice for Securing Control System Modems
DOE Office of Scientific and Technical Information (OSTI.GOV)
James R. Davidson; Jason L. Wright
2008-01-01
This paper addresses an often overlooked “backdoor” into critical infrastructure control systems created by modem connections. A modem’s connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods.
Will the Internet Transform Higher Education?
ERIC Educational Resources Information Center
Baer, Walter S.
This analysis of the Internet and higher education focuses on two distinct models: one which is attempting to create "better, faster, cheaper" versions of today's courses and curricula through on-campus information infrastructure, and the other which envisions the Internet as the agent to transform higher education into student-centered learning…
Internet Access in the European Union and in the United States.
ERIC Educational Resources Information Center
Bauer, Johannes M.; Berne, Michel; Maitland, Carleen F.
2002-01-01
Examines the effects of public policies towards traditional communications infrastructures on Internet access in Europe and the United States. Discusses competitive strategies and describes the influence of regulatory policies affecting market entry and the pricing of services on Internet access, based on empirical findings. (Author/LRW)
ERIC Educational Resources Information Center
Wampler, Angela Mallicote
1996-01-01
Examines whether the Internet will be an equalizer or will increase social stratification, whether the Internet will be a boon to rural areas, and how it can be made more appealing or acceptable to rural areas. Discusses the "missionary movement" model of economic change and rural issues related to access to infrastructure, censorship,…
The Roland Maze Project school-based extensive air shower network
NASA Astrophysics Data System (ADS)
Feder, J.; Jȩdrzejczak, K.; Karczmarczyk, J.; Lewandowski, R.; Swarzyński, J.; Szabelska, B.; Szabelski, J.; Wibig, T.
2006-01-01
We plan to construct the large area network of extensive air shower detectors placed on the roofs of high school buildings in the city of Łódź. Detection points will be connected by INTERNET to the central server and their work will be synchronized by GPS. The main scientific goal of the project are studies of ultra high energy cosmic rays. Using existing town infrastructure (INTERNET, power supply, etc.) will significantly reduce the cost of the experiment. Engaging high school students in the research program should significantly increase their knowledge of science and modern technologies, and can be a very efficient way of science popularisation. We performed simulations of the projected network capabilities of registering Extensive Air Showers and reconstructing energies of primary particles. Results of the simulations and the current status of project realisation will be presented.
DOE Office of Scientific and Technical Information (OSTI.GOV)
McParland, Charles
The Smart Grid envisions a transformed US power distribution grid that enables communicating devices, under human supervision, to moderate loads and increase overall system stability and security. This vision explicitly promotes increased participation from a community that, in the past, has had little involvement in power grid operations -the consumer. The potential size of this new community and its member's extensive experience with the public Internet prompts an analysis of the evolution and current state of the Internet as a predictor for best practices in the architectural design of certain portions of the Smart Grid network. Although still evolving, themore » vision of the Smart Grid is that of a community of communicating and cooperating energy related devices that can be directed to route power and modulate loads in pursuit of an integrated, efficient and secure electrical power grid. The remaking of the present power grid into the Smart Grid is considered as fundamentally transformative as previous developments such as modern computing technology and high bandwidth data communications. However, unlike these earlier developments, which relied on the discovery of critical new technologies (e.g. the transistor or optical fiber transmission lines), the technologies required for the Smart Grid currently exist and, in many cases, are already widely deployed. In contrast to other examples of technical transformations, the path (and success) of the Smart Grid will be determined not by its technology, but by its system architecture. Fortunately, we have a recent example of a transformative force of similar scope that shares a fundamental dependence on our existing communications infrastructure - namely, the Internet. We will explore several ways in which the scale of the Internet and expectations of its users have shaped the present Internet environment. As the presence of consumers within the Smart Grid increases, some experiences from the early growth of the Internet are expected to be informative and pertinent.« less
The Internet of Samples in the Earth Sciences (iSamples)
NASA Astrophysics Data System (ADS)
Carter, M. R.; Lehnert, K. A.
2015-12-01
Across most Earth Science disciplines, research depends on the availability of samples collected above, at, and beneath Earth's surface, on the moon and in space, or generated in experiments. Many domains in the Earth Sciences have recently expressed the need for better discovery, access, and sharing of scientific samples and collections (EarthCube End-User Domain workshops, 2012 and 2013, http://earthcube.org/info/about/end-user-workshops), as has the US government (OSTP Memo, March 2014). The Internet of Samples in the Earth Sciences (iSamples) is an initiative funded as a Research Coordination Network (RCN) within the EarthCube program to address this need. iSamples aims to advance the use of innovative cyberinfrastructure to connect physical samples and sample collections across the Earth Sciences with digital data infrastructures to revolutionize their utility for science. iSamples strives to build, grow, and foster a new community of practice, in which domain scientists, curators of sample repositories and collections, computer and information scientists, software developers and technology innovators engage in and collaborate on defining, articulating, and addressing the needs and challenges of physical samples as a critical component of digital data infrastructure. A primary goal of iSamples is to deliver a community-endorsed set of best practices and standards for the registration, description, identification, and citation of physical specimens and define an actionable plan for implementation. iSamples conducted a broad community survey about sample sharing and has created 5 different working groups to address the different challenges of developing the internet of samples - from metadata schemas and unique identifiers to an architecture of a shared cyberinfrastructure for collections, to digitization of existing collections, to education, and ultimately to establishing the physical infrastructure that will ensure preservation and access of the physical samples. Creating awareness of the need to include physical samples in discussions of reproducible science is another priority of the iSamples RCN.
Industrial Internet of Things: (IIoT) applications in underground coal mines.
Zhou, C; Damiano, N; Whisner, B; Reyes, M
2017-12-01
The Industrial Internet of Things (IIoT), a concept that combines sensor networks and control systems, has been employed in several industries to improve productivity and safety. U.S. National Institute for Occupational Safety and Health (NIOSH) researchers are investigating IIoT applications to identify the challenges of and potential solutions for transferring IIoT from other industries to the mining industry. Specifically, NIOSH has reviewed existing sensors and communications network systems used in U.S. underground coal mines to determine whether they are capable of supporting IIoT systems. The results show that about 40 percent of the installed post-accident communication systems as of 2014 require minimal or no modification to support IIoT applications. NIOSH researchers also developed an IIoT monitoring and control prototype system using low-cost microcontroller Wi-Fi boards to detect a door opening on a refuge alternative, activate fans located inside the Pittsburgh Experimental Mine and actuate an alarm beacon on the surface. The results of this feasibility study can be used to explore IIoT applications in underground coal mines based on existing communication and tracking infrastructure.
Zhou, C.; Damiano, N.; Whisner, B.; Reyes, M.
2017-01-01
The Industrial Internet of Things (IIoT), a concept that combines sensor networks and control systems, has been employed in several industries to improve productivity and safety. U.S. National Institute for Occupational Safety and Health (NIOSH) researchers are investigating IIoT applications to identify the challenges of and potential solutions for transferring IIoT from other industries to the mining industry. Specifically, NIOSH has reviewed existing sensors and communications network systems used in U.S. underground coal mines to determine whether they are capable of supporting IIoT systems. The results show that about 40 percent of the installed post-accident communication systems as of 2014 require minimal or no modification to support IIoT applications. NIOSH researchers also developed an IIoT monitoring and control prototype system using low-cost microcontroller Wi-Fi boards to detect a door opening on a refuge alternative, activate fans located inside the Pittsburgh Experimental Mine and actuate an alarm beacon on the surface. The results of this feasibility study can be used to explore IIoT applications in underground coal mines based on existing communication and tracking infrastructure. PMID:29348699
A Tool Supporting Collaborative Data Analytics Workflow Design and Management
NASA Astrophysics Data System (ADS)
Zhang, J.; Bao, Q.; Lee, T. J.
2016-12-01
Collaborative experiment design could significantly enhance the sharing and adoption of the data analytics algorithms and models emerged in Earth science. Existing data-oriented workflow tools, however, are not suitable to support collaborative design of such a workflow, to name a few, to support real-time co-design; to track how a workflow evolves over time based on changing designs contributed by multiple Earth scientists; and to capture and retrieve collaboration knowledge on workflow design (discussions that lead to a design). To address the aforementioned challenges, we have designed and developed a technique supporting collaborative data-oriented workflow composition and management, as a key component toward supporting big data collaboration through the Internet. Reproducibility and scalability are two major targets demanding fundamental infrastructural support. One outcome of the project os a software tool, supporting an elastic number of groups of Earth scientists to collaboratively design and compose data analytics workflows through the Internet. Instead of recreating the wheel, we have extended an existing workflow tool VisTrails into an online collaborative environment as a proof of concept.
Frequency Count Attribute Oriented Induction of Corporate Network Data for Mapping Business Activity
NASA Astrophysics Data System (ADS)
Tanutama, Lukas
2014-03-01
Companies increasingly rely on Internet for effective and efficient business communication. As Information Technology infrastructure backbone for business activities, corporate network connects the company to Internet and enables its activities globally. It carries data packets generated by the activities of the users performing their business tasks. Traditionally, infrastructure operations mainly maintain data carrying capacity and network devices performance. It would be advantageous if a company knows what activities are running in its network. The research provides a simple method of mapping the business activity reflected by the network data. To map corporate users' activities, a slightly modified Attribute Oriented Induction (AOI) approach to mine the network data was applied. The frequency of each protocol invoked were counted to show what the user intended to do. The collected data was samples taken within a certain sampling period. Samples were taken due to the enormous data packets generated. Protocols of interest are only Internet related while intranet protocols are ignored. It can be concluded that the method could provide the management a general overview of the usage of its infrastructure and lead to efficient, effective and secure ICT infrastructure.
Alternatives for Monitoring and Limiting Network Access to Students in Network-Connected Classrooms
ERIC Educational Resources Information Center
Almeroth, Kevin; Zhang, Hangjin
2013-01-01
With the advent of laptop computers and network technology, many classrooms are now being equipped with Internet connections, either through wired connections or wireless infrastructure. Internet access provides students an additional source from which to obtain course-related information. However, constant access to the Internet can be a…
Universal Keyword Classifier on Public Key Based Encrypted Multikeyword Fuzzy Search in Public Cloud
Munisamy, Shyamala Devi; Chokkalingam, Arun
2015-01-01
Cloud computing has pioneered the emerging world by manifesting itself as a service through internet and facilitates third party infrastructure and applications. While customers have no visibility on how their data is stored on service provider's premises, it offers greater benefits in lowering infrastructure costs and delivering more flexibility and simplicity in managing private data. The opportunity to use cloud services on pay-per-use basis provides comfort for private data owners in managing costs and data. With the pervasive usage of internet, the focus has now shifted towards effective data utilization on the cloud without compromising security concerns. In the pursuit of increasing data utilization on public cloud storage, the key is to make effective data access through several fuzzy searching techniques. In this paper, we have discussed the existing fuzzy searching techniques and focused on reducing the searching time on the cloud storage server for effective data utilization. Our proposed Asymmetric Classifier Multikeyword Fuzzy Search method provides classifier search server that creates universal keyword classifier for the multiple keyword request which greatly reduces the searching time by learning the search path pattern for all the keywords in the fuzzy keyword set. The objective of using BTree fuzzy searchable index is to resolve typos and representation inconsistencies and also to facilitate effective data utilization. PMID:26380364
Munisamy, Shyamala Devi; Chokkalingam, Arun
2015-01-01
Cloud computing has pioneered the emerging world by manifesting itself as a service through internet and facilitates third party infrastructure and applications. While customers have no visibility on how their data is stored on service provider's premises, it offers greater benefits in lowering infrastructure costs and delivering more flexibility and simplicity in managing private data. The opportunity to use cloud services on pay-per-use basis provides comfort for private data owners in managing costs and data. With the pervasive usage of internet, the focus has now shifted towards effective data utilization on the cloud without compromising security concerns. In the pursuit of increasing data utilization on public cloud storage, the key is to make effective data access through several fuzzy searching techniques. In this paper, we have discussed the existing fuzzy searching techniques and focused on reducing the searching time on the cloud storage server for effective data utilization. Our proposed Asymmetric Classifier Multikeyword Fuzzy Search method provides classifier search server that creates universal keyword classifier for the multiple keyword request which greatly reduces the searching time by learning the search path pattern for all the keywords in the fuzzy keyword set. The objective of using BTree fuzzy searchable index is to resolve typos and representation inconsistencies and also to facilitate effective data utilization.
Integrated Service Provisioning in an Ipv6 over ATM Research Network
DOE Office of Scientific and Technical Information (OSTI.GOV)
Eli Dart; Helen Chen; Jerry Friesen
1999-02-01
During the past few years, the worldwide Internet has grown at a phenomenal rate, which has spurred the proposal of innovative network technologies to support the fast, efficient and low-latency transport of a wide spectrum of multimedia traffic types. Existing network infrastructures have been plagued by their inability to provide for real-time application traffic as well as their general lack of resources and resilience to congestion. This work proposes to address these issues by implementing a prototype high-speed network infrastructure consisting of Internet Protocol Version 6 (IPv6) on top of an Asynchronous Transfer Mode (ATM) transport medium. Since ATM ismore » connection-oriented whereas IP uses a connection-less paradigm, the efficient integration of IPv6 over ATM is especially challenging and has generated much interest in the research community. We propose, in collaboration with an industry partner, to implement IPv6 over ATM using a unique approach that integrates IP over fast A TM hardware while still preserving IP's connection-less paradigm. This is achieved by replacing ATM's control software with IP's routing code and by caching IP's forwarding decisions in ATM's VPI/VCI translation tables. Prototype ''VR'' and distributed-parallel-computing applications will also be developed to exercise the realtime capability of our IPv6 over ATM network.« less
Adopting Internet Standards for Orbital Use
NASA Technical Reports Server (NTRS)
Wood, Lloyd; Ivancic, William; da Silva Curiel, Alex; Jackson, Chris; Stewart, Dave; Shell, Dave; Hodgson, Dave
2005-01-01
After a year of testing and demonstrating a Cisco mobile access router intended for terrestrial use onboard the low-Earth-orbiting UK-DMC satellite as part of a larger merged ground/space IP-based internetwork, we reflect on and discuss the benefits and drawbacks of integration and standards reuse for small satellite missions. Benefits include ease of operation and the ability to leverage existing systems and infrastructure designed for general use, as well as reuse of existing, known, and well-understood security and operational models. Drawbacks include cases where integration work was needed to bridge the gaps in assumptions between different systems, and where performance considerations outweighed the benefits of reuse of pre-existing file transfer protocols. We find similarities with the terrestrial IP networks whose technologies we have adopted and also some significant differences in operational models and assumptions that must be considered.
Study on the Future Internet System through Analysis of SCADA Systems
NASA Astrophysics Data System (ADS)
Song, Jae-Gu; Jung, Sungmo; Kim, Seoksoo
Research on the future Internet is focused on establishing standards by solving problems through various projects and accepting various requirements. In this study, the SCADA (Supervisory Control And Data Acquisition) environment, closely related with national infrastructure, is analyzed in order to explore requirements of the future Internet and then those of the SCADA network. Also, this study provides SCADA system environments for the future Internet.
ERIC Educational Resources Information Center
Campbell, Wendy
2017-01-01
The speed and availability of Internet-capable devices, such as computers, smartphones, gaming consoles, TVs, and tablets have made it possible for our society to be connected, and stay connected to the Internet 24 hours a day. The Internet of Things (IoT) describes a new environment where common objects are uniquely identifiable and accessible…
Supporting research sites in resource-limited settings: Challenges in implementing IT infrastructure
Whalen, Christopher; Donnell, Deborah; Tartakovsky, Michael
2014-01-01
As Information and Communication Technology infrastructure becomes more reliable, new methods of Electronic Data Capture (EDC), datamarts/Data warehouses, and mobile computing provide platforms for rapid coordination of international research projects and multisite studies. However, despite the increasing availability of internet connectivity and communication systems in remote regions of the world, there are still significant obstacles. Sites with poor infrastructure face serious challenges participating in modern clinical and basic research, particularly that relying on EDC and internet communication technologies. This report discusses our experiences in supporting research in resource-limited settings (RLS). We describe examples of the practical and ethical/regulatory challenges raised by use of these newer technologies for data collection in multisite clinical studies. PMID:24321986
Whalen, Christopher J; Donnell, Deborah; Tartakovsky, Michael
2014-01-01
As information and communication technology infrastructure becomes more reliable, new methods of electronic data capture, data marts/data warehouses, and mobile computing provide platforms for rapid coordination of international research projects and multisite studies. However, despite the increasing availability of Internet connectivity and communication systems in remote regions of the world, there are still significant obstacles. Sites with poor infrastructure face serious challenges participating in modern clinical and basic research, particularly that relying on electronic data capture and Internet communication technologies. This report discusses our experiences in supporting research in resource-limited settings. We describe examples of the practical and ethical/regulatory challenges raised by the use of these newer technologies for data collection in multisite clinical studies.
Smart Bandwidth Assignation in an Underlay Cellular Network for Internet of Vehicles.
de la Iglesia, Idoia; Hernandez-Jayo, Unai; Osaba, Eneko; Carballedo, Roberto
2017-09-27
The evolution of the IoT (Internet of Things) paradigm applied to new scenarios as VANETs (Vehicular Ad Hoc Networks) has gained momentum in recent years. Both academia and industry have triggered advanced studies in the IoV (Internet of Vehicles), which is understood as an ecosystem where different types of users (vehicles, elements of the infrastructure, pedestrians) are connected. How to efficiently share the available radio resources among the different types of eligible users is one of the important issues to be addressed. This paper briefly analyzes various concepts presented hitherto in the literature and it proposes an enhanced algorithm for ensuring a robust co-existence of the aforementioned system users. Therefore, this paper introduces an underlay RRM (Radio Resource Management) methodology which is capable of (1) improving cellular spectral efficiency while making a minimal impact on cellular communications and (2) ensuring the different QoS (Quality of Service) requirements of ITS (Intelligent Transportation Systems) applications. Simulation results, where we compare the proposed algorithm to the other two RRM, show the promising spectral efficiency performance of the proposed RRM methodology.
Smart Bandwidth Assignation in an Underlay Cellular Network for Internet of Vehicles
de la Iglesia, Idoia; Hernandez-Jayo, Unai
2017-01-01
The evolution of the IoT (Internet of Things) paradigm applied to new scenarios as VANETs (Vehicular Ad Hoc Networks) has gained momentum in recent years. Both academia and industry have triggered advanced studies in the IoV (Internet of Vehicles), which is understood as an ecosystem where different types of users (vehicles, elements of the infrastructure, pedestrians) are connected. How to efficiently share the available radio resources among the different types of eligible users is one of the important issues to be addressed. This paper briefly analyzes various concepts presented hitherto in the literature and it proposes an enhanced algorithm for ensuring a robust co-existence of the aforementioned system users. Therefore, this paper introduces an underlay RRM (Radio Resource Management) methodology which is capable of (1) improving cellular spectral efficiency while making a minimal impact on cellular communications and (2) ensuring the different QoS (Quality of Service) requirements of ITS (Intelligent Transportation Systems) applications. Simulation results, where we compare the proposed algorithm to the other two RRM, show the promising spectral efficiency performance of the proposed RRM methodology. PMID:28953256
An Attack-Resilient Middleware Architecture for Grid Integration of Distributed Energy Resources
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wu, Yifu; Mendis, Gihan J.; He, Youbiao
In recent years, the increasing penetration of Distributed Energy Resources (DERs) has made an impact on the operation of the electric power systems. In the grid integration of DERs, data acquisition systems and communications infrastructure are crucial technologies to maintain system economic efficiency and reliability. Since most of these generators are relatively small, dedicated communications investments for every generator are capital cost prohibitive. Combining real-time attack-resilient communications middleware with Internet of Things (IoTs) technologies allows for the use of existing infrastructure. In our paper, we propose an intelligent communication middleware that utilizes the Quality of Experience (QoE) metrics to complementmore » the conventional Quality of Service (QoS) evaluation. Furthermore, our middleware employs deep learning techniques to detect and defend against congestion attacks. The simulation results illustrate the efficiency of our proposed communications middleware architecture.« less
The NASA Science Internet: An integrated approach to networking
NASA Technical Reports Server (NTRS)
Rounds, Fred
1991-01-01
An integrated approach to building a networking infrastructure is an absolute necessity for meeting the multidisciplinary science networking requirements of the Office of Space Science and Applications (OSSA) science community. These networking requirements include communication connectivity between computational resources, databases, and library systems, as well as to other scientists and researchers around the world. A consolidated networking approach allows strategic use of the existing science networking within the Federal government, and it provides networking capability that takes into consideration national and international trends towards multivendor and multiprotocol service. It also offers a practical vehicle for optimizing costs and maximizing performance. Finally, and perhaps most important to the development of high speed computing is that an integrated network constitutes a focus for phasing to the National Research and Education Network (NREN). The NASA Science Internet (NSI) program, established in mid 1988, is structured to provide just such an integrated network. A description of the NSI is presented.
Sensor4PRI: A Sensor Platform for the Protection of Railway Infrastructures
Cañete, Eduardo; Chen, Jaime; Díaz, Manuel; Llopis, Luis; Rubio, Bartolomé
2015-01-01
Wireless Sensor Networks constitute pervasive and distributed computing systems and are potentially one of the most important technologies of this century. They have been specifically identified as a good candidate to become an integral part of the protection of critical infrastructures. In this paper we focus on railway infrastructure protection and we present the details of a sensor platform designed to be integrated into a slab track system in order to carry out both installation and maintenance monitoring activities. In the installation phase, the platform helps operators to install the slab tracks in the right position. In the maintenance phase, the platform collects information about the structural health and behavior of the infrastructure when a train travels along it and relays the readings to a base station. The base station uses trains as data mules to upload the information to the internet. The use of a train as a data mule is especially suitable for collecting information from remote or inaccessible places which do not have a direct connection to the internet and require less network infrastructure. The overall aim of the system is to deploy a permanent economically viable monitoring system to improve the safety of railway infrastructures. PMID:25734648
Evaluation of Future Internet Technologies for Processing and Distribution of Satellite Imagery
NASA Astrophysics Data System (ADS)
Becedas, J.; Perez, R.; Gonzalez, G.; Alvarez, J.; Garcia, F.; Maldonado, F.; Sucari, A.; Garcia, J.
2015-04-01
Satellite imagery data centres are designed to operate a defined number of satellites. For instance, difficulties when new satellites have to be incorporated in the system appear. This occurs because traditional infrastructures are neither flexible nor scalable. With the appearance of Future Internet technologies new solutions can be provided to manage large and variable amounts of data on demand. These technologies optimize resources and facilitate the appearance of new applications and services in the traditional Earth Observation (EO) market. The use of Future Internet technologies for the EO sector were validated with the GEO-Cloud experiment, part of the Fed4FIRE FP7 European project. This work presents the final results of the project, in which a constellation of satellites records the whole Earth surface on a daily basis. The satellite imagery is downloaded into a distributed network of ground stations and ingested in a cloud infrastructure, where the data is processed, stored, archived and distributed to the end users. The processing and transfer times inside the cloud, workload of the processors, automatic cataloguing and accessibility through the Internet are evaluated to validate if Future Internet technologies present advantages over traditional methods. Applicability of these technologies is evaluated to provide high added value services. Finally, the advantages of using federated testbeds to carry out large scale, industry driven experiments are analysed evaluating the feasibility of an experiment developed in the European infrastructure Fed4FIRE and its migration to a commercial cloud: SoftLayer, an IBM Company.
Rapid deployment of internet-connected environmental monitoring devices
USDA-ARS?s Scientific Manuscript database
Advances in electronic sensing and monitoring systems and the growth of the communications infrastructure have enabled users to gain immediate access to information and interaction with physical devices. To facilitate the uploading, viewing, and sharing of data via the internet, while avoiding the ...
Toyonaga, Shinya; Kominami, Daichi; Murata, Masayuki
2016-01-01
Many researchers are devoting attention to the so-called “Internet of Things” (IoT), and wireless sensor networks (WSNs) are regarded as a critical technology for realizing the communication infrastructure of the future, including the IoT. Against this background, virtualization is a crucial technique for the integration of multiple WSNs. Designing virtualized WSNs for actual environments will require further detailed studies. Within the IoT environment, physical networks can undergo dynamic change, and so, many problems exist that could prevent applications from running without interruption when using the existing approaches. In this paper, we show an overall architecture that is suitable for constructing and running virtual wireless sensor network (VWSN) services within a VWSN topology. Our approach provides users with a reliable VWSN network by assigning redundant resources according to each user’s demand and providing a recovery method to incorporate environmental changes. We tested this approach by simulation experiment, with the results showing that the VWSN network is reliable in many cases, although physical deployment of sensor nodes and the modular structure of the VWSN will be quite important to the stability of services within the VWSN topology. PMID:27548177
Toyonaga, Shinya; Kominami, Daichi; Murata, Masayuki
2016-08-19
Many researchers are devoting attention to the so-called "Internet of Things" (IoT), and wireless sensor networks (WSNs) are regarded as a critical technology for realizing the communication infrastructure of the future, including the IoT. Against this background, virtualization is a crucial technique for the integration of multiple WSNs. Designing virtualized WSNs for actual environments will require further detailed studies. Within the IoT environment, physical networks can undergo dynamic change, and so, many problems exist that could prevent applications from running without interruption when using the existing approaches. In this paper, we show an overall architecture that is suitable for constructing and running virtual wireless sensor network (VWSN) services within a VWSN topology. Our approach provides users with a reliable VWSN network by assigning redundant resources according to each user's demand and providing a recovery method to incorporate environmental changes. We tested this approach by simulation experiment, with the results showing that the VWSN network is reliable in many cases, although physical deployment of sensor nodes and the modular structure of the VWSN will be quite important to the stability of services within the VWSN topology.
PKI security in large-scale healthcare networks.
Mantas, Georgios; Lymberopoulos, Dimitrios; Komninos, Nikos
2012-06-01
During the past few years a lot of PKI (Public Key Infrastructures) infrastructures have been proposed for healthcare networks in order to ensure secure communication services and exchange of data among healthcare professionals. However, there is a plethora of challenges in these healthcare PKI infrastructures. Especially, there are a lot of challenges for PKI infrastructures deployed over large-scale healthcare networks. In this paper, we propose a PKI infrastructure to ensure security in a large-scale Internet-based healthcare network connecting a wide spectrum of healthcare units geographically distributed within a wide region. Furthermore, the proposed PKI infrastructure facilitates the trust issues that arise in a large-scale healthcare network including multi-domain PKI infrastructures.
Private Sector Leadership in Global Policy Reform.
ERIC Educational Resources Information Center
Ritter, Jeffrey
1997-01-01
The global dimension of the Internet requires new approaches to formulating policy infrastructures. Commerce must invest in the development of policy infrastructures and governments must support these new approaches; an effective balance between commercial needs and social requirements is necessary in order to achieve universal access. The…
Merging the Intellectual and Technical Infrastructures in Higher Education: The Internet Example.
ERIC Educational Resources Information Center
Hannah, Richard L.
1998-01-01
The pervasiveness of information technology in higher education requires rethinking notions of student, course, curriculum, and other traditional concepts and processes of instruction. This article discusses Internet issues (access, portability, reliability, reboot priorities and back-up communications, student preparedness) and describes new…
3 CFR - Unleashing the Wireless Broadband Revolution
Code of Federal Regulations, 2011 CFR
2011-01-01
... Internet, as vital infrastructure, has become central to the daily economic life of almost every American..., and improve the quality of our lives as wireless high-speed access to the Internet. Innovative new... applications that will transform Americans' lives. Spectrum and the new technologies it enables also are...
The impact of internet-connected control systems on the oil and gas industry
NASA Astrophysics Data System (ADS)
Martel, Ruth T.
In industry and infrastructure today, communication is a way of life. In the oil and gas industry, the use of devices that communicate with the network at large is both commonplace and expected. Unfortunately, security on these devices is not always best. Many industrial control devices originate from legacy devices not originally configured with security in mind. All infrastructure and industry today has seen an increase in attacks on their networks and in some cases, a very dramatic increase, which should be a cause for alarm and action. The purpose of this research was to highlight the threat that Internet-connected devices present to an organization's network in the oil and gas industry and ultimately, to the business and possibly even human life. Although there are several previous studies that highlight the problem of these Internet-connected devices, there remains evidence that security response has not been adequate. The analysis conducted on only one easily discovered device serves as an example of the ongoing issue of the security mindset in the oil and gas industry. The ability to connect to a network through an Internet-connected device gives a hacker an anonymous backdoor to do great damage in that network. The hope is that the approach to security in infrastructure and especially the oil and gas industry, changes before a major catastrophe occurs involving human life.
Ali, Saqib; Wang, Guojun; Cottrell, Roger Leslie; ...
2018-05-28
Internet performance is highly correlated with key economic development metrics of a region. According to World Bank, the economic growth of a country increases 1.3% with a 10% increase in the speed of the Internet. Therefore, it is necessary to monitor and understand the performance of the Internet links in the region. It helps to figure out the infrastructural inefficiencies, poor resource allocation, and routing issues in the region. Moreover, it provides healthy suggestions for future upgrades. Therefore, the objective of this paper is to understand the Internet performance and routing infrastructure of South Asian countries in comparison to themore » developed world and neighboring countries using end-to-end Internet performance measurements. The South Asian countries comprise nearly 32% of the Internet users in Asia and nearly 16% of the world. The Internet performance metrics in the region are collected through the PingER framework. The framework is developed by the SLAC National Accelerator Laboratory, USA and is running for the last 20 years. PingER has 16 monitoring nodes in the region, and in the last year PingER monitors about 40 sites in South Asia using the ubiquitous ping facility. The collected data is used to estimate the key Internet performance metrics of South Asian countries. The performance metrics are compared with the neighboring countries and the developed world. Particularly, the TCP throughput of the countries is also correlated with different development indices. Further, worldwide Internet connectivity and routing patterns of the countries are investigated to figure out the inconsistencies in the region. Furthermore, the performance analysis revealed that the South Asia region is 7-10 years behind the developed regions of North America (USA and Canada), Europe, and East Asia.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ali, Saqib; Wang, Guojun; Cottrell, Roger Leslie
Internet performance is highly correlated with key economic development metrics of a region. According to World Bank, the economic growth of a country increases 1.3% with a 10% increase in the speed of the Internet. Therefore, it is necessary to monitor and understand the performance of the Internet links in the region. It helps to figure out the infrastructural inefficiencies, poor resource allocation, and routing issues in the region. Moreover, it provides healthy suggestions for future upgrades. Therefore, the objective of this paper is to understand the Internet performance and routing infrastructure of South Asian countries in comparison to themore » developed world and neighboring countries using end-to-end Internet performance measurements. The South Asian countries comprise nearly 32% of the Internet users in Asia and nearly 16% of the world. The Internet performance metrics in the region are collected through the PingER framework. The framework is developed by the SLAC National Accelerator Laboratory, USA and is running for the last 20 years. PingER has 16 monitoring nodes in the region, and in the last year PingER monitors about 40 sites in South Asia using the ubiquitous ping facility. The collected data is used to estimate the key Internet performance metrics of South Asian countries. The performance metrics are compared with the neighboring countries and the developed world. Particularly, the TCP throughput of the countries is also correlated with different development indices. Further, worldwide Internet connectivity and routing patterns of the countries are investigated to figure out the inconsistencies in the region. Furthermore, the performance analysis revealed that the South Asia region is 7-10 years behind the developed regions of North America (USA and Canada), Europe, and East Asia.« less
2009-05-01
information technology revolution. The architecture of the Nation’s digital infrastructure, based largely upon the Internet, is not secure or resilient...thriving digital infrastructure. In addi tion, differing national and regional laws and practices —such as laws concerning the investigation and... technology has transformed the global economy and connected people and markets in ways never imagined. To realize the full benefits of the digital
"SWING": A European project for a new application of an ionospheric network
NASA Astrophysics Data System (ADS)
Zolesi, B.; Bianchi, C.; Meloni, A.; Baskaradas, J. A.; Belehaki, A.; Altadill, D.; Dalle Mese, E.
2016-05-01
The SWING (Short Wave critical Infrastructure Network based on a new Generation high survival radio communication system) is a European project aimed at studying a high survival high-frequency (HF) radio network to link European Critical Infrastructures (ECIs). This system is thought to replace broadband internet communication, maintaining the minimum flux of essential information for the ECIs management and control, in case of wide-scale threats, including terrorist attacks, able to put out of order internet links over the Mediterranean region. SWING is designed to evaluate the threat and increase the security awareness, as well as the level of protection, of analogous and/or interdependent ECIs. In order to meet these goals, SWING was finalized to recognize how and when the internet communication fails and to develop the standard software and hardware tools necessary for implementing communication protocols suited for a reliable and interoperable short-wave (SW) or high-frequency (HF) radio network backup. The internet broadband description and internet failure recognition were taken into consideration in the project but are not treated in this paper. It has been assessed that in case of complete failure of the internet broadband communication fundamental information for the management and control of ECIs over the Mediterranean region can be maintained with a HF network, even in case of moderate ionospheric perturbations.
Design and implementation of a remote UAV-based mobile health monitoring system
NASA Astrophysics Data System (ADS)
Li, Songwei; Wan, Yan; Fu, Shengli; Liu, Mushuang; Wu, H. Felix
2017-04-01
Unmanned aerial vehicles (UAVs) play increasing roles in structure health monitoring. With growing mobility in modern Internet-of-Things (IoT) applications, the health monitoring of mobile structures becomes an emerging application. In this paper, we develop a UAV-carried vision-based monitoring system that allows a UAV to continuously track and monitor a mobile infrastructure and transmit back the monitoring information in real- time from a remote location. The monitoring system uses a simple UAV-mounted camera and requires only a single feature located on the mobile infrastructure for target detection and tracking. The computation-effective vision-based tracking solution based on a single feature is an improvement over existing vision-based lead-follower tracking systems that either have poor tracking performance due to the use of a single feature, or have improved tracking performance at a cost of the usage of multiple features. In addition, a UAV-carried aerial networking infrastructure using directional antennas is used to enable robust real-time transmission of monitoring video streams over a long distance. Automatic heading control is used to self-align headings of directional antennas to enable robust communication in mobility. Compared to existing omni-communication systems, the directional communication solution significantly increases the operation range of remote monitoring systems. In this paper, we develop the integrated modeling framework of camera and mobile platforms, design the tracking algorithm, develop a testbed of UAVs and mobile platforms, and evaluate system performance through both simulation studies and field tests.
Towards Accurate Node-Based Detection of P2P Botnets
2014-01-01
Botnets are a serious security threat to the current Internet infrastructure. In this paper, we propose a novel direction for P2P botnet detection called node-based detection. This approach focuses on the network characteristics of individual nodes. Based on our model, we examine node's flows and extract the useful features over a given time period. We have tested our approach on real-life data sets and achieved detection rates of 99-100% and low false positives rates of 0–2%. Comparison with other similar approaches on the same data sets shows that our approach outperforms the existing approaches. PMID:25089287
NASA Astrophysics Data System (ADS)
Chan, Christine S.; Ostertag, Michael H.; Akyürek, Alper Sinan; Šimunić Rosing, Tajana
2017-05-01
The Internet of Things envisions a web-connected infrastructure of billions of sensors and actuation devices. However, the current state-of-the-art presents another reality: monolithic end-to-end applications tightly coupled to a limited set of sensors and actuators. Growing such applications with new devices or behaviors, or extending the existing infrastructure with new applications, involves redesign and redeployment. We instead propose a modular approach to these applications, breaking them into an equivalent set of functional units (context engines) whose input/output transformations are driven by general-purpose machine learning, demonstrating an improvement in compute redundancy and computational complexity with minimal impact on accuracy. In conjunction with formal data specifications, or ontologies, we can replace application-specific implementations with a composition of context engines that use common statistical learning to generate output, thus improving context reuse. We implement interconnected context-aware applications using our approach, extracting user context from sensors in both healthcare and grid applications. We compare our infrastructure to single-stage monolithic implementations with single-point communications between sensor nodes and the cloud servers, demonstrating a reduction in combined system energy by 22-45%, and multiplying the battery lifetime of power-constrained devices by at least 22x, with easy deployment across different architectures and devices.
Product self-management: evolution in recycling and reuse.
Thomas, Valerie M
2003-12-01
This paper explores the potential to make product recycling and reuse easier by shifting responsibility for product management toward the product itself. Examples range from barcode-enabled Internet sales of used products to RFID-enabled garbage trucks that identify recyclable items and provide rebates. Initial steps toward product self-management have made opportunistic use of product bar codes and Internet markets. In the United States, Internet markets are driving increased reuse of products. In the European Union, recycling and waste management policy is driving the use of radio electronics in waste management. Prospects for product self-management are assessed from both a technological and an economic perspective. The technological analysis indicates that radio-frequency tags offer some advantages over bar codes, but their application to product self-management requires considerable investment in the waste management infrastructure. This suggests that early applications of advanced product tags are most suitable for Germany and other countries where the waste management industry has already integrated information technology into its operations. The economic analysis indicates that increased reuse of products can reduce consumption of new products and materials, although on a less than one-to-one basis, simultaneously reducing costs for consumers and deriving more value from existing products.
Examining Willingness to Attack Critical Infrastructure Online and Offline
ERIC Educational Resources Information Center
Holt, Thomas J.; Kilger, Max
2012-01-01
The continuing adoption of technologies by the general public coupled with the expanding reliance of critical infrastructures connected through the Internet has created unique opportunities for attacks by civilians and nation-states alike. Although governments are increasingly focusing on policies to deter nation-state level attacks, it is unclear…
Electronic Business Transaction Infrastructure Analysis Using Petri Nets and Simulation
ERIC Educational Resources Information Center
Feller, Andrew Lee
2010-01-01
Rapid growth in eBusiness has made industry and commerce increasingly dependent on the hardware and software infrastructure that enables high-volume transaction processing across the Internet. Large transaction volumes at major industrial-firm data centers rely on robust transaction protocols and adequately provisioned hardware capacity to ensure…
ERIC Educational Resources Information Center
Radack, Shirley M.
1994-01-01
Examines the role of the National Institute of Standards and Technology (NIST) in the development of the National Information Infrastructure (NII). Highlights include the standards process; voluntary standards; Open Systems Interconnection problems; Internet Protocol Suite; consortia; government's role; and network security. (16 references) (LRW)
Telemedicine using free voice over internet protocol (VoIP) technology.
Miller, David J; Miljkovic, Nikola; Chiesa, Chad; Callahan, John B; Webb, Brad; Boedeker, Ben H
2011-01-01
Though dedicated videoteleconference (VTC) systems deliver high quality, low-latency audio and video for telemedical applications, they require expensive hardware and extensive infrastructure. The purpose of this study was to investigate free commercially available Voice over Internet Protocol (VoIP) software as a low cost alternative for telemedicine.
The Digital Divide: The View from Latin America and the Caribbean.
ERIC Educational Resources Information Center
Rodriguez, Adolfo
This paper discusses the digital divide from the perspective of Latin America and the Caribbean. Highlights include: new issues that make access to electronic resources difficult for users; differences in technological infrastructure among countries; how Internet users are distributed worldwide; Internet access in Africa; the number of students…
Applying a rateless code in content delivery networks
NASA Astrophysics Data System (ADS)
Suherman; Zarlis, Muhammad; Parulian Sitorus, Sahat; Al-Akaidi, Marwan
2017-09-01
Content delivery network (CDN) allows internet providers to locate their services, to map their coverage into networks without necessarily to own them. CDN is part of the current internet infrastructures, supporting multi server applications especially social media. Various works have been proposed to improve CDN performances. Since accesses on social media servers tend to be short but frequent, providing redundant to the transmitted packets to ensure lost packets not degrade the information integrity may improve service performances. This paper examines the implementation of rateless code in the CDN infrastructure. The NS-2 evaluations show that rateless code is able to reduce packet loss up to 50%.
European security framework for healthcare.
Ruotsalainen, Pekka; Pohjonen, Hanna
2003-01-01
eHealth and telemedicine services are promising business areas in Europe. It is clear that eHealth products and services will be sold and ordered from a distance and over national borderlines in the future. However, there are many barriers to overcome. For both national and pan-European eHealth and telemedicine applications a common security framework is needed. These frameworks set security requirements needed for cross-border eHealth services. The next step is to build a security infrastructure which is independent of technical platforms. Most of the European eHealth platforms are regional or territorial. Some countries are looking for a Public Key Infrastructure, but no large scale solutions do exist in healthcare. There is no clear candidate solution for European-wide interoperable eHealth platform. Gross-platform integration seems to be the most practical integration method at a European level in the short run. The use of Internet as a European integration platform is a promising solution in the long run.
NASA Astrophysics Data System (ADS)
Navare, Jyoti; Gemikonakli, Orhan
Globalisation and new technology has opened the gates to more security risks. As the strategic importance of communication networks and information increased, threats to the security and safety of communication infrastructures, as well as information stored in and/or transmitted increased significantly. The development of the self replicating programmes has become a nightmare for Internet users. Leading companies, strategic organisations were not immune to attacks; they were also "hacked" and overtaken by intruders. Incidents of recent years have also shown that national/regional crisis may also trigger cyber attacks at large scale. Experts forecast that cyber wars are likely to take the stage as tension mounts between developed societies. New risks such as cyber-attacks, network terrorism and disintegration of traditional infrastructures has somewhat blurred the boundaries of operation and control. This paper seeks to consider the risk management and governance and looking more specifically at implications for emerging economies.
AIB-OR: improving onion routing circuit construction using anonymous identity-based cryptosystems.
Wang, Changji; Shi, Dongyuan; Xu, Xilei
2015-01-01
The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet.
Design and Development of a Flight Route Modification, Logging, and Communication Network
NASA Technical Reports Server (NTRS)
Merlino, Daniel K.; Wilson, C. Logan; Carboneau, Lindsey M.; Wilder, Andrew J.; Underwood, Matthew C.
2016-01-01
There is an overwhelming desire to create and enhance communication mechanisms between entities that operate within the National Airspace System. Furthermore, airlines are always extremely interested in increasing the efficiency of their flights. An innovative system prototype was developed and tested that improves collaborative decision making without modifying existing infrastructure or operational procedures within the current Air Traffic Management System. This system enables collaboration between flight crew and airline dispatchers to share and assess optimized flight routes through an Internet connection. Using a sophisticated medium-fidelity flight simulation environment, a rapid-prototyping development, and a unified modeling language, the software was designed to ensure reliability and scalability for future growth and applications. Ensuring safety and security were primary design goals, therefore the software does not interact or interfere with major flight control or safety systems. The system prototype demonstrated an unprecedented use of in-flight Internet to facilitate effective communication with Airline Operations Centers, which may contribute to increased flight efficiency for airlines.
AIB-OR: Improving Onion Routing Circuit Construction Using Anonymous Identity-Based Cryptosystems
Wang, Changji; Shi, Dongyuan; Xu, Xilei
2015-01-01
The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet. PMID:25815879
Timpka, Toomas; Nordqvist, Cecilia; Lindqvist, Kent
2009-03-09
Safety promotion is planned and practised not only by public health organizations, but also by other welfare state agencies, private companies and non-governmental organizations. The term 'infrastructure' originally denoted the underlying resources needed for warfare, e.g. roads, industries, and an industrial workforce. Today, 'infrastructure' refers to the physical elements, organizations and people needed to run projects in different societal arenas. The aim of this study was to examine associations between infrastructure and local implementation of safety policies in injury prevention and safety promotion programs. Qualitative data on municipalities in Sweden designated as Safe Communities were collected from focus group interviews with municipal politicians and administrators, as well as from policy documents, and materials published on the Internet. Actor network theory was used to identify weaknesses in the present infrastructure and determine strategies that can be used to resolve these. The weakness identification analysis revealed that the factual infrastructure available for effectuating national strategies varied between safety areas and approaches, basically reflecting differences between bureaucratic and network-based organizational models. At the local level, a contradiction between safety promotion and the existence of quasi-markets for local public service providers was found to predispose for a poor local infrastructure diminishing the interest in integrated inter-agency activities. The weakness resolution analysis showed that development of an adequate infrastructure for safety promotion would require adjustment of the legal framework regulating injury data exchange, and would also require rational financial models for multi-party investments in local infrastructures. We found that the "silo" structure of government organization and assignment of resources was a barrier to collaborative action for safety at a community level. It may therefore be overly optimistic to take for granted that different approaches to injury control, such as injury prevention and safety promotion, can share infrastructure. Similarly, it may be unrealistic to presuppose that safety promotion can reach its potential in terms of injury rate reductions unless the critical infrastructure for this is in place. Such an alignment of the infrastructure to organizational processes requires more than financial investments.
Branch Campus Librarianship with Minimal Infrastructure: Rewards and Challenges
ERIC Educational Resources Information Center
Knickman, Elena; Walton, Kerry
2014-01-01
Delaware County Community College provides library services to its branch campus community members by stationing a librarian at a campus 5 to 20 hours each week, without any more library infrastructure than an Internet-enabled computer on the school network. Faculty and students have reacted favorably to the increased presence of librarians.…
ERIC Educational Resources Information Center
Thigpen, Kamila
2014-01-01
While connecting the nation's schools and libraries to the internet by modernizing and expanding the federal E-rate program currently dominates education technology efforts, a new report from the Alliance for Excellent Education urges that adequate broadband access be accompanied by a comprehensive "digital infrastructure" that unlocks…
Starting a Community-Wide Internet Turnkey Training Program for K-12 Teachers.
ERIC Educational Resources Information Center
McGrath, Beth; Baron, Joshua
Based on the work of the New Jersey Networking Infrastructure in Education (NJNIE) project, it has been demonstrated that thoughtful integration into the curriculum of Internet-based resources has enormous potential to improve teaching and learning. "The Alliance for Training K-12 Teachers in Instructional Technologies: A National…
Virtual Network Embedding via Monte Carlo Tree Search.
Haeri, Soroush; Trajkovic, Ljiljana
2018-02-01
Network virtualization helps overcome shortcomings of the current Internet architecture. The virtualized network architecture enables coexistence of multiple virtual networks (VNs) on an existing physical infrastructure. VN embedding (VNE) problem, which deals with the embedding of VN components onto a physical network, is known to be -hard. In this paper, we propose two VNE algorithms: MaVEn-M and MaVEn-S. MaVEn-M employs the multicommodity flow algorithm for virtual link mapping while MaVEn-S uses the shortest-path algorithm. They formalize the virtual node mapping problem by using the Markov decision process (MDP) framework and devise action policies (node mappings) for the proposed MDP using the Monte Carlo tree search algorithm. Service providers may adjust the execution time of the MaVEn algorithms based on the traffic load of VN requests. The objective of the algorithms is to maximize the profit of infrastructure providers. We develop a discrete event VNE simulator to implement and evaluate performance of MaVEn-M, MaVEn-S, and several recently proposed VNE algorithms. We introduce profitability as a new performance metric that captures both acceptance and revenue to cost ratios. Simulation results show that the proposed algorithms find more profitable solutions than the existing algorithms. Given additional computation time, they further improve embedding solutions.
Globalisation and human dignity: the case of the information superhighway.
Hamelink, C J
1996-01-01
In 1994, Vice President Al Gore coined the concept of the Information Superhighway during a speech in Buenos Aires in which he proposed the development of a global information infrastructure. The project envisions the incorporation of all existing communication networks into one system, facilitating the globalization of markets. The internet, a decentralized network of computer networks, is one small-scale, existing model of what the superhighway could be, a public space owned by nobody in which communication takes place largely for noncommercial purposes. The internet currently connects 40 million computer users from at least 90 countries. The alternative model for the superhighway is the privately managed global shopping mall, a global interactive marketplace for information, entertainment, and advertising. The author warns, however, that it is not possible to predict the future social impact of such an information superhighway. Decision makers nonetheless push ahead in development, full of confidence in the merit and infallibility of technology. Since one cannot accurately predict the future, it rational to assume that social consequences may both promote and threaten human dignity. The author explains at which level he believes the superhighway threatens the human rights norms of equality, inviolability, and liberty, and discusses what the World Association for Christian Communication can do.
Operating a terrestrial Internet router onboard and alongside a small satellite
NASA Astrophysics Data System (ADS)
Wood, L.; da Silva Curiel, A.; Ivancic, W.; Hodgson, D.; Shell, D.; Jackson, C.; Stewart, D.
2006-07-01
After twenty months of flying, testing and demonstrating a Cisco mobile access router, originally designed for terrestrial use, onboard the low-Earth-orbiting UK-DMC satellite as part of a larger merged ground/space IP-based internetwork, we use our experience to examine the benefits and drawbacks of integration and standards reuse for small satellite missions. Benefits include ease of operation and the ability to leverage existing systems and infrastructure designed for general use with a large set of latent capabilities to draw on when needed, as well as the familiarity that comes from reuse of existing, known, and well-understood security and operational models. Drawbacks include cases where integration work was needed to bridge the gaps in assumptions between different systems, and where performance considerations outweighed the benefits of reuse of pre-existing file transfer protocols. We find similarities with the terrestrial IP networks whose technologies have been taken to small satellites—and also some significant differences between the two in operational models and assumptions that must be borne in mind.
Harrop, Wayne; Matteson, Ashley
This paper presents cyber resilience as key strand of national security. It establishes the importance of critical national infrastructure protection and the growing vicarious nature of remote, well-planned, and well executed cyber attacks on critical infrastructures. Examples of well-known historical cyber attacks are presented, and the emergence of 'internet of things' as a cyber vulnerability issue yet to be tackled is explored. The paper identifies key steps being undertaken by those responsible for detecting, deterring, and disrupting cyber attacks on critical national infrastructure in the United Kingdom and the USA.
ERIC Educational Resources Information Center
Needleman, Mark H.
1996-01-01
Reviews developments related to standards in electronic and networked information. Discusses traditional library and Internet communities, and notes the importance of having a supporting infrastructure in place. Topics include: Z39.50; Z39.56 Serial Item/Contribution Identifier (SICI); Interlibrary Loan (ILL) Protocol; character set standards;…
Learning with a Website for the Textile Industry in Botswana
ERIC Educational Resources Information Center
Mbambo, Buhle; Cronje, Johannes C.
2007-01-01
This paper reports on a locally initiated investigation into the suitability of the Internet in helping to meet the information needs of women in small, medium, and micro enterprises (SMMEs) in the textile industry in Botswana. The background is the stated government policy to encourage the development of SMMEs and the Internet infrastructure. The…
ERIC Educational Resources Information Center
Ryan, Joe; McClure, Charles R.
This report represents the views and perceptions of participants at a December 1994 Strategic Information Resources Management (SIRM) seminar, held in the District of Columbia, entitled "Building and Managing Government Internet Services." The group was comprised of 67 government officials and contractors who either had or were about to…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-18
... is placed in the public docket and made available on the Internet. If you submit an electronic... material, such as copyrighted material, is not placed on the Internet and will be publicly available only... things, to complete a Federal Register notice announcing EPA's determinations pursuant to section 110(k...
Challenges Concerning the Energy-Dependency of the Telecom Infrastructure
NASA Astrophysics Data System (ADS)
Fickert, Lothar; Malleck, Helmut; Wakolbinger, Christian
Industry worldwide depends on Information and Communication Technology (ICT). Through large-scale blackouts of the public electricity supply telephone services and Internet connections are massively reduced in their functions, leading to cascading effects. Following analysis of selected, typical failure situations counter-measures to re-establish the public electricity supply in Austria to consumers are identified. This can serve also as an example for other countries. Based on the existing public electricity supply system, a sensitivity analysis both in power and in the ICT sector for the mobile and the fixed network is carried out. As a new possible solution ”smart grid” or ”microgrids” and the controlled operation of decentralized stable islands are investigated.
A Metadata Standard for Hydroinformatic Data Conforming to International Standards
NASA Astrophysics Data System (ADS)
Notay, Vikram; Carstens, Georg; Lehfeldt, Rainer
2017-04-01
The affordable availability of computing power and digital storage has been a boon for the scientific community. The hydroinformatics community has also benefitted from the so-called digital revolution, which has enabled the tackling of more and more complex physical phenomena using hydroinformatic models, instruments, sensors, etc. With models getting more and more complex, computational domains getting larger and the resolution of computational grids and measurement data getting finer, a large amount of data is generated and consumed in any hydroinformatics related project. The ubiquitous availability of internet also contributes to this phenomenon with data being collected through sensor networks connected to telecommunications networks and the internet long before the term Internet of Things existed. Although generally good, this exponential increase in the number of available datasets gives rise to the need to describe this data in a standardised way to not only be able to get a quick overview about the data but to also facilitate interoperability of data from different sources. The Federal Waterways Engineering and Research Institute (BAW) is a federal authority of the German Federal Ministry of Transport and Digital Infrastructure. BAW acts as a consultant for the safe and efficient operation of the German waterways. As part of its consultation role, BAW operates a number of physical and numerical models for sections of inland and marine waterways. In order to uniformly describe the data produced and consumed by these models throughout BAW and to ensure interoperability with other federal and state institutes on the one hand and with EU countries on the other, a metadata profile for hydroinformatic data has been developed at BAW. The metadata profile is composed in its entirety using the ISO 19115 international standard for metadata related to geographic information. Due to the widespread use of the ISO 19115 standard in the existing geodata infrastructure worldwide, the profile provides a means to describe hydroinformatic data that conforms to existing metadata standards. Additionally, EU and German national standards, INSPIRE and GDI-DE have been considered to ensure interoperability on an international and national level. Finally, elements of the GovData profile of the Federal Government of Germany have been integrated to be able to participate in its Open Data initiative. All these factors make the metadata profile developed at BAW highly suitable for describing hydroinformatic data in particular and physical state variables in general. Further details about this metadata profile will be presented at the conference. Acknowledgements: The authors would like to thank Christoph Wosniok and Peter Schade for their contributions towards the development of this metadata standard.
Network and computing infrastructure for scientific applications in Georgia
NASA Astrophysics Data System (ADS)
Kvatadze, R.; Modebadze, Z.
2016-09-01
Status of network and computing infrastructure and available services for research and education community of Georgia are presented. Research and Educational Networking Association - GRENA provides the following network services: Internet connectivity, network services, cyber security, technical support, etc. Computing resources used by the research teams are located at GRENA and at major state universities. GE-01-GRENA site is included in European Grid infrastructure. Paper also contains information about programs of Learning Center and research and development projects in which GRENA is participating.
2002-03-22
may be derived from detailed inspection of the IC itself or from illicit appropriation of design information. Counterfeit smart cards can be mass...Infrastructure (PKI) as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair...interference devices (SQDIS), electrical testing, and electron beam testing. • Other attacks, such as UV or X-rays or high temperatures, could cause erasure
Security and privacy issues with health care information technology.
Meingast, Marci; Roosta, Tanya; Sastry, Shankar
2006-01-01
The face of health care is changing as new technologies are being incorporated into the existing infrastructure. Electronic patient records and sensor networks for in-home patient monitoring are at the current forefront of new technologies. Paper-based patient records are being put in electronic format enabling patients to access their records via the Internet. Remote patient monitoring is becoming more feasible as specialized sensors can be placed inside homes. The combination of these technologies will improve the quality of health care by making it more personalized and reducing costs and medical errors. While there are benefits to technologies, associated privacy and security issues need to be analyzed to make these systems socially acceptable. In this paper we explore the privacy and security implications of these next-generation health care technologies. We describe existing methods for handling issues as well as discussing which issues need further consideration.
Royall, Julia; Isyagi, Micongwe Moses; Iliyasu, Yawale; Lukande, Robert; Vuhahula, Edda
2018-03-01
The shared practice of pathology via the Internet holds great potential for pathologists in sub-Saharan Africa (SSA) and their global partners. Application of the Internet is constrained by issues of bandwidth, cost, and power. The penetration of mobile telephony and the arrival of smartphones have changed the use of Internet and social media in Africa and therefore the work of the 4 African pathologists featured in this article. As pathology in SSA struggles for visibility and usefulness, the Internet and its electronic applications provide a critical infrastructure as well as a podium for pathologists across the continent. Copyright © 2017 Elsevier Inc. All rights reserved.
National Stormwater Calculator: Low Impact Development ...
Stormwater discharges continue to cause impairment of our Nation’s waterbodies. EPA has developed the National Stormwater Calculator (SWC) to help support local, state, and national stormwater management objectives to reduce runoff through infiltration and retention using green infrastructure practices as low impact development (LID) controls. The primary focus of the SWC is to inform site developers on how well they can meet a desired stormwater retention target with and without the use of green infrastructure. It can also be used by landscapers and homeowners. Platform. The SWC is a Windows-based desktop program that requires an internet connection. A mobile web application version that will be compatible with all operating systems is currently being developed and is expected to be released in the fall of 2017.Cost Module. An LID cost estimation module within the application allows planners and managers to evaluate LID controls based on comparison of regional and national project planning level cost estimates (capital and average annual maintenance) and predicted LID control performance. Cost estimation is accomplished based on user-identified size configuration of the LID control infrastructure and other key project and site-specific variables. This includes whether the project is being applied as part of new development or redevelopment and if there are existing site constraints.Climate Scenarios. The SWC allows users to consider how runoff may vary based
A Real-Time Web of Things Framework with Customizable Openness Considering Legacy Devices
Zhao, Shuai; Yu, Le; Cheng, Bo
2016-01-01
With the development of the Internet of Things (IoT), resources and applications based on it have emerged on a large scale. However, most efforts are “silo” solutions where devices and applications are tightly coupled. Infrastructures are needed to connect sensors to the Internet, open up and break the current application silos and move to a horizontal application mode. Based on the concept of Web of Things (WoT), many infrastructures have been proposed to integrate the physical world with the Web. However, issues such as no real-time guarantee, lack of fine-grained control of data, and the absence of explicit solutions for integrating heterogeneous legacy devices, hinder their widespread and practical use. To address these issues, this paper proposes a WoT resource framework that provides the infrastructures for the customizable openness and sharing of users’ data and resources under the premise of ensuring the real-time behavior of their own applications. The proposed framework is validated by actual systems and experimental evaluations. PMID:27690038
A Real-Time Web of Things Framework with Customizable Openness Considering Legacy Devices.
Zhao, Shuai; Yu, Le; Cheng, Bo
2016-09-28
With the development of the Internet of Things (IoT), resources and applications based on it have emerged on a large scale. However, most efforts are "silo" solutions where devices and applications are tightly coupled. Infrastructures are needed to connect sensors to the Internet, open up and break the current application silos and move to a horizontal application mode. Based on the concept of Web of Things (WoT), many infrastructures have been proposed to integrate the physical world with the Web. However, issues such as no real-time guarantee, lack of fine-grained control of data, and the absence of explicit solutions for integrating heterogeneous legacy devices, hinder their widespread and practical use. To address these issues, this paper proposes a WoT resource framework that provides the infrastructures for the customizable openness and sharing of users' data and resources under the premise of ensuring the real-time behavior of their own applications. The proposed framework is validated by actual systems and experimental evaluations.
Object and image retrieval over the Internet
NASA Astrophysics Data System (ADS)
Gilles, Sebastien; Winter, A.; Feldmar, J.; Poirier, N.; Bousquet, R.; Bussy, B.; Lamure, H.; Demarty, C.-H.; Nastar, Chahab
2000-12-01
In this article, we describe some of the work that was carried out at LookThatUp for designing an infrastructure enabling image-based search over the Internet. The service was designed to be remotely accessible and easily integrated to partner sites. One application of the technology, called Image-Shopper, is described and demonstrated. The technological basis of the system is then reviewed.
Why Customers Use or Do Not Use Internet Banking: A Case Study of a Community Bank
ERIC Educational Resources Information Center
Beadnell, Stephen Allen
2014-01-01
The banking industry is being challenged by shareholders and consumers to provide its products in the most efficient manner, provide good customer service, and earn a fair profit. Although the infrastructure is in place to serve most customers through Internet banking, the number of customers using this channel is less than expected. The purpose…
The GILDA t-Infrastructure: grid training activities in Africa and future opportunities
NASA Astrophysics Data System (ADS)
Ardizzone, V.; Barbera, R.; Ciuffo, L.; Giorgio, E.
2009-04-01
Scientists, educators, and students from many parts of the worlds are not able to take advantage of ICT because the digital divide is growing and prevents less developed countries to exploit its benefits. Instead of becoming more empowered and involved in worldwide developments, they are becoming increasingly marginalised as the world of education and science becomes increasingly Internet-dependent. The Grid Infn Laboratory for Dissemination Activities (GILDA) spreads since almost five years the awareness of Grid technology to a large audience, training new communities and fostering new organisations to provide resources. The knowledge dissemination process guided by the training activities is a key factor to ensure that all users can fully understand the characteristics of the Grid services offered by large existing e-Infrastructure. GILDA is becoming a "de facto" standard in training infrastructures (t-Infrastructures) and it is adopted by many grid projects worldwide. In this contribution we will report on the latest status of GILDA services and on the training activities recently carried out in sub-Saharan Africa (Malawi and South Africa). Particular care will be devoted to show how GILDA can be "cloned" to satisfy both education and research demands of African Organisations. The opportunities to benefit from GILDA in the framework of the EPIKH project as well as the plans of the European Commission on grid training and education for the 2010-2011 calls of its 7th Framework Programme will be presented and discussed.
NASA Technical Reports Server (NTRS)
McCormack, Michael J.; Gibson, Alec K.; Dennis, Noah E.; Underwood, Matthew C.; Miller,Lana B.; Ballin, Mark G.
2013-01-01
Abstract-Next Generation Air Transportation System (NextGen) applications reliant upon aircraft data links such as Automatic Dependent Surveillance-Broadcast (ADS-B) offer a sweeping modernization of the National Airspace System (NAS), but the aviation stakeholder community has not yet established a positive business case for equipage and message content standards remain in flux. It is necessary to transition promising Air Traffic Management (ATM) Concepts of Operations (ConOps) from simulation environments to full-scale flight tests in order to validate user benefits and solidify message standards. However, flight tests are prohibitively expensive and message standards for Commercial-off-the-Shelf (COTS) systems cannot support many advanced ConOps. It is therefore proposed to simulate future aircraft surveillance and communications equipage and employ an existing commercial data link to exchange data during dedicated flight tests. This capability, referred to as the Networked Air Traffic Infrastructure Validation Environment (NATIVE), would emulate aircraft data links such as ADS-B using in-flight Internet and easily-installed test equipment. By utilizing low-cost equipment that is easy to install and certify for testing, advanced ATM ConOps can be validated, message content standards can be solidified, and new standards can be established through full-scale flight trials without necessary or expensive equipage or extensive flight test preparation. This paper presents results of a feasibility study of the NATIVE concept. To determine requirements, six NATIVE design configurations were developed for two NASA ConOps that rely on ADS-B. The performance characteristics of three existing in-flight Internet services were investigated to determine whether performance is adequate to support the concept. Next, a study of requisite hardware and software was conducted to examine whether and how the NATIVE concept might be realized. Finally, to determine a business case, economic factors were evaluated and a preliminary cost-benefit analysis was performed.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Khan, Shahryar Muhammad; /SLAC /NUST, Rawalpindi; Cottrell, R.Les
2007-10-30
The future of Computing in High Energy Physics (HEP) applications depends on both the Network and Grid infrastructure. South Asian countries such as India and Pakistan are making significant progress by building clusters as well as improving their network infrastructure However to facilitate the use of these resources, they need to manage the issues of network connectivity to be among the leading participants in Computing for HEP experiments. In this paper we classify the connectivity for academic and research institutions of South Asia. The quantitative measurements are carried out using the PingER methodology; an approach that induces minimal ICMP trafficmore » to gather active end-to-end network statistics. The PingER project has been measuring the Internet performance for the last decade. Currently the measurement infrastructure comprises of over 700 hosts in more than 130 countries which collectively represents approximately 99% of the world's Internet-connected population. Thus, we are well positioned to characterize the world's connectivity. Here we present the current state of the National Research and Educational Networks (NRENs) and Grid Infrastructure in the South Asian countries and identify the areas of concern. We also present comparisons between South Asia and other developing as well as developed regions. We show that there is a strong correlation between the Network performance and several Human Development indices.« less
The history of infrastructures and the future of cyberinfrastructure in the Earth system sciences
NASA Astrophysics Data System (ADS)
Edwards, P. N.
2012-12-01
Infrastructures display similar historical patterns of inception, development, growth and decay. They typically begin as centralized systems which later proliferate into competing variants. Users' desire for seamless functionality tends eventually to push these variants toward interoperability, usually through "gateway" technologies that link incompatible systems into networks. Another stage is reached when these networks are linked to others, as in the cases of container transport (connecting trucking, rail, and shipping) or the Internet. End stages of infrastructure development include "splintering" (specialized service tiering) and decay, as newer infrastructures displace older ones. Temporal patterns are also visible in historical infrastructure development. This presentation, by a historian of science and technology, describes these patterns through examples of both physical and digital infrastructures, focusing on the global weather forecast infrastructure since the 19th century. It then investigates how some of these patterns might apply to the future of cyberinfrastructure for the Earth system sciences.
Architecture of a Service-Enabled Sensing Platform for the Environment
Kotsev, Alexander; Pantisano, Francesco; Schade, Sven; Jirka, Simon
2015-01-01
Recent technological advancements have led to the production of arrays of miniaturized sensors, often embedded in existing multitasking devices (e.g., smartphones, tablets) and using a wide range of radio standards (e.g., Bluetooth, Wi-Fi, 4G cellular networks). Altogether, these technological evolutions coupled with the diffusion of ubiquitous Internet connectivity provide the base-line technology for the Internet of Things (IoT). The rapid increase of IoT devices is enabling the definition of new paradigms of data collection and introduces the concept of mobile crowd-sensing. In this respect, new sensing methodologies promise to extend the current understanding of the environment and social behaviors by leveraging citizen-contributed data for a wide range of applications. Environmental sensing can however only be successful if all the heterogeneous technologies and infrastructures work smoothly together. As a result, the interconnection and orchestration of devices is one of the central issues of the IoT paradigm. With this in mind, we propose an approach for improving the accessibility of observation data, based on interoperable standards and on-device web services. PMID:25688593
Architecture of a service-enabled sensing platform for the environment.
Kotsev, Alexander; Pantisano, Francesco; Schade, Sven; Jirka, Simon
2015-02-13
Recent technological advancements have led to the production of arrays of miniaturized sensors, often embedded in existing multitasking devices (e.g., smartphones, tablets) and using a wide range of radio standards (e.g., Bluetooth, Wi-Fi, 4G cellular networks). Altogether, these technological evolutions coupled with the diffusion of ubiquitous Internet connectivity provide the base-line technology for the Internet of Things (IoT). The rapid increase of IoT devices is enabling the definition of new paradigms of data collection and introduces the concept of mobile crowd-sensing. In this respect, new sensing methodologies promise to extend the current understanding of the environment and social behaviors by leveraging citizen-contributed data for a wide range of applications. Environmental sensing can however only be successful if all the heterogeneous technologies and infrastructures work smoothly together. As a result, the interconnection and orchestration of devices is one of the central issues of the IoT paradigm. With this in mind, we propose an approach for improving the accessibility of observation data, based on interoperable standards and on-device web services.
Modelling operations and security of cloud systems using Z-notation and Chinese Wall security policy
NASA Astrophysics Data System (ADS)
Basu, Srijita; Sengupta, Anirban; Mazumdar, Chandan
2016-11-01
Enterprises are increasingly using cloud computing for hosting their applications. Availability of fast Internet and cheap bandwidth are causing greater number of people to use cloud-based services. This has the advantage of lower cost and minimum maintenance. However, ensuring security of user data and proper management of cloud infrastructure remain major areas of concern. Existing techniques are either too complex, or fail to properly represent the actual cloud scenario. This article presents a formal cloud model using the constructs of Z-notation. Principles of the Chinese Wall security policy have been applied to design secure cloud-specific operations. The proposed methodology will enable users to safely host their services, as well as process sensitive data, on cloud.
Mohammadi, Ali; Ahmadi, Maryam; Gharagozlu, Alireza
2016-03-01
Each year, around 1.2 million people die in the road traffic incidents. Reducing traffic accidents requires an exact understanding of the risk factors associated with traffic patterns and behaviors. Properly analyzing these factors calls for a comprehensive system for collecting and processing accident data. The aim of this study was to develop a minimum data set (MDS) for an information management system to study traffic accidents in Iran. This descriptive, cross-sectional study was performed in 2014. Data were collected from the traffic police, trauma centers, medical emergency centers, and via the internet. The investigated resources for this study were forms, databases, and documents retrieved from the internet. Forms and databases were identical, and one sample of each was evaluated. The related internet-sourced data were evaluated in their entirety. Data were collected using three checklists. In order to arrive at a consensus about the data elements, the decision Delphi technique was applied using questionnaires. The content validity and reliability of the questionnaires were assessed by experts' opinions and the test-retest method, respectively. An (MDS) of a traffic accident information management system was assigned to three sections: a minimum data set for traffic police with six classes, including 118 data elements; a trauma center with five data classes, including 57 data elements; and a medical emergency center, with 11 classes, including 64 data elements. Planning for the prevention of traffic accidents requires standardized data. As the foundation for crash prevention efforts, existing standard data infrastructures present policymakers and government officials with a great opportunity to strengthen and integrate existing accident information systems to better track road traffic injuries and fatalities.
Mohammadi, Ali; Ahmadi, Maryam; Gharagozlu, Alireza
2016-01-01
Background: Each year, around 1.2 million people die in the road traffic incidents. Reducing traffic accidents requires an exact understanding of the risk factors associated with traffic patterns and behaviors. Properly analyzing these factors calls for a comprehensive system for collecting and processing accident data. Objectives: The aim of this study was to develop a minimum data set (MDS) for an information management system to study traffic accidents in Iran. Materials and Methods: This descriptive, cross-sectional study was performed in 2014. Data were collected from the traffic police, trauma centers, medical emergency centers, and via the internet. The investigated resources for this study were forms, databases, and documents retrieved from the internet. Forms and databases were identical, and one sample of each was evaluated. The related internet-sourced data were evaluated in their entirety. Data were collected using three checklists. In order to arrive at a consensus about the data elements, the decision Delphi technique was applied using questionnaires. The content validity and reliability of the questionnaires were assessed by experts’ opinions and the test-retest method, respectively. Results: An (MDS) of a traffic accident information management system was assigned to three sections: a minimum data set for traffic police with six classes, including 118 data elements; a trauma center with five data classes, including 57 data elements; and a medical emergency center, with 11 classes, including 64 data elements. Conclusions: Planning for the prevention of traffic accidents requires standardized data. As the foundation for crash prevention efforts, existing standard data infrastructures present policymakers and government officials with a great opportunity to strengthen and integrate existing accident information systems to better track road traffic injuries and fatalities. PMID:27247791
DOE Office of Scientific and Technical Information (OSTI.GOV)
Branscomb, L.; Hurley, D.; Keller, J.
1998-04-01
This project was undertaken to explore new options for connecting homes and small businesses to high-speed communications networks, such as the Internet. Fundamental to this inquiry was an interest in looking at options which are newly enabled through changes in technology and regulation, and which go beyond the traditional topdown, centralized model for local access. In particular, the authors focused on opportunities for end-user and community-level investment. This project was intended to investigate the opportunities presented by the decreasing cost of computing and networking platforms, the unbundling of local exchange network elements, and the intelligent endpoints model of networking bestmore » exemplified by the Internet. Do these factors, along with communications technologies such as spread spectrum wireless, digital subscriber line services, and the ability to modulate a communications signal over the electric power line infrastructure, enable new models for end-user investment in intelligent infrastructure as a leverage point for accessing the broadband network? This question was first explored through a two-day conference held at the Freedom Forum in Arlington, Virginia, October 29 and 30, 1996. The workshop addressed issues in the consumer adoption of new communications technologies, use of the electric power line infrastructure, the role of municipalities, and the use of alternative technologies, such as XDSL, satellite, spread spectrum wireless, LMDS, and others. The best of these papers have been further developed, with editorial guidance provided by Harvard, and compiled in the form of a book (The First 100 Feet: New Options for Internet and Broadband Access, Deborah Hurley and James Keller, eds., MIT Press, 1998) to be published as part of the MIT Press Spring 1998 catalogue. A summary of topics covered by the book is given in this report.« less
COOPEUS - connecting research infrastructures in environmental sciences
NASA Astrophysics Data System (ADS)
Koop-Jakobsen, Ketil; Waldmann, Christoph; Huber, Robert
2015-04-01
The COOPEUS project was initiated in 2012 bringing together 10 research infrastructures (RIs) in environmental sciences from the EU and US in order to improve the discovery, access, and use of environmental information and data across scientific disciplines and across geographical borders. The COOPEUS mission is to facilitate readily accessible research infrastructure data to advance our understanding of Earth systems through an international community-driven effort, by: Bringing together both user communities and top-down directives to address evolving societal and scientific needs; Removing technical, scientific, cultural and geopolitical barriers for data use; and Coordinating the flow, integrity and preservation of information. A survey of data availability was conducted among the COOPEUS research infrastructures for the purpose of discovering impediments for open international and cross-disciplinary sharing of environmental data. The survey showed that the majority of data offered by the COOPEUS research infrastructures is available via the internet (>90%), but the accessibility to these data differ significantly among research infrastructures; only 45% offer open access on their data, whereas the remaining infrastructures offer restricted access e.g. do not release raw data or sensible data, demand user registration or require permission prior to release of data. These rules and regulations are often installed as a form of standard practice, whereas formal data policies are lacking in 40% of the infrastructures, primarily in the EU. In order to improve this situation COOPEUS has installed a common data-sharing policy, which is agreed upon by all the COOPEUS research infrastructures. To investigate the existing opportunities for improving interoperability among environmental research infrastructures, COOPEUS explored the opportunities with the GEOSS common infrastructure (GCI) by holding a hands-on workshop. Through exercises directly registering resources, the first steps were taken to implement the GCI as a platform for documenting the capabilities of the COOPEUS research infrastructures. COOPEUS recognizes the potential for the GCI to become an important platform promoting cross-disciplinary approaches in the studies of multifaceted environmental challenges. Recommendations from the workshop participants also revealed that in order to attract research infrastructures to use the GCI, the registration process must be simplified and accelerated. However, also the data policies of the individual research infrastructure, or lack thereof, can prevent the use of the GCI or other portals, due to unclarities regarding data management authority and data ownership. COOPEUS shall continue to promote cross-disciplinary data exchange in the environmental field and will in the future expand to also include other geographical areas.
Transport Traffic Analysis for Abusive Infrastructure Characterization
2012-12-14
Introduction Abusive traffic abounds on the Internet, in the form of email, malware, vulnerability scanners, worms, denial-of-service, drive-by-downloads, scam ...insight is two-fold. First, attackers have a basic requirement to source large amounts of data, be it denial-of-service, scam -hosting, spam, or other...the network core. This paper explores the power of transport-layer traffic analysis to detect and characterize scam hosting infrastructure, including
2016-02-01
Internet service providers and global supply chains, over which DOD has no direct authority to mitigate risk effectively. The global technology supply...cyberspace. CO are composed of the military, intelligence, and ordinary business operations of DOD in and through cyberspace. Cyberspace, while a global ...infrastructures, including the Internet , telecommunications networks, computer systems, and embedded processors and controllers, and the content that flows across
Vulnerability of network of networks
NASA Astrophysics Data System (ADS)
Havlin, S.; Kenett, D. Y.; Bashan, A.; Gao, J.; Stanley, H. E.
2014-10-01
Our dependence on networks - be they infrastructure, economic, social or others - leaves us prone to crises caused by the vulnerabilities of these networks. There is a great need to develop new methods to protect infrastructure networks and prevent cascade of failures (especially in cases of coupled networks). Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How, and at which cost can one restructure the network such that it will become more robust against malicious attacks? The gradual increase in attacks on the networks society depends on - Internet, mobile phone, transportation, air travel, banking, etc. - emphasize the need to develop new strategies to protect and defend these crucial networks of communication and infrastructure networks. One example is the threat of liquid explosives a few years ago, which completely shut down air travel for days, and has created extreme changes in regulations. Such threats and dangers warrant the need for new tools and strategies to defend critical infrastructure. In this paper we review recent advances in the theoretical understanding of the vulnerabilities of interdependent networks with and without spatial embedding, attack strategies and their affect on such networks of networks as well as recently developed strategies to optimize and repair failures caused by such attacks.
Prioritized service system behavior
NASA Astrophysics Data System (ADS)
Oliver, Huw
2001-07-01
Internet technology is becoming the infrastructure of the future for any information that can be transmitted digitally, including voice, audio, video and data services of all kinds. The trend to integrate voice and data traffic observed in the Internet is expected to continue until the full integration of all media types is achieved. At the same time it is obvious that the business model employed for current Internet usage is not sustainable for the creation of an infrastructure suitable to support a diverse and ever-increasing range of application services. Currently the Internet provides only a single class of best-effort service and prices are mainly built on flat-fee, access based schemes. We propose the use of pricing mechanisms for controlling demand for scarce resources, in order to improve the economic efficiency of the system. Standard results in economic theory suggest that increasing the value of the network services to the users is beneficial to both the users and the network operator (since he can charge them more and get back a bigger percentage of their surplus). Using pricing mechanisms helps in that respect. When demand is high, prices are being raised and hence deter the users with low valuation for the service to use it. This leaves resources to be available for the users that value them more, and hence are ready to pay more.
Advanced Broadband Infrastructure Bond Initiative of 2009
Rep. Eshoo, Anna G. [D-CA-14
2009-01-28
House - 02/02/2009 Referred to the Subcommittee on Communications, Technology, and the Internet. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Unbundled infrastructure firms: Competition and continuing regulation
NASA Astrophysics Data System (ADS)
Hogendorn, Christiaan Paul
Unbundled infrastructure firms provide conduits for electricity transmission, residential communications, etc. but are vertically disintegrated from "content" functions such as electricity generation or world-wide-web pages. These conduits are being deregulated, and this dissertation examines whether the deregulated conduits will behave in an efficient and competitive manner. The dissertation presents three essays, each of which develops a theoretical model of the behavior of conduit firms in a market environment. The first essay considers the prospects for competition between multiple conduits in the emerging market for broadband (high-speed) residential Internet access. It finds that such competition is likely to emerge as demand for these services increase. The second essay shows how a monopoly electricity or natural gas transmission conduit can facilitate collusion between suppliers of the good. It shows that this is an inefficient effect of standard price-cap regulation. The third essay considers the supply chain of residential Internet access and evaluates proposed "open access" regulation that would allow more than one firm to serve customers over the same physical infrastructure. It shows that the amount of content available to consumers does not necessarily increase under open access.
An Encryption Scheme for Communication Internet SCADA Components
NASA Astrophysics Data System (ADS)
Robles, Rosslin John; Kim, Tai-Hoon
The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network. SCADA is considered a critical infrastructure, and connecting to the internet is putting the society on jeopardy, some operators hold back on connecting it to the internet. But since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Supervisory Control and Data Acquisition Systems (SCADA) through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.
Converged Infrastructure for Emerging Regions - A Research Agenda
NASA Astrophysics Data System (ADS)
Chevrollier, Nicolas; Zidbeck, Juha; Ntlatlapa, Ntsibane; Simsek, Burak; Marikar, Achim
In remote parts of Africa, the lack of energy supply, of wired infrastructure, of trained personnel and the limitation in OPEX and CAPEX impose stringent requirements on the network building blocks that support the communication infrastructure. Consequently, in this promising but untapped market, the research aims at designing and implementing energy-efficient, robust, reliable and affordable wide heterogeneous wireless mesh networks to connect geographically very large areas in a challenged environment. This paper proposes a solution that is aimed at enhancing the usability of Internet services in the harsh target environment and especially how the end-users experience the reliability of these services.
NASA Astrophysics Data System (ADS)
Blasch, Erik; Kadar, Ivan; Grewe, Lynne L.; Brooks, Richard; Yu, Wei; Kwasinski, Andres; Thomopoulos, Stelios; Salerno, John; Qi, Hairong
2017-05-01
During the 2016 SPIE DSS conference, nine panelists were invited to highlight the trends and opportunities in cyber-physical systems (CPS) and Internet of Things (IoT) with information fusion. The world will be ubiquitously outfitted with many sensors to support our daily living thorough the Internet of Things (IoT), manage infrastructure developments with cyber-physical systems (CPS), as well as provide communication through networked information fusion technology over the internet (NIFTI). This paper summarizes the panel discussions on opportunities of information fusion to the growing trends in CPS and IoT. The summary includes the concepts and areas where information supports these CPS/IoT which includes situation awareness, transportation, and smart grids.
Inventing an Energy Internet: Concepts, Architectures and Protocols for Smart Energy Utilization
Tsoukalas, Lefteri
2018-01-24
In recent years, the Internet is revolutionizing information availability much like the Power Grid revolutionized energy availability a century earlier. We will explore the differences and similarities of these two critical infrastructures and identify ways for convergence which may lead to an energy internet. Pricing signals, nodal forecasting, and short-term elasticities are key concepts in smart energy flows respecting the delicate equilibrium involved in generation-demand and aiming at higher efficiencies. We will discuss how intelligent forecasting approaches operating at multiple levels (including device or nodal levels) can ameliorate the challenges of power storage. In addition to higher efficiencies, an energy internet may achieve significant reliability and security improvements and offer greater flexibility and transparency in the overall energy-environmental relation.
Cyber physical systems based on cloud computing and internet of things for energy efficiency
NASA Astrophysics Data System (ADS)
Suciu, George; Butca, Cristina; Suciu, Victor; Cretu, Alexandru; Fratu, Octavian
2016-12-01
Cyber Physical Systems (CPS) and energy efficiency play a major role in the context of industry expansion. Management practices for improving efficiency in the field of energy consumption became a priority of many major industries who are inefficient in terms of exploitation costs. The effort of adopting energy management means in an organization is quite challenging due to the lack of resources and expertise. One major problem consists in the lack of knowledge for energy management and practices. This paper aims to present authors' concept in creating a Cyber Physical Energy System (CPES) that will change organizations' way of consuming energy, by making them aware of their use. The presented concept will consider the security of the whole system and the easy integration with the existing electric network infrastructure.
Telepathology in cytopathology: challenges and opportunities.
Collins, Brian T
2013-01-01
Telepathology in cytopathology is becoming more commonly utilized, and newer technologic infrastructures afford the laboratory a variety of options. The options and design of a telepathology system are driven by the clinical needs. This is primarily focused on providing rapid on-site evaluation service for fine needle aspiration. The clinical requirements and needs of a system are described. Available tools to design and implement a telepathology system are covered, including methods of image capture, network connectivity and remote viewing options. The primary telepathology method currently used and described involves the delivery via a network connection of a live video image to a remote site which is passively viewed by an internet web-based browser. By utilizing live video information and a voice connection to the on-site location, the remote viewer can collect clinical information and direct their view of the slides. Telepathology systems for use in cytopathology can be designed and implemented with commercially available infrastructure. It is necessary for the laboratory to validate the designed system and adhere to the required regulatory requirements. Telepathology for cytopathology can be reliably utilized by adapting existing technology, and newer advances hold great promise for further applications in the cytopathology laboratory. Copyright © 2013 S. Karger AG, Basel.
The public health dashboard: a surveillance model for bioterrorism preparedness.
Foldy, Seth L; Biedrzycki, Paul A; Baker, Bevan K; Swain, Geoffrey R; Howe, Donna S; Gieryn, Douglas; Barthell, Edward N; Pemble, Kim R
2004-01-01
The City of Milwaukee Health Department piloted a short-term, near real-time syndromic surveillance and communication tool by using an existing secure regional Internet infrastructure. Voluntary, active syndromic case reporting by hospital Emergency Departments was combined with other data streams, including clinical laboratory reports of communicable disease, hospital emergency room diversions, ambulance runs, medical examiner reports of unusual or suspicious deaths, poison control and nursing hotline call volumes, and pharmacy over-the-counter sales. These data were aggregated into a "Surveillance Dashboard" format that was used to communicate community syndromic health trends to hospitals, Emergency Departments, and other providers using a secure Internet technology. Emergency Departments at 8 area hospitals reported a total of 314 cases meeting syndromic criteria from 26,888 patient encounters. Participants were satisfied with data entry and communications. All participating Emergency Departments received e-mail and text pager alerts sent by the Milwaukee Health Department. No unexplained findings or suggestions of an early outbreak were reported through syndrome surveillance for the 4-week duration of the project. Similar surveillance and communications systems could provide multiple benefits to Emergency Department workflow and management, as well as to public health and emergency response.
A Multifactor Secure Authentication System for Wireless Payment
NASA Astrophysics Data System (ADS)
Sanyal, Sugata; Tiwari, Ayu; Sanyal, Sudip
Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. The vulnerability is that access is based on only single factor authentication which is not secure to protect user data, there is a need of multifactor authentication. This paper proposes a new protocol based on multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce another security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy with in a limited resources that does not require any change in infrastructure or underline protocol of wireless network. This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases faith of the user and business organizations on wireless financial transaction using mobile devices.
Social network based dynamic transit service through the OMITS system.
DOT National Transportation Integrated Search
2014-02-01
The Open Mode Integrated Transportation System (OMITS) forms a sustainable information infrastructure for communication within and between the mobile/Internet network, the roadway : network, and the users social network. It manipulates the speed g...
University of Florida Advanced Technologies Campus Testbed [Summary
DOT National Transportation Integrated Search
2017-12-01
Connected vehicles (CV) and automated vehicles (AV) are the subjects of numerous projects around the world. CVs can communicate with a driver, other vehicles, roadside infrastructure, the Internet, or all of the above. These communications can assist...
Inventing an Energy Internet: Concepts, Architectures and Protocols for Smart Energy Utilization
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tsoukalas, Lefteri
2009-04-29
In recent years, the Internet is revolutionizing information availability much like the Power Grid revolutionized energy availability a century earlier. We will explore the differences and similarities of these two critical infrastructures and identify ways for convergence which may lead to an energy internet. Pricing signals, nodal forecasting, and short-term elasticities are key concepts in smart energy flows respecting the delicate equilibrium involved in generation-demand and aiming at higher efficiencies. We will discuss how intelligent forecasting approaches operating at multiple levels (including device or nodal levels) can ameliorate the challenges of power storage. In addition to higher efficiencies, an energymore » internet may achieve significant reliability and security improvements and offer greater flexibility and transparency in the overall energy-environmental relation.« less
Telecardiology through ubiquitous internet services.
Costa, Carlos; Oliveira, José Luís
2012-09-01
Implementation of telemedicine in many clinical scenarios improves the quality of care and patient safety. However, its use is hindered by operational, infrastructural and financial limitations. This paper describes the design and deployment of a plug-and-play telemedicine platform for cardiologic applications. The novelty of this work is that, instead of complex middleware, it uses a common electronic mailbox and its protocols to support the core of the telemedicine information system and associated data (ECG and medical images). A security model was also developed to ensure data privacy and confidentiality. The solution was validated in several real environments, in terms of performance, robustness, scalability and work efficiency. During the past three years it has been used on a daily basis by several small and medium-sized laboratories. The advantage of using an Internet service in opposition to a server-based infrastructure is that it does not require IT resources to set up the telemedicine centre. A doctor can configure and operate the centre with the same simplicity as any other Internet browser application. The solution is currently in use to support remote diagnosis and reports of ECG and Echocardiography in Portugal and Angola. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
International Convergence on Geoscience Cyberinfrastructure
NASA Astrophysics Data System (ADS)
Allison, M. L.; Atkinson, R.; Arctur, D. K.; Cox, S.; Jackson, I.; Nativi, S.; Wyborn, L. A.
2012-04-01
There is growing international consensus on addressing the challenges to cyber(e)-infrastructure for the geosciences. These challenges include: Creating common standards and protocols; Engaging the vast number of distributed data resources; Establishing practices for recognition of and respect for intellectual property; Developing simple data and resource discovery and access systems; Building mechanisms to encourage development of web service tools and workflows for data analysis; Brokering the diverse disciplinary service buses; Creating sustainable business models for maintenance and evolution of information resources; Integrating the data management life-cycle into the practice of science. Efforts around the world are converging towards de facto creation of an integrated global digital data network for the geosciences based on common standards and protocols for data discovery and access, and a shared vision of distributed, web-based, open source interoperable data access and integration. Commonalities include use of Open Geospatial Consortium (OGC) and ISO specifications and standardized data interchange mechanisms. For multidisciplinarity, mediation, adaptation, and profiling services have been successfully introduced to leverage the geosciences standards which are commonly used by the different geoscience communities -introducing a brokering approach which extends the basic SOA archetype. Principal challenges are less technical than cultural, social, and organizational. Before we can make data interoperable, we must make people interoperable. These challenges are being met by increased coordination of development activities (technical, organizational, social) among leaders and practitioners in national and international efforts across the geosciences to foster commonalities across disparate networks. In doing so, we will 1) leverage and share resources, and developments, 2) facilitate and enhance emerging technical and structural advances, 3) promote interoperability across scientific domains, 4) support the promulgation and institutionalization of agreed-upon standards, protocols, and practice, and 5) enhance knowledge transfer not only across the community, but into the domain sciences, 6) lower existing entry barriers for users and data producers, 7) build on the existing disciplinary infrastructures leveraging their service buses. . All of these objectives are required for establishing a permanent and sustainable cyber(e)-infrastructure for the geosciences. The rationale for this approach is well articulated in the AuScope mission statement: "Many of these problems can only be solved on a national, if not global scale. No single researcher, research institution, discipline or jurisdiction can provide the solutions. We increasingly need to embrace e-Research techniques and use the internet not only to access nationally distributed datasets, instruments and compute infrastructure, but also to build online, 'virtual' communities of globally dispersed researchers." Multidisciplinary interoperability can be successfully pursued by adopting a "system of systems" or a "Network of Networks" philosophy. This approach aims to: (a) supplement but not supplant systems mandates and governance arrangements; (b) keep the existing capacities as autonomous as possible; (c) lower entry barriers; (d) Build incrementally on existing infrastructures (information systems); (e) incorporate heterogeneous resources by introducing distribution and mediation functionalities. This approach has been adopted by the European INSPIRE (Infrastructure for Spatial Information in the European Community) initiative and by the international GEOSS (Global Earth Observation System of Systems) programme.
NASA Technical Reports Server (NTRS)
Crabb, Michele D.; Woodrow, Thomas S. (Technical Monitor)
1995-01-01
With the fast growing popularity of the Internet, many organizations are racing to get onto the on-ramp to the Information Superhighway. However, with frequent headlines such as 'Hackers' break in at General Electric raises questions about the Net's Security', 'Internet Security Imperiled - Hackers steal data that could threaten computers world-wide' and 'Stanford Computer system infiltrated; Security fears grow', organizations find themselves rethinking their approach to the on-ramp. Is the Internet safe? What do I need to do to protect my organization? Will hackers try to break into my systems? These are questions many organizations are asking themselves today. In order to safely travel along the Information Superhighway, organizations need a strong security framework. Developing such a framework for a computer site, whether it be just a few dozen hosts or several thousand hosts is not an easy task. The security infrastructure for a site is often developed piece-by-piece in response to security incidents which have affected that site over time. Or worse yet, no coordinated effort has been dedicated toward security. The end result is that many sites are still poorly prepared to handle the security dangers of the Internet. This paper presents guidelines for building a successful security infrastructure. The problem is addressed in a cookbook style method. First is a discussion on how to identify your assets and evaluate the threats to those assets; next are suggestions and tips for identifying the weak areas in your security armor. Armed with this information we can begin to think about what you really need for your site and what you can afford. In this stage of the process we examine the different categories of security tools and products that are available and then present some tips for deciding what is best for your site.
NASA Astrophysics Data System (ADS)
Chen, R. S.; de Sherbinin, A. M.; Yetman, G.; Downs, R. R.
2017-12-01
A central issue in international efforts to address climate change, large-scale disaster risk, and overall sustainable development is the exposure of human settlements and population to changing climate patterns and a range of geological, climatological, technological, and other hazards. The present and future location of human activities is also important in mitigation and adaptation to climate change, and to ensuring that we "leave no one behind" in achieving the Sustainable Development Goals adopted by the international community in September 2015. The extent and quality of built infrastructure are key factors in the mortality, morbidity, and economic impacts of disasters, and are simultaneously essential to sustainable development. Earth observations have great potential to improve the coverage, consistency, timeliness, and richness of data on settlements, infrastructure, and population, in ways that complement existing and emerging forms of socioeconomic data collection such as censuses, surveys, and cell phone and Internet traffic. Night-time lights from the Suomi-NPP satellite may be able to provide near real-time data on occupance and economic activity. New "big data" capabilities make it possible to rapidly process high-resolution (50-cm) imagery to detect structures and changes in structures, especially in rural areas where other data are limited. A key challenge is to ensure that these types of data can be translated into forms useful in a range of applications and for diverse user communities, including national statistical offices, local government planners, development and humanitarian organizations, community groups, and the private sector. We report here on efforts, in coordination with the GEO Human Planet Initiative, to develop new data on settlements, infrastructure, and population, together with open data services and tools, to support disaster risk assessment, climate vulnerability analysis, and sustainable development decision making.
Insecurity of Wireless Networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sheldon, Frederick T; Weber, John Mark; Yoo, Seong-Moo
Wireless is a powerful core technology enabling our global digital infrastructure. Wi-Fi networks are susceptible to attacks on Wired Equivalency Privacy, Wi-Fi Protected Access (WPA), and WPA2. These attack signatures can be profiled into a system that defends against such attacks on the basis of their inherent characteristics. Wi-Fi is the standard protocol for wireless networks used extensively in US critical infrastructures. Since the Wired Equivalency Privacy (WEP) security protocol was broken, the Wi-Fi Protected Access (WPA) protocol has been considered the secure alternative compatible with hardware developed for WEP. However, in November 2008, researchers developed an attack on WPA,more » allowing forgery of Address Resolution Protocol (ARP) packets. Subsequent enhancements have enabled ARP poisoning, cryptosystem denial of service, and man-in-the-middle attacks. Open source systems and methods (OSSM) have long been used to secure networks against such attacks. This article reviews OSSMs and the results of experimental attacks on WPA. These experiments re-created current attacks in a laboratory setting, recording both wired and wireless traffic. The article discusses methods of intrusion detection and prevention in the context of cyber physical protection of critical Internet infrastructure. The basis for this research is a specialized (and undoubtedly incomplete) taxonomy of Wi-Fi attacks and their adaptations to existing countermeasures and protocol revisions. Ultimately, this article aims to provide a clearer picture of how and why wireless protection protocols and encryption must achieve a more scientific basis for detecting and preventing such attacks.« less
Distribute Off-Time Office Internet bandwidth Using Topology Mesh For Sorrounding Neighbour
NASA Astrophysics Data System (ADS)
Zendrato, Niskarto; Sihombing, Oloan; Laia, Yonata; Sabarita Barus, Ertina
2018-04-01
The Internet as one of the very rapidly growing information technology can provide data and information with wide world, complete, and up to date. Users can download and upload data such as the application file, multimedia and text through the Internet network. But for the Internet availability is still less equal access because of the lack of availability of adequate infrastructure, therefore the author make the utilization of bandwidth that can be establish Internet balancing although still on a small scale. By this research the authors use bandwidth from PT. Deltauli Home Teknikarya that where bandwidth necessity on when time off-time unused office, where the office always pay full for Internet connection even though at the time of the off-time. It’s many of the available bandwidth, so that the author is trying to take advantage of the bandwidth at the time of the off-time the office to be used by the community using radio connection link and use the radius server as user management and server to send sms and user and password to the users who want to enjoy free internet connection.
The Information Superhighway: Democracy or Capitalism?
ERIC Educational Resources Information Center
Plowman, Travis S.
1997-01-01
Presents a brief background on the information revolution. Discusses universal access and the National Information Infrastructure; the constrained view of Internet providers who oppose centralization, government regulation, limitation of individual rights, and commercialism; technology use in a democratic society; effectiveness of…
Reviewing innovative Earth observation solutions for filling science-policy gaps in hydrology
NASA Astrophysics Data System (ADS)
Lehmann, Anthony; Giuliani, Gregory; Ray, Nicolas; Rahman, Kazi; Abbaspour, Karim C.; Nativi, Stefano; Craglia, Massimo; Cripe, Douglas; Quevauviller, Philippe; Beniston, Martin
2014-10-01
Improved data sharing is needed for hydrological modeling and water management that require better integration of data, information and models. Technological advances in Earth observation and Web technologies have allowed the development of Spatial Data Infrastructures (SDIs) for improved data sharing at various scales. International initiatives catalyze data sharing by promoting interoperability standards to maximize the use of data and by supporting easy access to and utilization of geospatial data. A series of recent European projects are contributing to the promotion of innovative Earth observation solutions and the uptake of scientific outcomes in policy. Several success stories involving different hydrologists' communities can be reported around the World. Gaps still exist in hydrological, agricultural, meteorological and climatological data access because of various issues. While many sources of data exists at all scales it remains difficult and time-consuming to assemble hydrological information for most projects. Furthermore, data and sharing formats remain very heterogeneous. Improvements require implementing/endorsing some commonly agreed standards and documenting data with adequate metadata. The brokering approach allows binding heterogeneous resources published by different data providers and adapting them to tools and interfaces commonly used by consumers of these resources. The challenge is to provide decision-makers with reliable information, based on integrated data and tools derived from both Earth observations and scientific models. Successful SDIs rely therefore on various aspects: a shared vision between all participants, necessity to solve a common problem, adequate data policies, incentives, and sufficient resources. New data streams from remote sensing or crowd sourcing are also producing valuable information to improve our understanding of the water cycle, while field sensors are developing rapidly and becoming less costly. More recent data standards are enhancing interoperability between hydrology and other scientific disciplines, while solutions exist to communicate uncertainty of data and models, which is an essential pre-requisite for decision-making. Distributed computing infrastructures can handle complex and large hydrological data and models, while Web Processing Services bring the flexibility to develop and execute simple to complex workflows over the Internet. The need for capacity building at human, infrastructure and institutional levels is also a major driver for reinforcing the commitment to SDI concepts.
NASA Astrophysics Data System (ADS)
Lehr, William H.; Pupillo, Lorenzo Maria
The Internet is now widely regarded as essential infrastructure for our global economy and society. It is in our homes and businesses. We use it to communicate and socialize, for research, and as a platform for E-commerce. In the late 1990s, much was predicted about what the Internet has become at present; but now, we have actual experience living with the Internet as a critical component of our everyday lives. Although the Internet has already had profound effects, there is much we have yet to realize. The present volume represents a third installment in a collaborative effort to highlight the all-encompassing, multidisciplinary implications of the Internet for public policy. The first installment was conceived in 1998, when we initiated plans to organize an international conference among academic, industry, and government officials to discuss the growing policy agenda posed by the Internet. The conference was hosted by the European Commission in Brussels in 1999 and brought together a diverse mix of perspectives on what the pressing policy issues would be confronting the Internet. All of the concerns identified remain with us today, including how to address the Digital Divide, how to modify intellectual property laws to accommodate the new realities of the Internet, what to do about Internet governance and name-space management, and how to evolve broadcast and telecommunications regulatory frameworks for a converged world.
Study on the contract characteristics of Internet architecture
NASA Astrophysics Data System (ADS)
Fu, Chuan; Zhang, Guoqing; Yang, Jing; Liu, Xiaona
2011-11-01
The importance of Internet architecture goes beyond the technical aspects. The architecture of Internet has a profound influence on the Internet-based economy in term of how the profits are shared by different market participants (Internet Server Provider, Internet Content Provider), since it is the physical foundation upon which the profit-sharing contracts are derived. In order to facilitate the continuing growth of the Internet, it is necessary to systematically study factors that curtail the Internet-based economy including the existing Internet architecture. In this paper, we used transaction cost economics and contract economics as new tools to analyse the contracts derived from the current Internet architecture. This study sheds light on how the macro characteristics of Internet architecture effect the microeconomical decisions of market participants. Based on the existing Internet architecture, we discuss the possibility of promoting Internet-based economy by encouraging user to connect their private stub network to the Internet and giving the user more right of self-governing.
Overview of NASA communications infrastructure
NASA Technical Reports Server (NTRS)
Arnold, Ray J.; Fuechsel, Charles
1991-01-01
The infrastructure of NASA communications systems for effecting coordination across NASA offices and with the national and international research and technological communities is discussed. The offices and networks of the communication system include the Office of Space Science and Applications (OSSA), which manages all NASA missions, and the Office of Space Operations, which furnishes communication support through the NASCOM, the mission critical communications support network, and the Program Support Communications network. The NASA Science Internet was established by OSSA to centrally manage, develop, and operate an integrated computer network service dedicated to NASA's space science and application research. Planned for the future is the National Research and Education Network, which will provide communications infrastructure to enhance science resources at a national level.
A Study of LoRa: Long Range & Low Power Networks for the Internet of Things
Augustin, Aloÿs; Yi, Jiazi; Clausen, Thomas; Townsley, William Mark
2016-01-01
LoRa is a long-range, low-power, low-bitrate, wireless telecommunications system, promoted as an infrastructure solution for the Internet of Things: end-devices use LoRa across a single wireless hop to communicate to gateway(s), connected to the Internet and which act as transparent bridges and relay messages between these end-devices and a central network server. This paper provides an overview of LoRa and an in-depth analysis of its functional components. The physical and data link layer performance is evaluated by field tests and simulations. Based on the analysis and evaluations, some possible solutions for performance enhancements are proposed. PMID:27618064
A Study of LoRa: Long Range & Low Power Networks for the Internet of Things.
Augustin, Aloÿs; Yi, Jiazi; Clausen, Thomas; Townsley, William Mark
2016-09-09
LoRa is a long-range, low-power, low-bitrate, wireless telecommunications system, promoted as an infrastructure solution for the Internet of Things: end-devices use LoRa across a single wireless hop to communicate to gateway(s), connected to the Internet and which act as transparent bridges and relay messages between these end-devices and a central network server. This paper provides an overview of LoRa and an in-depth analysis of its functional components. The physical and data link layer performance is evaluated by field tests and simulations. Based on the analysis and evaluations, some possible solutions for performance enhancements are proposed.
Cath, Corinne; Floridi, Luciano
2017-04-01
The debate on whether and how the Internet can protect and foster human rights has become a defining issue of our time. This debate often focuses on Internet governance from a regulatory perspective, underestimating the influence and power of the governance of the Internet's architecture. The technical decisions made by Internet Standard Developing Organisations (SDOs) that build and maintain the technical infrastructure of the Internet influences how information flows. They rearrange the shape of the technically mediated public sphere, including which rights it protects and which practices it enables. In this article, we contribute to the debate on SDOs' ethical responsibility to bring their work in line with human rights. We defend three theses. First, SDOs' work is inherently political. Second, the Internet Engineering Task Force (IETF), one of the most influential SDOs, has a moral obligation to ensure its work is coherent with, and fosters, human rights. Third, the IETF should enable the actualisation of human rights through the protocols and standards it designs by implementing a responsibility-by-design approach to engineering. We conclude by presenting some initial recommendations on how to ensure that work carried out by the IETF may enable human rights.
Impact of different cloud deployments on real-time video applications for mobile video cloud users
NASA Astrophysics Data System (ADS)
Khan, Kashif A.; Wang, Qi; Luo, Chunbo; Wang, Xinheng; Grecos, Christos
2015-02-01
The latest trend to access mobile cloud services through wireless network connectivity has amplified globally among both entrepreneurs and home end users. Although existing public cloud service vendors such as Google, Microsoft Azure etc. are providing on-demand cloud services with affordable cost for mobile users, there are still a number of challenges to achieve high-quality mobile cloud based video applications, especially due to the bandwidth-constrained and errorprone mobile network connectivity, which is the communication bottleneck for end-to-end video delivery. In addition, existing accessible clouds networking architectures are different in term of their implementation, services, resources, storage, pricing, support and so on, and these differences have varied impact on the performance of cloud-based real-time video applications. Nevertheless, these challenges and impacts have not been thoroughly investigated in the literature. In our previous work, we have implemented a mobile cloud network model that integrates localized and decentralized cloudlets (mini-clouds) and wireless mesh networks. In this paper, we deploy a real-time framework consisting of various existing Internet cloud networking architectures (Google Cloud, Microsoft Azure and Eucalyptus Cloud) and a cloudlet based on Ubuntu Enterprise Cloud over wireless mesh networking technology for mobile cloud end users. It is noted that the increasing trend to access real-time video streaming over HTTP/HTTPS is gaining popularity among both research and industrial communities to leverage the existing web services and HTTP infrastructure in the Internet. To study the performance under different deployments using different public and private cloud service providers, we employ real-time video streaming over the HTTP/HTTPS standard, and conduct experimental evaluation and in-depth comparative analysis of the impact of different deployments on the quality of service for mobile video cloud users. Empirical results are presented and discussed to quantify and explain the different impacts resulted from various cloud deployments, video application and wireless/mobile network setting, and user mobility. Additionally, this paper analyses the advantages, disadvantages, limitations and optimization techniques in various cloud networking deployments, in particular the cloudlet approach compared with the Internet cloud approach, with recommendations of optimized deployments highlighted. Finally, federated clouds and inter-cloud collaboration challenges and opportunities are discussed in the context of supporting real-time video applications for mobile users.
ERIC Educational Resources Information Center
Lynch, Clifford
1997-01-01
Discusses the state of the Internet. Highlights include the magnitude of the infrastructure, costs, its increasing pace, constraints in international links, provision of network capacity to homes and small businesses, cable television modems, political and cultural problems, the digital library concept, search engines, the failure of personal…
ERIC Educational Resources Information Center
Dominick, Jay
2000-01-01
Discussion of wireless technology focuses on whether there is enough value in a wireless infrastructure for schools to justify the cost. Considers issues campuses must face, including access to the Internet, telecommunications, and networking; explains technical details; and describes wireless initiatives at Wake Forest University. (LRW)
A Risk Mitigation Model: Lessons Learned From Actual Insider Sabotage
2006-11-07
performance Responsibilities removed from projects Suspension of Internet access Death in family ; Divorce Financial Disagreement re: salary/compensation...Infrastructure by Information Technology Insiders, ” Monterrey , CA.: Defense Personnel Security Research and Education Center. Shaw, E.D. (2004). “The
Superficial view of fiber to the home (FTTH)
NASA Astrophysics Data System (ADS)
Li, Xiaolin
2004-04-01
For the past few years, telecom companies have been working diligently to provide us with pseudo-broadband Internet connections over copper (DSL) and cable (cable modem). I use the term "pseudo-broadband" because the existing telecom infrastructure can only provide speeds of up to 1.5 megabits per second. (In theory, cable modem can provide up to 2.5 megabits per second, but in reality nobody obtains these speeds because the shared aspects of cable modem results in lower speeds.) No doubt improvements will be made over the next few years to squeeze more out of copper and cable, but it doesn't matter, because fiber to the home is coming, and it will be here faster than most people predict. In case you're wondering, FTTH provides download speeds of up to 155 megabits per second -- that's 100 times faster than the pseudo-broadband DSL and cable modem connections. Can you say instantaneous data transfer? Can you say, video on demand? SBC and Bellsouth are two of the telecom giants pioneering FTTH. The initial markets are new residential construction, because you don't have to dig up streets in an existing neighborhood to lay the fiber optic cable. SBC plans to wire 6,000 homes in a community in San Francisco by late next year. Initial net connections will only be about 5 MB/second -- far from the theoretical maximum of 155 MB/second, but still blazingly fast compared to DSL and cable modem. BellSouth is also pioneering FTTH with a trial project involving more than 400 people in the Atlanta suburb of Dunwoody. These individuals have Internet connections of about 10 MB/second! No doubt there will be stumbles along the way to providing FTTH. No doubt there are challenges to making FTTH cost effective. No doubt it will take years before most residences in the world have true broadband Internet access.
Challenges faced in e-infrastructure at the Ministry of Mines and Energy, Namibia
NASA Astrophysics Data System (ADS)
Maletzky, Monica; Mhopjeni, Kombada
2014-05-01
The e-infrastructure at the Ministry of Mines is undergoing considerable restructuring with most of it in the planning phase. One of the main challenges faced is the Local Area Network that is outdated and not capable to handling the volume of data that is transferred in the network. Most of the Network Interface Cards (NIC) on the servers and all related LAN equipment have a capability of 10/100Mb/s and cannot support the volume of data transported over the network. This is not adequate for the need of high end users such as geoscientists who work with large geological, remote sensing and geophysical datasets. Taking the above into consideration the Ministry has embarked on implementing changes to the network. The initiative involves the acquisition of Cisco Layer3 switches that have the capability of transferring large volumes of data, up to 10Gb/s. Subsequent upgrades of the NICs and small form-factor pluggable (SFP) are planned in the near future. Apart from the internal network, the Ministry's present internet connection is insufficient as the Ministry shares the outbound link with all other Ministries in the Namibian government. The internet provided by the Office of the Prime Minister (OPM), which serves as the government's internet service provider (ISP), to our institution is currently 2Mb/s. OPM has embarked on the upgrade of the network infrastructure. The first phase of the involved the upgrade of the national point of presence (POP) to operate at a capacity of 300Mb/s. This would be followed by the expansion of a fibre network to all the government institutions. Upon completion, the internet performance will be improved as it is envisaged that the Ministry of Mines and Energy's bandwidth will be upgraded to 10Mb/s and hopefully alleviate the current strain on the system. This project is expected to be completed by June 2014. However, due to the challenges that our office is faced with, we have acquired a 4Mb/s internet link for the interim period. Storage also poses one of our main challenges. The institution lacks sufficient storage and at present some data are stored externally. Similarly, the back-up storage is limited and outdated, as in some instances storage tapes are used. The Ministry plans to acquire a new storage capacity to enable it to locally host all the data. Subsequently this new storage facility will include back-up storage hosted off-site. The acquisition is in progress and the implementation of the new system is envisaged within the near future. The Ministry is trying its utmost to upgrade its e-infrastructure to support the business of the organisation.
A case analysis of INFOMED: the Cuban national health care telecommunications network and portal.
Séror, Ann C
2006-01-27
The Internet and telecommunications technologies contribute to national health care system infrastructures and extend global health care services markets. The Cuban national health care system offers a model to show how a national information portal can contribute to system integration, including research, education, and service delivery as well as international trade in products and services. The objectives of this paper are (1) to present the context of the Cuban national health care system since the revolution in 1959, (2) to identify virtual institutional infrastructures of the system associated with the Cuban National Health Care Telecommunications Network and Portal (INFOMED), and (3) to show how they contribute to Cuban trade in international health care service markets. Qualitative case research methods were used to identify the integrated virtual infrastructure of INFOMED and to show how it reflects socialist ideology. Virtual institutional infrastructures include electronic medical and information services and the structure of national networks linking such services. Analysis of INFOMED infrastructures shows integration of health care information, research, and education as well as the interface between Cuban national information networks and the global Internet. System control mechanisms include horizontal integration and coordination through virtual institutions linked through INFOMED, and vertical control through the Ministry of Public Health and the government hierarchy. Telecommunications technology serves as a foundation for a dual market structure differentiating domestic services from international trade. INFOMED is a model of interest for integrating health care information, research, education, and services. The virtual infrastructures linked through INFOMED support the diffusion of Cuban health care products and services in global markets. Transferability of this model is contingent upon ideology and interpretation of values such as individual intellectual property and confidentiality of individual health information. Future research should focus on examination of these issues and their consequences for global markets in health care.
A Case Analysis of INFOMED: The Cuban National Health Care Telecommunications Network and Portal
2006-01-01
Background The Internet and telecommunications technologies contribute to national health care system infrastructures and extend global health care services markets. The Cuban national health care system offers a model to show how a national information portal can contribute to system integration, including research, education, and service delivery as well as international trade in products and services. Objective The objectives of this paper are (1) to present the context of the Cuban national health care system since the revolution in 1959, (2) to identify virtual institutional infrastructures of the system associated with the Cuban National Health Care Telecommunications Network and Portal (INFOMED), and (3) to show how they contribute to Cuban trade in international health care service markets. Methods Qualitative case research methods were used to identify the integrated virtual infrastructure of INFOMED and to show how it reflects socialist ideology. Virtual institutional infrastructures include electronic medical and information services and the structure of national networks linking such services. Results Analysis of INFOMED infrastructures shows integration of health care information, research, and education as well as the interface between Cuban national information networks and the global Internet. System control mechanisms include horizontal integration and coordination through virtual institutions linked through INFOMED, and vertical control through the Ministry of Public Health and the government hierarchy. Telecommunications technology serves as a foundation for a dual market structure differentiating domestic services from international trade. Conclusions INFOMED is a model of interest for integrating health care information, research, education, and services. The virtual infrastructures linked through INFOMED support the diffusion of Cuban health care products and services in global markets. Transferability of this model is contingent upon ideology and interpretation of values such as individual intellectual property and confidentiality of individual health information. Future research should focus on examination of these issues and their consequences for global markets in health care. PMID:16585025
NASA Astrophysics Data System (ADS)
Petitdidier, M.
2009-04-01
In today's Information Age, an effective cyber-infrastructure and Internet access underpins development and human welfare by strengthening education and training, expanding science, technology and innovation capability, opening up collaboration opportunities with the rest of the world, and generating the knowledge base for decision-making. Poor Internet connectivity prevents many countries in Africa, especially Sub-Saharan ones, from taking advantage of these opportunities. There are many initiatives from local, governmental, African, European and international organisations to promote, survey and fund networking. The eGY (electronic Geophysical Year) and Sharing Knowledge Foundation initiatives are based on African scientific communities, and are complementary of other initiatives. Their bottom-up role is twofold: firstly to motivate and support the scientists in each country (1) to ask their government or organisations for a better Internet for research and for education and (2) to organize themselves to welcome new technologies, secondly to promote a better cyber-infrastructure for their universities towards international organisations. In 2007 during the IHY workshop that gathered African scientists from 20 countries eGY provided the results of the questionnaire sent to all the participants to describe the status of internet in the Universities and Research institutes. Then recommendations were written. In 2007 Sharing the knowledge foundation organized a meeting devoted to internet and Grids in Africa. The participants, scientists, industrialists and members of NGO originating from 14 countries wrote also recommendations. In 2009 the presentation in this session of R.L.A Cottrell and U. Kalim will provide an overview of the evolution of the networking. In parallel to the improvement of internet the development of scientific collaboration among African countries and with Europe by using ICT was considered as an essential point. This presentation will be focused on the recommendations, different achievements and plans (see presentation in this section by V. Ardizzone et al.) .
Digital Economy and Management in Spain.
ERIC Educational Resources Information Center
del Aguila, Ana R.; Padilla, Antonio; Serarols, Christian; Veciana, Jose M.
2003-01-01
Explains the digital economy and its impact on the firm. Highlights include subsectors of the digital economy, including infrastructure; analysis of the digital economy in Spain; analysis of the ICT (information and communication technology) sector in Spain; and electronic commerce through the Internet. (LRW)
Infrastructure Vulnerability Assessment and Defense
2005-03-01
companies or organizations. The connectivity and communications within and among networks are "glued" together by a set of protocols defined by the Internet ... research communities, which are modified and improved over decades of time. Those protocols are usually designed in the principle to achieve
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. Senate Committee on Commerce, Science, and Transportation.
The Senate Subcommittee on Science, Technology, and Space held a hearing in Billings, Montana, on rural America's access to the National Information Infrastructure (NII) and uses of NII in the provision of rural education and services. An Assistant Secretary of Commerce discussed the development of the Internet, problems in rural access to the…
Top Cyber: Developing the Top One Percent to Defeat the Advanced Persistent Threat
2014-02-13
Critical Infrastructure.” V3-CO-UK, 7 May 2013. http://www.v3.co.uk/v3-uk/news/2266397/us- government-chinese- hackers -have-the-skills-to-take-down...it is a source of great risk; and, for hackers , it is the super-highway to a target-rich environment. For the U.S. Government (USG), cyberspace is...worldwide. Ultimately, for all its benefits, the Internet presents an “Achilles’ Heel” in the defense of the nation’s Critical Infrastructure and Key
44 CFR 201.7 - Tribal Mitigation Plans.
Code of Federal Regulations, 2013 CFR
2013-10-01
... of existing and future buildings, infrastructure, and critical facilities located in the identified... effects of each hazard, with particular emphasis on new and existing buildings and infrastructure. (iii...
Economic Incentives for Cybersecurity: Using Economics to Design Technologies Ready for Deployment
DOE Office of Scientific and Technical Information (OSTI.GOV)
Vishik, Claire; Sheldon, Frederick T; Ott, David
Cybersecurity practice lags behind cyber technology achievements. Solutions designed to address many problems may and do exist but frequently cannot be broadly deployed due to economic constraints. Whereas security economics focuses on the cost/benefit analysis and supply/demand, we believe that more sophisticated theoretical approaches, such as economic modeling, rarely utilized, would derive greater societal benefits. Unfortunately, today technologists pursuing interesting and elegant solutions have little knowledge of the feasibility for broad deployment of their results and cannot anticipate the influences of other technologies, existing infrastructure, and technology evolution, nor bring the solutions lifecycle into the equation. Additionally, potentially viable solutionsmore » are not adopted because the risk perceptions by potential providers and users far outweighs the economic incentives to support introduction/adoption of new best practices and technologies that are not well enough defined. In some cases, there is no alignment with redominant and future business models as well as regulatory and policy requirements. This paper provides an overview of the economics of security, reviewing work that helped to define economic models for the Internet economy from the 1990s. We bring forward examples of potential use of theoretical economics in defining metrics for emerging technology areas, positioning infrastructure investment, and building real-time response capability as part of software development. These diverse examples help us understand the gaps in current research. Filling these gaps will be instrumental for defining viable economic incentives, economic policies, regulations as well as early-stage technology development approaches, that can speed up commercialization and deployment of new technologies in cybersecurity.« less
Building a School District's Wide Area Network.
ERIC Educational Resources Information Center
Mastel, Vern L.
1996-01-01
Describes the development of a wide area network (WAN) in the Bismarck Public School District (North Dakota). Topics include design goals, network infrastructure, implementing library access, sharing resources across platforms, electronic mail, dial-in access, Internet access, adhering to software licenses, shareware and freeware, and monitoring…
More Money for Telecommunications, Other Programs.
ERIC Educational Resources Information Center
Brown, Dennis
2000-01-01
Describes increases in federal aid that affect: (1) the rural telecommunications infrastructure, access to the Internet for rural schools and libraries, and distance learning and telemedicine programs; (2) nonmetropolitan airports and other transportation; and (3) water treatment and wastewater facilities in rural, American Indian, and Alaska…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-06
... available through http://www.ferc.gov . Anyone with Internet access who desires to view this event can do so... for the free Webcasts. It also offers access to this event via television in the Washington, DC area...
Manes, Gianfranco; Collodi, Giovanni; Gelpi, Leonardo; Fusco, Rosanna; Ricci, Giuseppe; Manes, Antonio; Passafiume, Marco
2016-01-20
This paper describes a distributed point-source monitoring platform for gas level and leakage detection in hazardous environments. The platform, based on a wireless sensor network (WSN) architecture, is organised into sub-networks to be positioned in the plant's critical areas; each sub-net includes a gateway unit wirelessly connected to the WSN nodes, hence providing an easily deployable, stand-alone infrastructure featuring a high degree of scalability and reconfigurability. Furthermore, the system provides automated calibration routines which can be accomplished by non-specialized maintenance operators without system reliability reduction issues. Internet connectivity is provided via TCP/IP over GPRS (Internet standard protocols over mobile networks) gateways at a one-minute sampling rate. Environmental and process data are forwarded to a remote server and made available to authenticated users through a user interface that provides data rendering in various formats and multi-sensor data fusion. The platform is able to provide real-time plant management with an effective; accurate tool for immediate warning in case of critical events.
Implementation of the Web-based laboratory
NASA Astrophysics Data System (ADS)
Ying, Liu; Li, Xunbo
2005-12-01
With the rapid developments of Internet technologies, remote access and control via Internet is becoming a reality. A realization of the web-based laboratory (the W-LAB) was presented. The main target of the W-LAB was to allow users to easily access and conduct experiments via the Internet. While realizing the remote communication, a system, which adopted the double client-server architecture, was introduced. It ensures the system better security and higher functionality. The experimental environment implemented in the W-Lab was integrated by both virtual lab and remote lab. The embedded technology in the W-LAB system as an economical and efficient way to build the distributed infrastructural network was introduced. Furthermore, by introducing the user authentication mechanism in the system, it effectively secures the remote communication.
The digital divide: Trends in global mobile and broadband Internet access from 2000–2010
Ronquillo, Charlene; Currie, Leanne
2012-01-01
The digital divide is described as the gap between those who do and do not have access to digital information and communications technologies (ICT). ICTs are viewed as an indicator of infrastructure and potential for development, and are a growing platform for health information and services delivery. This study compares the penetration of mobile and broadband Internet technologies by global region from 2000 to 2010. Results illustrate the rapid growth of mobile cellular telephone subscriptions in all global regions with trends suggesting a continued increase. Little to modest gains were made in fixed broadband Internet subscriptions globally. There is a growing popularity of mobile subscriptions with use of data communications, exceeding the numbers of fixed Internet subscriptions. This comparison reveals current strengths that can be built on and highlights the importance of awareness of global trends and using such knowledge to inform design and delivery of ICT-based health services. PMID:24199118
Tuning In: Challenging Design for Communities through a Field Study of Radio Amateurs
NASA Astrophysics Data System (ADS)
Bogdan, Cristian; Bowers, John
As illustrated by the emerging field of Communities and Technologies, the topic of community, whether further qualified by ‘virtual' (Rheingold 1993), ‘on line' or ‘networked' (Schuler 1996), has become a major focus for field study, design, technical infrastructural provision, as well as social, psychological and economic theorising. Let us review some early examples of this ‘turn to community'. (1999) discuss the ‘network communities of SeniorNet', an organisation that supports people over the age of 50 in the use of computer networking technologies. The SeniorNet study highlights the complex ‘collage' of participation and interaction styles that community members sustain, many of which go beyond conventional understandings of older people, their practices and relations to technology. While the members of SeniorNet are geographically dispersed, (1996) describe the ‘Blacksburg Electronic Village', a local community computing initiative centred around Blacksburg, Virginia, USA. As long ago as 1994, (1994) claimed the existence of over 100 such projects in the US with very diverse aims and experiences but all concerned to be responsive to a community's needs while exploiting the Internet and the technical developments it has made possible. For their part, (2001) offer some generic infrastructural tools for community computing, including support for ‘identity management'.
The Global Communication Infrastructure of the International Monitoring System
NASA Astrophysics Data System (ADS)
Lastowka, L.; Gray, A.; Anichenko, A.
2007-05-01
The Global Communications Infrastructure (GCI) employs 6 satellites in various frequency bands distributed around the globe. Communications with the PTS (Provisional Technical Secretariat) in Vienna, Austria are achieved through VSAT technologies, international leased data circuits and Virtual Private Network (VPN) connections over the Internet. To date, 210 independent VSAT circuits have been connected to Vienna as well as special circuits connecting to the Antarctic and to independent sub-networks. Data volumes from all technologies currently reach 8 Gigabytes per day. The first level of support and a 24/7 help desk remains with the GCI contractor, but performance is monitored actively by the PTS/GCI operations team. GCI operations are being progressively introduced into the PTS operations centre. An Operations centre fully integrated with the GCI segment of the IMS network will ensure a more focused response to incidents and will maximize the availability of the IMS network. Existing trouble tickets systems are being merged to ensure the commission manages GCI incidents in the context of the IMS as a whole. A focus on a single source of data for GCI network performance has enabled reporting systems to be developed which allow for improved and automated reports. The contracted availability for each individual virtual circuit is 99.5% and this performance is regularly reviewed on a monthly basis
Remote vibration monitoring system using wireless internet data transfer
NASA Astrophysics Data System (ADS)
Lemke, John
2000-06-01
Vibrations from construction activities can affect infrastructure projects in several ways. Within the general vicinity of a construction site, vibrations can result in damage to existing structures, disturbance to people, damage to sensitive machinery, and degraded performance of precision instrumentation or motion sensitive equipment. Current practice for monitoring vibrations in the vicinity of construction sites commonly consists of measuring free field or structural motions using velocity transducers connected to a portable data acquisition unit via cables. This paper describes an innovative way to collect, process, transmit, and analyze vibration measurements obtained at construction sites. The system described measures vibration at the sensor location, performs necessary signal conditioning and digitization, and sends data to a Web server using wireless data transmission and Internet protocols. A Servlet program running on the Web server accepts the transmitted data and incorporates it into a project database. Two-way interaction between the Web-client and the Web server is accomplished through the use of a Servlet program and a Java Applet running inside a browser located on the Web client's computer. Advantages of this system over conventional vibration data logging systems include continuous unattended monitoring, reduced costs associated with field data collection, instant access to data files and graphs by project team members, and the ability to remotely modify data sampling schemes.
CALS Infrastructure Analysis. Draft. Volume 21
DOT National Transportation Integrated Search
1990-03-01
This executive overview to the DoD CALS Infrastructure Analysis Report summarizes the Components' current effort to modernize the DoD technical data infrastructure. This infrastructure includes all existing and planned capabilities to acquire, manage...
Business Models of E-Government: Research on Dynamic E-Government Based on Web Services
NASA Astrophysics Data System (ADS)
Li, Yan; Yang, Jiumin
Government transcends all sectors in a society. It provides not only the legal, political and economic infrastructure to support other sectors, but also exerts significant influence on the social factors that contribute to their development. With its maturity of technologies and management, e-government will eventually enter into the time of 'one-stop' services. Among others, the technology of Web services is the major contributor to this achievement. Web services provides a new way of standard-based software technology, letting programmers combine existing computer system in new ways over the Internet within one business or across many, and would thereby bring about profound and far-reaching impacts on e-government. This paper introduced the business modes of e-government, architecture of dynamic e-government and its key technologies. Finally future prospect of dynamic e-government was also briefly discussed.
The Roland Maze Project — Cosmic Ray Registration at Schools
NASA Astrophysics Data System (ADS)
Feder, J.; JȨDRZEJCZAK, K.; Karczmarczyk, J.; Lewandowski, R.; Swarzyński, J.; Szabelska, B.; Szabelski, J.; Tokarski, P.; Wibig, T.
Experimental studies of cosmic rays at the highest energies (above 1018 eV) are the main scientific goal of the projected large area network of extensive air shower detectors. Placing the detectors on the roofs of high school buildings will lower the cost by using the existing urban infrastructure (INTERNET, power supply, etc.), and can be a very efficient way of science popularisation by engaging high school students in the research program. 30 high schools in Łódź are already involved in the project. The project has recently obtained some financial support from the City Council of Łódź. The donation enabled us to start experimental work on detector construction details. A cycle of lectures and seminars devoted to different aspects of project realization (detector construction, on-line data acquisition system, C++ programming) has been organized for students at our Institute and at schools.
The Role of the Army in Infrastructure and Capacity Building
2010-02-01
Issues Volume I: Theory of War and Strategy 3rd edition, ed. J. Boone Bartholomees, Jr. (Carlisle: USAWC Strategic Studies Institute, 2009), 145...efforts. 34 Raj M. Desai and Homi Kharas, Do Philanthropic Citizens Behave Like Governments? Internet-Based Platforms and the Diffusion of International
Cloud Computing Based E-Learning System
ERIC Educational Resources Information Center
Al-Zoube, Mohammed; El-Seoud, Samir Abou; Wyne, Mudasser F.
2010-01-01
Cloud computing technologies although in their early stages, have managed to change the way applications are going to be developed and accessed. These technologies are aimed at running applications as services over the internet on a flexible infrastructure. Microsoft office applications, such as word processing, excel spreadsheet, access database…
Going Digital in Rural America.
ERIC Educational Resources Information Center
Malecki, Edward J.
This paper examines the extent to which rural America is digital--has access to the Internet and to newer technologies such as wireless broadband--and discusses rural supply and demand for "going digital." Supply aspects include issues of both infrastructure and public policy. Demand aspects include entrepreneurs (business users) and…
ERIC Educational Resources Information Center
Internet Research, 1996
1996-01-01
Companies that have taken leading roles in the operation and expansion of the world information infrastructure have been profoundly affected by it. This article assesses the growth and impact of the Internet and outlines some of its advantages and disadvantages for business. Discusses e-mail, corporate documentation, video conferencing, virtual…
An Agenda for Action To Achieve the Information Society in the UK.
ERIC Educational Resources Information Center
Oppenheim, Charles
1996-01-01
Discusses the development a national information policy in the United Kingdom (UK): policies for national information infrastructures, electronic information services, privacy and data protection, copyright, public and national libraries; reviews problems inhibiting Internet use; compares the UK's and the European Commission's approaches to…
Intrusion-Tolerant Replication under Attack
ERIC Educational Resources Information Center
Kirsch, Jonathan
2010-01-01
Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…
Information Infrastructure: Organisational Capability for Online Information Provision.
ERIC Educational Resources Information Center
Klobas, Jane E.
This paper identifies aspects of information flow that are affected by online provision of internal information. Reference is made to four case studies of Western Australian government agencies' steps toward becoming Internet information providers, and to the lessons learned from their experiences. Three key interdependent elements of…
Classification of Encrypted Web Traffic Using Machine Learning Algorithms
2013-06-01
DPI devices to block certain websites; Yu, Cong, Chen, and Lei [52] suggest hashing the domains of pornographic and illegal websites so ISPs can...Zhenming Lei. “Blocking pornographic , illegal websites by internet host domain using FPGA and Bloom Filter”. Network Infrastructure and Digital Content
A Novel Navigation Paradigm for XML Repositories.
ERIC Educational Resources Information Center
Azagury, Alain; Factor, Michael E.; Maarek, Yoelle S.; Mandler, Benny
2002-01-01
Discusses data exchange over the Internet and describes the architecture and implementation of an XML document repository that promotes a navigation paradigm for XML documents based on content and context. Topics include information retrieval and semistructured documents; and file systems as information storage infrastructure, particularly XMLFS.…
78 FR 18954 - Incentives To Adopt Improved Cybersecurity Practices
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-28
... [Docket Number 130206115-3115-01] Incentives To Adopt Improved Cybersecurity Practices AGENCY: U.S... infrastructure and other interested entities of the Cybersecurity Framework being developed by the National... on the Internet Policy Task Force Web page at http://www.ntia.doc.gov/category/cybersecurity . For...
ERIC Educational Resources Information Center
Saba, Farhad; Mahon, J. Michael
1999-01-01
Discusses telecommunications developments that are affecting distance educators. Topics include bandwidth; educational radio and television; instructional television-fixed services (ITFS); cable television; communication satellites; computers; digital telecommunications; the Internet; other protocols; future systems; telephone switches and…
HPCC and the National Information Infrastructure: an overview.
Lindberg, D A
1995-01-01
The National Information Infrastructure (NII) or "information superhighway" is a high-priority federal initiative to combine communications networks, computers, databases, and consumer electronics to deliver information services to all U.S. citizens. The NII will be used to improve government and social services while cutting administrative costs. Operated by the private sector, the NII will rely on advanced technologies developed under the direction of the federal High Performance Computing and Communications (HPCC) Program. These include computing systems capable of performing trillions of operations (teraops) per second and networks capable of transmitting billions of bits (gigabits) per second. Among other activities, the HPCC Program supports the national supercomputer research centers, the federal portion of the Internet, and the development of interface software, such as Mosaic, that facilitates access to network information services. Health care has been identified as a critical demonstration area for HPCC technology and an important application area for the NII. As an HPCC participant, the National Library of Medicine (NLM) assists hospitals and medical centers to connect to the Internet through projects directed by the Regional Medical Libraries and through an Internet Connections Program cosponsored by the National Science Foundation. In addition to using the Internet to provide enhanced access to its own information services, NLM sponsors health-related applications of HPCC technology. Examples include the "Visible Human" project and recently awarded contracts for test-bed networks to share patient data and medical images, telemedicine projects to provide consultation and medical care to patients in rural areas, and advanced computer simulations of human anatomy for training in "virtual surgery." PMID:7703935
Implementation of information and communication technologies for health in Bangladesh
Tabassum, Reshman
2015-01-01
Abstract Problem Bangladesh has yet to develop a fully integrated health information system infrastructure that is critical to guiding policy development and planning. Approach Initial pilot telemedicine and eHealth programmes were not coordinated at national level. However, in 2011, a national eHealth policy was implemented. Local setting Bangladesh has made substantial improvements to its health system. However, the country still faces public health challenges with limited and inequitable access to health services and lack of adequate resources to meet the demands of the population. Relevant changes In 2008, eHealth services were introduced, including computerization of health facilities at sub-district levels, internet connections, internet servers and an mHealth service for communicating with health-care providers. Health facilities at sub-district levels were provided with internet connections and servers. In 482 upazila health complexes and district hospitals, an mHealth service was set-up where an on-duty doctor is available for patients at all hours to provide consultations by mobile phone. A government operated telemedicine service was initiated and by 2014, 43 fully equipped centres were in service. These centres provide medical consultations by qualified physicians to patients visiting rural and remote community clinics and union health centres. Lessons learnt Despite early pilot interventions and successful implementation, progress in adopting eHealth strategies in Bangladesh has been slow. There is a lack of common standards on information technology for health, which causes difficulties in data management and sharing among different databases. Limited internet bandwidth and the high cost of infrastructure and software development are barriers to adoption of these technologies. PMID:26549909
Implementation of information and communication technologies for health in Bangladesh.
Islam, Sheik Mohammed Shariful; Tabassum, Reshman
2015-11-01
Bangladesh has yet to develop a fully integrated health information system infrastructure that is critical to guiding policy development and planning. Initial pilot telemedicine and eHealth programmes were not coordinated at national level. However, in 2011, a national eHealth policy was implemented. Bangladesh has made substantial improvements to its health system. However, the country still faces public health challenges with limited and inequitable access to health services and lack of adequate resources to meet the demands of the population. In 2008, eHealth services were introduced, including computerization of health facilities at sub-district levels, internet connections, internet servers and an mHealth service for communicating with health-care providers. Health facilities at sub-district levels were provided with internet connections and servers. In 482 upazila health complexes and district hospitals, an mHealth service was set-up where an on-duty doctor is available for patients at all hours to provide consultations by mobile phone. A government operated telemedicine service was initiated and by 2014, 43 fully equipped centres were in service. These centres provide medical consultations by qualified physicians to patients visiting rural and remote community clinics and union health centres. Despite early pilot interventions and successful implementation, progress in adopting eHealth strategies in Bangladesh has been slow. There is a lack of common standards on information technology for health, which causes difficulties in data management and sharing among different databases. Limited internet bandwidth and the high cost of infrastructure and software development are barriers to adoption of these technologies.
Connected Vehicle Infrastructure : Deployment and Funding Overview
DOT National Transportation Integrated Search
2018-01-01
This report reviews existing and proposed legislation relevant to connected vehicle infrastructure (CVI) implementation, identifies existing funding mechanisms for CVI implementation, reviews CVI pilot programs and case studies, and provides an overv...
Montag, Christian; Bey, Katharina; Sha, Peng; Li, Mei; Chen, Ya-Fei; Liu, Wei-Yin; Zhu, Yi-Kang; Li, Chun-Bo; Markett, Sebastian; Keiper, Julia; Reuter, Martin
2015-03-01
It has been hypothesized that two distinctive forms of Internet addiction exist. Here, generalized Internet addiction refers to the problematic use of the Internet covering a broad range of Internet-related activities. In contrast, specific forms of Internet addiction target the problematic use of distinct online activities such as excessive online video gaming or activities in social networks. The present study investigates the relationship between generalized and specific Internet addiction in a cross-cultural study encompassing data from China, Taiwan, Sweden and Germany in n = 636 participants. In this study, we assessed - besides generalized Internet addiction - addictive behavior in the domains of online video gaming, online shopping, online social networks and online pornography. The results confirm the existence of distinct forms of specific Internet addiction. One exception, however, was established in five of the six samples under investigation: online social network addiction correlates in large amounts with generalized Internet addiction. In general, it is of importance to distinguish between generalized and specific Internet addiction. Copyright © 2014 Wiley Publishing Asia Pty Ltd.
Stress, Coping, and Internet Use of College Students
ERIC Educational Resources Information Center
Deatherage, Scott; Servaty-Seib, Heather L.; Aksoz, Idil
2014-01-01
College students experience stressful life events and little research exists on the role the Internet may play in students' coping. Objective: The purpose of the present study was to examine associations among perceived stress, time spent on the Internet, underlying motives for utilizing the Internet, problematic Internet use, and traditional…
Planning for Technology: An Administrator's Guide to the Next Century.
ERIC Educational Resources Information Center
Day, William C.
1998-01-01
Discusses ways for preparing schools for integrating technology, including designing the wiring infrastructure, equipment purchases, furniture needs, and ergonomic considerations. Describes four levels of Internet connectivity access and provides a list of contact names, phone numbers, and Web sites for technology fund information from each state.…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-26
... Information System to assist the Commission in ensuring rapid restoration of communications capabilities after... circuit- switched network infrastructure to broadband networks. The Commission is seeking to extend the... Internet Service Providers. Increasing numbers of consumers, businesses, and government agencies rely on...
The First World Congress on the Management of Electronic Commerce: Review and Commentary.
ERIC Educational Resources Information Center
Bontis, Nick; De Castro, Akemi
2000-01-01
Summarizes some key findings of academic papers presented at the First World Congress on the Management of Electronic Commerce (January, 2000, Hamilton, Ontario, Canada). Outlines two meta-management issues that surfaced: taking a strategic approach to Internet ventures and considering infrastructure design during implementation. Highlights…
Sixth Annual Conference on Computers, Freedom, and Privacy: The RealAudio Proceedings.
ERIC Educational Resources Information Center
Glover, Barbara; Meernik, Mary
1996-01-01
Reviews the sixth Conference on Computers, Freedom, and Privacy (CFP) held in March 1996. Highlights include the Communications Decency Act, part of the 1996 Telecommunications Reform Act; European views; Internet service providers; limiting online speech on campus; cryptography; the global information infrastructure; copyright; and China and the…
"MXing It up": How African Adolescents May Affect Social Change through Mobile Phone Use
ERIC Educational Resources Information Center
Napolitano, Christopher M.
2010-01-01
This chapter outlines mobile phone use among African (particularly South African) adolescents. With an estimated 350 million active mobile phone subscriptions, improving network infrastructure, low-cost Internet-ready handsets, innovative programs and applications, mobiles in Africa, and their increasingly younger, increasingly poorer, and…
The Failure of Telecom Reform.
ERIC Educational Resources Information Center
Garcia, D. Linda
1996-01-01
With the rise of the Internet and the debate over the National Information Infrastructure, Congress had an opportunity with the Telecommunications Act of 1996 to reassess communication policy in light of the information age. Instead, Congress passed a product of political compromise rather than political vision; it calls for deregulation without…
An Architecture for Online Laboratory E-Learning System
ERIC Educational Resources Information Center
Duan, Bing; Hosseini, Habib Mir M.; Ling, Keck Voon; Gay, Robert Kheng Leng
2006-01-01
Internet-based learning systems, or e-learning, are widely available in institutes, universities, and industrial companies, hosting regular or continuous education programs. The dream of teaching and learning from anywhere and at anytime becomes a reality due to the construction of e-learning infrastructure. Traditional teaching materials and…
The Indonesian Digital Library Network Is Born To Struggle with the Digital Divide.
ERIC Educational Resources Information Center
Fahmi, Ismail
2002-01-01
Describes the Indonesian Digital Library Network that is designed to develop Indonesia as a knowledge-based society. Highlights include the digital divide; problems in a developing country, including Internet accessibility, bandwidth capacity, and network delays; gathering information about national assets; information infrastructure; data…
[Internet addiction: a different kind of addiction?].
Dejoie, J F
2001-07-01
The concept of Internet addiction, also called Internet addictive disorder or pathological Internet use, entered the medical dictionary in 1995. More and more authors have been preoccupied with it lately, and the majority conclude that this condition, on which some people cast doubt a few years ago, well and truly exists. Several forms of Internet addiction appear to exist, categorised according to the type of misuse it is subjected to: "cybersex", "chat rooms", "net gaming", the pathological search for information or video games being the most frequent. Psychiatric disorders most usually associated with Internet addiction seem to be bipolar disorders. As a consequence, efficient drugs would be those that act as thymo-stabilisers, undoubtedly because they are also effective against those bipolar disorders. Psychotherapeutic treatments as discussion groups on the Internet or group therapies have not yet been evaluated.
Energy Efficient, Cross-Layer Enabled, Dynamic Aggregation Networks for Next Generation Internet
NASA Astrophysics Data System (ADS)
Wang, Michael S.
Today, the Internet traffic is growing at a near exponential rate, driven predominately by data center-based applications and Internet-of-Things services. This fast-paced growth in Internet traffic calls into question the ability of the existing optical network infrastructure to support this continued growth. The overall optical networking equipment efficiency has not been able to keep up with the traffic growth, creating a energy gap that makes energy and cost expenditures scale linearly with the traffic growth. The implication of this energy gap is that it is infeasible to continue using existing networking equipment to meet the growing bandwidth demand. A redesign of the optical networking platform is needed. The focus of this dissertation is on the design and implementation of energy efficient, cross-layer enabled, dynamic optical networking platforms, which is a promising approach to address the exponentially growing Internet bandwidth demand. Chapter 1 explains the motivation for this work by detailing the huge Internet traffic growth and the unsustainable energy growth of today's networking equipment. Chapter 2 describes the challenges and objectives of enabling agile, dynamic optical networking platforms and the vision of the Center for Integrated Access Networks (CIAN) to realize these objectives; the research objectives of this dissertation and the large body of related work in this field is also summarized. Chapter 3 details the design and implementation of dynamic networking platforms that support wavelength switching granularity. The main contribution of this work involves the experimental validation of deep cross-layer communication across the optical performance monitoring (OPM), data, and control planes. The first experiment shows QoS-aware video streaming over a metro-scale test-bed through optical power monitoring of the transmission wavelength and cross-layer feedback control of the power level. The second experiment extends the performance monitoring capabilities to include real-time monitoring of OSNR and polarization mode dispersion (PMD) to enable dynamic wavelength switching and selective restoration. Chapter 4 explains the author?s contributions in designing dynamic networking at the sub-wavelength switching granularity, which can provide greater network efficiency due to its finer granularity. To support dynamic switching, regeneration, adding/dropping, and control decisions on each individual packet, the cross-layer enabled node architecture is enhanced with a FPGA controller that brings much more precise timing and control to the switching, OPM, and control planes. Furthermore, QoS-aware packet protection and dynamic switching, dropping, and regeneration functionalities were experimentally demonstrated in a multi-node network. Chapter 5 describes a technique to perform optical grooming, a process of optically combining multiple incoming data streams into a single data stream, which can simultaneously achieve greater bandwidth utilization and increased spectral efficiency. In addition, an experimental demonstration highlighting a fully functioning multi-node, agile optical networking platform is detailed. Finally, a summary and discussion of future work is provided in Chapter 6. The future of the Internet is very exciting, filled with not-yet-invented applications and services driven by cloud computing and Internet-of-Things. The author is cautiously optimistic that agile, dynamically reconfigurable optical networking is the solution to realizing this future.
Beacons for supporting lunar landing navigation
NASA Astrophysics Data System (ADS)
Theil, Stephan; Bora, Leonardo
2017-03-01
Current and future planetary exploration missions involve a landing on the target celestial body. Almost all of these landing missions are currently relying on a combination of inertial and optical sensor measurements to determine the current flight state with respect to the target body and the desired landing site. As soon as an infrastructure at the landing site exists, the requirements as well as conditions change for vehicles landing close to this existing infrastructure. This paper investigates the options for ground-based infrastructure supporting the onboard navigation system and analyzes the impact on the achievable navigation accuracy. For that purpose, the paper starts with an existing navigation architecture based on optical navigation and extends it with measurements to support navigation with ground infrastructure. A scenario of lunar landing is simulated and the provided functions of the ground infrastructure as well as the location with respect to the landing site are evaluated. The results are analyzed and discussed.
World Wide Web and Internet: applications for radiologists.
Wunderbaldinger, P; Schima, W; Turetschek, K; Helbich, T H; Bankier, A A; Herold, C J
1999-01-01
Global exchange of information is one of the major sources of scientific progress in medicine. For management of the rapidly growing body of medical information, computers and their applications have become an indispensable scientific tool. Approximately 36 million computer users are part of a worldwide network called the Internet or "information highway" and have created a new infrastructure to promote rapid and efficient access to medical, and thus also to radiological, information. With the establishment of the World Wide Web (WWW) by a consortium of computer users who used a standardized, nonproprietary syntax termed HyperText Markup Language (HTML) for composing documents, it has become possible to provide interactive multimedia presentations to a wide audience. The extensive use of images in radiology makes education, worldwide consultation (review) and scientific presentation via the Internet a major beneficiary of this technical development. This is possible, since both information (text) as well as medical images can be transported via the Internet. Presently, the Internet offers an extensive database for radiologists. Since many radiologists and physicians have to be considered "Internet novices" and, hence, cannot yet avail themselves of the broad spectrum of the Internet, the aim of this article is to present a general introduction to the WWW/Internet and its applications for radiologists. All Internet sites mentioned in this article can be found at the following Internet address: http://www.univie.ac. at/radio/radio.html (Department of Radiology, University of Vienna)
Predicting the behavior of techno-social systems.
Vespignani, Alessandro
2009-07-24
We live in an increasingly interconnected world of techno-social systems, in which infrastructures composed of different technological layers are interoperating within the social component that drives their use and development. Examples are provided by the Internet, the World Wide Web, WiFi communication technologies, and transportation and mobility infrastructures. The multiscale nature and complexity of these networks are crucial features in understanding and managing the networks. The accessibility of new data and the advances in the theory and modeling of complex networks are providing an integrated framework that brings us closer to achieving true predictive power of the behavior of techno-social systems.
Virtualized Networks and Virtualized Optical Line Terminal (vOLT)
NASA Astrophysics Data System (ADS)
Ma, Jonathan; Israel, Stephen
2017-03-01
The success of the Internet and the proliferation of the Internet of Things (IoT) devices is forcing telecommunications carriers to re-architecture a central office as a datacenter (CORD) so as to bring the datacenter economics and cloud agility to a central office (CO). The Open Network Operating System (ONOS) is the first open-source software-defined network (SDN) operating system which is capable of managing and controlling network, computing, and storage resources to support CORD infrastructure and network virtualization. The virtualized Optical Line Termination (vOLT) is one of the key components in such virtualized networks.
Privacy-enhanced electronic mail
NASA Astrophysics Data System (ADS)
Bishop, Matt
1990-06-01
The security of electronic mail sent through the Internet may be described in exactly three words: there is none. The Privacy and Security Research Group has recommended implementing mechanisms designed to provide security enhancements. The first set of mechanisms provides a protocol to provide privacy, integrity, and authentication for electronic mail; the second provides a certificate-based key management infrastructure to support key distribution throughout the internet, to support the first set of mechanisms. These mechanisms are described, as well as the reasons behind their selection and how these mechanisms can be used to provide some measure of security in the exchange of electronic mail.
Effect of infrastructure design on commons dilemmas in social-ecological system dynamics.
Yu, David J; Qubbaj, Murad R; Muneepeerakul, Rachata; Anderies, John M; Aggarwal, Rimjhim M
2015-10-27
The use of shared infrastructure to direct natural processes for the benefit of humans has been a central feature of human social organization for millennia. Today, more than ever, people interact with one another and the environment through shared human-made infrastructure (the Internet, transportation, the energy grid, etc.). However, there has been relatively little work on how the design characteristics of shared infrastructure affect the dynamics of social-ecological systems (SESs) and the capacity of groups to solve social dilemmas associated with its provision. Developing such understanding is especially important in the context of global change where design criteria must consider how specific aspects of infrastructure affect the capacity of SESs to maintain vital functions in the face of shocks. Using small-scale irrigated agriculture (the most ancient and ubiquitous example of public infrastructure systems) as a model system, we show that two design features related to scale and the structure of benefit flows can induce fundamental changes in qualitative behavior, i.e., regime shifts. By relating the required maintenance threshold (a design feature related to infrastructure scale) to the incentives facing users under different regimes, our work also provides some general guidance on determinants of robustness of SESs under globalization-related stresses.
Effect of infrastructure design on commons dilemmas in social−ecological system dynamics
Yu, David J.; Qubbaj, Murad R.; Muneepeerakul, Rachata; Anderies, John M.; Aggarwal, Rimjhim M.
2015-01-01
The use of shared infrastructure to direct natural processes for the benefit of humans has been a central feature of human social organization for millennia. Today, more than ever, people interact with one another and the environment through shared human-made infrastructure (the Internet, transportation, the energy grid, etc.). However, there has been relatively little work on how the design characteristics of shared infrastructure affect the dynamics of social−ecological systems (SESs) and the capacity of groups to solve social dilemmas associated with its provision. Developing such understanding is especially important in the context of global change where design criteria must consider how specific aspects of infrastructure affect the capacity of SESs to maintain vital functions in the face of shocks. Using small-scale irrigated agriculture (the most ancient and ubiquitous example of public infrastructure systems) as a model system, we show that two design features related to scale and the structure of benefit flows can induce fundamental changes in qualitative behavior, i.e., regime shifts. By relating the required maintenance threshold (a design feature related to infrastructure scale) to the incentives facing users under different regimes, our work also provides some general guidance on determinants of robustness of SESs under globalization-related stresses. PMID:26460043
Internet use by patients with bipolar disorder: Results from an international multisite survey.
Bauer, Rita; Conell, Jörn; Glenn, Tasha; Alda, Martin; Ardau, Raffaella; Baune, Bernhard T; Berk, Michael; Bersudsky, Yuly; Bilderbeck, Amy; Bocchetta, Alberto; Bossini, Letizia; Castro, Angela M Paredes; Cheung, Eric Yw; Chillotti, Caterina; Choppin, Sabine; Del Zompo, Maria; Dias, Rodrigo; Dodd, Seetal; Duffy, Anne; Etain, Bruno; Fagiolini, Andrea; Hernandez, Miryam Fernández; Garnham, Julie; Geddes, John; Gildebro, Jonas; Gonzalez-Pinto, Ana; Goodwin, Guy M; Grof, Paul; Harima, Hirohiko; Hassel, Stefanie; Henry, Chantal; Hidalgo-Mazzei, Diego; Kapur, Vaisnvy; Kunigiri, Girish; Lafer, Beny; Larsen, Erik R; Lewitzka, Ute; Licht, Rasmus W; Lund, Anne Hvenegaard; Misiak, Blazej; Monteith, Scott; Munoz, Rodrigo; Nakanotani, Takako; Nielsen, René E; O'Donovan, Claire; Okamura, Yasushi; Osher, Yamima; Piotrowski, Patryk; Reif, Andreas; Ritter, Philipp; Rybakowski, Janusz K; Sagduyu, Kemal; Sawchuk, Brett; Schwartz, Elon; Scippa, Ângela M; Slaney, Claire; Sulaiman, Ahmad H; Suominen, Kirsi; Suwalska, Aleksandra; Tam, Peter; Tatebayashi, Yoshitaka; Tondo, Leonardo; Vieta, Eduard; Vinberg, Maj; Viswanath, Biju; Volkert, Julia; Zetin, Mark; Whybrow, Peter C; Bauer, Michael
2016-08-30
There is considerable international interest in online education of patients with bipolar disorder, yet little understanding of how patients use the Internet and other sources to seek information. 1171 patients with a diagnosis of bipolar disorder in 17 countries completed a paper-based, anonymous survey. 81% of the patients used the Internet, a percentage similar to the general public. Older age, less education, and challenges in country telecommunications infrastructure and demographics decreased the odds of using the Internet. About 78% of the Internet users looked online for information on bipolar disorder or 63% of the total sample. More years of education in relation to the country mean, and feeling very confident about managing life decreased the odds of seeking information on bipolar disorder online, while having attended support groups increased the odds. Patients who looked online for information on bipolar disorder consulted medical professionals plus a mean of 2.3 other information sources such as books, physician handouts, and others with bipolar disorder. Patients not using the Internet consulted medical professionals plus a mean of 1.6 other information sources. The percentage of patients with bipolar disorder who use the Internet is about the same as the general public. Other information sources remain important. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Infrastructure for Training and Partnershipes: California Water and Coastal Ocean Resources
NASA Technical Reports Server (NTRS)
Siegel, David A.; Dozier, Jeffrey; Gautier, Catherine; Davis, Frank; Dickey, Tommy; Dunne, Thomas; Frew, James; Keller, Arturo; MacIntyre, Sally; Melack, John
2000-01-01
The purpose of this project was to advance the existing ICESS/Bren School computing infrastructure to allow scientists, students, and research trainees the opportunity to interact with environmental data and simulations in near-real time. Improvements made with the funding from this project have helped to strengthen the research efforts within both units, fostered graduate research training, and helped fortify partnerships with government and industry. With this funding, we were able to expand our computational environment in which computer resources, software, and data sets are shared by ICESS/Bren School faculty researchers in all areas of Earth system science. All of the graduate and undergraduate students associated with the Donald Bren School of Environmental Science and Management and the Institute for Computational Earth System Science have benefited from the infrastructure upgrades accomplished by this project. Additionally, the upgrades fostered a significant number of research projects (attached is a list of the projects that benefited from the upgrades). As originally proposed, funding for this project provided the following infrastructure upgrades: 1) a modem file management system capable of interoperating UNIX and NT file systems that can scale to 6.7 TB, 2) a Qualstar 40-slot tape library with two AIT tape drives and Legato Networker backup/archive software, 3) previously unavailable import/export capability for data sets on Zip, Jaz, DAT, 8mm, CD, and DLT media in addition to a 622Mb/s Internet 2 connection, 4) network switches capable of 100 Mbps to 128 desktop workstations, 5) Portable Batch System (PBS) computational task scheduler, and vi) two Compaq/Digital Alpha XP1000 compute servers each with 1.5 GB of RAM along with an SGI Origin 2000 (purchased partially using funds from this project along with funding from various other sources) to be used for very large computations, as required for simulation of mesoscale meteorology or climate.
Kommoss, S; Kommoss, F; Diebold, J; Lax, S; Schmidt, D; Staebler, A; du Bois, A; Pfisterer, J
2017-01-01
The current literature indicates that a considerable number of patients in ovarian carcinoma clinical trials have histopathological diagnoses in conflict with inclusion criteria. It has been suggested that specialised pathology review prior to randomisation should become the standard procedure in study protocols. We hypothesised that our new, internet-based high-throughput infrastructure would be capable of providing specialised pathology review within 10 working days (w.d.). Patients scheduled for the AGO OVAR17 ovarian carcinoma chemotherapy trial were registered for expert pathologic case review using a new internet-based central pathology review platform prior to randomisation. All original slides were requested from local pathologists. Slides were scanned and uploaded to a secured internet server. A network of experienced gynaecological pathologists was connected to the server through a custom-designed software platform. If deemed necessary by the expert pathologists, immunohistochemistry was available through a collaborating pathology lab. A total of 880 patients with an original diagnosis of ovarian epithelial carcinoma were registered for expert pathology review from October 2011 to July 2013. For case review, five gynaecopathologists from Austria, Switzerland and Germany were available online. Median number of w.d. required to complete the whole process from patient registration to transmission of final review diagnoses was 4 (range 2-31) (w.d.), and in 848 out of 880 (97.5%) cases, it amounted to ⩽10 w.d. In 2.5% (n=22) of cases, a major diagnostic discrepancy of potential clinical relevance was found leading to exclusion from the chemotherapy trial. Our results show that the use of a new internet-based infrastructure makes timely specialised case review, prior to patient randomisation feasible within ⩽10 w.d. Our new approach helped to protect against overtreatment with chemotherapy of patients with ovarian borderline tumours and inadequate treatment of patients with ovarian metastases, as a result of their inappropriate entry into a clinical trial designed for patients with primary ovarian carcinoma.
Lindberg, D A; Humphreys, B L
1995-01-01
The High-Performance Computing and Communications (HPCC) program is a multiagency federal effort to advance the state of computing and communications and to provide the technologic platform on which the National Information Infrastructure (NII) can be built. The HPCC program supports the development of high-speed computers, high-speed telecommunications, related software and algorithms, education and training, and information infrastructure technology and applications. The vision of the NII is to extend access to high-performance computing and communications to virtually every U.S. citizen so that the technology can be used to improve the civil infrastructure, lifelong learning, energy management, health care, etc. Development of the NII will require resolution of complex economic and social issues, including information privacy. Health-related applications supported under the HPCC program and NII initiatives include connection of health care institutions to the Internet; enhanced access to gene sequence data; the "Visible Human" Project; and test-bed projects in telemedicine, electronic patient records, shared informatics tool development, and image systems. PMID:7614116
Security, privacy, and confidentiality issues on the Internet
Kelly, Grant; McKenzie, Bruce
2002-01-01
We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to `sign' a message whereby the private key of an individual can be used to `hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a `digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers. PMID:12554559
Internet-based computer technology on radiotherapy.
Chow, James C L
2017-01-01
Recent rapid development of Internet-based computer technologies has made possible many novel applications in radiation dose delivery. However, translational speed of applying these new technologies in radiotherapy could hardly catch up due to the complex commissioning process and quality assurance protocol. Implementing novel Internet-based technology in radiotherapy requires corresponding design of algorithm and infrastructure of the application, set up of related clinical policies, purchase and development of software and hardware, computer programming and debugging, and national to international collaboration. Although such implementation processes are time consuming, some recent computer advancements in the radiation dose delivery are still noticeable. In this review, we will present the background and concept of some recent Internet-based computer technologies such as cloud computing, big data processing and machine learning, followed by their potential applications in radiotherapy, such as treatment planning and dose delivery. We will also discuss the current progress of these applications and their impacts on radiotherapy. We will explore and evaluate the expected benefits and challenges in implementation as well.
Security, privacy, and confidentiality issues on the Internet.
Kelly, Grant; McKenzie, Bruce
2002-01-01
We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to 'sign' a message whereby the private key of an individual can be used to 'hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a 'digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-21
... location and via the Internet; (4) load Management Ripple Control Receivers for an existing load management... central location and via the Internet; (4) Load Management Ripple Control Receivers for an existing load...
Preservation of Scientific and Cultural Heritage in Balkan Countries
ERIC Educational Resources Information Center
Tonta, Yasar
2009-01-01
Purpose: The peoples living in the Balkan Peninsula over centuries have created a very rich cultural heritage and the constant political upheavals in the region have affected the development and preservation of their cultures. This paper aims to review the internet infrastructure and networked readiness levels of the Balkan countries, which are…
ERIC Educational Resources Information Center
Özcan, Seher; Gökçearslan, Sahin; Solmaz, Ebru
2016-01-01
Owing to advancements in both information and communication technologies and especially in the internet infrastructure, globalization has shifted to the next dimension; and these developments in technology has expressed its significance in online education like other domains of life. Utilization from new technologies has significantly minimized…
ERIC Educational Resources Information Center
Draper, Darryl C.
2013-01-01
The increased accessibility of technology and Internet connections has enabled organizations to provide their workforces with the opportunity to engage in distributed education. "Harnessing this innovation calls for organizational and technological infrastructures that support the interplay of knowledge and knowing" (Cook & Brown, 1999, p. 381).…
The Importance of Obeying E-Rate's Rules
ERIC Educational Resources Information Center
Fitzgerald, Sara
2004-01-01
Since 1998, Americans have paid more than $8 billion in assessments on their telephone bills to help provide schools and libraries with discounted access to the Internet, as well as to support investments in networking infrastructure. In this brief article, the author argues that now more than ever, it is important for school officials to pay…
DURIP: Mitigating Attacks on Mobile Devices and Critical Cellular Infrastructure
2016-03-03
Patrick Traynor, Shobha Venkataraman . Why is my smartphone slow? On the fly diagnosis of underperformance on the mobile Internet, 2013 43rd Annual IEEE...Symposium (NDSS), 2013. 4. C. Amrutkar, M. Hiltunen, T. Jim, K. Joshi, O. Spatscheck, P. Traynor and S. Venkataraman , Why is My Smartphone Slow? On The
2011-03-01
they can continue to leverage these capabilities (building Smart Grid infrastructure and providing Internet connectivity to every home ) while ensuring...21 Figure 9. Smart Grid Interoperability .............................................................................. 22 Figure 10. Smart ...Grid Integration .................................................................................... 24 Figure 11. National Smart Grid Initiatives
ERIC Educational Resources Information Center
Rowley, Tom
Telecommunications technologies have great potential for linking rural homes, schools, businesses, and government. Experts agree that rural development depends on investment in additional telecommunications infrastructure and on local access to the Internet, but getting advanced telecommunications services to rural areas will take time. This…
Models of Educational Computing @ Home: New Frontiers for Research on Technology in Learning.
ERIC Educational Resources Information Center
Kafai, Yasmin B.; Fishman, Barry J.; Bruckman, Amy S.; Rockman, Saul
2002-01-01
Discusses models of home educational computing that are linked to learning in school and recommends the need for research that addresses the home as a computer-based learning environment. Topics include a history of research on educational computing at home; technological infrastructure, including software and compatibility; Internet access;…
ERIC Educational Resources Information Center
Karalar, Halit; Dogan, Ugur
2017-01-01
FATIH Project carried out by the Turkish government is one of the comprehensive technology integration project in the World. With this project, interactive boards, tablets and multifunctional printers have been distributed to schools and Internet infrastructure of schools improved. EIN (Educational Informatics Network) platform, known as EBA…
DOT National Transportation Integrated Search
2012-03-01
This report introduces the design and implementation of a Web-based bridge information visual analytics system. This : project integrates Internet, multiple databases, remote sensing, and other visualization technologies. The result : combines a GIS ...
In Search of the Best On-Line Degree Programs in Human Resources.
ERIC Educational Resources Information Center
Kirk, James J.; Waltemyer, Holly
The advent of the Internet, the World Wide Web, and global infrastructures for e-learning are revolutionizing how colleges and universities deliver degree programs to adult students. Benefits of on-line degree programs to working adults include flexibility, convenience, and time and cost savings. New technologies that greatly affect how online…
NASA Astrophysics Data System (ADS)
Montalto, F. A.; Yu, Z.; Soldner, K.; Israel, A.; Fritch, M.; Kim, Y.; White, S.
2017-12-01
Urban stormwater utilities are increasingly using decentralized "green" infrastructure (GI) systems to capture stormwater and achieve compliance with regulations. Because environmental conditions, and design varies by GSI facility, monitoring of GSI systems under a range of conditions is essential. Conventional monitoring efforts can be costly because in-field data logging requires intense data transmission rates. The Internet of Things (IoT) can be used to more cost-effectively collect, store, and publish GSI monitoring data. Using 3G mobile networks, a cloud-based database was built on an Amazon Web Services (AWS) EC2 virtual machine to store and publish data collected with environmental sensors deployed in the field. This database can store multi-dimensional time series data, as well as photos and other observations logged by citizen scientists through a public engagement mobile app through a new Application Programming Interface (API). Also on the AWS EC2 virtual machine, a real-time QAQC flagging algorithm was developed to validate the sensor data streams.
Schooley, Benjamin L; Horan, Thomas A; Lee, Pamela W; West, Priscilla A
2010-01-01
This multimethod pilot study examined patient and practitioner perspectives on the influence of spatial barriers to healthcare access and the role of health information technology in overcoming these barriers. The study included a survey administered to patients attending a Department of Veterans Affairs (VA) health visit, and a focus group with VA care providers. Descriptive results and focus group findings are presented. Spatial distance is a significant factor for many rural veterans when seeking healthcare. For this sample of rural veterans, a range of telephone, computer, and Internet technologies may become more important for accessing care as Internet access becomes more ubiquitous and as younger veterans begin using the VA health system. The focus group highlighted the negative impact of distance, economic considerations, geographic barriers, and specific medical conditions on access to care. Lack of adequate technology infrastructure was seen as an obstacle to utilization. This study discusses the need to consider distance, travel modes, age, and information technology infrastructure and adoption when designing health information technology to care for rural patients. PMID:20697468
Manes, Gianfranco; Collodi, Giovanni; Gelpi, Leonardo; Fusco, Rosanna; Ricci, Giuseppe; Manes, Antonio; Passafiume, Marco
2016-01-01
This paper describes a distributed point-source monitoring platform for gas level and leakage detection in hazardous environments. The platform, based on a wireless sensor network (WSN) architecture, is organised into sub-networks to be positioned in the plant’s critical areas; each sub-net includes a gateway unit wirelessly connected to the WSN nodes, hence providing an easily deployable, stand-alone infrastructure featuring a high degree of scalability and reconfigurability. Furthermore, the system provides automated calibration routines which can be accomplished by non-specialized maintenance operators without system reliability reduction issues. Internet connectivity is provided via TCP/IP over GPRS (Internet standard protocols over mobile networks) gateways at a one-minute sampling rate. Environmental and process data are forwarded to a remote server and made available to authenticated users through a user interface that provides data rendering in various formats and multi-sensor data fusion. The platform is able to provide real-time plant management with an effective; accurate tool for immediate warning in case of critical events. PMID:26805832
NASA Astrophysics Data System (ADS)
Riesmeier, Joerg; Eichelberg, Marco; Kleber, Klaus; Groenemeyer, Dietrich H.; Oosterwijk, Herman J.; Jensch, Peter F.
2002-05-01
With the release of 'DICOM Structured Reporting' (SR) as an official extension of the standard about two years ago, DICOM has entered a new domain that is only indirectly related to medical imaging. Basically, DICOM SR is a general model allowing to encode medical reports in a structured manner in DICOM's tag-based format. Therefore, the existing DICOM infrastructure can be used to archive and communicate structured reports, with only relatively small changes to existing systems. As a consequence of the introduction of medical reports in a digital form, the relevance of security measures increases significantly. We have developed a prototype implementation of DICOM structured reporting together with the new security extensions for secure transport connections and digital signatures. The application allows to create, read and modify any SR document, to digitally sign an SR document in whole or part and to transmit such documents over a network. While the secure transport connection protects data from modifications or unauthorized access only during transmission, digital signatures provide a lifetime integrity check and, therefore, maintain the legal document status of structured reports. The application has been successfully demonstrated at RSNA 2000 and ECR 2001, and is freely available on the Internet.
NASA Virtual Conferences and Instruction Over the Internet
NASA Technical Reports Server (NTRS)
Leon, Mark; McCurdy, Andrea; Wood, Charles
1997-01-01
Distance learning is not new. Since the time that radio has embellished our culture distance learning has taken on may forms. With the onset of television, video tape and satellite link ups the world of multimedia has taken a presence in our remote learning environment. Now in the information age new models for bring the best education to people through out the world is in its early stages. Recent "Information Age" technological developments have made key advancements to distance learning through the greater bandwidths now available over the Internet and a broader communications infrastructure that extends to classrooms throughout the country and the world. Further, new software compression technology allows audio and video to be communicated over the Internet much more efficiently. Larger amounts of data can be transferred to remote sites at less cost. The purpose of this paper is to demonstrate the use of state-of-art technology in the educational community. The focus will be on virtual conferences, virtual instruction and remote education. The techniques herein have been developed by NASA and the University of North Dakota(UND) through the use of existing software and hardware purchased in the United States. NASA has awarded UND a grant for continued research in this area based on their pioneering effort to date. NASA has been conducting "Virtual Conferences" from Ames Research Center in order to make unique educational opportunities available to participants across the country and internationally. Through the use of this technical approach, hundreds of teachers have been able to attend events where physical or financial barriers traditionally prevented their attendance. This technique is currently being adopted by industry due to its scaleable merit.
Intelligent device management in the selfcare marketplace.
Biniaris, Christos G; Marsh, Andrew J
2008-01-01
Over the last ten years the Internet has emerged as a key infrastructure for service innovation, enabling IP (Internet Protocol) to become the wide area network communication protocol of choice. The natural result of this choice is that service providers and their customers are looking for ways to optimise costs by migrating existing services and applications onto IP as well. A good example is the medical industry, which is transitioning to Internet-based communications as the field of telemedicine broadens to preventative and self healthcare. However, technology is changing quickly and consumers face an array of choices to satisfy their healthcare needs with numerous devices from different vendors. Seamless healthcare device networking can play a major role in automating and safeguarding the process of collecting and transferring medical data, remote patient monitoring and reducing costs through remote equipment monitoring. In this scope, we describe an approach augmenting the Session Initiation Protocol (SIP) with healthcare services in order to form a framework for efficient collection and storage of measurements, aiming to address the issues of the lack of a standardised data interface for consumer healthcare technologies (including hardware and protocols) and the lack of a standardised format for self-collected healthcare data (including the storage medium). In this framework, measurements can be seamlessly collected and stored as XML notes located virtually anywhere, such as the user's home or mobile device. Additionally, these notes can be accessed locally or remotely by doctors and specialists. Also, we discuss how this approach supports user mobility by proxying and redirecting requests to the user's current location and how it can remove the complexity of using consumer healthcare technologies from different vendors connected to different devices and the opportunities for Independent Software Vendors to develop additional services.
Information Infrastructure Technology and Applications (IITA) Program: Annual K-12 Workshop
NASA Technical Reports Server (NTRS)
Hunter, Paul; Likens, William; Leon, Mark
1995-01-01
The purpose of the K-12 workshop is to stimulate a cross pollination of inter-center activity and introduce the regional centers to curing edge K-1 activities. The format of the workshop consists of project presentations, working groups, and working group reports, all contained in a three day period. The agenda is aggressive and demanding. The K-12 Education Project is a multi-center activity managed by the Information Infrastructure Technology and Applications (IITA)/K-12 Project Office at the NASA Ames Research Center (ARC). this workshop is conducted in support of executing the K-12 Education element of the IITA Project The IITA/K-12 Project funds activities that use the National Information Infrastructure (NII) (e.g., the Internet) to foster reform and restructuring in mathematics, science, computing, engineering, and technical education.
Improving Remote Voting Security with CodeVoting
NASA Astrophysics Data System (ADS)
Joaquim, Rui; Ribeiro, Carlos; Ferreira, Paulo
One of the major problems that prevents the spread of elections with the possibility of remote voting over electronic networks, also called Internet Voting, is the use of unreliable client platforms, such as the voter's computer and the Internet infrastructure connecting it to the election server. A computer connected to the Internet is exposed to viruses, worms, Trojans, spyware, malware and other threats that can compromise the election's integrity. For instance, it is possible to write a virus that changes the voter's vote to a predetermined vote on election's day. Another possible attack is the creation of a fake election web site where the voter uses a malicious vote program on the web site that manipulates the voter's vote (phishing/pharming attack). Such attacks may not disturb the election protocol, therefore can remain undetected in the eyes of the election auditors.
Stevenson, Fiona A; Kerr, Cicely; Murray, Elizabeth; Nazareth, Irwin
2007-01-01
Background Both doctors and patients may perceive the Internet as a potential challenge to existing therapeutic relationships. Here we examine patients' views of the effect of the Internet on their relationship with doctors. Methods We ran 8 disease specific focus groups of between 2 and 8 respondents comprising adult patients with diabetes mellitus, ischaemic heart disease or hepatitis C. Results Data are presented on (i) the perceived benefits and (ii) limitations of the Internet in the context of the doctor-patient relationship, (iii) views on sharing information with doctors, and (iv) the potential of the Internet for the future. Information from the Internet was particularly valued in relation to experiential knowledge. Conclusion Despite evidence of increasing patient activism in seeking information and the potential to challenge the position of the doctor, the accounts here do not in any way suggest a desire to disrupt the existing balance of power, or roles, in the consultation. Patients appear to see the Internet as an additional resource to support existing and valued relationships with their doctors. Doctors therefore need not feel challenged or threatened when patients bring health information from the Internet to a consultation, rather they should see it as an attempt on the part of the patient to work with the doctor and respond positively. PMID:17705836
Fuzzy architecture assessment for critical infrastructure resilience
DOE Office of Scientific and Technical Information (OSTI.GOV)
Muller, George
2012-12-01
This paper presents an approach for the selection of alternative architectures in a connected infrastructure system to increase resilience of the overall infrastructure system. The paper begins with a description of resilience and critical infrastructure, then summarizes existing approaches to resilience, and presents a fuzzy-rule based method of selecting among alternative infrastructure architectures. This methodology includes considerations which are most important when deciding on an approach to resilience. The paper concludes with a proposed approach which builds on existing resilience architecting methods by integrating key system aspects using fuzzy memberships and fuzzy rule sets. This novel approach aids the systemsmore » architect in considering resilience for the evaluation of architectures for adoption into the final system architecture.« less
Accurate Vehicle Location System Using RFID, an Internet of Things Approach.
Prinsloo, Jaco; Malekian, Reza
2016-06-04
Modern infrastructure, such as dense urban areas and underground tunnels, can effectively block all GPS signals, which implies that effective position triangulation will not be achieved. The main problem that is addressed in this project is the design and implementation of an accurate vehicle location system using radio-frequency identification (RFID) technology in combination with GPS and the Global system for Mobile communication (GSM) technology, in order to provide a solution to the limitation discussed above. In essence, autonomous vehicle tracking will be facilitated with the use of RFID technology where GPS signals are non-existent. The design of the system and the results are reflected in this paper. An extensive literature study was done on the field known as the Internet of Things, as well as various topics that covered the integration of independent technology in order to address a specific challenge. The proposed system is then designed and implemented. An RFID transponder was successfully designed and a read range of approximately 31 cm was obtained in the low frequency communication range (125 kHz to 134 kHz). The proposed system was designed, implemented, and field tested and it was found that a vehicle could be accurately located and tracked. It is also found that the antenna size of both the RFID reader unit and RFID transponder plays a critical role in the maximum communication range that can be achieved.
Accurate Vehicle Location System Using RFID, an Internet of Things Approach
Prinsloo, Jaco; Malekian, Reza
2016-01-01
Modern infrastructure, such as dense urban areas and underground tunnels, can effectively block all GPS signals, which implies that effective position triangulation will not be achieved. The main problem that is addressed in this project is the design and implementation of an accurate vehicle location system using radio-frequency identification (RFID) technology in combination with GPS and the Global system for Mobile communication (GSM) technology, in order to provide a solution to the limitation discussed above. In essence, autonomous vehicle tracking will be facilitated with the use of RFID technology where GPS signals are non-existent. The design of the system and the results are reflected in this paper. An extensive literature study was done on the field known as the Internet of Things, as well as various topics that covered the integration of independent technology in order to address a specific challenge. The proposed system is then designed and implemented. An RFID transponder was successfully designed and a read range of approximately 31 cm was obtained in the low frequency communication range (125 kHz to 134 kHz). The proposed system was designed, implemented, and field tested and it was found that a vehicle could be accurately located and tracked. It is also found that the antenna size of both the RFID reader unit and RFID transponder plays a critical role in the maximum communication range that can be achieved. PMID:27271638
ERIC Educational Resources Information Center
Sahin, Cengiz
2014-01-01
The concept of internet addiction refers to the excessive use of internet which in turn causes various problems in individual, social and professional aspects. The aim of this study is to determine the relationship between depression and internet addiction in terms of grades, sex, the existence of internet connection at home and time spent on…
DOT National Transportation Integrated Search
2013-07-01
This study explored possibilities for using existing transportation infrastructure for the cost-effective : installation of pneumatic waste-collection technology in Manhattan. If shown to be economically and : operationally feasible, reducing the num...
Geographical Assesment of Results from Preventing the Parameter Tampering in a Web Application
NASA Astrophysics Data System (ADS)
Menemencioğlu, O.; Orak, İ. M.
2017-11-01
The improving usage of internet and attained intensity of usage rate attracts the malicious in around the world. Many preventing systems are offered by researchers with different infrastructures. Very effective preventing system was proposed most recently by the researchers. The previously offered mechanism has prevented the multi-type vulnerabilities after preventing system was put into use. The attack attempts have been recorded. The researchers analysed the results geographically, discussed the obtained results and made some inference of the results. Our assessments show that the geographical findings can be used to retrieve some implication and build an infrastructure which prevents the vulnerabilities by location.
RAIN: A Bio-Inspired Communication and Data Storage Infrastructure.
Monti, Matteo; Rasmussen, Steen
2017-01-01
We summarize the results and perspectives from a companion article, where we presented and evaluated an alternative architecture for data storage in distributed networks. We name the bio-inspired architecture RAIN, and it offers file storage service that, in contrast with current centralized cloud storage, has privacy by design, is open source, is more secure, is scalable, is more sustainable, has community ownership, is inexpensive, and is potentially faster, more efficient, and more reliable. We propose that a RAIN-style architecture could form the backbone of the Internet of Things that likely will integrate multiple current and future infrastructures ranging from online services and cryptocurrency to parts of government administration.
Distributed Accounting on the Grid
NASA Technical Reports Server (NTRS)
Thigpen, William; Hacker, Thomas J.; McGinnis, Laura F.; Athey, Brian D.
2001-01-01
By the late 1990s, the Internet was adequately equipped to move vast amounts of data between HPC (High Performance Computing) systems, and efforts were initiated to link together the national infrastructure of high performance computational and data storage resources together into a general computational utility 'grid', analogous to the national electrical power grid infrastructure. The purpose of the Computational grid is to provide dependable, consistent, pervasive, and inexpensive access to computational resources for the computing community in the form of a computing utility. This paper presents a fully distributed view of Grid usage accounting and a methodology for allocating Grid computational resources for use on a Grid computing system.
Web-Based Consumer Health Information: Public Access, Digital Division, and Remainders
Lorence, Daniel; Park, Heeyoung
2006-01-01
Public access Internet portals and decreasing costs of personal computers have created a growing consensus that unequal access to information, or a “digital divide,” has largely disappeared for US consumers. A series of technology initiatives in the late 1990s were believed to have largely eliminated the divide. For healthcare patients, access to information is an essential part of the consumer-centric framework outlined in the recently proposed national health information initiative. Data from a recent study of health information-seeking behaviors on the Internet suggest that a “digitally underserved group” persists, effectively limiting the planned national health information infrastructure to wealthier Americans. PMID:16926743
Modelling of plug and play interface for energy router based on IEC61850
NASA Astrophysics Data System (ADS)
Shi, Y. F.; Yang, F.; Gan, L.; He, H. L.
2017-11-01
Under the background of the “Internet Plus”, as the energy internet infrastructure equipment, energy router will be widely developed. The IEC61850 standard is the only universal standard in the field of power system automation which realizes the standardization of engineering operation of intelligent substation. To eliminate the lack of International unified standard for communication of energy router, this paper proposes to apply IEC61850 to plug and play interface and establishes the plug and play interface information model and information transfer services. This paper provides a research approach for the establishment of energy router communication standards, and promotes the development of energy router.
Nasir, Zaheer Ahmad; Campos, Luiza Cintra; Christie, Nicola; Colbeck, Ian
2016-08-01
Exposure to airborne biological hazards in an ever expanding urban transport infrastructure and highly diverse mobile population is of growing concern, in terms of both public health and biosecurity. The existing policies and practices on design, construction and operation of these infrastructures may have severe implications for airborne disease transmission, particularly, in the event of a pandemic or intentional release of biological of agents. This paper reviews existing knowledge on airborne disease transmission in different modes of transport, highlights the factors enhancing the vulnerability of transport infrastructures to airborne disease transmission, discusses the potential protection measures and identifies the research gaps in order to build a bioresilient transport infrastructure. The unification of security and public health research, inclusion of public health security concepts at the design and planning phase, and a holistic system approach involving all the stakeholders over the life cycle of transport infrastructure hold the key to mitigate the challenges posed by biological hazards in the twenty-first century transport infrastructure.
Designing a Classification System for Internet Offenders: Doing Cognitive Distortions
ERIC Educational Resources Information Center
Hundersmarck, Steven F.; Durkin, Keith F.; Delong, Ronald L.
2007-01-01
Televised features such as NBC's "To Catch a Predator" have highlighted the growing problem posed by Internet sexual predators. This paper reports on the authors' attempts in designing a classification system for Internet offenders. The classification system was designed based on existing theory, understanding the nature of Internet offenders and…
ERIC Educational Resources Information Center
Awofeso, Niyi; Philip, Keir; Heller, Richard F.
2012-01-01
Current public health training infrastructure and facilitators in most developing nations are insufficient relative to public health service delivery needs. We examined five areas of student perceptions of a web-based public health learning initiative, the Peoples-uni, which focused on: reasons for enrolling, learning expectations; technical…
ROVER: A DNS-Based Method to Detect and Prevent IP Hijacks
ERIC Educational Resources Information Center
Gersch, Joseph E.
2013-01-01
The Border Gateway Protocol (BGP) is critical to the global internet infrastructure. Unfortunately BGP routing was designed with limited regard for security. As a result, IP route hijacking has been observed for more than 16 years. Well known incidents include a 2008 hijack of YouTube, loss of connectivity for Australia in February 2012, and an…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-05
... public docket without change and may be made available online at http://www.regulations.gov , including... public docket and made available on the Internet. If you submit an electronic comment, EPA recommends... additional information about EPA's public docket visit the EPA Docket Center homepage at http://www.epa.gov...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-23
...-0353. EPA's policy is that all comments received will be included in the public docket without change... comment that is placed in the public docket and made available on the Internet. If you submit an... viruses. For additional information about EPA's public docket visit the EPA Docket Center homepage at http...
E-Commerce and Education. Graduate Paper Series on Electronic Commerce.
ERIC Educational Resources Information Center
di Giantomasso, Tania
Broad assumptions about the impact of the Internet have created a "cult of hype" where the latest technological advancement is seen as the next best thing, and educators have been swept up in the promise of an educational utopia. The hype tells us that the world is joined by the infrastructure of this new technology and that…
2001 Industry Studies: Financial Services
2001-01-01
financial services firms are also positioning to compete here and abroad with international firms. Advances in information technology continue to provide...future. A veritable revolution is taking place within the financial services industry. Globalization, information technology and continuing... technological infrastructure that must be protected. Industry vulnerabilities will continue to increase as use of the Internet , e-commerce, and e-banking become
The Most Likely Nemesis to Timely, Accurate Electronic Information
2002-02-04
NETWORKS, TRAINING, COMMERCIAL OFF-THE-SHELF, INFORMATION TECHNOLOGY , INTERNET , COMMUNICATIONS EQUIPMENT, ELECTRONIC INFORMATION 15.Abstract... information . During a recent interview for Military Information Technology magazine, Lieutenant General John L. Woodward, Jr., USAF, Deputy Chief of Staff...NSC) Coordinator for Security, Infrastructure Protection and Counterterrorism, said the NSC did not want a czar for information technology (IT) nor
ERIC Educational Resources Information Center
Denda, Kayo; Smulewitz, Gracemary
2004-01-01
In the contemporary library environment, the presence of the Internet and the infrastructure of the integrated library system suggest an integrated internal organization. The article describes the example of Douglass Rationalization, a team-based collaborative project to refocus the collection of Rutgers' Douglass Library, taking advantage of the…
Baseline Survey of Educational Technology Access and Application in Southeastern Utah.
ERIC Educational Resources Information Center
Tyner, Kathleen; And Others
Utah's Southeastern Education Service Center has devised a five-phase vision plan for improving the educational technology infrastructure in the southeastern region of the state. The fourth phase involves the creation of the Southeastern Utah Regional Wide Area Network (SURWAN), which will link all K-12 schools to the Internet by 1996. This…
ERIC Educational Resources Information Center
Gonzalez, Emilio
Connecting every classroom, library, hospital, and clinic in the United States to the National Information Infrastructure (NII) is a priority for the Clinton Administration. This document provides a status report on this initiative by drawing from current data regarding Internet connectivity, a benchmark for NII access. Chapter 1 of the report…
NASA Technical Reports Server (NTRS)
Randolph, Lynwood P.
1994-01-01
The Open Systems Interconnection Transmission Control Protocol/Internet Protocol (OSI TCP/IP) and the Government Open Systems Interconnection Profile (GOSIP) are compared and described in terms of Federal internetworking. The organization and functions of the Federal Internetworking Requirements Panel (FIRP) are discussed and the panel's conclusions and recommendations with respect to the standards and implementation of the National Information Infrastructure (NII) are presented.
802.11 Wireless Infrastructure To Enhance Medical Response to Disasters
Arisoylu, Mustafa; Mishra, Rajesh; Rao, Ramesh; Lenert, Leslie A.
2005-01-01
802.11 (WiFi) is a well established network communications protocol that has wide applicability in civil infrastructure. This paper describes research that explores the design of 802.11 networks enhanced to support data communications in disaster environments. The focus of these efforts is to create network infrastructure to support operations by Metropolitan Medical Response System (MMRS) units and Federally-sponsored regional teams that respond to mass casualty events caused by a terrorist attack with chemical, biological, nuclear or radiological weapons or by a hazardous materials spill. In this paper, we describe an advanced WiFi-based network architecture designed to meet the needs of MMRS operations. This architecture combines a Wireless Distribution Systems for peer-to-peer multihop connectivity between access points with flexible and shared access to multiple cellular backhauls for robust connectivity to the Internet. The architecture offers a high bandwidth data communications infrastructure that can penetrate into buildings and structures while also supporting commercial off-the-shelf end-user equipment such as PDAs. It is self-configuring and is self-healing in the event of a loss of a portion of the infrastructure. Testing of prototype units is ongoing. PMID:16778990
Digital Divide in Sub-Saharan African Universities: Recommendations and Monitoring
DOE Office of Scientific and Technical Information (OSTI.GOV)
Barry, Boubakar; /Assoc. Afr. Univ.; Chukwuma, Victor
The Digital Divide prevents Africa from taking advantages of new information technologies. One of the most urgent priorities is to bring the Internet in African Universities, Research, and Learning Centers to the level of other regions of the world. eGY-Africa, and the Sharing Knowledge Foundation are two bottom-up initiatives by scientists to secure better cyber-infrastructure and Internet facilities in Africa. Recommendations by the present scientific communities are being formulated at national, regional and international levels. The Internet capabilities are well documented at country level overall, but this is not the case at the University level. The snapshot of the Internetmore » status in universities in 17 African countries, obtained by a questionnaire survey, is consistent with measures of Internet penetration in the corresponding country. The monitoring of Internet performance has been proposed to those African universities to provide an information base for arguing the need to improve the coverage for Africa. A pilot program is recommended that will start scientific collaboration with Europe in western Africa using ICT. The program will lay the foundations for the arrival of new technologies like Grids.« less
Future CO2 Emissions and Climate Change from Existing Energy Infrastructure
NASA Astrophysics Data System (ADS)
Davis, S. J.; Caldeira, K.; Matthews, D.
2010-12-01
If current greenhouse gas (GHG) concentrations remain constant, the world would be committed to several centuries of increasing global mean temperatures and sea level rise. By contrast, near elimination of anthropogenic CO2 emissions would be required to produce diminishing GHG concentrations consistent with stabilization of mean temperatures. Yet long-lived energy and transportation infrastructure now operating can be expected to contribute substantial CO2 emissions over the next 50 years. Barring widespread retrofitting of existing power plants with carbon capture and storage (CCS) technologies or the early decommissioning of serviceable infrastructure, these “committed emissions” represent infrastructural inertia which may be the primary contributor to total future warming commitment. With respect to GHG emissions, infrastructural inertia may be thought of as having two important and overlapping components: (i) infrastructure that directly releases GHGs to the atmosphere, and (ii) infrastructure that contributes to the continued production of devices that emit GHGs to the atmosphere. For example, the interstate highway and refueling infrastructure in the United States facilitates continued production of gasoline-powered automobiles. Here, we focus only on the warming commitment from infrastructure that directly releases CO2 to the atmosphere. Essentially, we answer the question: What if no additional CO2-emitting devices (e.g., power plants, motor vehicles) were built, but all the existing CO2-emitting devices were allowed to live out their normal lifetimes? What CO2 levels and global mean temperatures would we attain? Of course, the actual lifetime of devices may be strongly influenced by economic and policy constraints. For instance, a ban on new CO2-emitting devices would create tremendous incentive to prolong the lifetime of existing devices. Thus, our scenarios are not realistic, but offer a means of gauging the threat of climate change from existing devices relative to those devices that have yet to be built. We developed scenarios of global CO2 emissions from the energy sector using datasets of power plants and motor vehicles worldwide, as well as estimates of fossil fuel emissions produced directly by industry, households, businesses, and other forms of transport. We estimated lifetimes and annual emissions of infrastructure from historical data. We projected changes in CO2 and temperature in response to our calculated emissions using an intermediate-complexity coupled climate-carbon model (UVic ESCM). We calculate cumulative future emissions of 496 (282 to 701) gigatonnes of CO2 from combustion of fossil fuels by existing infrastructure between 2010 and 2060, forcing mean warming of 1.3°C (1.1 to 1.4°C) above the preindustrial era and atmospheric concentrations of CO2 less than 430 parts per million (ppm). Because these conditions would likely avoid many key impacts of climate change, we conclude that sources of the most threatening emissions have yet to be built. However, CO2-emitting infrastructure will expand unless extraordinary efforts are undertaken to develop alternatives.
Remote Thermal Analysis Through the Internet
NASA Astrophysics Data System (ADS)
Malroy, Eric T.
2002-07-01
The Heater of the Hypersonic Tunnel Facility (HTF) was modeled using SINDA/FLUINT thermal software. A description of the model is given. The project presented the opportunity of interfacing the thermal model with the Internet and was a demonstration that complex analysis is possible through the Internet. Some of the issues that need to be addressed related to interfacing software with the Internet are the following: justification for using the Internet, selection of the web server, choice of the CGI language, security of the system, communication among the parties, maintenance of state between web pages, and simultaneous users on the Internet system. The opportunities available for using the Internet for analysis are many and can present a significant jump in technology. This paper presents a vision how interfacing with the Internet could develop in the future. Using a separate Optical Internet (OI) for analysis, coupled with virtual reality analysis rooms (VRAR), could provide a synergistic environment to couple together engineering analysis within industry, academia, and government. The process of analysis could be broken down into sub-components so that specialization could occur resulting in superior quality, minimized cost and reduced time for engineering analysis and manufacturing. Some possible subcomponents of the system are solver routines, databases, Graphical User Interfaces, engineering design software, VRARs, computer processing, CAD systems, manufacturing, and a plethora of other options only limited by ones imagination. On a larger scope, the specialization of companies on the optical network would allow companies to rapidly construct and reconstruct their infrastructure based on changing economic conditions. This could transform business.
This document presents the results of completed work using existing geographic information system (GIS) data to map existing water and sewer infrastructure and homes without access to safe drinking water and basic sanitation on the Navajo Nation.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Stamber, Kevin L.; Unis, Carl J.; Shirah, Donald N.
Research into modeling of the quantification and prioritization of resources used in the recovery of lifeline critical infrastructure following disruptive incidents, such as hurricanes and earthquakes, has shown several factors to be important. Among these are population density and infrastructure density, event effects on infrastructure, and existence of an emergency response plan. The social sciences literature has a long history of correlating the population density and infrastructure density at a national scale, at a country-to-country level, mainly focused on transportation networks. This effort examines whether these correlations can be repeated at smaller geographic scales, for a variety of infrastructure types,more » so as to be able to use population data as a proxy for infrastructure data where infrastructure data is either incomplete or insufficiently granular. Using the best data available, this effort shows that strong correlations between infrastructure density for multiple types of infrastructure (e.g. miles of roads, hospital beds, miles of electric power transmission lines, and number of petroleum terminals) and population density do exist at known geographic boundaries (e.g. counties, service area boundaries) with exceptions that are explainable within the social sciences literature. Furthermore, the correlations identified provide a useful basis for ongoing research into the larger resource utilization problem.« less
Stamber, Kevin L.; Unis, Carl J.; Shirah, Donald N.; ...
2016-04-01
Research into modeling of the quantification and prioritization of resources used in the recovery of lifeline critical infrastructure following disruptive incidents, such as hurricanes and earthquakes, has shown several factors to be important. Among these are population density and infrastructure density, event effects on infrastructure, and existence of an emergency response plan. The social sciences literature has a long history of correlating the population density and infrastructure density at a national scale, at a country-to-country level, mainly focused on transportation networks. This effort examines whether these correlations can be repeated at smaller geographic scales, for a variety of infrastructure types,more » so as to be able to use population data as a proxy for infrastructure data where infrastructure data is either incomplete or insufficiently granular. Using the best data available, this effort shows that strong correlations between infrastructure density for multiple types of infrastructure (e.g. miles of roads, hospital beds, miles of electric power transmission lines, and number of petroleum terminals) and population density do exist at known geographic boundaries (e.g. counties, service area boundaries) with exceptions that are explainable within the social sciences literature. Furthermore, the correlations identified provide a useful basis for ongoing research into the larger resource utilization problem.« less
Collaboration and decision making tools for mobile groups
NASA Astrophysics Data System (ADS)
Abrahamyan, Suren; Balyan, Serob; Ter-Minasyan, Harutyun; Degtyarev, Alexander
2017-12-01
Nowadays the use of distributed collaboration tools is widespread in many areas of people activity. But lack of mobility and certain equipment-dependency creates difficulties and decelerates development and integration of such technologies. Also mobile technologies allow individuals to interact with each other without need of traditional office spaces and regardless of location. Hence, realization of special infrastructures on mobile platforms with help of ad-hoc wireless local networks could eliminate hardware-attachment and be useful also in terms of scientific approach. Solutions from basic internet-messengers to complex software for online collaboration equipment in large-scale workgroups are implementations of tools based on mobile infrastructures. Despite growth of mobile infrastructures, applied distributed solutions in group decisionmaking and e-collaboration are not common. In this article we propose software complex for real-time collaboration and decision-making based on mobile devices, describe its architecture and evaluate performance.
Closing the "Know-Do" Gap: eHealth Strategies for the Global South.
2008-01-01
For years, the Internet has been the new black, the "in" thing, the must have. And the virtual fever is spreading. According to the World Bank, global Internet use more than quadrupled between 2000 and 2005, from 15 users per 1000 population to 67.[1] Yet, many Global South countries are stalled on the Information Superhighway: the same World Bank report found that only 15 per 1000 population in sub-Saharan Africa are connected to the Internet, and only 21 per1000 in South Asia. To say nothing of glaring access inequalities within countries, lack of foreign investment in the communications sector of developing nations, and deficient connectivity in key areas of national infrastructure - schools, government centers, and health facilities. Yet the same World Bank report noted that eHealth initiatives ranked last in a list of technology strategies among countries surveyed.[1].
Home security system using internet of things
NASA Astrophysics Data System (ADS)
Anitha, A.
2017-11-01
IoT refers to the infrastructure of connected physical devices which is growing at a rapid rate as huge number of devices and objects are getting associated to the Internet. Home security is a very useful application of IoT and we are using it to create an inexpensive security system for homes as well as industrial use. The system will inform the owner about any unauthorized entry or whenever the door is opened by sending a notification to the user. After the user gets the notification, he can take the necessary actions. The security system will use a microcontroller known as Arduino Uno to interface between the components, a magnetic Reed sensor to monitor the status, a buzzer for sounding the alarm, and a WiFi module, ESP8266 to connect and communicate using the Internet. The main advantages of such a system includes the ease of setting up, lower costs and low maintenance.
Approaches in highly parameterized inversion - GENIE, a general model-independent TCP/IP run manager
Muffels, Christopher T.; Schreuder, Willem A.; Doherty, John E.; Karanovic, Marinko; Tonkin, Matthew J.; Hunt, Randall J.; Welter, David E.
2012-01-01
GENIE is a model-independent suite of programs that can be used to generally distribute, manage, and execute multiple model runs via the TCP/IP infrastructure. The suite consists of a file distribution interface, a run manage, a run executer, and a routine that can be compiled as part of a program and used to exchange model runs with the run manager. Because communication is via a standard protocol (TCP/IP), any computer connected to the Internet can serve in any of the capacities offered by this suite. Model independence is consistent with the existing template and instruction file protocols of the widely used PEST parameter estimation program. This report describes (1) the problem addressed; (2) the approach used by GENIE to queue, distribute, and retrieve model runs; and (3) user instructions, classes, and functions developed. It also includes (4) an example to illustrate the linking of GENIE with Parallel PEST using the interface routine.
Sensor-Based Optimization Model for Air Quality Improvement in Home IoT
Kim, Jonghyuk
2018-01-01
We introduce current home Internet of Things (IoT) technology and present research on its various forms and applications in real life. In addition, we describe IoT marketing strategies as well as specific modeling techniques for improving air quality, a key home IoT service. To this end, we summarize the latest research on sensor-based home IoT, studies on indoor air quality, and technical studies on random data generation. In addition, we develop an air quality improvement model that can be readily applied to the market by acquiring initial analytical data and building infrastructures using spectrum/density analysis and the natural cubic spline method. Accordingly, we generate related data based on user behavioral values. We integrate the logic into the existing home IoT system to enable users to easily access the system through the Web or mobile applications. We expect that the present introduction of a practical marketing application method will contribute to enhancing the expansion of the home IoT market. PMID:29570684
Sensor-Based Optimization Model for Air Quality Improvement in Home IoT.
Kim, Jonghyuk; Hwangbo, Hyunwoo
2018-03-23
We introduce current home Internet of Things (IoT) technology and present research on its various forms and applications in real life. In addition, we describe IoT marketing strategies as well as specific modeling techniques for improving air quality, a key home IoT service. To this end, we summarize the latest research on sensor-based home IoT, studies on indoor air quality, and technical studies on random data generation. In addition, we develop an air quality improvement model that can be readily applied to the market by acquiring initial analytical data and building infrastructures using spectrum/density analysis and the natural cubic spline method. Accordingly, we generate related data based on user behavioral values. We integrate the logic into the existing home IoT system to enable users to easily access the system through the Web or mobile applications. We expect that the present introduction of a practical marketing application method will contribute to enhancing the expansion of the home IoT market.
Human face recognition using eigenface in cloud computing environment
NASA Astrophysics Data System (ADS)
Siregar, S. T. M.; Syahputra, M. F.; Rahmat, R. F.
2018-02-01
Doing a face recognition for one single face does not take a long time to process, but if we implement attendance system or security system on companies that have many faces to be recognized, it will take a long time. Cloud computing is a computing service that is done not on a local device, but on an internet connected to a data center infrastructure. The system of cloud computing also provides a scalability solution where cloud computing can increase the resources needed when doing larger data processing. This research is done by applying eigenface while collecting data as training data is also done by using REST concept to provide resource, then server can process the data according to existing stages. After doing research and development of this application, it can be concluded by implementing Eigenface, recognizing face by applying REST concept as endpoint in giving or receiving related information to be used as a resource in doing model formation to do face recognition.
APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN MEDICAL EDUCATION
Al-Tamimi, Dalal M.
2003-01-01
The recognition that information and communication technologies should play an increasingly important role in medical education is a key to educating physicians in the 21st century. Computer use in medical education includes, Internet hypermedia/multimedia technologies, medical informatics, distance learning and telemedicine. Adaptation to the use of these technologies should ideally start from the elementary school level. Medical schools must introduce medical informatics courses very early in the medical curriculum. Teachers will need regular CME courses to prepare and update themselves with the changing circumstances. Our infrastructure must be prepared for the new developments with computer labs, basic skill labs, close circuit television facilities, virtual class rooms, smart class rooms, simulated teaching facilities, and distance teaching by tele-techniques. Our existing manpower including, doctors, nurses, technicians, librarians, and administration personal require hands-on training, while new recruitment will have to emphasize compulsory knowledge of and familiarity with information technology. This paper highlights these subjects in detail as a means to prepare us to meet the challenges of the 21st century. PMID:23011983
CASAS: A tool for composing automatically and semantically astrophysical services
NASA Astrophysics Data System (ADS)
Louge, T.; Karray, M. H.; Archimède, B.; Knödlseder, J.
2017-07-01
Multiple astronomical datasets are available through internet and the astrophysical Distributed Computing Infrastructure (DCI) called Virtual Observatory (VO). Some scientific workflow technologies exist for retrieving and combining data from those sources. However selection of relevant services, automation of the workflows composition and the lack of user-friendly platforms remain a concern. This paper presents CASAS, a tool for semantic web services composition in astrophysics. This tool proposes automatic composition of astrophysical web services and brings a semantics-based, automatic composition of workflows. It widens the services choice and eases the use of heterogeneous services. Semantic web services composition relies on ontologies for elaborating the services composition; this work is based on Astrophysical Services ONtology (ASON). ASON had its structure mostly inherited from the VO services capacities. Nevertheless, our approach is not limited to the VO and brings VO plus non-VO services together without the need for premade recipes. CASAS is available for use through a simple web interface.
Hydropower Resource Assessment of Brazilian Streams
DOE Office of Scientific and Technical Information (OSTI.GOV)
Douglas G. Hall
The Idaho National Laboratory (INL) in collaboration with the U.S. Geological Survey (USGS) with the assistance of the Empresa de Pesquisa Energetica (EPE) and the Agencia Nacional de Energia Electrica (ANEEL) has performed a comprehensive assessment of the hydropower potential of all Brazilian natural streams. The methodology by which the assessment was performed is described. The results of the assessment are presented including an estimate of the hydropower potential for all of Brazil, and the spatial distribution of hydropower potential thus providing results on a state by state basis. The assessment results have been incorporated into a geographic information systemmore » (GIS) application for the Internet called the Virtual Hydropower Prospector do Brasil. VHP do Brasil displays potential hydropower sites on a map of Brazil in the context of topography and hydrography, existing power and transportation infrastructure, populated places and political boundaries, and land use. The features of the application, which includes tools for finding and selecting potential hydropower sites and other features and displaying their attributes, is fully described.« less
DOT National Transportation Integrated Search
2009-09-13
The development of infrastructure facilities can negatively impact critical habitat and essential ecosystems. There are a variety of techniques available to avoid, minimize, and mitigate negative impacts of existing infrastructure as well as future i...
77 FR 72673 - Critical Infrastructure Protection and Resilience Month, 2012
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-05
.... Cyber incidents can have devastating consequences on both physical and virtual infrastructure, which is... work within existing authorities to fortify our country against cyber risks, comprehensive legislation remains essential to improving infrastructure security, enhancing cyber information sharing between...
Ethical Issues in Internet Research: International Good Practice and Irish Research Ethics Documents
ERIC Educational Resources Information Center
Felzmann, Heike
2013-01-01
This chapter discusses the main research ethical concerns that arise in internet research and reviews existing research ethical guidance in the Irish context in relation to its application to internet research. The chapter begins with a brief outline of high profile cases in the early history of the internet that highlighted specific emerging…
Soleymani, Mohammad Reza; Garivani, Asieh; Zare-Farashbandi, Firoozeh
2016-06-01
Internet addiction is a typical use of the internet that causes the psychological, social, educational, or occupational problems for the people. Students need the internet more than other people due to their educational or research needs. The rate and type of the internet use may affect their information-seeking behavior too. This study aims to investigate the effect of the internet addiction on the information-seeking behavior of the postgraduate students. This applied study that uses the correlation method. The research population composed of 1149 postgraduate students of Isfahan University of Medical Sciences, of which 284 were selected using the stratified random sampling as the sample. Yang's internet addiction questionnaire and the researcher-developed questionnaire of the information-seeking behavior were used as the data collection instruments. Instrument validity was confirmed by the specialists of librarianship and medical sciences and its reliability was confirmed using the Cronbach's alpha coefficient (0.86). Research data were analyzed using the descriptive statistics (mean and standard deviation) and inferential statistics (independent-t tests, Pearson correlation coefficient, and variance analysis). Based on the findings, there was no sign of internet addiction among the 86.6% of the students. However, 13% of the students were exposed to the internet addiction and only 0.4% of internet addiction was observed among the students. There was no significant difference between the information-seeking behavior of the male and female respondents. There was no sign of the internet addiction in any dimension of the information-seeking behavior of the students. This study showed that there is no relationship between the information-seeking behavior of the students and the age and the rate of the internet use. Promoting the network infrastructures and increasing the internet speed as well as facilitating the use of electronic resources should be prioritized by the officials.
Soleymani, Mohammad Reza; Garivani, Asieh; Zare-Farashbandi, Firoozeh
2016-01-01
Introduction: Internet addiction is a typical use of the internet that causes the psychological, social, educational, or occupational problems for the people. Students need the internet more than other people due to their educational or research needs. The rate and type of the internet use may affect their information-seeking behavior too. This study aims to investigate the effect of the internet addiction on the information-seeking behavior of the postgraduate students. Methods: This applied study that uses the correlation method. The research population composed of 1149 postgraduate students of Isfahan University of Medical Sciences, of which 284 were selected using the stratified random sampling as the sample. Yang’s internet addiction questionnaire and the researcher-developed questionnaire of the information-seeking behavior were used as the data collection instruments. Instrument validity was confirmed by the specialists of librarianship and medical sciences and its reliability was confirmed using the Cronbach’s alpha coefficient (0.86). Research data were analyzed using the descriptive statistics (mean and standard deviation) and inferential statistics (independent-t tests, Pearson correlation coefficient, and variance analysis). Results: Based on the findings, there was no sign of internet addiction among the 86.6% of the students. However, 13% of the students were exposed to the internet addiction and only 0.4% of internet addiction was observed among the students. There was no significant difference between the information-seeking behavior of the male and female respondents. There was no sign of the internet addiction in any dimension of the information-seeking behavior of the students. Conclusion: This study showed that there is no relationship between the information-seeking behavior of the students and the age and the rate of the internet use. Promoting the network infrastructures and increasing the internet speed as well as facilitating the use of electronic resources should be prioritized by the officials. PMID:27482160
Engineering properties of douglas-fir lumber reclaimed from deconstructed buildings
Robert Falk; Derek Maul; Steven Cramer; James Evans; Victoria Herian
2008-01-01
A vast wood resource exists in our Nation's wood-framed building infrastructure. As the buildings in this infrastructure age and are remodeled or removed for redevelopment, the wood framing residing in these buildings has the potential to be recovered for reuse. However, little technical information exists on the residual engineering properties of reclaimed...
Do regions of ALICE matter? Social relationships and data exchanges in the Grid
NASA Astrophysics Data System (ADS)
Widmer, E. D.; Carminati, F.; Grigoras, C.; Viry, G.; Galli Carminati, G.
2012-06-01
Following a previous publication [1], this study aims at investigating the impact of regional affiliations of centres on the organisation of collaboration within the Distributed Computing ALICE infrastructure, based on social networks methods. A self-administered questionnaire was sent to all centre managers about support, email interactions and wished collaborations in the infrastructure. Several additional measures, stemming from technical observations were produced, such as bandwidth, data transfers and Internet Round Trip Time (RTT) were also included. Information for 50 centres were considered (60% response rate). Empirical analysis shows that despite the centralisation on CERN, the network is highly organised by regions. The results are discussed in the light of policy and efficiency issues.
Do regions matter in ALICE?. Social relationships and data exchanges in the Grid
NASA Astrophysics Data System (ADS)
Widmer, E. D.; Viry, G.; Carminati, F.; Galli-Carminati, G.
2012-02-01
This study aims at investigating the impact of regional affiliations of centres on the organisation of collaborations within the Distributed Computing ALICE infrastructure, based on social networks methods. A self-administered questionnaire was sent to all centre managers about support, email interactions and wished collaborations in the infrastructure. Several additional measures, stemming from technical observations were collected, such as bandwidth, data transfers and Internet Round Trip Time (RTT) were also included. Information for 50 centres were considered (about 70% response rate). Empirical analysis shows that despite the centralisation on CERN, the network is highly organised by regions. The results are discussed in the light of policy and efficiency issues.
Deception Using an SSH Honeypot
2017-09-01
the device itself but also the device’s cloud and mobile infrastructure. This increase in unsecured devices connected to the Internet presents...have SSH enabled on their systems without knowledge that this service is running. Computer -security professionals use several techniques to gain...early 2000s. Honeypots are decoy computer systems intended for no other purpose than to collect data on attackers. They gather information about
ERIC Educational Resources Information Center
da Silva, André Constantino; Freire, Fernanda Maria Pereira; de Arruda, Alan Victor Pereira; da Rocha, Heloísa Vieira
2013-01-01
e-Learning environments offer content, such text, audio, video, animations, using the Web infrastructure and they are designed to users interacting with keyboard, mouse and a medium-sized screen. Mobile devices, such as smartphones and tablets, have enough computation power to render Web pages, allowing browsing the Internet and access e-Learning…
ERIC Educational Resources Information Center
Ekufu, ThankGod K.
2012-01-01
Organizations are finding it difficult in today's economy to implement the vast information technology infrastructure required to effectively conduct their business operations. Despite the fact that some of these organizations are leveraging on the computational powers and the cost-saving benefits of computing on the Internet cloud, others…
"To Be or Not to Be:" School Libraries and the Future of Learning
ERIC Educational Resources Information Center
Todd, Ross J.
2010-01-01
School libraries face a challenging future. Substantive claims are being made that they are no longer viable because of the access to vast quantities of information on the Internet and because they are costly infrastructures to maintain because of the increasing cost of print materials as well as the cost of personnel. Research show that students…
Yagos, Walter Onen; Tabo Olok, Geoffrey; Ovuga, Emilio
2017-01-10
Information and communication technologies have become a vital infrastructural asset for use in the retention of rural health workers. However, little is known about the potential influence of ICT use, perceptions of health workers on ICT in healthcare delivery, and contribution of ICT to health care providers' retention in rural and remote areas in rural post-war and conflict situations of northern Uganda. Data from interviews were transcribed, coded and thematically analysed. Participants generally exhibited low confidence, knowledge and low ICT skills. Majority of participants, however, perceived ICT as beneficial in relation to job performance and health care provider retention in rural areas. Common barriers for the implementation and use of ICT in health centres were inadequate ICT knowledge and skills, poor Internet networks, inadequate computers, inadequate power supply, lack of Internet Modems and expensive access to outside computer centres. This qualitative study showed low confidence, poor knowledge and skills in ICT usage but positive perceptions about the benefits and contributions of ICT. These findings suggest the need for specific investment in ICT infrastructural development for health care providers in remote rural areas of northern Uganda.
Regulation of online pharmacy: an Australian perspective.
Bernath, Paul
2003-02-01
This article argues that existing Australian regulations do not adequately cover online pharmacies or Internet advertising of medicines and that existing penalties and sanctions are often ineffective, potentially placing public health and safety at risk. Suggestions are made for future regulatory approaches. It is concluded that as well as an effective program of public education, cautious domestic legislative reform is necessary to ensure specific regulation of Australian online pharmacy practice and Internet advertising of medicines. In addition, the global nature of the Internet demands international co-operation and increased regulator and consumer vigilance.
76 FR 18743 - Commission Information Collection Activities (FERC-603); Comment Request; Extension
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-05
... FERC-603 ``Critical Energy Infrastructure Information'' (OMB No. 1902-0197) is used by the Commission to implement procedures for gaining access to critical energy infrastructure information (CEII) that... information about ``existing or proposed critical infrastructure that (i) relates to the production...
Research on Internet-Supported Learning: A Review
ERIC Educational Resources Information Center
Bekele, Teklu Abate; Menchaca, Michael Paul
2008-01-01
How did the Internet affect learning in higher education? What methodological and theoretical issues characterized research on Internet-Supported Learning (ISL)? What implications existed for future research? A constant comparative, qualitative analysis of 29 studies indicated grade achievement was the prime measure of effectiveness in ISL…
Infrastructure Commons in Economic Perspective
NASA Astrophysics Data System (ADS)
Frischmann, Brett M.
This chapter briefly summarizes a theory (developed in substantial detail elsewhere)1 that explains why there are strong economic arguments for managing and sustaining infrastructure resources in an openly accessible manner. This theory facilitates a better understanding of two related issues: how society benefits from infrastructure resources and how decisions about how to manage or govern infrastructure resources affect a wide variety of public and private interests. The key insights from this analysis are that infrastructure resources generate value as inputs into a wide range of productive processes and that the outputs from these processes are often public goods and nonmarket goods that generate positive externalities that benefit society as a whole. Managing such resources in an openly accessible manner may be socially desirable from an economic perspective because doing so facilitates these downstream productive activities. For example, managing the Internet infrastructure in an openly accessible manner facilitates active citizen involvement in the production and sharing of many different public and nonmarket goods. Over the last decade, this has led to increased opportunities for a wide range of citizens to engage in entrepreneurship, political discourse, social network formation, and community building, among many other activities. The chapter applies these insights to the network neutrality debate and suggests how the debate might be reframed to better account for the wide range of private and public interests at stake.
Data Stewardship in the Ocean Sciences Needs to Include Physical Samples
NASA Astrophysics Data System (ADS)
Carter, M.; Lehnert, K.
2016-02-01
Across the Ocean Sciences, research involves the collection and study of samples collected above, at, and below the seafloor, including but not limited to rocks, sediments, fluids, gases, and living organisms. Many domains in the Earth Sciences have recently expressed the need for better discovery, access, and sharing of scientific samples and collections (EarthCube End-User Domain workshops, 2012 and 2013, http://earthcube.org/info/about/end-user-workshops), as has the US government (OSTP Memo, March 2014). iSamples (Internet of Samples in the Earth Sciences) is a Research Coordination Network within the EarthCube program that aims to advance the use of innovative cyberinfrastructure to support and advance the utility of physical samples and sample collections for science and ensure reproducibility of sample-based data and research results. iSamples strives to build, grow, and foster a new community of practice, in which domain scientists, curators of sample repositories and collections, computer and information scientists, software developers and technology innovators engage in and collaborate on defining, articulating, and addressing the needs and challenges of physical samples as a critical component of digital data infrastructure. A primary goal of iSamples is to deliver a community-endorsed set of best practices and standards for the registration, description, identification, and citation of physical specimens and define an actionable plan for implementation. iSamples conducted a broad community survey about sample sharing and has created 5 different working groups to address the different challenges of developing the internet of samples - from metadata schemas and unique identifiers to an architecture for a shared cyberinfrastructure to manage collections, to digitization of existing collections, to education, and ultimately to establishing the physical infrastructure that will ensure preservation and access of the physical samples. Repositories that curate marine sediment cores and dredge samples from the oceanic crust are participating in iSamples, but many other samples collected in the Ocean sciences are not yet represented. This presentation aims to engage a wider spectrum of Ocean scientists and sample curators in iSamples.
Chiu, Chia-Nan; Chen, Huei-Huang
2016-01-01
Many studies on the significance of knowledge management (KM) in the business world have been performed in recent years. Public sector KM is a research area of growing importance. Findings show that few authors specialize in the field and there are several obstacles to developing a cohesive body of literature. In order to examine their effect of the knowledge management capability [which consists of knowledge infrastructure capability (KIC) and knowledge process capability (KPC)] and organizational effectiveness (OE), this study conducted structural equation modeling to test the hypotheses with 302 questionnaires of Taipei Water Department staffs in Taiwan. In exploring the model developed in this study, the findings show that there exists a significant relationship between KPC and OE, while KIC and OE are insignificant. These results are different from earlier findings in the literature. Furthermore, this research proposed organizational commitment (OC) as the mediator role. The findings suggest that only OC has significant mediating effects between KPC and OE, whereas this is not the case for KIC and OE. It is noteworthy that the above findings inspired managers, in addition to construct the knowledge infrastructure more than focus on social media tools on the Internet, which engage knowledge workers in "peer-to-peer" knowledge sharing across organizational and company boundaries. The results are likely to help organizations (particularly public utilities) sharpen their knowledge management strategies. Academic and practical implications were drawn based on the findings.
Interoperability and security in wireless body area network infrastructures.
Warren, Steve; Lebak, Jeffrey; Yao, Jianchu; Creekmore, Jonathan; Milenkovic, Aleksandar; Jovanov, Emil
2005-01-01
Wireless body area networks (WBANs) and their supporting information infrastructures offer unprecedented opportunities to monitor state of health without constraining the activities of a wearer. These mobile point-of-care systems are now realizable due to the convergence of technologies such as low-power wireless communication standards, plug-and-play device buses, off-the-shelf development kits for low-power microcontrollers, handheld computers, electronic medical records, and the Internet. To increase acceptance of personal monitoring technology while lowering equipment cost, advances must be made in interoperability (at both the system and device levels) and security. This paper presents an overview of WBAN infrastructure work in these areas currently underway in the Medical Component Design Laboratory at Kansas State University (KSU) and at the University of Alabama in Huntsville (UAH). KSU efforts include the development of wearable health status monitoring systems that utilize ISO/IEEE 11073, Bluetooth, Health Level 7, and OpenEMed. WBAN efforts at UAH include the development of wearable activity and health monitors that incorporate ZigBee-compliant wireless sensor platforms with hardware-level encryption and the TinyOS development environment. WBAN infrastructures are complex, requiring many functional support elements. To realize these infrastructures through collaborative efforts, organizations such as KSU and UAH must define and utilize standard interfaces, nomenclature, and security approaches.
BioVeL: a virtual laboratory for data analysis and modelling in biodiversity science and ecology.
Hardisty, Alex R; Bacall, Finn; Beard, Niall; Balcázar-Vargas, Maria-Paula; Balech, Bachir; Barcza, Zoltán; Bourlat, Sarah J; De Giovanni, Renato; de Jong, Yde; De Leo, Francesca; Dobor, Laura; Donvito, Giacinto; Fellows, Donal; Guerra, Antonio Fernandez; Ferreira, Nuno; Fetyukova, Yuliya; Fosso, Bruno; Giddy, Jonathan; Goble, Carole; Güntsch, Anton; Haines, Robert; Ernst, Vera Hernández; Hettling, Hannes; Hidy, Dóra; Horváth, Ferenc; Ittzés, Dóra; Ittzés, Péter; Jones, Andrew; Kottmann, Renzo; Kulawik, Robert; Leidenberger, Sonja; Lyytikäinen-Saarenmaa, Päivi; Mathew, Cherian; Morrison, Norman; Nenadic, Aleksandra; de la Hidalga, Abraham Nieva; Obst, Matthias; Oostermeijer, Gerard; Paymal, Elisabeth; Pesole, Graziano; Pinto, Salvatore; Poigné, Axel; Fernandez, Francisco Quevedo; Santamaria, Monica; Saarenmaa, Hannu; Sipos, Gergely; Sylla, Karl-Heinz; Tähtinen, Marko; Vicario, Saverio; Vos, Rutger Aldo; Williams, Alan R; Yilmaz, Pelin
2016-10-20
Making forecasts about biodiversity and giving support to policy relies increasingly on large collections of data held electronically, and on substantial computational capability and capacity to analyse, model, simulate and predict using such data. However, the physically distributed nature of data resources and of expertise in advanced analytical tools creates many challenges for the modern scientist. Across the wider biological sciences, presenting such capabilities on the Internet (as "Web services") and using scientific workflow systems to compose them for particular tasks is a practical way to carry out robust "in silico" science. However, use of this approach in biodiversity science and ecology has thus far been quite limited. BioVeL is a virtual laboratory for data analysis and modelling in biodiversity science and ecology, freely accessible via the Internet. BioVeL includes functions for accessing and analysing data through curated Web services; for performing complex in silico analysis through exposure of R programs, workflows, and batch processing functions; for on-line collaboration through sharing of workflows and workflow runs; for experiment documentation through reproducibility and repeatability; and for computational support via seamless connections to supporting computing infrastructures. We developed and improved more than 60 Web services with significant potential in many different kinds of data analysis and modelling tasks. We composed reusable workflows using these Web services, also incorporating R programs. Deploying these tools into an easy-to-use and accessible 'virtual laboratory', free via the Internet, we applied the workflows in several diverse case studies. We opened the virtual laboratory for public use and through a programme of external engagement we actively encouraged scientists and third party application and tool developers to try out the services and contribute to the activity. Our work shows we can deliver an operational, scalable and flexible Internet-based virtual laboratory to meet new demands for data processing and analysis in biodiversity science and ecology. In particular, we have successfully integrated existing and popular tools and practices from different scientific disciplines to be used in biodiversity and ecological research.
Agility: Agent - Ility Architecture
2002-10-01
existing and emerging standards (e.g., distributed objects, email, web, search engines , XML, Java, Jini). Three agent system components resulted from...agents and other Internet resources and operate over the web (AgentGram), a yellow pages service that uses Internet search engines to locate XML ads for agents and other Internet resources (WebTrader).
78 FR 38227 - Connect America Fund
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-26
... different per- location support amounts based on the existing level of Internet access ($550 for homes with low-speed Internet access and $775, as in the first round, for homes with only dial-up access), and... Internet access. We adopt a process for challenges to the eligibility of specific areas where price cap...
Shao, Yao-Jun; Zheng, Tong; Wang, Yan-Qiu; Liu, Ling; Chen, Yan; Yao, Ying-Shui
2018-01-01
With the development of economy and technology, the Internet is becoming more and more popular. Internet addiction has gradually become a serious issue in public health worldwide. The number of Internet users in China has reached 731 million, with an estimated 24 million adolescents determined as having Internet addiction. In this meta-analysis, we attempted to estimate the prevalence of Internet addiction among College Students in the People's Republic of China in order to improve the mental health level of college students and provide evidence for the prevention of Internet addiction. Eligible articles about the prevalence of Internet addiction among college students in China published between 2006 and 2017 were retrieved from online Chinese periodicals, the full-text databases of Wan Fang, VIP, and the Chinese National Knowledge Infrastructure, as well as PubMed. Stata 11.0 was used to perform the analyses. A total of 26 papers were included in the analyses. The overall sample size was 38,245, with 4573 diagnosed with Internet addiction. The pooled detection rate of Internet addiction was 11% (95% confidence interval [CI] 9-13%) among college students in China. The detection rate was higher in male students (16%) than female students (8%). The Internet addiction detection rate was 11% (95% CI 8-14%) in southern areas, 11% (95% CI 7-14%) in northern areas, 13% (95% CI 8-18%) in eastern areas and 9% (95% CI 8-11%) in the mid-western areas. According to different scales, the Internet addiction detection rate was 11% (95% CI 8-15%) using the Young scale and 9% (95% CI 6-11%) using the Chen scale respectively. Cumulative meta analysis showed that the detection rate had a slight upward trend and gradually stabilized in the last 3 years. The pooled Internet addiction detection rate of Chinese college students in out study was 11%, which is higher than in some other countries and strongly demonstrates a worrisome situation. Effective measures should be taken to prevent further Internet addiction and improve the current situation.
Rethinking Mobile Telephony with the IMP
2011-01-01
in the telephony industry, and portions of it such as SS7 or SCTP signaling are packet-switched, deployed mobile telephony access infrastructure is...deployment of wireless LAN technology raises the question of how a mobile telephony system might instead be architected to use wireless LAN access ...and wireless access points has made universal Internet access increasingly convenient. There are clearly barriers to this vision of accessing a
Cyberspace and Posse Comitatus: Legal Implications of a Borderless Domain
2010-03-01
technology infrastructures, including the Internet , telecommunications networks, computer systems, and embedded processors and controllers.” 9 This...the people, and stopped just short of shutting down economic markets . 2 Though never admitted, all indications point to a coordinated attack from...control orders transit many of the same, generally commercially-owned, routers, switches, computers, and wires, each with the goal of passing information
Active Computer Network Defense: An Assessment
2001-04-01
sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center
A Regression Analysis of Elementary Students' ICT Usage vis-à-vis Access to Technology in Singapore
ERIC Educational Resources Information Center
Tay, Lee Yong; Nair, Shanthi Suraj; Lim, Cher Ping
2017-01-01
This paper explores the relationship among ICT infrastructure (i.e., computing devices and Internet), one-to-one computing program and student ICT activities in school. It also looks into the differences of how ICT is being used in the teaching of English, mathematics and science at the elementary school level in relation to the availability of…
High Speed Internet Access Using Cellular Infrastructure
2004-09-01
62 Figure 50 Initial Connection from Laptop to Mobile Phone via Bluetooth . ....................64 Figure 51 Mobile Phone Discovered by the Laptop...tailor them to their needs. Other hardware improvements include Infrared and Bluetooth capabilities for external connectivity with a computer, as well...mobile phone can communicate with a computer through a phone’s vendor specific cable, Infrared or Bluetooth . The latter two depend on both devices
ERIC Educational Resources Information Center
Lennett, Benjamin; Morris, Sarah J.; Byrum, Greta
2012-01-01
Based on a request for information (RFI) submitted to The University Community Next Generation Innovation Project (Gig.U), the paper describes a model for universities to develop next generation broadband infrastructure in their communities. In the our view universities can play a critical role in spurring next generation networks into their…
Transportation of Large Wind Components: A Review of Existing Geospatial Data
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mooney, Meghan; Maclaurin, Galen
2016-09-01
This report features the geospatial data component of a larger project evaluating logistical and infrastructure requirements for transporting oversized and overweight (OSOW) wind components. The goal of the larger project was to assess the status and opportunities for improving the infrastructure and regulatory practices necessary to transport wind turbine towers, blades, and nacelles from current and potential manufacturing facilities to end-use markets. The purpose of this report is to summarize existing geospatial data on wind component transportation infrastructure and to provide a data gap analysis, identifying areas for further analysis and data collection.
Institutional Transformation Model
DOE Office of Scientific and Technical Information (OSTI.GOV)
2015-10-19
Reducing the energy consumption of large institutions with dozens to hundreds of existing buildings while maintaining and improving existing infrastructure is a critical economic and environmental challenge. SNL's Institutional Transformation (IX) work integrates facilities and infrastructure sustainability technology capabilities and collaborative decision support modeling approaches to help facilities managers at Sandia National Laboratories (SNL) simulate different future energy reduction strategies and meet long term energy conservation goals.
Tateno, Masaru; Teo, Alan R; Kato, Takahiro A
2018-05-02
As the number of the internet users becomes higher-83.5% of the Japanese population at the end of 2016 with more than half of them (57.9%) accessing the internet through their smartphones 1 -besides problematic internet use or internet addiction, 2 smartphone addiction may be becoming more serious too. This article is protected by copyright. All rights reserved.
The Effects of an Internet2 Implementation at the Food and Drug Administration: A Case Study
ERIC Educational Resources Information Center
Chen, Melinda Elena
2010-01-01
The purpose of this study is to determine the potential effects of an Internet2 implementation at the FDA. Because Internet2 does not currently exist in the FDA, research will be made to compare the tools used today to transmit data to what may develop with an Internet2 presence. These effects will be assessed from the point-of-view of the…
Geographic Information Systems and Web Page Development
NASA Technical Reports Server (NTRS)
Reynolds, Justin
2004-01-01
The Facilities Engineering and Architectural Branch is responsible for the design and maintenance of buildings, laboratories, and civil structures. In order to improve efficiency and quality, the FEAB has dedicated itself to establishing a data infrastructure based on Geographic Information Systems, GIs. The value of GIS was explained in an article dating back to 1980 entitled "Need for a Multipurpose Cadastre which stated, "There is a critical need for a better land-information system in the United States to improve land-conveyance procedures, furnish a basis for equitable taxation, and provide much-needed information for resource management and environmental planning." Scientists and engineers both point to GIS as the solution. What is GIS? According to most text books, Geographic Information Systems is a class of software that stores, manages, and analyzes mapable features on, above, or below the surface of the earth. GIS software is basically database management software to the management of spatial data and information. Simply put, Geographic Information Systems manage, analyze, chart, graph, and map spatial information. At the outset, I was given goals and expectations from my branch and from my mentor with regards to the further implementation of GIs. Those goals are as follows: (1) Continue the development of GIS for the underground structures. (2) Extract and export annotated data from AutoCAD drawing files and construct a database (to serve as a prototype for future work). (3) Examine existing underground record drawings to determine existing and non-existing underground tanks. Once this data was collected and analyzed, I set out on the task of creating a user-friendly database that could be assessed by all members of the branch. It was important that the database be built using programs that most employees already possess, ruling out most AutoCAD-based viewers. Therefore, I set out to create an Access database that translated onto the web using Internet Explorer as the foundation. After some programming, it was possible to view AutoCAD files and other GIS-related applications on Internet Explorer, while providing the user with a variety of editing commands and setting options. I was also given the task of launching a divisional website using Macromedia Flash and other web- development programs.
The internet of things for personalized health.
Schreier, Günter
2014-01-01
Advances in information and communications technologies (ICT) enable new personalized health care concepts which are often characterized by four "P" terms, i.e. personalized, predictive, preventive and participatory. However, real world implementations of the complete 4P spectrum hardly exist today. The Internet of Things (IoT) has been defined as an extension to the current Internet that enables pervasive communication between the physical and the virtual world. Smart devices and enabling elements like Near Field Communication (NFC) and Radio Frequency Identification (RFID) technology already exist and increasingly will be a mainstream element of our lives. This future vision paper attempts to assess if and how the Internet of Things for personalized health (IoT4pH) can help to facilitate the 4P healthcare paradigm and discusses related challenges and opportunities.
Cascading failure in scale-free networks with tunable clustering
NASA Astrophysics Data System (ADS)
Zhang, Xue-Jun; Gu, Bo; Guan, Xiang-Min; Zhu, Yan-Bo; Lv, Ren-Li
2016-02-01
Cascading failure is ubiquitous in many networked infrastructure systems, such as power grids, Internet and air transportation systems. In this paper, we extend the cascading failure model to a scale-free network with tunable clustering and focus on the effect of clustering coefficient on system robustness. It is found that the network robustness undergoes a nonmonotonic transition with the increment of clustering coefficient: both highly and lowly clustered networks are fragile under the intentional attack, and the network with moderate clustering coefficient can better resist the spread of cascading. We then provide an extensive explanation for this constructive phenomenon via the microscopic point of view and quantitative analysis. Our work can be useful to the design and optimization of infrastructure systems.
Internet of things for an age-friendly healthcare.
Konstantinidis, Evdokimos I; Bamparopoulos, Giorgos; Billis, Antonis; Bamidis, Panagiotis D
2015-01-01
In healthcare applications a large cohort of recent implementations utilises IoT-oriented infrastructures (XMPP) as well as smart mobile devices as communication gateways. IoT characteristi Communication/Connectivity, Pervasive Computing and Ambient Intelligence, are all highly related to Active and Healthy Aging environments. This paper presents a new idea, that of IoT enabled devices which are directly connected to the IoT (a glucose meter is used as an example herein), complying with the XMPP messaging protocol and the incorporation of a recently released Controller Application Communication (CAC) framework for distributed, cross-platform communication. A web based exergaming platform and a disease management tool, provide the vehicles for the demonstration of the feasibility and the successful implementation and integration of the aforementioned infrastructure.
Continued Use of a Chinese Online Portal: An Empirical Study
ERIC Educational Resources Information Center
Shih, Hung-Pin
2008-01-01
The evolution of the internet has made online portals a popular means of surfing the internet. In internet commerce, understanding the post-adoption behaviour of users of online portals can help enterprises to attract new users and retain existing customers. For predicting continued use intentions, this empirical study focused on applying and…
44 CFR 201.7 - Tribal Mitigation Plans.
Code of Federal Regulations, 2012 CFR
2012-10-01
... buildings, infrastructure, and critical facilities located in the identified hazard areas; (B) An estimate... particular emphasis on new and existing buildings and infrastructure. (iii) An action plan describing how the...
Open source system OpenVPN in a function of Virtual Private Network
NASA Astrophysics Data System (ADS)
Skendzic, A.; Kovacic, B.
2017-05-01
Using of Virtual Private Networks (VPN) can establish high security level in network communication. VPN technology enables high security networking using distributed or public network infrastructure. VPN uses different security and managing rules inside networks. It can be set up using different communication channels like Internet or separate ISP communication infrastructure. VPN private network makes security communication channel over public network between two endpoints (computers). OpenVPN is an open source software product under GNU General Public License (GPL) that can be used to establish VPN communication between two computers inside business local network over public communication infrastructure. It uses special security protocols and 256-bit Encryption and it is capable of traversing network address translators (NATs) and firewalls. It allows computers to authenticate each other using a pre-shared secret key, certificates or username and password. This work gives review of VPN technology with a special accent on OpenVPN. This paper will also give comparison and financial benefits of using open source VPN software in business environment.
NASA Astrophysics Data System (ADS)
Serbu, Sabina; Rivière, Étienne; Felber, Pascal
The emergence of large-scale distributed applications based on many-to-many communication models, e.g., broadcast and decentralized group communication, has an important impact on the underlying layers, notably the Internet routing infrastructure. To make an effective use of network resources, protocols should both limit the stress (amount of messages) on each infrastructure entity like routers and links, and balance as much as possible the load in the network. Most protocols use application-level metrics such as delays to improve efficiency of content dissemination or routing, but the extend to which such application-centric optimizations help reduce and balance the load imposed to the infrastructure is unclear. In this paper, we elaborate on the design of such network-friendly protocols and associated metrics. More specifically, we investigate random-based gossip dissemination. We propose and evaluate different ways of making this representative protocol network-friendly while keeping its desirable properties (robustness and low delays). Simulations of the proposed methods using synthetic and real network topologies convey and compare their abilities to reduce and balance the load while keeping good performance.
Cloudweaver: Adaptive and Data-Driven Workload Manager for Generic Clouds
NASA Astrophysics Data System (ADS)
Li, Rui; Chen, Lei; Li, Wen-Syan
Cloud computing denotes the latest trend in application development for parallel computing on massive data volumes. It relies on clouds of servers to handle tasks that used to be managed by an individual server. With cloud computing, software vendors can provide business intelligence and data analytic services for internet scale data sets. Many open source projects, such as Hadoop, offer various software components that are essential for building a cloud infrastructure. Current Hadoop (and many others) requires users to configure cloud infrastructures via programs and APIs and such configuration is fixed during the runtime. In this chapter, we propose a workload manager (WLM), called CloudWeaver, which provides automated configuration of a cloud infrastructure for runtime execution. The workload management is data-driven and can adapt to dynamic nature of operator throughput during different execution phases. CloudWeaver works for a single job and a workload consisting of multiple jobs running concurrently, which aims at maximum throughput using a minimum set of processors.
Big-BOE: Fusing Spanish Official Gazette with Big Data Technology.
Basanta-Val, Pablo; Sánchez-Fernández, Luis
2018-06-01
The proliferation of new data sources, stemmed from the adoption of open-data schemes, in combination with an increasing computing capacity causes the inception of new type of analytics that process Internet of things with low-cost engines to speed up data processing using parallel computing. In this context, the article presents an initiative, called BIG-Boletín Oficial del Estado (BOE), designed to process the Spanish official government gazette (BOE) with state-of-the-art processing engines, to reduce computation time and to offer additional speed up for big data analysts. The goal of including a big data infrastructure is to be able to process different BOE documents in parallel with specific analytics, to search for several issues in different documents. The application infrastructure processing engine is described from an architectural perspective and from performance, showing evidence on how this type of infrastructure improves the performance of different types of simple analytics as several machines cooperate.
Blended Learning Implementation in “Guru Pembelajar” Program
NASA Astrophysics Data System (ADS)
Mahdan, D.; Kamaludin, M.; Wendi, H. F.; Simanjuntak, M. V.
2018-02-01
The rapid development of information and communication technology (ICT), especially the internet, computers and communication devices requires the innovation in learning; one of which is Blended Learning. The concept of Blended Learning is the mixing of face-to-face learning models by learning online. Blended learning used in the learner teacher program organized by the Indonesian department of education and culture that a program to improve the competence of teachers, called “Guru Pembelajar” (GP). Blended learning model is perfect for learning for teachers, due to limited distance and time because online learning can be done anywhere and anytime. but the problems that arise from the implementation of this activity are many teachers who do not follow the activities because teachers, especially the elderly do not want to follow the activities because they cannot use computers and the internet, applications that are difficult to understand by participants, unstable internet connection in the area where the teacher lives and facilities and infrastructure are not adequate.
Low-earth-orbit Satellite Internet Protocol Communications Concept and Design
NASA Technical Reports Server (NTRS)
Slywezak, Richard A.
2004-01-01
This report presents a design concept for a low-Earth-orbit end-to-end Internet-Protocol- (IP-) based mission. The goal is to maintain an up-to-date communications infrastructure that makes communications seamless with the protocols used in terrestrial computing. It is based on the premise that the use of IPs will permit greater interoperability while also reducing costs and providing users the ability to retrieve data directly from the satellite. However, implementing an IP-based solution also has a number of challenges, since wireless communications have different characteristics than wired communications. This report outlines the design of a low-Earth-orbit end-to-end IP-based mission; the ideas and concepts of Space Internet architectures and networks are beyond the scope of this document. The findings of this report show that an IP-based mission is plausible and would provide benefits to the user community, but the outstanding issues must be resolved before a design can be implemented.
Silva-Lopes, Victor W; Monteiro-Leal, Luiz H
2003-07-01
The development of new technology and the possibility of fast information delivery by either Internet or Intranet connections are changing education. Microanatomy education depends basically on the correct interpretation of microscopy images by students. Modern microscopes coupled to computers enable the presentation of these images in a digital form by creating image databases. However, the access to this new technology is restricted entirely to those living in cities and towns with an Information Technology (IT) infrastructure. This study describes the creation of a free Internet histology database composed by high-quality images and also presents an inexpensive way to supply it to a greater number of students through Internet/Intranet connections. By using state-of-the-art scientific instruments, we developed a Web page (http://www2.uerj.br/~micron/atlas/atlasenglish/index.htm) that, in association with a multimedia microscopy laboratory, intends to help in the reduction of the IT educational gap between developed and underdeveloped regions. Copyright 2003 Wiley-Liss, Inc.
Web N.0, the New Development Trend of Internet
NASA Astrophysics Data System (ADS)
Sun, Zhiguo; Wang, Wensheng
This article analyzes the Internet basic theory, the network foundation environment and the user behavior change and so on, Which analyzes the development tendency of existing partial Internet products in the future Internet environment. The article also hot on the concept of cloud computing, Demonstrates the relation between Cloud Computing and Web 2.0 from the angle of Cloud-based end-user applications, The possibly killing application in the future was discussed.
44 CFR 201.6 - Local Mitigation Plans.
Code of Federal Regulations, 2014 CFR
2014-10-01
..., infrastructure, and critical facilities located in the identified hazard areas; (B) An estimate of the potential... effects of each hazard, with particular emphasis on new and existing buildings and infrastructure. All...
44 CFR 201.6 - Local Mitigation Plans.
Code of Federal Regulations, 2012 CFR
2012-10-01
..., infrastructure, and critical facilities located in the identified hazard areas; (B) An estimate of the potential... effects of each hazard, with particular emphasis on new and existing buildings and infrastructure. All...
44 CFR 201.6 - Local Mitigation Plans.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., infrastructure, and critical facilities located in the identified hazard areas; (B) An estimate of the potential... effects of each hazard, with particular emphasis on new and existing buildings and infrastructure. All...
More Bang for the Buck: Integrating Green Infrastructure into Existing Public Works Projects
shares lessons learned from municipal and county officials experienced in coordinating green infrastructure applications with scheduled street maintenance, park improvements, and projects on public sites.
ERIC Educational Resources Information Center
Yoose, Becky
2010-01-01
With the growth of Web 2.0 library intranets in recent years, many libraries are leaving behind legacy, first-generation intranets. As Web 2.0 intranets multiply and mature, how will traditional intranet best practices--especially in the areas of planning, implementation, and evaluation--translate into an existing Web 2.0 intranet infrastructure?…
Engineering Infrastructures: Problems of Safety and Security in the Russian Federation
NASA Astrophysics Data System (ADS)
Makhutov, Nikolay A.; Reznikov, Dmitry O.; Petrov, Vitaly P.
Modern society cannot exist without stable and reliable engineering infrastructures (EI), whose operation is vital for any national economy. These infrastructures include energy, transportation, water and gas supply systems, telecommunication and cyber systems, etc. Their performance is commensurate with storing and processing huge amounts of information, energy and hazardous substances. Ageing infrastructures are deteriorating — with operating conditions declining from normal to emergency and catastrophic. The complexity of engineering infrastructures and their interdependence with other technical systems makes them vulnerable to emergency situations triggered by natural and manmade catastrophes or terrorist attacks.
The security concern on internet banking adoption among Malaysian banking customers.
Sudha, Raju; Thiagarajan, A S; Seetharaman, A
2007-01-01
The existing literatures highlights that the security is the primary factor which determines the adoption of Internet banking technology. The secondary information on Internet banking development in Malaysia shows a very slow growth rate. Hence, this study aims to study the banking customers perception towards security concern and Internet banking adoption through the information collected from 150 sample respondents. The data analysis reveals that the customers have much concern about security and privacy issue in adoption of Internet banking, whether the customers are adopted Internet banking or not. Hence, it infers that to popularize Internet banking system there is a need for improvement in security and privacy issue among the banking customers.
Federation for a Secure Enterprise
2016-09-10
12 October 2005 e. RFC Internet X.509 Public Key Infrastructure: Certification Path Building, 2005 f. Public Key Cryptography Standard, PKCS #1...v2.2: RSA Cryptography Standard, RSA Laboratories, October 27, 2012 g. PKCS#12 format PKCS #12 v1.0: Personal Information Exchange Syntax Standard, RSA...ClientHello padding extension, 2015-02-17 f. Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier
Education, Emerging Information Technology, and the NSF
NASA Astrophysics Data System (ADS)
Wink, Donald J.
1998-11-01
The National Science Foundation was the original organizational leader for the Internet, and it is still engaged in funding research and infrastructure related to the use of networked information. As it is written in the strategic plan for the Directorate for Computer and Information Science and Engineering, "These technologies promise to have at least as great an impact as did the invention of written language thousands of years ago."
Fighting Back: New Media and Military Operations
2008-11-01
combustible mix of 24/7 cable news, call-in radio and television programs, Internet bloggers and online websites, cell phones and iPods.”4 But, of...even individuals to affect strategic outcomes with minimal information infrastructure and little capital expenditure. Anyone with a camera cell phone and...areas of underdeveloped countries. The cell phone , however, as a means of mobile technology, is increasingly available worldwide and deserves discussion
Metadata squared: enhancing its usability for volunteered geographic information and the GeoWeb
Poore, Barbara S.; Wolf, Eric B.; Sui, Daniel Z.; Elwood, Sarah; Goodchild, Michael F.
2013-01-01
The Internet has brought many changes to the way geographic information is created and shared. One aspect that has not changed is metadata. Static spatial data quality descriptions were standardized in the mid-1990s and cannot accommodate the current climate of data creation where nonexperts are using mobile phones and other location-based devices on a continuous basis to contribute data to Internet mapping platforms. The usability of standard geospatial metadata is being questioned by academics and neogeographers alike. This chapter analyzes current discussions of metadata to demonstrate how the media shift that is occurring has affected requirements for metadata. Two case studies of metadata use are presented—online sharing of environmental information through a regional spatial data infrastructure in the early 2000s, and new types of metadata that are being used today in OpenStreetMap, a map of the world created entirely by volunteers. Changes in metadata requirements are examined for usability, the ease with which metadata supports coproduction of data by communities of users, how metadata enhances findability, and how the relationship between metadata and data has changed. We argue that traditional metadata associated with spatial data infrastructures is inadequate and suggest several research avenues to make this type of metadata more interactive and effective in the GeoWeb.
Delivering integrated HAZUS-MH flood loss analyses and flood inundation maps over the Web.
Hearn, Paul P; Longenecker, Herbert E; Aguinaldo, John J; Rahav, Ami N
2013-01-01
Catastrophic flooding is responsible for more loss of life and damages to property than any other natural hazard. Recently developed flood inundation mapping technologies make it possible to view the extent and depth of flooding on the land surface over the Internet; however, by themselves these technologies are unable to provide estimates of losses to property and infrastructure. The Federal Emergency Management Agency's (FEMA's) HAZUS-MH software is extensively used to conduct flood loss analyses in the United States, providing a nationwide database of population and infrastructure at risk. Unfortunately, HAZUS-MH requires a dedicated Geographic Information System (GIS) workstation and a trained operator, and analyses are not adapted for convenient delivery over the Web. This article describes a cooperative effort by the US Geological Survey (USGS) and FEMA to make HAZUS-MH output GIS and Web compatible and to integrate these data with digital flood inundation maps in USGS's newly developed Inundation Mapping Web Portal. By running the computationally intensive HAZUS-MH flood analyses offline and converting the output to a Web-GIS compatible format, detailed estimates of flood losses can now be delivered to anyone with Internet access, thus dramatically increasing the availability of these forecasts to local emergency planners and first responders.
Delivering integrated HAZUS-MH flood loss analyses and flood inundation maps over the Web
Hearn,, Paul P.; Longenecker, Herbert E.; Aguinaldo, John J.; Rahav, Ami N.
2013-01-01
Catastrophic flooding is responsible for more loss of life and damages to property than any other natural hazard. Recently developed flood inundation mapping technologies make it possible to view the extent and depth of flooding on the land surface over the Internet; however, by themselves these technologies are unable to provide estimates of losses to property and infrastructure. The Federal Emergency Management Agency’s (FEMA's) HAZUS-MH software is extensively used to conduct flood loss analyses in the United States, providing a nationwide database of population and infrastructure at risk. Unfortunately, HAZUS-MH requires a dedicated Geographic Information System (GIS) workstation and a trained operator, and analyses are not adapted for convenient delivery over the Web. This article describes a cooperative effort by the US Geological Survey (USGS) and FEMA to make HAZUS-MH output GIS and Web compatible and to integrate these data with digital flood inundation maps in USGS’s newly developed Inundation Mapping Web Portal. By running the computationally intensive HAZUS-MH flood analyses offline and converting the output to a Web-GIS compatible format, detailed estimates of flood losses can now be delivered to anyone with Internet access, thus dramatically increasing the availability of these forecasts to local emergency planners and first responders.
The Internet: Problem Solving Friend or Foe?
ERIC Educational Resources Information Center
Wanko, Jeffrey J.
2007-01-01
Teaching problem solving to today's students requires teachers to be aware of the ways their students may use the internet as both a resource and as a tool for solving problems. In this article, I describe some of my own experiences in teaching problem solving to preservice teachers and how the existence of the internet has affected the ways in…
The Good, the Bad, and the Ugly: Internet Review Sites.
ERIC Educational Resources Information Center
Cooke, Alison; McNab, Alison; Anagnostelis, Betsy
In response to the increased use of the Internet for information access and dissemination, and the explosion in the availability of resources which may be of interest to end-users, a number of services are now available which provide access to selected and evaluated resources. Many existing Internet search tools are inadequate due to the high rate…
Countermeasure Analysis on Internet Logistics
NASA Astrophysics Data System (ADS)
Teng, Shao Ying; Li, Xiao Jun; Zhao, Zhi; Qin, Peng Lei; Lu, Ya Ya
2018-06-01
The rapid development of Internet technology has caused a series of industrial revolution, which has provided strong impetus for economic development. The Internet + concept puts forward the deep integration between the Internet and traditional industries, which points out the direction for the development of various industries. For the logistics industry, "Internet +" provides a new way of transformation, and intelligent logistics, smart logistics and green logistics bring new business value to the logistics industry. This paper analyzes the current situation of the logistics industry in the context of Internet +, finds out the existing problems, and proposes corresponding solutions to provide the impetus for further development of the logistics industry.
Trouble with the Commercial: Internets Theorized and Used
NASA Astrophysics Data System (ADS)
Paasonen, Susanna
If a future archeologist were to reconstruct internet cultures of the 1990s on the basis of available research literature written during the decade in question, what shape would the resulting “internet” take? How would it correspond to the everyday uses of the internet, or public discourses concerning the medium? Taking these hypothetical questions as starting point, this article investigates some of the gaps between the Internets theorized and used since the 1990s. I argue that premises concerning the internet as a communication medium, as articulated in existing research literature have given rise to ideals and norms with a continuing legacy in internet research.
Hackländer, T; Kleber, K; Schneider, H; Demabre, N; Cramer, B M
2004-08-01
To build an infrastructure that enables radiologists on-call and external users a teleradiological access to the HTML-based image distribution system inside the hospital via internet. In addition, no investment costs should arise on the user side and the image data should be sent renamed using cryptographic techniques. A pure HTML-based system manages the image distribution inside the hospital, with an open source project extending this system through a secure gateway outside the firewall of the hospital. The gateway handles the communication between the external users and the HTML server within the network of the hospital. A second firewall is installed between the gateway and the external users and builds up a virtual private network (VPN). A connection between the gateway and the external user is only acknowledged if the computers involved authenticate each other via certificates and the external users authenticate via a multi-stage password system. All data are transferred encrypted. External users get only access to images that have been renamed to a pseudonym by means of automated processing before. With an ADSL internet access, external users achieve an image load frequency of 0.4 CT images per second. More than 90 % of the delay during image transfer results from security checks within the firewalls. Data passing the gateway induce no measurable delay. Project goals were realized by means of an infrastructure that works vendor independently with any HTML-based image distribution systems. The requirements of data security were realized using state-of-the-art web techniques. Adequate access and transfer speed lead to a widespread acceptance of the system on the part of external users.
Defending networks against denial-of-service attacks
NASA Astrophysics Data System (ADS)
Gelenbe, Erol; Gellman, Michael; Loukas, George
2004-11-01
Denial of service attacks, viruses and worms are common tools for malicious adversarial behavior in networks. Experience shows that over the last few years several of these techniques have probably been used by governments to impair the Internet communications of various entities, and we can expect that these and other information warfare tools will be used increasingly as part of hostile behavior either independently, or in conjunction with other forms of attack in conventional or asymmetric warfare, as well as in other forms of malicious behavior. In this paper we concentrate on Distributed Denial of Service Attacks (DDoS) where one or more attackers generate flooding traffic and direct it from multiple sources towards a set of selected nodes or IP addresses in the Internet. We first briefly survey the literature on the subject, and discuss some examples of DDoS incidents. We then present a technique that can be used for DDoS protection based on creating islands of protection around a critical information infrastructure. This technique, that we call the CPN-DoS-DT (Cognitive Packet Networks DoS Defence Technique), creates a self-monitoring sub-network surrounding each critical infrastructure node. CPN-DoS-DT is triggered by a DDoS detection scheme, and generates control traffic from the objects of the DDoS attack to the islands of protection where DDOS packet flows are destroyed before they reach the critical infrastructure. We use mathematical modelling, simulation and experiments on our test-bed to show the positive and negative outcomes that may result from both the attack, and the CPN-DoS-DT protection mechanism, due to imperfect detection and false alarms.
The significance of digital citizenship in the well-being of older migrants.
Millard, A; Baldassar, L; Wilding, R
2018-05-01
To understand the increasingly important role of digital citizenship (the ability to participate in society online) in supporting the well-being of ageing migrants. Participant observation, social network mapping, ethnographic and life-history interviews. Fifteen in-depth case studies examined the role of online participation in fostering the well-being and care of older migrants in Perth, Western Australia. Participants are members of an 'internet café' that facilitates their shared development of Internet skills. The case studies are derived from ethnographic research conducted between July and October 2016. Older peoples' maintenance of support networks and social engagement, and their access to healthcare services, can be enhanced when they are motivated to increase their digital literacy (the ability to use the Internet for information and communication) through appropriate educational, technological, infrastructure and social support. This support is likely to be more effective when developed through social learning systems that create communities of practice. Improving digital literacy has special implications for the well-being of older migrants because it can enhance their ability to exchange emotional support across distance. Digital literacy for older migrants can dramatically increase their ability to maintain and expand dispersed networks of support. Effective implementation of affordable and age-inclusive information and communication technology (ITC) infrastructure requires integrated support that connects individuals and their homes with social learning systems to ensure that participation continues as mobility declines. As health information and social engagement are increasingly delivered through online platforms, supporting the digital citizenship of older people is becoming an important equity issue. Copyright © 2018 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.
IPv6 Test Bed for Testing Aeronautical Applications
NASA Technical Reports Server (NTRS)
Wilkins, Ryan; Zernic, Michael; Dhas, Chris
2004-01-01
Aviation industries in United States and in Europe are undergoing a major paradigm shift in the introduction of new network technologies. In the US, NASA is also actively investigating the feasibility of IPv6 based networks for the aviation needs of the United States. In Europe, the Eurocontrol lead, Internet Protocol for Aviation Exchange (iPAX) Working Group is actively investigating the various ways of migrating the aviation authorities backbone infrastructure from X.25 based networks to an IPv6 based network. For the last 15 years, the global aviation community has pursued the development and implementation of an industry-specific set of communications standards known as the Aeronautical Telecommunications Network (ATN). These standards are now beginning to affect the emerging military Global Air Traffic Management (GATM) community as well as the commercial air transport community. Efforts are continuing to gain a full understanding of the differences and similarities between ATN and Internet architectures as related to Communications, Navigation, and Surveillance (CNS) infrastructure choices. This research paper describes the implementation of the IPv6 test bed at NASA GRC, and Computer Networks & Software, Inc. and these two test beds are interface to Eurocontrol over the IPv4 Internet. This research work looks into the possibility of providing QoS performance for Aviation application in an IPv6 network as is provided in an ATN based network. The test bed consists of three autonomous systems. The autonomous system represents CNS domain, NASA domain and a EUROCONTROL domain. The primary mode of connection between CNS IPv6 testbed and NASA and EUROCONTROL IPv6 testbed is initially a set of IPv6 over IPv4 tunnels. The aviation application under test (CPDLC) consists of two processes running on different IPv6 enabled machines.
Licciardone, J C; Smith-Barbaro, P; Coleridge, S T
2001-01-01
The Internet offers consumers unparalleled opportunities to acquire health information. The emergence of the Internet, rather than more-traditional sources, for obtaining health information is worthy of ongoing surveillance, including identification of the factors associated with using the Internet for this purpose. To measure the prevalence of Internet use as a mechanism for obtaining health information in the United States; to compare such Internet use with newspapers or magazines, radio, and television; and to identify sociodemographic factors associated with using the Internet for acquiring health information. Data were acquired from the Second Osteopathic Survey of Health Care in America (OSTEOSURV-II), a national telephone survey using random-digit dialing within the United States during 2000. The target population consisted of adult, noninstitutionalized, household members. As part of the survey, data were collected on: facility with the Internet, sources of health information, and sociodemographic characteristics. Multivariate analysis was used to identify factors associated with acquiring health information on the Internet. A total of 499 (64% response rate) respondents participated in the survey. With the exception of an overrepresentation of women (66%), respondents were generally similar to national referents. Fifty percent of respondents either strongly agreed or agreed that they felt comfortable using the Internet as a health information resource. The prevalence rates of using the health information sources were: newspapers or magazines, 69%; radio, 30%; television, 56%; and the Internet, 32%. After adjusting for potential confounders, older respondents were more likely than younger respondents to use newspapers or magazines and television to acquire health information, but less likely to use the Internet. Higher education was associated with greater use of newspapers or magazines and the Internet as health information sources. Internet use was lower in rural than urban or suburban areas. The Internet has already surpassed radio as a source of health information but still lags substantially behind print media and television. Significant barriers to acquiring health information on the Internet remain among persons 60 years of age or older, those with 12 or fewer years of education, and those residing in rural areas. Stronger efforts are needed to ensure access to and facility with the Internet among all segments of the population. This includes user-friendly access for older persons with visual or other functional impairments, providing low-literacy Web sites, and expanding Internet infrastructure to reach all areas of the United States.
Internet-Based System for Voice Communication With the ISS
NASA Technical Reports Server (NTRS)
Chamberlain, James; Myers, Gerry; Clem, David; Speir, Terri
2005-01-01
The Internet Voice Distribution System (IVoDS) is a voice-communication system that comprises mainly computer hardware and software. The IVoDS was developed to supplement and eventually replace the Enhanced Voice Distribution System (EVoDS), which, heretofore, has constituted the terrestrial subsystem of a system for voice communications among crewmembers of the International Space Station (ISS), workers at the Payloads Operations Center at Marshall Space Flight Center, principal investigators at diverse locations who are responsible for specific payloads, and others. The IVoDS utilizes a communication infrastructure of NASA and NASArelated intranets in addition to, as its name suggests, the Internet. Whereas the EVoDS utilizes traditional circuitswitched telephony, the IVoDS is a packet-data system that utilizes a voice over Internet protocol (VOIP). Relative to the EVoDS, the IVoDS offers advantages of greater flexibility and lower cost for expansion and reconfiguration. The IVoDS is an extended version of a commercial Internet-based voice conferencing system that enables each user to participate in only one conference at a time. In the IVoDS, a user can receive audio from as many as eight conferences simultaneously while sending audio to one of them. The IVoDS also incorporates administrative controls, beyond those of the commercial system, that provide greater security and control of the capabilities and authorizations for talking and listening afforded to each user.
Information and Communication Technologies in Social Work
Perron, Brian E.; Taylor, Harry O.; Glass, Joseph E.; Margerum-Leys, Jon
2011-01-01
Information and communication technologies (ICTs) are electronic tools used to convey, manipulate and store information. The exponential growth of Internet access and ICTs greatly influenced social, political, and economic processes in the United States, and worldwide. Regardless of the level of practice, ICTs will continue influencing the careers of social workers and the clients they serve. ICTs have received some attention in the social work literature and curriculum, but we argue that this level of attention is not adequate given their ubiquity, growth and influence, specifically as it relates to upholding social work ethics. Significant attention is needed to help ensure social workers are responsive to the technological changes in the health care system, including the health care infrastructure and use of technology among clients. Social workers also need ICT competencies in order to effectively lead different types of social change initiatives or collaborate with professionals of other disciplines who are using ICTs as part of existing strategies. This paper also identifies potential pitfalls and challenges with respect to the adoption of ICTs, with recommendations for advancing their use in practice, education, and research. PMID:21691444
Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques
NASA Astrophysics Data System (ADS)
Bhadauria, Rohit; Sanyal, Sugata
2012-06-01
Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for IT-based solutions and services that the industry uses. It promises to provide a flexible IT architecture, accessible through internet for lightweight portable devices. This would allow multi-fold increase in the capacity or capabilities of the existing and new software. In a cloud computing environment, the entire data reside over a set of networked resources, enabling the data to be accessed through virtual machines. Since these data-centers may lie in any corner of the world beyond the reach and control of users, there are multifarious security and privacy challenges that need to be understood and taken care of. Also, one can never deny the possibility of a server breakdown that has been witnessed, rather quite often in the recent times. There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario. This extensive survey paper aims to elaborate and analyze the numerous unresolved issues threatening the cloud computing adoption and diffusion affecting the various stake-holders linked to it.
Disruptive Innovation Can Prevent the Next Pandemic.
Shaikh, Affan T; Ferland, Lisa; Hood-Cree, Robert; Shaffer, Loren; McNabb, Scott J N
2015-01-01
Public health surveillance (PHS) is at a tipping point, where the application of novel processes, technologies, and tools promise to vastly improve efficiency and effectiveness. Yet twentieth century, entrenched ideology and lack of training results in slow uptake and resistance to change. The term disruptive innovation - used to describe advances in technology and processes that change existing markets - is useful to describe the transformation of PHS. Past disruptive innovations used in PHS, such as distance learning, the smart phone, and field-based laboratory testing have outpaced older services, practices, and technologies used in the traditional classroom, governmental offices, and personal communication, respectively. Arguably, the greatest of these is the Internet - an infrastructural innovation that continues to enable exponential benefits in seemingly limitless ways. Considering the Global Health Security Agenda and facing emerging and reemerging infectious disease threats, evolving environmental and behavioral risks, and ever changing epidemiologic trends, PHS must transform. Embracing disruptive innovation in the structures and processes of PHS can be unpredictable. However, it is necessary to strengthen and unlock the potential to prevent, detect, and respond.
FTTH: the overview of existing technologies
NASA Astrophysics Data System (ADS)
Nowak, Dawid; Murphy, John
2005-06-01
The growing popularity of the Internet is the key driver behind the development of new access methods which would enable a customer to experience a true broadband. Amongst various technologies, the access methods based on the optical fiber are getting more and more attention as they offer the ultimate solution in delivering different services to the customers' premises. Three different architectures have been proposed that facilitate the roll out of Fiber-to-the-Home (FTTH) infrastructure. Point-to-point Ethernet networks are the most straightforward and already matured solution. Different flavors of Passive Optical Networks (PONs) with Time Division Multiplexing Access (TDMA) are getting more widespread as necessary equipment is becoming available on the market. The third main contender are PONs withWavelength DivisionMultiplexing Access (WDMA). Although still in their infancy, the laboratory tests show that they have many advantages over present solutions. In this paper we show a brief comparison of these three access methods. In our analysis the architecture of each solution is presented. The applicability of each system is looked at from different viewpoint and their advantages and disadvantages are highlighted.
Model of load balancing using reliable algorithm with multi-agent system
NASA Astrophysics Data System (ADS)
Afriansyah, M. F.; Somantri, M.; Riyadi, M. A.
2017-04-01
Massive technology development is linear with the growth of internet users which increase network traffic activity. It also increases load of the system. The usage of reliable algorithm and mobile agent in distributed load balancing is a viable solution to handle the load issue on a large-scale system. Mobile agent works to collect resource information and can migrate according to given task. We propose reliable load balancing algorithm using least time first byte (LFB) combined with information from the mobile agent. In system overview, the methodology consisted of defining identification system, specification requirements, network topology and design system infrastructure. The simulation method for simulated system was using 1800 request for 10 s from the user to the server and taking the data for analysis. Software simulation was based on Apache Jmeter by observing response time and reliability of each server and then compared it with existing method. Results of performed simulation show that the LFB method with mobile agent can perform load balancing with efficient systems to all backend server without bottleneck, low risk of server overload, and reliable.
Earth System Grid II, Turning Climate Datasets into Community Resources
DOE Office of Scientific and Technical Information (OSTI.GOV)
Middleton, Don
2006-08-01
The Earth System Grid (ESG) II project, funded by the Department of Energy’s Scientific Discovery through Advanced Computing program, has transformed climate data into community resources. ESG II has accomplished this goal by creating a virtual collaborative environment that links climate centers and users around the world to models and data via a computing Grid, which is based on the Department of Energy’s supercomputing resources and the Internet. Our project’s success stems from partnerships between climate researchers and computer scientists to advance basic and applied research in the terrestrial, atmospheric, and oceanic sciences. By interfacing with other climate science projects,more » we have learned that commonly used methods to manage and remotely distribute data among related groups lack infrastructure and under-utilize existing technologies. Knowledge and expertise gained from ESG II have helped the climate community plan strategies to manage a rapidly growing data environment more effectively. Moreover, approaches and technologies developed under the ESG project have impacted datasimulation integration in other disciplines, such as astrophysics, molecular biology and materials science.« less
Large-scale measurement and modeling of backbone Internet traffic
NASA Astrophysics Data System (ADS)
Roughan, Matthew; Gottlieb, Joel
2002-07-01
There is a brewing controversy in the traffic modeling community concerning how to model backbone traffic. The fundamental work on self-similarity in data traffic appears to be contradicted by recent findings that suggest that backbone traffic is smooth. The traffic analysis work to date has focused on high-quality but limited-scope packet trace measurements; this limits its applicability to high-speed backbone traffic. This paper uses more than one year's worth of SNMP traffic data covering an entire Tier 1 ISP backbone to address the question of how backbone network traffic should be modeled. Although the limitations of SNMP measurements do not permit us to comment on the fine timescale behavior of the traffic, careful analysis of the data suggests that irrespective of the variation at fine timescales, we can construct a simple traffic model that captures key features of the observed traffic. Furthermore, the model's parameters are measurable using existing network infrastructure, making this model practical in a present-day operational network. In addition to its practicality, the model verifies basic statistical multiplexing results, and thus sheds deep insight into how smooth backbone traffic really is.
The VISPA internet platform for outreach, education and scientific research in various experiments
NASA Astrophysics Data System (ADS)
van Asseldonk, D.; Erdmann, M.; Fischer, B.; Fischer, R.; Glaser, C.; Heidemann, F.; Müller, G.; Quast, T.; Rieger, M.; Urban, M.; Welling, C.
2015-12-01
VISPA provides a graphical front-end to computing infrastructures giving its users all functionality needed for working conditions comparable to a personal computer. It is a framework that can be extended with custom applications to support individual needs, e.g. graphical interfaces for experiment-specific software. By design, VISPA serves as a multipurpose platform for many disciplines and experiments as demonstrated in the following different use-cases. A GUI to the analysis framework OFFLINE of the Pierre Auger collaboration, submission and monitoring of computing jobs, university teaching of hundreds of students, and outreach activity, especially in CERN's open data initiative. Serving heterogeneous user groups and applications gave us lots of experience. This helps us in maturing the system, i.e. improving the robustness and responsiveness, and the interplay of the components. Among the lessons learned are the choice of a file system, the implementation of websockets, efficient load balancing, and the fine-tuning of existing technologies like the RPC over SSH. We present in detail the improved server setup and report on the performance, the user acceptance and the realized applications of the system.
Study and design on the typical plan for regional hybrid energy internet
NASA Astrophysics Data System (ADS)
Zou, Zhenyu; Zheng, Shuai; Sha, Zhicheng
2018-04-01
The emergence of the energy internet has changed people's understanding of energy production, transmission, storage, conversion, consumption and so on. However, how to promote the development of the energy of the Internet, how to make it with the existing various types of energy entities organic integration, so that it can play an important role, we still need do more in-depth research and practice. After introducing the current situation for energy internet at home and abroad, the definition, character and motion traits of regional energy internet, this paper comprehensively studied typical scheme for regional energy internet based on Multi-energy complementary and developed the feasible suggestion key techniques and directions on development for regional energy internet.
The Self-Organising Seismic Early Warning Information Network: Scenarios
NASA Astrophysics Data System (ADS)
Kühnlenz, F.; Fischer, J.; Eveslage, I.
2009-04-01
SAFER and EDIM working groups, the Department of Computer Science, Humboldt-Universität zu Berlin, Berlin, Germany, and Section 2.1 Earthquake Risk and Early Warning, GFZ German Research Centre for Geosciences, Germany Contact: Frank Kühnlenz, kuehnlenz@informatik.hu-berlin.de The Self-Organising Seismic Early Warning Information Network (SOSEWIN) represents a new approach for Earthquake Early Warning Systems (EEWS), consisting in taking advantage of novel wireless communications technologies without the need of a planned, centralised infrastructure. It also sets out to overcome problems of insufficient node density, which typically affects present existing early warning systems, by having the SOSEWIN seismological sensing units being comprised of low-cost components (generally bought "off-the-shelf"), with each unit initially costing 100's of Euros, in contrast to 1,000's to 10,000's for standard seismological stations. The reduced sensitivity of the new sensing units arising from the use of lower-cost components will be compensated by the network's density, which in the future is expected to number 100's to 1000's over areas served currently by the order of 10's of standard stations. The robustness, independence of infrastructure, spontaneous extensibility due to a self-healing/self-organizing character in the case of removing/failing or adding sensors makes SOSEWIN potentially useful for various use cases, e.g. monitoring of building structures or seismic microzonation. Nevertheless its main purpose is the earthquake early warning, for which reason the ground motion is continuously monitored by conventional accelerometers (3-component). It uses SEEDLink to store and provide access to the sensor data. SOSEWIN considers also the needs of earthquake task forces, which want to set-up a temporary seismic network rapidly and with light-weighted stations to record after-shocks. The wireless and self-organising character of this sensor network should be of great value to do this job in a shorter time and with less manpower compared to using common seismic stations. We present here the graphical front-end of SOSEWIN in its usage for different scenarios. It belongs to a management infrastructure based on GIS and database technologies and therefore coupling with existing infrastructures should be simplified. Connecting the domain expert's laptop running the management software with a SOSEWIN may be fulfilled via any arbitrary node in the network (on-site access) or via a gateway node from a remote location using the internet. The scenarios focus on the needs of certain domain experts (seismologists or maybe engineers) and include the planning of a network installation, support during the installation process and testing of this installation. Another scenario mentions monitoring aspects of an already installed network and finally a scenario deals with the visualization of the alarming protocol detecting an earthquake event and issuing an early warning.
Creating a Road Map for Planetary Data Spatial Infrastructure
NASA Astrophysics Data System (ADS)
Naß, A.; Archinal, B.; Beyer, R.; DellaGiustina, D.; Fassett, C.; Gaddis, L.; Hagerty, J.; Hare, T.; Laura, J.; Lawrence, S.; Mazarico, E.; Patthoff, A.; Radebaugh, J.; Skinner, J.; Sutton, S.; Thomson, B. J.; Williams, D.
2017-09-01
There currently exists a clear need for long-range planning in regard to planetary spatial data and the development of infrastructure to support its use. Planetary data are the hard-earned fruits of planetary exploration, and the Mapping and Planetary Spatial Infrastructure Team (MAPSIT) mission is to ensure their availability for any conceivable investigation, now or in the future.
Development of a lunar infrastructure
NASA Astrophysics Data System (ADS)
Burke, J. D.
If humans are to reside continuously and productively on the Moon, they must be surrounded and supported there by an infrastructure having some attributes of the support systems that have made advanced civilization possible on Earth. Building this lunar infrastructure will, in a sense, be an investment. Creating it will require large resources from Earth, but once it exists it can do much to limit the further demands of a lunar base for Earthside support. What is needed for a viable lunar infrastructure? This question can be approached from two directions. The first is to examine history, which is essentially a record of growing information structures among humans on Earth (tribes, agriculture, specialization of work, education, ethics, arts and sciences, cities and states, technology). The second approach is much less secure but may provide useful insights: it is to examine the minimal needs of a small human community - not just for physical survival but for a stable existence with a net product output. This paper presents a summary, based on present knowledge of the Moon and of the likely functions of a human community there, of some of these infrastructure requirements, and also discusses possible ways to proceed toward meeting early infrastructure needs.
Online cancer education and immigrants: effecting culturally appropriate websites.
Changrani, Jyotsna; Gany, Francesca
2005-01-01
The online population is becoming increasingly diverse. Cancer information websites are a popular destination. However, culturally-appropriate cancer information websites are lacking. An Internet behavior and preference study was conducted in Caribbean immigrant women. 60 English-speaking Caribbean immigrant women in New York City participated in website review sessions. Three-quarters of the participants used computers regularly. Over 80% accessed the Internet from home. Over 50% felt confident using the Internet. However, only 6% used the Internet to search for health information. A "cultural digital divide" exists. The Internet should be tailored to immigrants to facilitate web-based cancer education.
Internet Access and Usage in Improving Students' Self-Directed Learning in Indonesia Open University
ERIC Educational Resources Information Center
Rahardjo, Djoko; Sumardjo; Lubis, Djuara P.; Harijati, Sri Ir.
2016-01-01
Internet is well known nowadays, however higher distance education students who live in remote rural areas still have not been able to take advantages of this medium optimally for their learning process. For accessing the internet the students have to be available with the minimum prerequisites: the existence of adequate devices and the sufficient…
ERIC Educational Resources Information Center
Menger, Fion; Morris, Julie; Salis, Christos
2017-01-01
Purpose: This article uses an illustrative case example to discuss a means of producing a holistic profile of Internet use for individuals with aphasia. Methods: The authors used the International Classification of Functioning, Disability, and Health as a framework to select novel and existing assessments to explore the Internet use and skills of…
Loneliness and Social Internet Use: Pathways to Reconnection in a Digital World?
Nowland, Rebecca; Necka, Elizabeth A; Cacioppo, John T
2018-01-01
With the rise of online social networking, social relationships are increasingly developed and maintained in a digital domain. Drawing conclusions about the impact of the digital world on loneliness is difficult because there are contradictory findings, and cross-sectional studies dominate the literature, making causation difficult to establish. In this review, we present our theoretical model and propose that there is a bidirectional and dynamic relationship between loneliness and social Internet use. When the Internet is used as a way station on the route to enhancing existing relationships and forging new social connections, it is a useful tool for reducing loneliness. But when social technologies are used to escape the social world and withdraw from the "social pain" of interaction, feelings of loneliness are increased. We propose that loneliness is also a determinant of how people interact with the digital world. Lonely people express a preference for using the Internet for social interaction and are more likely to use the Internet in a way that displaces time spent in offline social activities. This suggests that lonely people may need support with their social Internet use so that they employ it in a way that enhances existing friendships and/or to forge new ones.
2012-09-06
CAPE CANAVERAL, Fla. – During NASA's Innovation Expo at the Kennedy Space Center in Florida, William Merrill, of NASA's Communications Infrastructure Services Division, proposes an innovation that would make mission audio available by way of an Internet radio stream. Kennedy Kick-Start Chair Mike Conroy looks on from the left. As Kennedy continues developing programs and infrastructure to become a 21st century spaceport, many employees are devising ways to do their jobs better and more efficiently. On Sept. 6, 2012, 16 Kennedy employees pitched their innovative ideas for improving the center at the Kennedy Kick-Start event. The competition was part of a center-wide effort designed to increase exposure for innovative ideas and encourage their implementation. For more information, visit http://www.nasa.gov/centers/kennedy/news/kick-start_competition.html Photo credit: NASA/Gianni Woods
NASA Astrophysics Data System (ADS)
Aktas, Mehmet; Aydin, Galip; Donnellan, Andrea; Fox, Geoffrey; Granat, Robert; Grant, Lisa; Lyzenga, Greg; McLeod, Dennis; Pallickara, Shrideep; Parker, Jay; Pierce, Marlon; Rundle, John; Sayar, Ahmet; Tullis, Terry
2006-12-01
We describe the goals and initial implementation of the International Solid Earth Virtual Observatory (iSERVO). This system is built using a Web Services approach to Grid computing infrastructure and is accessed via a component-based Web portal user interface. We describe our implementations of services used by this system, including Geographical Information System (GIS)-based data grid services for accessing remote data repositories and job management services for controlling multiple execution steps. iSERVO is an example of a larger trend to build globally scalable scientific computing infrastructures using the Service Oriented Architecture approach. Adoption of this approach raises a number of research challenges in millisecond-latency message systems suitable for internet-enabled scientific applications. We review our research in these areas.
Teleoncology in the Department of Defense: a tale of two systems.
Hunter, D C; Brustrom, J E; Goldsmith, B J; Davis, L J; Carlos, M; Ashley, E; Gardner, G; Gaal, I
1999-01-01
Two telemedicine networks were developed for the purpose of conducting multidisciplinary oncology ("teleoncology") conferences. The infrastructure of each system differed: one system was Internet-based; the other was delivered via Integrated Services Digital Network (ISDN) lines. The purpose of this study was to describe the infrastructure and cost, consultative process, technical aspects, and conference format of the two teleoncology programs. The two systems' technical aspects, participant satisfaction with the systems, and conference participation were compared qualitatively. Assessment of the technical aspects of the systems suggested that each had distinct advantages. Survey results indicated that provider satisfaction with the technical and logistical aspects of each type of teleoncology conference was high. The present study may prove helpful for individuals who are considering implementing their own teleoncology programs.
Anthony, Michelle L.; Klaver, Jacqueline M.; Quenzer, Robert
1998-01-01
The US Geological Survey and US Agency for International Development are enhancing the geographic information infrastructure of the Western Hemisphere by establishing the Inter-American Geospatial Data Network (IGDN). In its efforts to strengthen the Western Hemisphere's information infrastructure, the IGDN is consistent with the goals of the Plan of Action that emerged from the 1994 Summit of the Americas. The IGDN is an on-line cooperative, or clearinghouse, of geospatial data. Internet technology is used to facilitate the discovery and access of Western Hemisphere geospatial data. It was established by using the standards and guidelines of the Federal Geographic Data Committee to provide a consistent data discovery mechanism that will help minimize geospatial data duplication, promote data availability, and coordinate data collection and research activities.
Bioinformatics clouds for big data manipulation.
Dai, Lin; Gao, Xin; Guo, Yan; Xiao, Jingfa; Zhang, Zhang
2012-11-28
As advances in life sciences and information technology bring profound influences on bioinformatics due to its interdisciplinary nature, bioinformatics is experiencing a new leap-forward from in-house computing infrastructure into utility-supplied cloud computing delivered over the Internet, in order to handle the vast quantities of biological data generated by high-throughput experimental technologies. Albeit relatively new, cloud computing promises to address big data storage and analysis issues in the bioinformatics field. Here we review extant cloud-based services in bioinformatics, classify them into Data as a Service (DaaS), Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS), and present our perspectives on the adoption of cloud computing in bioinformatics. This article was reviewed by Frank Eisenhaber, Igor Zhulin, and Sandor Pongor.
Characterization of attacks on public telephone networks
NASA Astrophysics Data System (ADS)
Lorenz, Gary V.; Manes, Gavin W.; Hale, John C.; Marks, Donald; Davis, Kenneth; Shenoi, Sujeet
2001-02-01
The U.S. Public Telephone Network (PTN) is a massively connected distributed information systems, much like the Internet. PTN signaling, transmission and operations functions must be protected from physical and cyber attacks to ensure the reliable delivery of telecommunications services. The increasing convergence of PTNs with wireless communications systems, computer networks and the Internet itself poses serious threats to our nation's telecommunications infrastructure. Legacy technologies and advanced services encumber well-known and as of yet undiscovered vulnerabilities that render them susceptible to cyber attacks. This paper presents a taxonomy of cyber attacks on PTNs in converged environments that synthesizes exploits in computer and communications network domains. The taxonomy provides an opportunity for the systematic exploration of mitigative and preventive strategies, as well as for the identification and classification of emerging threats.
William, Mayega Roy; Elzie, D; Sebuwufu, D; Kiguli, J; Bazeyo, W
2013-06-01
The growing need for disaster management skills at all levels in Eastern Africa requires innovative approaches to training planners at all levels. While information technology tools provide a viable option, few studies have assessed the capacity for training institutions to use technology for cascading disaster management skills. The design was an explorative survey. A pre-training survey was conducted among 16 faculty members (9 academic staff and 7 information technology (IT) staff) from 7 schools of public health in Eastern Africa. Key informant interviews with 4 students and 4 staff members were conducted at the school of public health in Makerere. IT staff also conducted observations on trends of use of information technology infrastructure. Current levels of use of ICT among teaching and IT staff is variable. On-site use of the internet is high, but off-site access is low. Personal computers, e-mail, discussion forums and other web-based learning management platforms and open education resources (OERs) have been variably used by faculty and students to facilitate learning. On the other hand, videos, web-conferencing, social media, web-based document management tools, and mobile telephone applications were much less frequently used. A disaster management short course produced by the Health Emergencies Management Project (HEMP) has been adapted to a web-based open education resource and an interactive CD-ROM. Challenges included low levels of awareness and skills in technology options among students and faculty and access to reliable internet. Despite the existing challenges, technology tools are a viable platform for cascading disaster management skills in Eastern Africa.
NASA Astrophysics Data System (ADS)
Rogers, Michael; Bhatti, Saleem
This chapter offers a survey of the emerging field of private peer-to-peer networks, which can be defined as internet overlays in which the resources and infrastructure are provided by the users, and which new users may only join by personal invitation. The last few years have seen rapid developments in this field. We describe deployed systems, classify them architecturally, and identify some technical and social tradeoffs in the design of private peer-to-peer networks.
A Novel Market-Oriented Dynamic Collaborative Cloud Service Platform
NASA Astrophysics Data System (ADS)
Hassan, Mohammad Mehedi; Huh, Eui-Nam
In today's world the emerging Cloud computing (Weiss, 2007) offer a new computing model where resources such as computing power, storage, online applications and networking infrastructures can be shared as "services" over the internet. Cloud providers (CPs) are incentivized by the profits to be made by charging consumers for accessing these services. Consumers, such as enterprises, are attracted by the opportunity for reducing or eliminating costs associated with "in-house" provision of these services.
2011-09-01
service -oriented systems • Software -as-a- Service ( SaaS ) • social network infrastructures • Internet marketing • mobile computing • context awareness...Maintenance and Evolution of Service -Oriented Systems (MESOA 2010), organized by members of the Carnegie Mellon Software Engineering Institute’s...CMU/SEI-2011-SR-008 | 1 1 Workshop Introduction The Software Engineering Institute (SEI) started developing a service -oriented architecture
ERIC Educational Resources Information Center
Wu, Anise M. S.; Lau, Joseph T. F.; Cheng, Kit-man; Law, Rita W.; Tse, Vincent W. S.; Lau, Mason M. C.
2018-01-01
Internet addiction (IA) is prevalent among adolescents and imposes a serious public health threat. Familial risk and protective factors may co-exist and interact with each other to determine IA. We conducted a cross-sectional survey among 9,618 Secondary 1 to 4 students in Hong Kong, China. About 16% of the surveyed students were classified as…
Wireless intelligent network: infrastructure before services?
NASA Astrophysics Data System (ADS)
Chu, Narisa N.
1996-01-01
The Wireless Intelligent Network (WIN) intends to take advantage of the Advanced Intelligent Network (AIN) concepts and products developed from wireline communications. However, progress of the AIN deployment has been slow due to the many barriers that exist in the traditional wireline carriers' deployment procedures and infrastructure. The success of AIN has not been truly demonstrated. The AIN objectives and directions are applicable to the wireless industry although the plans and implementations could be significantly different. This paper points out WIN characteristics in architecture, flexibility, deployment, and value to customers. In order to succeed, the technology driven AIN concept has to be reinforced by the market driven WIN services. An infrastructure suitable for the WIN will contain elements that are foreign to the wireline network. The deployment process is expected to seed with the revenue generated services. Standardization will be achieved by simplifying and incorporating the IS-41C, AIN, and Intelligent Network CS-1 recommendations. Integration of the existing and future systems impose the biggest challenge of all. Service creation has to be complemented with service deployment process which heavily impact the carriers' infrastructure. WIN deployment will likely start from an Intelligent Peripheral, a Service Control Point and migrate to a Service Node when sufficient triggers are implemented in the mobile switch for distributed call control. The struggle to move forward will not be based on technology, but rather on the impact to existing infrastructure.
2014-04-01
must be done to determine current infrastructure and capabilities so that necessary updates and changes can be addressed up front. Mobile biometric...with existing satellite communications infrastructure . 20 PSTP 03-427BIOM 4 State of Mobile Biometric Device Market 4.1 Fingerprint...is a wireless information system highlighted by Real-time wireless data collection mobile device independence, wireless infrastructure independence
Effect of social support on depression of internet addicts and the mediating role of loneliness.
He, Fei; Zhou, Qin; Li, Jing; Cao, Rong; Guan, Hao
2014-01-01
Many studies have determined the existence of an extremely close association between Internet addiction and depression. However, the reasons for the depression of Internet addicts have not been fully investigated. This cross-sectional study aims to explore the factors that influence depression among Internet addicts. A total of 162 male Internet addicts completed the Emotional and Social Loneliness Scale, Multidimensional Scale of Perceived Social Support, and Self-Rating Depression Scale. Loneliness and lack of social support are significantly correlated with depression among Internet addicts. Structural Equation Modeling results indicate that social support partially mediates loneliness and depression. Both social support and loneliness were negatively associated with depression of Internet addicts whereas loneliness plays a mediating role between social support and depression.
Formal Approach For Resilient Reachability based on End-System Route Agility
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rauf, Usman; Gillani, Fida; Al-Shaer, Ehab
The deterministic nature of existing routing protocols has resulted into an ossified Internet with static and predictable network routes. This gives persistent attackers (e.g. eavesdroppers and DDoS attackers) plenty of time to study the network and identify the vulnerable links (critical) to plan a devastating and stealthy attack. Recently, route mutation approaches have been proposed to address such issues. However, these approaches incur significantly high overhead and depend upon the availability of disjoint routes in the network, which inherently limit their use for mission critical services. To cope with these issues, we extend the current routing architecture to consider end-hostsmore » as routing elements, and present a formal method based agile defense mechanism to increase resiliency of the existing cyber infrastructure. The major contributions of this paper include: (1) formalization of efficient and resilient End to End (E2E) reachability problem as a constraint satisfaction problem, which identifies the potential end-hosts to reach a destination while satisfying resilience and QoS constraints, (2) design and implementation of a novel decentralized End Point Route Mutation (EPRM) protocol, and (3) design and implementation of planning algorithm to minimize the overlap between multiple flows, for the sake of maximizing the agility in the system. Our implementation and evaluation validates the correctness, effectiveness and scalability of the proposed approach.« less
NASA Astrophysics Data System (ADS)
Iyer, Sridhar
2016-12-01
The ever-increasing global Internet traffic will inevitably lead to a serious upgrade of the current optical networks' capacity. The legacy infrastructure can be enhanced not only by increasing the capacity but also by adopting advance modulation formats, having increased spectral efficiency at higher data rate. In a transparent mixed-line-rate (MLR) optical network, different line rates, on different wavelengths, can coexist on the same fiber. Migration to data rates higher than 10 Gbps requires the implementation of phase modulation schemes. However, the co-existing on-off keying (OOK) channels cause critical physical layer impairments (PLIs) to the phase modulated channels, mainly due to cross-phase modulation (XPM), which in turn limits the network's performance. In order to mitigate this effect, a more sophisticated PLI-Routing and Wavelength Assignment (PLI-RWA) scheme needs to be adopted. In this paper, we investigate the critical impairment for each data rate and the way it affects the quality of transmission (QoT). In view of the aforementioned, we present a novel dynamic PLI-RWA algorithm for MLR optical networks. The proposed algorithm is compared through simulations with the shortest path and minimum hop routing schemes. The simulation results show that performance of the proposed algorithm is better than the existing schemes.
A virtual therapeutic environment with user projective agents.
Ookita, S Y; Tokuda, H
2001-02-01
Today, we see the Internet as more than just an information infrastructure, but a socializing place and a safe outlet of inner feelings. Many personalities develop aside from real world life due to its anonymous environment. Virtual world interactions are bringing about new psychological illnesses ranging from netaddiction to technostress, as well as online personality disorders and conflicts in multiple identities that exist in the virtual world. Presently, there are no standard therapy models for the virtual environment. There are very few therapeutic environments, or tools especially made for virtual therapeutic environments. The goal of our research is to provide the therapy model and middleware tools for psychologists to use in virtual therapeutic environments. We propose the Cyber Therapy Model, and Projective Agents, a tool used in the therapeutic environment. To evaluate the effectiveness of the tool, we created a prototype system, called the Virtual Group Counseling System, which is a therapeutic environment that allows the user to participate in group counseling through the eyes of their Projective Agent. Projective Agents inherit the user's personality traits. During the virtual group counseling, the user's Projective Agent interacts and collaborates to recover and increase their psychological growth. The prototype system provides a simulation environment where psychologists can adjust the parameters and customize their own simulation environment. The model and tool is a first attempt toward simulating online personalities that may exist only online, and provide data for observation.
Compressed ECG biometric: a fast, secured and efficient method for identification of CVD patient.
Sufi, Fahim; Khalil, Ibrahim; Mahmood, Abdun
2011-12-01
Adoption of compression technology is often required for wireless cardiovascular monitoring, due to the enormous size of Electrocardiography (ECG) signal and limited bandwidth of Internet. However, compressed ECG must be decompressed before performing human identification using present research on ECG based biometric techniques. This additional step of decompression creates a significant processing delay for identification task. This becomes an obvious burden on a system, if this needs to be done for a trillion of compressed ECG per hour by the hospital. Even though the hospital might be able to come up with an expensive infrastructure to tame the exuberant processing, for small intermediate nodes in a multihop network identification preceded by decompression is confronting. In this paper, we report a technique by which a person can be identified directly from his / her compressed ECG. This technique completely obviates the step of decompression and therefore upholds biometric identification less intimidating for the smaller nodes in a multihop network. The biometric template created by this new technique is lower in size compared to the existing ECG based biometrics as well as other forms of biometrics like face, finger, retina etc. (up to 8302 times lower than face template and 9 times lower than existing ECG based biometric template). Lower size of the template substantially reduces the one-to-many matching time for biometric recognition, resulting in a faster biometric authentication mechanism.
Advanced space-based InSAR risk analysis of planned and existing transportation infrastructure.
DOT National Transportation Integrated Search
2017-03-21
The purpose of this document is to summarize activities by Stanford University and : MDA Geospatial Services Inc. (MDA) to estimate surface deformation and associated : risk to transportation infrastructure using SAR Interferometric methods for the :...
Potential impacts of solar arrays on highway environment, safety and operations.
DOT National Transportation Integrated Search
2015-10-01
The advent of solar energy utilization in highway infrastructure around the country has been increasing in : recent years. Right of Ways (ROWs) have several advantages for energy development such as the existing : electrical infrastructure aligned wi...
DOT National Transportation Integrated Search
2012-10-01
Floridas transportation infrastructure must continually evolve to meet the demands of its growing population. Many jurisdictions are moving toward multimodal transportation systems that utilize existing infrastructure more efficiently, providing u...
Adapting to climate change : the public policy response - public infrastructure
DOT National Transportation Integrated Search
2009-06-01
This paper assesses the threats and needs that multidimensional climate change imposes for : public infrastructure, reviews the existing adaptive capacity that could be applied to respond : to these threats and needs, and presents options for enhanci...
Green Infrastructure Models and Tools
The objective of this project is to modify and refine existing models and develop new tools to support decision making for the complete green infrastructure (GI) project lifecycle, including the planning and implementation of stormwater control in urban and agricultural settings,...
User-level framework for performance monitoring of HPC applications
NASA Astrophysics Data System (ADS)
Hristova, R.; Goranov, G.
2013-10-01
HP-SEE is an infrastructure that links the existing HPC facilities in South East Europe in a common infrastructure. The analysis of the performance monitoring of the High-Performance Computing (HPC) applications in the infrastructure can be useful for the end user as diagnostic for the overall performance of his applications. The existing monitoring tools for HP-SEE provide to the end user only aggregated information for all applications. Usually, the user does not have permissions to select only the relevant information for him and for his applications. In this article we present a framework for performance monitoring of the HPC applications in the HP-SEE infrastructure. The framework provides standardized performance metrics, which every user can use in order to monitor his applications. Furthermore as a part of the framework a program interface is developed. The interface allows the user to publish metrics data from his application and to read and analyze gathered information. Publishing and reading through the framework is possible only with grid certificate valid for the infrastructure. Therefore the user is authorized to access only the data for his applications.
Integrating smart container technology into existing shipping and law enforcement infrastructure
NASA Astrophysics Data System (ADS)
Ferriere, Dale; Pysareva, Khrystyna; Rucinski, Andrzej
2006-05-01
While there has been important research and development in the area of smart container technologies, no system design methodologies have yet emerged for integrating this technology into the existing shipping and law enforcement infrastructure. A successful deployment of smart containers requires a precise understanding of how to integrate this new technology into the existing shipping and law enforcement infrastructure, how to establish communication interoperability, and how to establish procedures and protocols related to the operation of smart containers. In addition, this integration needs to be seamless, unobtrusive to commerce, and cost-effective. In order to address these issues, we need to answer the following series of questions: 1) Who will own and operate the smart container technology; 2) Who will be responsible for monitoring the smart container data and notifying first responders; 3) What communication technologies currently used by first responders might be adopted for smart container data transmission; and 4) How will existing cargo manifest data be integrated into smart container data. In short, we need to identify the best practices for smart container ownership and operation. In order to help provide answers to these questions, we have surveyed a sample group of representatives from law enforcement, first responder, regulatory, and private sector organizations. This paper presents smart container infrastructure best practices recommendations obtained from the results of the survey.
Effects of inter-packet spacing on the delivery of multimedia content
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kapadia, A. C.; Feng, A. C.; Feng, W. C.
2001-01-01
Streaming multimedia content with UDP has become increasingly popular over distributed systems such as the Internet. However, because UDP does not possess any congestion-control mechanism and most best-effort trafic is served by the congestion-controlled TCP, UDP flows steal bandwidth from TCP to the point that TCP flows can starve for network resources. Furthermore, such applications may cause the Internet infrastructure to eventually suffer from congestion collapse because UDP trafic does not self-regulate itself. To address this problem, next-generation Internet routers will implement active queue-management schemes to punish malicious traffic, e.g., non-adaptive UDP flows, and to the improve the performance ofmore » congestion-controlled traffic, e.g., TCP flows. The arrival of such routers will cripple the performance of today's UDP-based multimedia applications. So, in this paper, we introduce the notion of inter-packet spacing with control feedback to enable these UDP-based applications to perform well in the next-generation Internet while being adaptive and self-regulating. When compared with traditional UDP-based multimedia streaming, we illustrate that our counterintuitive, interpacket-spacing scheme with control feedback can reduce packet loss by 90% without adversely affecting delivered throughput. Keywords: network protocol, multimedia, packet spacing, rate-adjusting congestion control.« less
Healthcare teams over the Internet: towards a certificate-based approach.
Georgiadis, Christos K; Mavridis, Ioannis K; Pangalos, George I
2002-01-01
Healthcare environments are a representative case of collaborative environments since individuals (e.g. doctors) in many cases collaborate in order to provide care to patients in a more proficient way. At the same time modem healthcare institutions are increasingly interested in sharing access of their information resources in the networked environment. Healthcare applications over the Internet offer an attractive communication infrastructure at worldwide level but with a noticeably great factor of risk. Security has therefore become a major concern for healthcare applications over the Internet. However, although an adequate level of security can be relied upon digital certificates, if an appropriate security policy is used, additional security considerations are needed in order to deal efficiently with the above team-work concerns. The already known Hybrid Access Control security model supports and handles efficiently healthcare teams with active security capabilities and is capable to exploit the benefits of certificate technology. In this paper we present the way for encoding the appropriate authoritative information in various types of certificates, as well as the overall operational architecture of the implemented access control system for healthcare collaborative environments over the Internet. A pilot implementation of the proposed methodology in a major Greek hospital has shown the applicability of the proposals and the flexibility of the access control provided.
DOT National Transportation Integrated Search
1994-02-01
The report contains an assessment of existing port infrastructure related to United States-Mexico trade, planned infrastructure improvements, an identification of current trade and transportation flows, and an assessment of emerging trade corridors. ...
DOT National Transportation Integrated Search
2013-09-01
The use of public-private partnerships (PPPs) for transportation infrastructure delivery has increased in : the U.S. However, concerns about and opposition to these agreements exist due to a variety of factors. : This paper explores the perceptions t...
DOT National Transportation Integrated Search
2012-02-01
Many manuals, handbooks and web resources exist that provide guidance on planning for and designing bicycle and pedestrian facilities. However few of these resources emphasize program and infrastructure characteristics most desired by current (and po...
Internet addiction: reappraisal of an increasingly inadequate concept.
Starcevic, Vladan; Aboujaoude, Elias
2017-02-01
This article re-examines the popular concept of Internet addiction, discusses the key problems associated with it, and proposes possible alternatives. The concept of Internet addiction is inadequate for several reasons. Addiction may be a correct designation only for the minority of individuals who meet the general criteria for addiction, and it needs to be better demarcated from various patterns of excessive or abnormal use. Addiction to the Internet as a medium does not exist, although the Internet as a medium may play an important role in making some behaviors addictive. The Internet can no longer be separated from other potentially overused media, such as text messaging and gaming platforms. Internet addiction is conceptually too heterogeneous because it pertains to a variety of very different behaviors. Internet addiction should be replaced by terms that refer to the specific behaviors (eg, gaming, gambling, or sexual activity), regardless of whether these are performed online or offline.
Healthcare organizations and the Internet: impact on federal tax exemption.
Woods, LaVerne; Osborne, Michele
2002-01-01
Tax-exempt healthcare organizations have turned to the Internet as a powerful tool in communicating with the public, medical staff, and patients. Activities as diverse as providing links to the Web sites of other organizations, selling goods and services, soliciting contributions, and hosting forums on the Internet raise unresolved questions concerning the impact of Internet use on such organizations' tax-exempt status. The Internal Revenue Service has provided no guidance to date regarding the manner in which a nonprofit organizations' use of the Internet may affect its tax-exempt status or subject it to federal income tax on some sources of funds. This article suggests analytical approaches for applying existing law in the Internet context and identifies areas that are ripe for additional guidance.
Scalability Issues for Remote Sensing Infrastructure: A Case Study.
Liu, Yang; Picard, Sean; Williamson, Carey
2017-04-29
For the past decade, a team of University of Calgary researchers has operated a large "sensor Web" to collect, analyze, and share scientific data from remote measurement instruments across northern Canada. This sensor Web receives real-time data streams from over a thousand Internet-connected sensors, with a particular emphasis on environmental data (e.g., space weather, auroral phenomena, atmospheric imaging). Through research collaborations, we had the opportunity to evaluate the performance and scalability of their remote sensing infrastructure. This article reports the lessons learned from our study, which considered both data collection and data dissemination aspects of their system. On the data collection front, we used benchmarking techniques to identify and fix a performance bottleneck in the system's memory management for TCP data streams, while also improving system efficiency on multi-core architectures. On the data dissemination front, we used passive and active network traffic measurements to identify and reduce excessive network traffic from the Web robots and JavaScript techniques used for data sharing. While our results are from one specific sensor Web system, the lessons learned may apply to other scientific Web sites with remote sensing infrastructure.
Home monitoring and decision support for international liver transplant children.
Song, Bianying; Schulze, Mareike; Goldschmidt, Imeke; Haux, Reinhold; Baumann, Ulrich; Marschollek, Michael
2013-01-01
Complications may occur after a liver transplantation, therefore proper monitoring and care in the post-operation phase plays a very important role. Sometimes, monitoring and care for patients from abroad is difficult due to a variety of reasons, e.g., different care facilities. The objective of our research for this paper is to design, implement and evaluate a home monitoring and decision support infrastructure for international children who underwent liver transplant operation. A point-of-care device and the PedsQL questionnaire were used in patients' home environment for measuring the blood parameters and assessing quality of life. By using a tablet PC and a specially developed software, the measured results were able to be transmitted to the health care providers via internet. So far, the developed infrastructure has been evaluated with four international patients/families transferring 38 records of blood test. The evaluation showed that the home monitoring and decision support infrastructure is technically feasible and is able to give timely alarm in case of abnormal situation as well as may increase parent's feeling of safety for their children.
Is E-health Progressing Faster Than E-health Researchers?
2006-01-01
Formal Internet interventions exist in a broad context of diverse online health resources, which share elements in common like information, advice and peer support. However, most online health resources are not created by healthcare professionals. Internet interventions need to be designed to “compete” in that wider context. The democratization of production and distribution is central to the transformative effect of the Internet on society, yet potentially conflicts with healthcare’s need for an evidence base and safe practice. This is a core challenge for healthcare on the Internet. PMID:17032640
Cyberspace modernization. An interest protocol planning advisory
DOE Office of Scientific and Technical Information (OSTI.GOV)
Keliiaa, Curtis M.; McLane, Victor N.
A common challenge across the communications and information technology (IT) sectors is Internet + modernization + complexity + risk + cost. Cyberspace modernization and cyber security risks, issues, and concerns impact service providers, their customers, and the industry at large. Public and private sectors are struggling to solve the problem. New service opportunities lie in mobile voice, video, and data, and machine-to-machine (M2M) information and communication technologies that are migrating not only to predominant Internet Protocol (IP) communications, but also concurrently integrating IP, version 4 (IPv4) and IP, version 6 (IPv6). With reference to the Second Internet and the Internetmore » of Things, next generation information services portend business survivability in the changing global market. The planning, architecture, and design information herein is intended to increase infrastructure preparedness, security, interoperability, resilience, and trust in the midst of such unprecedented change and opportunity. This document is a product of Sandia National Laboratories Tribal Cyber and IPv6 project work. It is a Cyberspace Modernization objective advisory in support of bridging the digital divide through strategic partnership and an informed path forward.« less
A Framework For Analysis Of Coastal Infrastructure Vunerabilty To Global Sea Level Rise
NASA Astrophysics Data System (ADS)
Obrien, P. S.; White, K. D.; Veatch, W.; Marzion, R.; Moritz, H.; Moritz, H. R.
2017-12-01
Recorded impacts of global sea rise on coastal water levels have been documented over the past 100 to 150 years. In the recent 40 years the assumption of hydrologic stationarity has been recognized as invalid. New coastal infrastructure designs must recognize the paradigm shift from hydrologic stationarity to non-stationarity in coastal hydrology. A framework for the evaluation of existing coastal infrastructure is proposed to effectively assess design vulnerability. Two data sets developed from existing structures are chosen to test a proposed framework for vunerabilty to global sea level rise, with the proposed name Climate Preparedness and Resilience Register (CPRR). The CPRR framework consists of four major elements; Datum Adjustment, Coastal Water Levels, Scenario Projections and Performance Thresholds.
ERIC Educational Resources Information Center
Samad, Ramli Abdul
This paper shows that, although a digital divide exists between developed and developing countries, the development of information technology (IT) and the Internet has had a profound political, social, and economic impact on developing countries. IT and the Internet revolution are shaping the world into new polarized entities due to the uneven…
Optimizing the Long-Term Capacity Expansion and Protection of Iraqi Oil Infrastructure
2005-09-01
remotely using only a computer and a high-speed internet connection. I only wish that the Navy as a whole were as receptive to telecommuting as you...INTRODUCTION Formula for success: Rise early, work hard , strike oil. Jean Paul Getty (1892-1976), American Industrialist and Founder of the Getty...In truth , Iraq has neglected its lifeblood industry for far too long and requires a capital expansion and security plan - as well as the financial
Costa Gondim, João José; de Oliveira Albuquerque, Robson; Clayton Alves Nascimento, Anderson; García Villalba, Luis Javier; Kim, Tai-Hoon
2016-01-01
Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices’ limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class–amplified reflection distributed denial of service attacks (AR-DDoS)–against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests). After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS) attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims. PMID:27827931
Costa Gondim, João José; de Oliveira Albuquerque, Robson; Clayton Alves Nascimento, Anderson; García Villalba, Luis Javier; Kim, Tai-Hoon
2016-11-04
Concerns about security on Internet of Things (IoT) cover data privacy and integrity, access control, and availability. IoT abuse in distributed denial of service attacks is a major issue, as typical IoT devices' limited computing, communications, and power resources are prioritized in implementing functionality rather than security features. Incidents involving attacks have been reported, but without clear characterization and evaluation of threats and impacts. The main purpose of this work is to methodically assess the possible impacts of a specific class-amplified reflection distributed denial of service attacks (AR-DDoS)-against IoT. The novel approach used to empirically examine the threat represented by running the attack over a controlled environment, with IoT devices, considered the perspective of an attacker. The methodology used in tests includes that perspective, and actively prospects vulnerabilities in computer systems. This methodology defines standardized procedures for tool-independent vulnerability assessment based on strategy, and the decision flows during execution of penetration tests (pentests). After validation in different scenarios, the methodology was applied in amplified reflection distributed denial of service (AR-DDoS) attack threat assessment. Results show that, according to attack intensity, AR-DDoS saturates reflector infrastructure. Therefore, concerns about AR-DDoS are founded, but expected impact on abused IoT infrastructure and devices will be possibly as hard as on final victims.
Assessing health consumerism on the Web: a demographic profile of information-seeking behaviors.
Lorence, Daniel P; Park, Heeyoung; Fox, Susannah
2006-08-01
The growing diversity of the online health information community is increasingly cited as a limiting factor related to the potential of the Internet as an effective health communication channel and information resource. Public-access Internet portals and decreasing costs of personal computers have created a consensus that unequal access to information, or a "Digital Divide," presents a like problem specific to health care consumers. Access to information, however, is an essential part of the consumer-centric framework outlined in the recently proposed U.S. National Health Information Infrastructure (NHII) and Health Architecture initiatives. To date little research has been done to differentiate the types of health information sought on the Web by different subgroups, linking user characteristics and health-seeking behaviors. Data from a study of consumer Web search activity in a post-intervention era serves as a natural experiment, and can identify whether a "digitally underserved group" persists in the United States. Such an environment would serve to exclude traditionally underserved groups from the benefits of the planned national heath information infrastructure. This exploratory technology assessment study seeks to differentiate and delineate specific behaviors, or lack of desired behaviors, across targeted health care subgroups. Doing so allows the design of more effective strategies to promote the use of the Web as a health education and health promotion tool, under the envisioned shared decision-making, consumer-centric health information model.
Complex IoT Systems as Enablers for Smart Homes in a Smart City Vision.
Lynggaard, Per; Skouby, Knud Erik
2016-11-02
The world is entering a new era, where Internet-of-Things (IoT), smart homes, and smart cities will play an important role in meeting the so-called big challenges. In the near future, it is foreseen that the majority of the world's population will live their lives in smart homes and in smart cities. To deal with these challenges, to support a sustainable urban development, and to improve the quality of life for citizens, a multi-disciplinary approach is needed. It seems evident, however, that a new, advanced Information and Communications Technology ICT infrastructure is a key feature to realize the "smart" vision. This paper proposes a specific solution in the form of a hierarchical layered ICT based infrastructure that handles ICT issues related to the "big challenges" and seamlessly integrates IoT, smart homes, and smart city structures into one coherent unit. To exemplify benefits of this infrastructure, a complex IoT system has been deployed, simulated and elaborated. This simulation deals with wastewater energy harvesting from smart buildings located in a smart city context. From the simulations, it has been found that the proposed infrastructure is able to harvest between 50% and 75% of the wastewater energy in a smart residential building. By letting the smart city infrastructure coordinate and control the harvest time and duration, it is possible to achieve considerable energy savings in the smart homes, and it is possible to reduce the peak-load for district heating plants.
Complex IoT Systems as Enablers for Smart Homes in a Smart City Vision
Lynggaard, Per; Skouby, Knud Erik
2016-01-01
The world is entering a new era, where Internet-of-Things (IoT), smart homes, and smart cities will play an important role in meeting the so-called big challenges. In the near future, it is foreseen that the majority of the world’s population will live their lives in smart homes and in smart cities. To deal with these challenges, to support a sustainable urban development, and to improve the quality of life for citizens, a multi-disciplinary approach is needed. It seems evident, however, that a new, advanced Information and Communications Technology ICT infrastructure is a key feature to realize the “smart” vision. This paper proposes a specific solution in the form of a hierarchical layered ICT based infrastructure that handles ICT issues related to the “big challenges” and seamlessly integrates IoT, smart homes, and smart city structures into one coherent unit. To exemplify benefits of this infrastructure, a complex IoT system has been deployed, simulated and elaborated. This simulation deals with wastewater energy harvesting from smart buildings located in a smart city context. From the simulations, it has been found that the proposed infrastructure is able to harvest between 50% and 75% of the wastewater energy in a smart residential building. By letting the smart city infrastructure coordinate and control the harvest time and duration, it is possible to achieve considerable energy savings in the smart homes, and it is possible to reduce the peak-load for district heating plants. PMID:27827851
Internet addiction: a systematic review of epidemiological research for the last decade.
Kuss, D J; Griffiths, M D; Karila, L; Billieux, J
2014-01-01
In the last decade, Internet usage has grown tremendously on a global scale. The increasing popularity and frequency of Internet use has led to an increasing number of reports highlighting the potential negative consequences of overuse. Over the last decade, research into Internet addiction has proliferated. This paper reviews the existing 68 epidemiological studies of Internet addiction that (i) contain quantitative empirical data, (ii) have been published after 2000, (iii) include an analysis relating to Internet addiction, (iv) include a minimum of 1000 participants, and (v) provide a full-text article published in English using the database Web of Science. Assessment tools and conceptualisations, prevalence, and associated factors in adolescents and adults are scrutinised. The results reveal the following. First, no gold standard of Internet addiction classification exists as 21 different assessment instruments have been identified. They adopt official criteria for substance use disorders or pathological gambling, no or few criteria relevant for an addiction diagnosis, time spent online, or resulting problems. Second, reported prevalence rates differ as a consequence of different assessment tools and cut-offs, ranging from 0.8% in Italy to 26.7% in Hong Kong. Third, Internet addiction is associated with a number of sociodemographic, Internet use, and psychosocial factors, as well as comorbid symptoms and disorder in adolescents and adults. The results indicate that a number of core symptoms (i.e., compulsive use, negative outcomes and salience) appear relevant for diagnosis, which assimilates Internet addiction and other addictive disorders and also differentiates them, implying a conceptualisation as syndrome with similar etiology and components, but different expressions of addictions. Limitations include the exclusion of studies with smaller sample sizes and studies focusing on specific online behaviours. Conclusively, there is a need for nosological precision so that ultimately those in need can be helped by translating the scientific evidence established in the context of Internet addiction into actual clinical practice.
The use of sustainable materials for quick repair of aging bridges : phase II final report.
DOT National Transportation Integrated Search
2012-02-01
"During the last decade fiber reinforced polymer (FRP) materials have gained wide acceptance for repair and strengthening of existing infrastructures or to design new infrastructures due to their desirable properties (high strength to weight ratio, l...
Broad roads in a thin country : infrastructure concessions in Chile
DOT National Transportation Integrated Search
2000-01-01
Chile has experienced rapid economic growth for more than a decade. Demand for basic infrastructure services has grown in tandem with the economic expansion, quickly outstripping the supply capacity of existing assets. In the early 90's a policy deci...
Characteristics of the auto users and non-users of central Texas toll roads.
DOT National Transportation Integrated Search
2009-08-01
As toll road usage increases to finance new road infrastructure or add capacity to existing road infrastructure, the : question of who does and does not use toll roads becomes increasingly important to toll road developers, financiers, : Traffic and ...
Reshoring and its impact on transportation infrastructure & US economy.
DOT National Transportation Integrated Search
2016-12-01
Reshoring is expected to have a tremendous impact on the United States (US) economy and on the utilization of the existing : transportation infrastructures of the country. It is an immense need to identify the potential companies in the US that will ...
Bioinformatics clouds for big data manipulation
2012-01-01
Abstract As advances in life sciences and information technology bring profound influences on bioinformatics due to its interdisciplinary nature, bioinformatics is experiencing a new leap-forward from in-house computing infrastructure into utility-supplied cloud computing delivered over the Internet, in order to handle the vast quantities of biological data generated by high-throughput experimental technologies. Albeit relatively new, cloud computing promises to address big data storage and analysis issues in the bioinformatics field. Here we review extant cloud-based services in bioinformatics, classify them into Data as a Service (DaaS), Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS), and present our perspectives on the adoption of cloud computing in bioinformatics. Reviewers This article was reviewed by Frank Eisenhaber, Igor Zhulin, and Sandor Pongor. PMID:23190475
Research on an IP disaster recovery storage system
NASA Astrophysics Data System (ADS)
Zeng, Dong; Wang, Yusheng; Zhu, Jianfeng
2008-12-01
According to both the Fibre Channel (FC) Storage Area Network (SAN) switch and Fabric Application Interface Standard (FAIS) mechanism, an iSCSI storage controller is put forward and based upon it, an internet Small Computer System Interface (iSCSI) SAN construction strategy for disaster recovery (DR) is proposed and some multiple sites replication models and a closed queue performance analysis method are also discussed in this paper. The iSCSI storage controller lies in the fabric level of the networked storage infrastructure, and it can be used to connect to both the hybrid storage applications and storage subsystems, besides, it can provide virtualized storage environment and support logical volume access control, and by cooperating with the remote peerparts, a disaster recovery storage system can be built on the basis of the data replication, block-level snapshot and Internet Protocol (IP) take-over functions.
Porter, M E
2001-03-01
Many of the pioneers of Internet business, both dot-coms and established companies, have competed in ways that violate nearly every precept of good strategy. Rather than focus on profits, they have chased customers indiscriminately through discounting, channel incentives, and advertising. Rather than concentrate on delivering value that earns an attractive price from customers, they have pursued indirect revenues such as advertising and click-through fees. Rather than make trade-offs, they have rushed to offer every conceivable product or service. It did not have to be this way--and it does not have to be in the future. When it comes to reinforcing a distinctive strategy, Michael Porter argues, the Internet provides a better technological platform than previous generations of IT. Gaining competitive advantage does not require a radically new approach to business; it requires building on the proven principles of effective strategy. Porter argues that, contrary to recent thought, the Internet is not disruptive to most existing industries and established companies. It rarely nullifies important sources of competitive advantage in an industry; it often makes them even more valuable. And as all companies embrace Internet technology, the Internet itself will be neutralized as a source of advantage. Robust competitive advantages will arise instead from traditional strengths such as unique products, proprietary content, and distinctive physical activities. Internet technology may be able to fortify those advantages, but it is unlikely to supplant them. Porter debunks such Internet myths as first-mover advantage, the power of virtual companies, and the multiplying rewards of network effects. He disentangles the distorted signals from the marketplace, explains why the Internet complements rather than cannibalizes existing ways of doing business, and outlines strategic imperatives for dot-coms and traditional companies.
Climate Change Impacts on Runoff Generation for the Design of Sustainable Stormwater Infrastructure
DOT National Transportation Integrated Search
2011-06-01
Climate change over the Pacific Northwest is expected to alter the hydrological cycle, such as an increase in winter flooding potential due to more precipitation falling as snow and more frequent rain on snow events. Existing infrastructure for storm...
Characteristics of the truck users and non-users of Texas toll roads.
DOT National Transportation Integrated Search
2009-08-01
As the use of toll roads increase to finance new road infrastructure or add capacity to existing road infrastructure, the : question of who use and do not use toll roads becomes increasingly important to toll road developers, financiers, : Traffic an...
Minimizing Overhead for Secure Computation and Fully Homomorphic Encryption: Overhead
2015-11-01
many inputs. We also improved our compiler infrastructure to handle very large circuits in a more scalable way. In Jan’13, we employed the AESNI and...Amazon’s elastic compute infrastructure , and is running under a Xen hypervisor. Since we do not have direct access to the bare metal, we cannot...creating novel opportunities for compressing au- thentication overhead. It is especially compelling that existing public key infrastructures can be used
Trust Management and Accountability for Internet Security
ERIC Educational Resources Information Center
Liu, Wayne W.
2011-01-01
Adversarial yet interacting interdependent relationships in information sharing and service provisioning have been a pressing issue of the Internet. Such relationships exist among autonomous software agents, in networking system peers, as well as between "service users and providers." Traditional "ad hoc" security approaches effective in…
Direct-to-consumer advertisements of prescription medications over the Internet.
Fogel, Joshua; Novick, Daniel
2009-01-01
This study sought data on the impact of direct-to-consumer (DTC) advertisements and both intentions and frequency to seek more information about the drug being advertised. Data were collected from 498 college students regarding intention to seek and how frequently they obtained more information about prescription medications. For intentions, grocery or pharmacy and radio advertisements were associated with lesser intentions. For frequency, Internet advertisements were associated, while newspaper and spam e-mail advertisements were not. Types of sources associated with seeking additional information were doctor, Internet, and 1-800 information numbers. A significant interaction existed for seeing Internet advertisements for drugs and then seeking additional information from a doctor and not from the Internet. In conclusion, Internet advertising is associated with seeking additional information from a reliable source such as a doctor.
The effect of the internet on teen and young adult tobacco use: a literature review.
Forsyth, Susan R; Kennedy, Christine; Malone, Ruth E
2013-01-01
Research has shown that a positive association exists between exposure to smoking imagery, such as that found in movies and print advertising, and the subsequent uptake of cigarette smoking. Children appear to be especially vulnerable to advertising messaging and other positive portrayals of smoking, given that most adult smokers develop the habit before age 18 years. Although many traditional types of media have been studied, the current generation of youth is growing up as digital natives, with young people increasingly using the Internet for entertainment and to obtain information. Currently the Internet is an essentially unregulated marketplace of ideas and images. However, the effect of the Internet on teen smoking initiation has received little attention in studies. In this literature review, we summarize and critique the existing work, identify current knowledge gaps, and offer suggestions to health care providers about how to address this issue. Copyright © 2013 National Association of Pediatric Nurse Practitioners. Published by Mosby, Inc. All rights reserved.
Utilization of Internet Protocol-Based Voice Systems in Remote Payload Operations
NASA Technical Reports Server (NTRS)
Best, Susan; Nichols, Kelvin; Bradford, Robert
2003-01-01
This viewgraph presentation provides an overview of a proposed voice communication system for use in remote payload operations performed on the International Space Station. The system, Internet Voice Distribution System (IVoDS), would make use of existing Internet protocols, and offer a number of advantages over the system currently in use. Topics covered include: system description and operation, system software and hardware, system architecture, project status, and technology transfer applications.
Internet café addiction of Taiwanese adolescents.
Wu, Chin-Shan; Cheng, Fei-Fei
2007-04-01
With the recent vigorous development, the Internet has become a part of life. And the Internet café has become an emerging industry under this new wave of Internet heat. However, the Internet café has also brought about many unexpected social problems and negative effects on society in Taiwan. For example, Internet café addiction (or pathological use) is a particular phenomenon derived from Internet café in Taiwan. But currently there are just a few scholars who attend to this problem. This study focuses mainly on the phenomenon of Internet café addiction among adolescents in Taiwan, the Internet café patronage behavior, and the cause of this phenomenon. Result of a questionnaire survey indicate that a significant difference exists between male and female adolescent in the following two aspects: "the stay hours for each visit in Internet café" and "Internet café addiction scores." Males' stay hours in Internet café are longer than females', and males also get higher Internet café addiction scores than females. The results also indicate that participants' degree of self-esteem and support from their social network can account for 30% of variance of Internet café addiction. Further, the results also suggest that social support is positively related to Internet café addiction score, whereas a negative relationship between self-esteem and Internet café addiction score is observed.
Silicon Valley as an Early Adopter for On-Demand Civil VTOL Operations
NASA Technical Reports Server (NTRS)
Antcliff, Kevin R.; Moore, Mark D.; Goodrich, Kenneth H.
2016-01-01
With high incomes, long commutes, severe ground geographic constraints, severe highway congestion during peak commute times, high housing costs, and near perfect year-round weather, the Silicon Valley is positioned to be an excellent early adopter market for emerging aviation On-Demand Mobility transportation solutions. Prior efforts have attempted to use existing aviation platforms (helicopters or General Aviation aircraft) with existing infrastructure solutions, or only investigated new vehicle platforms without understanding how to incorporate new vehicle types into existing built-up communities. Research has been performed with the objective of minimizing door-to-door time for "Hyper Commuters" (frequent, long-distance commuters) in the Silicon Valley through the development of new helipad infrastructure for ultra-low noise Vertical Takeoff and Landing (VTOL) aircraft. Current travel times for chosen city-pairs across urban and suburban commutes are compared to future mobility concepts that provide significantly higher utilization and productivity to yield competitive operating costs compared to existing transportation choices. Helipads are introduced near current modes of transportation and infrastructure for ease-of-access, and maximizing proximity. Strategies for both private and public infrastructure development are presented that require no new land purchase while minimizing community noise exposure. New VTOL concepts are introduced with cruise speeds of 200 mph, which yield a greater than three times improvement in overall door-to-door time when compared to current automobiles, and in some cases, improvements of up to 6 times lower trip times.
Research on key technologies of data processing in internet of things
NASA Astrophysics Data System (ADS)
Zhu, Yangqing; Liang, Peiying
2017-08-01
The data of Internet of things (IOT) has the characteristics of polymorphism, heterogeneous, large amount and processing real-time. The traditional structured and static batch processing method has not met the requirements of data processing of IOT. This paper studied a middleware that can integrate heterogeneous data of IOT, and integrated different data formats into a unified format. Designed a data processing model of IOT based on the Storm flow calculation architecture, integrated the existing Internet security technology to build the Internet security system of IOT data processing, which provided reference for the efficient transmission and processing of IOT data.
New Internet search volume-based weighting method for integrating various environmental impacts
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ji, Changyoon, E-mail: changyoon@yonsei.ac.kr; Hong, Taehoon, E-mail: hong7@yonsei.ac.kr
Weighting is one of the steps in life cycle impact assessment that integrates various characterized environmental impacts as a single index. Weighting factors should be based on the society's preferences. However, most previous studies consider only the opinion of some people. Thus, this research proposes a new weighting method that determines the weighting factors of environmental impact categories by considering public opinion on environmental impacts using the Internet search volumes for relevant terms. To validate the new weighting method, the weighting factors for six environmental impacts calculated by the new weighting method were compared with the existing weighting factors. Themore » resulting Pearson's correlation coefficient between the new and existing weighting factors was from 0.8743 to 0.9889. It turned out that the new weighting method presents reasonable weighting factors. It also requires less time and lower cost compared to existing methods and likewise meets the main requirements of weighting methods such as simplicity, transparency, and reproducibility. The new weighting method is expected to be a good alternative for determining the weighting factor. - Highlight: • A new weighting method using Internet search volume is proposed in this research. • The new weighting method reflects the public opinion using Internet search volume. • The correlation coefficient between new and existing weighting factors is over 0.87. • The new weighting method can present the reasonable weighting factors. • The proposed method can be a good alternative for determining the weighting factors.« less
Cairo, Sarah B; Kalisya, Luc Malemo; Bigabwa, Richard; Rothstein, David H
2018-03-01
Characterize pediatric surgical capacity in the eastern Democratic Republic of Congo (DRC) to identify areas of potential improvement. The Pediatric Personnel, Infrastructure, Procedures, Equipment, and Supplies (PediPIPES) survey was used in two representative eastern DRC provinces to assess existing surgical infrastructure and capacity. We compared our results to previously published reports from other sub-Saharan African countries. Fourteen hospitals in the eastern DRC and 37 in 19 sub-Saharan African (SSA) countries were compared. The average PediPIPES index for the DRC was 7.7 compared to 13.5 for SSAs. The greatest disparities existed in the areas of personnel and infrastructure. Running water was reportedly available to 57.1% of the hospitals in the DRC, and the majority of hospitals (78.6%) were dependent on generators and solar panels for electricity. Only two hospitals in the DRC (14.3%) reported a pediatric surgeon equivalent on staff, compared to 86.5% of facilities sampled in SSA reporting ≥ 1 pediatric surgeon. Significant barriers in personnel, infrastructure, procedures, equipment, and supplies impede the provision of adequate surgical care to children. Further work is needed to assess allocation and utilization of existing resources, and to enhance training of personnel with specific attention to pediatric surgery.
DOT National Transportation Integrated Search
2011-08-01
"Fiber reinforced polymer (FRP) materials have gained wide acceptance for repair and retrofit of existing infrastructures or to design new infrastructures due to their desirable properties (high strength to weight ratio, light weight and consequent e...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-01
... provide quantitative information regarding expected reductions in emissions of CO 2 or fuel consumption as... provide quantitative information that validates the existence of substantial transportation-related costs... infrastructure investments on systematic analysis of expected benefits and costs, including both quantitative and...
Cyber Security Assessment Report: Adventium Labs
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2007-12-31
Major control system components often have life spans of 15-20 years. Many systems in our Nation's critical infrastructure were installed before the Internet became a reality and security was a concern. Consequently, control systems are generally insecure. Security is now being included in the development of new control system devices; however, legacy control systems remain vulnerable. Most efforts to secure control systems are aimed at protecting network borers, but if an intruder gets inside the network these systems are vulnerable to a cyber attack.
Complex Networks and Critical Infrastructures
NASA Astrophysics Data System (ADS)
Setola, Roberto; de Porcellinis, Stefano
The term “Critical Infrastructures” indicates all those technological infrastructures such as: electric grids, telecommunication networks, railways, healthcare systems, financial circuits, etc. that are more and more relevant for the welfare of our countries. Each one of these infrastructures is a complex, highly non-linear, geographically dispersed cluster of systems, that interact with their human owners, operators, users and with the other infrastructures. Their augmented relevance and the actual political and technological scenarios, which have increased their exposition to accidental failure and deliberate attacks, demand for different and innovative protection strategies (generally indicate as CIP - Critical Infrastructure Protection). To this end it is mandatory to understand the mechanisms that regulate the dynamic of these infrastructures. In this framework, an interesting approach is those provided by the complex networks. In this paper we illustrate some results achieved considering structural and functional properties of the corresponding topological networks both when each infrastructure is assumed as an autonomous system and when we take into account also the dependencies existing among the different infrastructures.
Assessing culture via the Internet: methods and techniques for psychological research.
Barry, D T
2001-02-01
This study examines the acculturation experiences of Arabic immigrants and assesses the utility of the Internet as a data collection tool. Based on in-depth pilot interview data from 10 male Arabic immigrants and items selected from pre-existing measures, the Male Arabic Ethnic Identity Measure (MAEIM) was developed. Male Arab immigrants (115 males) were solicited through traditional methods in addition to the Internet. Satisfactory reliability and validity were reported for the MAEIM. No significant differences emerged between the Internet and Midwestern samples. The Internet proved to be an effective method for soliciting a relatively large, geographically dispersed sample of Arabic immigrants. The use of the Internet as a research tool is examined in the context of anonymity, networking, low-cost, perceived interactive control, methodological rigor, and external validity. The Internet was an effective vehicle for addressing concerns raised by prospective participants. It is suggested that the Internet may be an important method to assess culture-relevant variables in further research on Arab and other immigrant populations.
NASA Astrophysics Data System (ADS)
Zhang, Geng; Lu, Meiling; Zhang, Dahua; Zhou, Liang; Li, Likang
2017-01-01
Energy internet is a kind of power sharing network, which can realize the bidirectional flow of energy information on the basis of the existing power grid. It puts forward higher requirements for reliability and controllability of information communication, and all kinds of business QoS of the backbone network. So the research of business QoS and trustworthy and controllable strategies mechanism have an important significance for the development of energy internet. This paper mainly studies how to use the software defined network (SDN) to achieve business QoS, and provide QoS support for all kinds of business of the energy internet. Combined with the current development situation of the energy internet in our country, this paper researches the trustworthy and controllable strategies mechanism for energy internet, and proposes the transition scheme of the IPv6 credible network architecture based on SDN. This coordinates the contradiction between the growing demand for energy internet applications and the limitations of the energy internet technology itself.
2014-09-01
power. The wireless infrastructure is an expansion of the current DOD IE which can be leveraged to connect mobile capabilities and technologies. The...DOD must focus on three critical areas central to mobility : the wireless infrastructure , the devices themselves, and the applications the devices use... infrastructure to support mobile devices. – The intent behind this goal is to improve the existing wireless backbone to support secure voice, data, and video
Open Drug Discovery Teams: A Chemistry Mobile App for Collaboration.
Ekins, Sean; Clark, Alex M; Williams, Antony J
2012-08-01
The Open Drug Discovery Teams (ODDT) project provides a mobile app primarily intended as a research topic aggregator of predominantly open science data collected from various sources on the internet. It exists to facilitate interdisciplinary teamwork and to relieve the user from data overload, delivering access to information that is highly relevant and focused on their topic areas of interest. Research topics include areas of chemistry and adjacent molecule-oriented biomedical sciences, with an emphasis on those which are most amenable to open research at present. These include rare and neglected diseases, and precompetitive and public-good initiatives such as green chemistry. The ODDT project uses a free mobile app as user entry point. The app has a magazine-like interface, and server-side infrastructure for hosting chemistry-related data as well as value added services. The project is open to participation from anyone and provides the ability for users to make annotations and assertions, thereby contributing to the collective value of the data to the engaged community. Much of the content is derived from public sources, but the platform is also amenable to commercial data input. The technology could also be readily used in-house by organizations as a research aggregator that could integrate internal and external science and discussion. The infrastructure for the app is currently based upon the Twitter API as a useful proof of concept for a real time source of publicly generated content. This could be extended further by accessing other APIs providing news and data feeds of relevance to a particular area of interest. As the project evolves, social networking features will be developed for organizing participants into teams, with various forms of communication and content management possible.
Open Drug Discovery Teams: A Chemistry Mobile App for Collaboration
Ekins, Sean; Clark, Alex M; Williams, Antony J
2012-01-01
Abstract The Open Drug Discovery Teams (ODDT) project provides a mobile app primarily intended as a research topic aggregator of predominantly open science data collected from various sources on the internet. It exists to facilitate interdisciplinary teamwork and to relieve the user from data overload, delivering access to information that is highly relevant and focused on their topic areas of interest. Research topics include areas of chemistry and adjacent molecule-oriented biomedical sciences, with an emphasis on those which are most amenable to open research at present. These include rare and neglected diseases, and precompetitive and public-good initiatives such as green chemistry. The ODDT project uses a free mobile app as user entry point. The app has a magazine-like interface, and server-side infrastructure for hosting chemistry-related data as well as value added services. The project is open to participation from anyone and provides the ability for users to make annotations and assertions, thereby contributing to the collective value of the data to the engaged community. Much of the content is derived from public sources, but the platform is also amenable to commercial data input. The technology could also be readily used in-house by organizations as a research aggregator that could integrate internal and external science and discussion. The infrastructure for the app is currently based upon the Twitter API as a useful proof of concept for a real time source of publicly generated content. This could be extended further by accessing other APIs providing news and data feeds of relevance to a particular area of interest. As the project evolves, social networking features will be developed for organizing participants into teams, with various forms of communication and content management possible. PMID:23198003
Rubinstein, Yaffa R; Groft, Stephen C; Bartek, Ronald; Brown, Kyle; Christensen, Ronald A; Collier, Elaine; Farber, Amy; Farmer, Jennifer; Ferguson, John H; Forrest, Christopher B; Lockhart, Nicole C; McCurdy, Kate R; Moore, Helen; Pollen, Geraldine B; Richesson, Rachel; Miller, Vanessa Rangel; Hull, Sara; Vaught, Jim
2010-09-01
A movement to create a global patient registry for as many as 7,000 rare diseases was launched at a workshop, "Advancing Rare Disease Research: The Intersection of Patient Registries, Biospecimen Repositories, and Clinical Data." http://rarediseases.info.nih.gov/PATIENT_REGISTRIES_WORKSHOP/. The workshop was sponsored by the Office of Rare Diseases Research (ORDR). The focus was the building of an infrastructure for an internet-based global registry linking to biorepositories. Such a registry would serve the patients, investigators, and drug companies. To aid researchers the participants suggested the creation of a centralized database of biorepositories for rare biospecimens (RD-HUB)http://biospecimens.ordr.info.nih.gov/ that could be linked to the registry. Over two days of presentations and breakout sessions, several hundred attendees discussed government rules and regulations concerning privacy and patients' rights and the nature and scope of data to be entered into a central registry as well as concerns about how to validate patient and clinician-entered data to ensure data accuracy. Mechanisms for aggregating data from existing registries were also discussed. The attendees identified registry best practices, model coding systems, international systems for recruiting patients into clinical trials and novel ways of using the internet directly to invite participation in research. They also speculated about who would bear ultimate responsibility for the informatics in the registry and who would have access to the information. Hurdles associated with biospecimen collection and how to overcome them were detailed. The development of the recommendations was, in itself, an indication of the commitment of the rare disease community as never before. Published by Elsevier Inc.
Angelstam, Per; Khaulyak, Olha; Yamelynets, Taras; Mozgeris, Gintautas; Naumov, Vladimir; Chmielewski, Tadeusz J; Elbakidze, Marine; Manton, Michael; Prots, Bohdan; Valasiuk, Sviataslau
2017-05-15
The functionality of forest patches and networks as green infrastructure may be affected negatively both by expanding road networks and forestry intensification. We assessed the effects of (1) the current and planned road infrastructure, and (2) forest loss and gain, on the remaining large forest landscape massifs as green infrastructure at the EU's eastern border region in post-socialistic transition. First, habitat patch and network functionality in 1996-98 was assessed using habitat suitability index modelling. Second, we made expert interviews about road development with planners in 10 administrative regions in Poland, Belarus and Ukraine. Third, forest loss and gain inside the forest massifs, and gain outside them during the period 2001-14 were measured. This EU cross-border region hosts four remaining forest massifs as regional green infrastructure hotspots. While Poland's road network is developing fast in terms of new freeways, city bypasses and upgrades of road quality, in Belarus and Ukraine the focus is on maintenance of existing roads, and no new corridors. We conclude that economic support from the EU, and thus rapid development of roads in Poland, is likely to reduce the permeability for wildlife of the urban and agricultural matrix around existing forest massifs. However, the four identified forest massifs themselves, forming the forest landscape green infrastructure at the EU's east border, were little affected by road development plans. In contrast, forest loss inside massifs was high, especially in Ukraine. Only in Poland forest loss was balanced by gain. Forest gain outside forest massifs was low. To conclude, pro-active and collaborative spatial planning across different sectors and countries is needed to secure functional forest green infrastructure as base for biodiversity conservation and human well-being. Copyright © 2017. Published by Elsevier Ltd.
The Self-Organising Seismic Early Warning Information Network
NASA Astrophysics Data System (ADS)
Kühnlenz, F.; Eveslage, I.; Fischer, J.; Fleming, K. M.; Lichtblau, B.; Milkereit, C.; Picozzi, M.
2009-12-01
The Self-Organising Seismic Early Warning Information Network (SOSEWIN) represents a new approach for Earthquake Early Warning Systems (EEWS), consisting in taking advantage of novel wireless communications technologies without the need of a planned, centralised infrastructure. It also sets out to overcome problems of insufficient node density, which typically affects present existing early warning systems, by having the SOSEWIN seismological sensing units being comprised of low-cost components (generally bought "off-the-shelf"), with each unit initially costing 100's of Euros, in contrast to 1,000's to 10,000's for standard seismological stations. The reduced sensitivity of the new sensing units arising from the use of lower-cost components will be compensated by the network's density, which in the future is expected to number 100's to 1000's over areas served currently by the order of 10's of standard stations. The robustness, independence of infrastructure, spontaneous extensibility due to a self-healing/self-organizing character in the case of removing/failing or adding sensors makes SOSEWIN potentially useful for various use cases, e.g. monitoring of building structures or seismic microzonation. Nevertheless its main purpose is the earthquake early warning, for which reason the ground motion is continuously monitored by conventional accelerometers (3-component) and processed within a station. Based on this, the network itself decides whether an event is detected through cooperating stations. SEEDLink is used to store and provide access to the sensor data. Experiences and selected experiment results with the SOSEWIN-prototype installation in the Ataköy district of Istanbul (Turkey) are presented. SOSEWIN considers also the needs of earthquake task forces, which want to set-up a temporary seismic network rapidly and with light-weighted stations to record after-shocks. The wireless and self-organising character of this sensor network is of great value to do this job in a shorter time and with less manpower compared to using common seismic stations as we could see during the L'Aquila earthquake, where SOSEWIN was used to monitor damaged buildings. We present here the graphical front-end of SOSEWIN in its usage for different scenarios. It belongs to a management infrastructure based on GIS and database technologies and therefore coupling with existing infrastructures should be simplified. Connecting the domain expert’s laptop running the management software with a SOSEWIN may be fulfilled via any arbitrary node in the network (on-site access) or via a gateway node from a remote location using the internet. The scenarios focus on the needs of certain domain experts (seismologists or maybe engineers) and include the planning of a network installation, support during the installation process and testing of this installation. Another scenario mentions monitoring aspects of an already installed SOSEWIN and finally a scenario deals with the visualization of the alarming protocol detecting an earthquake event and issuing an early warning.
47 CFR 54.504 - Requests for services.
Code of Federal Regulations, 2014 CFR
2014-10-01
... pricing and technology infrastructure information submitted as part of an FCC Form 471 shall be treated as... disclosure of pricing or technology infrastructure information. (ii) The exemption for existing contract... school” as defined in § 54.500 of this subpart, do not operate as for-profit businesses, and do not have...
Keeley, Melissa; Koburger, Althea; Dolowitz, David P; Medearis, Dale; Nickel, Darla; Shuster, William
2013-06-01
Green infrastructure is a general term referring to the management of landscapes in ways that generate human and ecosystem benefits. Many municipalities have begun to utilize green infrastructure in efforts to meet stormwater management goals. This study examines challenges to integrating gray and green infrastructure for stormwater management, informed by interviews with practitioners in Cleveland, OH and Milwaukee WI. Green infrastructure in these cities is utilized under conditions of extreme fiscal austerity and its use presents opportunities to connect stormwater management with urban revitalization and economic recovery while planning for the effects of negative- or zero-population growth. In this context, specific challenges in capturing the multiple benefits of green infrastructure exist because the projects required to meet federally mandated stormwater management targets and the needs of urban redevelopment frequently differ in scale and location.
Perspectives on the Use of Green Infrastructure for Stormwater Management in Cleveland and Milwaukee
NASA Astrophysics Data System (ADS)
Keeley, Melissa; Koburger, Althea; Dolowitz, David P.; Medearis, Dale; Nickel, Darla; Shuster, William
2013-06-01
Green infrastructure is a general term referring to the management of landscapes in ways that generate human and ecosystem benefits. Many municipalities have begun to utilize green infrastructure in efforts to meet stormwater management goals. This study examines challenges to integrating gray and green infrastructure for stormwater management, informed by interviews with practitioners in Cleveland, OH and Milwaukee WI. Green infrastructure in these cities is utilized under conditions of extreme fiscal austerity and its use presents opportunities to connect stormwater management with urban revitalization and economic recovery while planning for the effects of negative- or zero-population growth. In this context, specific challenges in capturing the multiple benefits of green infrastructure exist because the projects required to meet federally mandated stormwater management targets and the needs of urban redevelopment frequently differ in scale and location.
Starving for Support: How Women with Anorexia Receive "Thinspiration" on the Internet
ERIC Educational Resources Information Center
Curry, Jennifer; Ray, Shannon
2010-01-01
This article provides the definition of anorexia, prevalence of the disorder, and treatment prognosis. Further, although the Internet provides many helpful resources for identifying problematic eating behavior and resources for persons suffering with eating disorders, Web sites exist that are meant to encourage, promote, and sustain anorexic…
ERIC Educational Resources Information Center
Noguchi, Kay
The Internet, a worldwide network of computer networks, is a noncommercial service with acceptable use restricted to the advancement of education and research. Although it has been in existence for quite a while, it is still new to most elementary and secondary educators in the Pacific region and elsewhere. This report is an introduction to the…
Customization of Education through Online Learning
ERIC Educational Resources Information Center
Rayburn, Kalim
2011-01-01
The educational opportunities provided through connectivity to the internet that did not previously exist make way for many opportunities to expand curricular options. Through the use of technology and the internet students are able to receive education through a tailored learning approach delivered via online resources. The purpose of this study…
NASA Astrophysics Data System (ADS)
Wyborn, L. A.; Woodcock, R.
2013-12-01
One of the greatest drivers for change in the way scientific research is undertaken in Australia was the development of the Australian eResearch Infrastructure which was coordinated by the then Australian Government Department of Innovation, Industry, Science and Research. There were two main tranches of funding: the 2007-2013 National Collaborative Research Infrastructure Strategy (NCRIS) and the 2009 Education and Investment Framework (EIF) Super Science Initiative. Investments were in two areas: the Australian e-Research Infrastructure and domain specific capabilities: combined investment in both is 1,452M with at least 456M being invested in eResearch infrastructure. NCRIS was specifically designed as a community-guided process to provide researchers, both academic and government, with major research facilities, supporting infrastructures and networks necessary for world-class research. Extensive community engagement was sought to inform decisions on where Australia could best make strategic infrastructure investments to further develop its research capacity and improve research outcomes over the next 5 to 10years. The current (2007-2014) Australian e-Research Infrastructure has 2 components: 1. The National eResearch physical infrastructure which includes two petascale HPC facilities (one in Canberra and one in Perth), a 10 Gbps national network (National Research Network), a national data storage infrastructure comprising 8 multi petabyte data stores and shared access methods (Australian Access Federation). 2. A second component is focused on research integration infrastructures and includes the Australian National Data Service, which is concerned with better management, description and access to distributed research data in Australia and the National eResearch Collaboration Tools and Resources (NeCTAR) project. NeCTAR is centred on developing problem oriented digital laboratories which provide better and coordinated access to research tools, data environments and workflows. The eResearch Infrastructure Stack is designed to support 12 individual domain-specific capabilities. Four are relevant to the Earth and Space Sciences: (1) AuScope (a national Earth Science Infrastructure Program), (2) the Integrated Marine Observing System (IMOS), (3) the Terrestrial Ecosystems Research Network (TERN) and (4) the Australian Urban Research Infrastructure Network (AURIN). The two main research integration infrastructures, ANDS and NeCTAR, are seen as pivotal to the success of the Australian eResearch Infrastructure. Without them, there was a risk that that the investments in new computers and data storage would provide physical infrastructure, but few would come to use it as the skills barriers to entry were too high. ANDS focused on transforming Australia's research data environment. Its flagship is Research Data Australia, an Internet-based discovery service designed to provide rich connections between data, projects, researchers and institutions, and promote visibility of Australian research data collections in search engines. NeCTAR focused on building eResearch infrastructure in four areas: virtual laboratories, tools, a federated research cloud and a hosting service. Combined, ANDS and NeCTAR are ensuring that people ARE coming and ARE using the physical infrastructures that were built.
BRIEF REPORT: What Types of Internet Guidance Do Patients Want from Their Physicians?
Diaz, Joseph A; Sciamanna, Christopher N; Evangelou, Evangelos; Stamp, Michael J; Ferguson, Tom
2005-01-01
Objectives To understand what patients expect from physicians regarding information seeking on the Internet. Design Self-administered survey. Setting/Participants Waiting rooms of 4 community-based primary care offices. Measurements/Main Results Of 494 patients invited to participate, 330 completed the survey for a response rate of 67%. Of 177 respondents who used the Internet for health information, only 15% agreed that physicians should ask them about their Internet searches. Most (62%) agreed that physicians should recommend specific web sites where patients can learn more about their health care. Conclusions Primary care physicians should recognize that many patients would like guidance as they turn to the Internet for medical information. Physicians can utilize quality assessment tools and existing resources that facilitate referring patients to authoritative, commercial-free, patient-oriented medical information on the Internet. PMID:16050874
Chon, Yongho
2013-01-01
One of the main reasons for reforming long-term care systems is a deficient existing service infrastructure for the elderly. This article provides an overview of why and how the Korean government expanded long-term care infrastructure through the introduction of a new compulsory insurance system, with a particular focus on the market-friendly policies used to expand the infrastructure. Then, the positive results of the expansion of the long-term care infrastructure and the challenges that have emerged are examined. Finally, it is argued that the Korean government should actively implement a range of practical policies and interventions within the new system.
Boutin, Natalie; Holzbach, Ana; Mahanta, Lisa; Aldama, Jackie; Cerretani, Xander; Embree, Kevin; Leon, Irene; Rathi, Neeta; Vickers, Matilde
2016-01-01
The Biobank and Translational Genomics core at Partners Personalized Medicine requires robust software and hardware. This Information Technology (IT) infrastructure enables the storage and transfer of large amounts of data, drives efficiencies in the laboratory, maintains data integrity from the time of consent to the time that genomic data is distributed for research, and enables the management of complex genetic data. Here, we describe the functional components of the research IT infrastructure at Partners Personalized Medicine and how they integrate with existing clinical and research systems, review some of the ways in which this IT infrastructure maintains data integrity and security, and discuss some of the challenges inherent to building and maintaining such infrastructure. PMID:26805892
DOE Office of Scientific and Technical Information (OSTI.GOV)
McCaskey, Alexander J.
Hybrid programming models for beyond-CMOS technologies will prove critical for integrating new computing technologies alongside our existing infrastructure. Unfortunately the software infrastructure required to enable this is lacking or not available. XACC is a programming framework for extreme-scale, post-exascale accelerator architectures that integrates alongside existing conventional applications. It is a pluggable framework for programming languages developed for next-gen computing hardware architectures like quantum and neuromorphic computing. It lets computational scientists efficiently off-load classically intractable work to attached accelerators through user-friendly Kernel definitions. XACC makes post-exascale hybrid programming approachable for domain computational scientists.
NASA Astrophysics Data System (ADS)
Purser, Autun; Kwasnitschka, Tom; Duda, Alexander; Schwendner, Jakob; Bamberg, Marlene; Sohl, Frank; Doya, Carol; Aguzzi, Jacopo; Best, Mairi; Llovet, Neus Campanya I.; Scherwath, Martin; Thomsen, Laurenz
2015-04-01
Cabled internet and power connectivity with the deep sea allow instruments to operate in the deep sea at higher temporal resolutions than was possible historically, with the reliance on battery life and data storage capacities. In addition to the increase in sensor temporal frequency, cabled infrastructures now allow remote access to and control of mobile platforms on the seafloor. Jacobs University Bremen, in combination with collaborators from the Robotic Exploration of Extreme Environments (ROBEX) project, CSIC Barcelona and Ocean Networks Canada have been operating tracked deep sea crawler vehicles at ~890 m depth at the dynamic Barkley Canyon methane seep site, Pacific Canada during the last ~4 years. The vehicle has been able to explore an area of ~50 m radius, allowing repeated visits to numerous microhabitats. Mounting a range of sensors, including temperature, pressure, conductivity, fluorescence, turbidity, flow and methane concentration sensors, as well as various camera systems a large dataset has been compiled. Several methane pockmarks are present in the survey area, and geological, biological and oceanographic changes have been monitored over a range of timescales. Several publications have been produced, and in this presentation we introduce further data currently under analysis. Cabled internet connectivity further allows mobile platforms to be used directly in education. As part of the ROBEX project, researchers and students from both terrestrial and planetary sciences are using the crawler in an ongoing study project. Students are introduced to statistical methods from both fields during the course and in later stages they can plan their own research using the in-situ crawler, and follow the progress of their investigations live, then analyse the collected data using the techniques introduced during the course. Cabled infrastructures offer a unique facility for spatial investigation of extreme ecosystems over time, and for the 'hands on' education of future students.
Tribal connections health information outreach: results, evaluation, and challenges
Wood, Fred B.; Sahali, Roy; Press, Nancy; Burroughs, Catherine; Mala, Theodore A.; Siegel, Elliot R.; Fuller, Sherrilynne S.; Rambo, Neil
2003-01-01
In 1997, the National Library of Medicine (NLM), a component of the National Institutes of Health (NIH), initiated a program of intensified outreach to Native Americans, initially focusing on the Pacific Northwest in collaboration with the Pacific Northwest Regional Medical Library (PNRML). This initiative, known as the Tribal Connections Project, emphasized the establishment or strengthening of Internet connections at select Indian reservations and Alaska Native villages and related needs assessment and training. The hope was that these efforts would improve tribal access to health information available via the Internet and the Web. Phase I included sixteen tribal sites—eight in Washington, four in Alaska, two in Montana, and one each in Oregon and Idaho. Phase I results indicate that the project was successful in assessing local needs and building awareness of the Internet, forging new partnerships with and between the participating Indian reservations and Alaska Native villages and other organizations, making real improvements in the information technology (IT) infrastructure and Internet connectivity at fifteen of sixteen sites, and conducting training sessions with several hundred tribal participants across thirteen sites. Most importantly, the project demonstrated the key role of tribal community involvement and empowerment and contributed to development of an outreach evaluation field manual and the evolving concept of community-based outreach. The knowledge gained from Tribal Connections Project Phase I is helping refine and enhance subsequent NLM-sponsored tribal connections and similar community outreach efforts. PMID:12568158
Takeda, Hiroshi; Matsumura, Yasushi; Nakagawa, Katsuhiko; Teratani, Tadamasa; Qiyan, Zhang; Kusuoka, Hideo; Matsuoka, Masami
2004-01-01
To share healthcare information and to promote cooperation among healthcare providers and customers (patients) under computerized network environment, a non-profit organization (NPO), named as OCHIS, was established at Osaka, Japan in 2003. Since security and confidentiality issues on the Internet have been major concerns in the OCHIS, the system has been based on healthcare public key infrastructure (HPKI), and found that there remained problems to be solved technically and operationally. An experimental study was conducted to elucidate the central and the local function in terms of a registration authority and a time stamp authority by contracting with the Ministry of Economics and Trading Industries in 2003. This paper describes the experimental design with NPO and the results of the study concerning message security and HPKI. The developed system has been operated practically in Osaka urban area.
Security policies and trust in ubiquitous computing.
Joshi, Anupam; Finin, Tim; Kagal, Lalana; Parker, Jim; Patwardhan, Anand
2008-10-28
Ubiquitous environments comprise resource-constrained mobile and wearable devices and computational elements embedded in everyday artefacts. These are connected to each other using both infrastructure-based as well as short-range ad hoc networks. Limited Internet connectivity limits the use of conventional security mechanisms such as public key infrastructures and other forms of server-centric authentication. Under these circumstances, peer-to-peer interactions are well suited for not just information interchange, but also managing security and privacy. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust and determining the reliability and accuracy of peer-provided data in such interactions are still in their infancy. Our research is directed towards providing stronger assurances of the reliability and trustworthiness of information and services, and the use of declarative policy-driven approaches to handle the open and dynamic nature of such systems. This paper provides an overview of some of the challenges and issues, and points out directions for progress.
NASA Technical Reports Server (NTRS)
Ivancic, William; Stewart, Dave; Shell, Dan; Wood, Lloyd; Paulsen, Phil; Jackson, Chris; Hodgson, Dave; Notham, James; Bean, Neville; Miller, Eric
2005-01-01
This report documents the design of network infrastructure to support operations demonstrating the concept of network-centric operations and command and control of space-based assets. These demonstrations showcase major elements of the Transformal Communication Architecture (TCA), using Internet Protocol (IP) technology. These demonstrations also rely on IP technology to perform the functions outlined in the Consultative Committee for Space Data Systems (CCSDS) Space Link Extension (SLE) document. A key element of these demonstrations was the ability to securely use networks and infrastructure owned and/or controlled by various parties. This is a sanitized technical report for public release. There is a companion report available to a limited audience. The companion report contains detailed networking addresses and other sensitive material and is available directly from William Ivancic at Glenn Research Center.
Ben Said, Mohamed; Robel, Laurence; Golse, Bernard; Jais, Jean Philippe
2017-01-01
Autism spectrum disorders (ASD) are complex neuro-developmental disorders affecting children in their early age. The diagnosis of ASD relies on multidisciplinary investigations, in psychiatry, neurology, genetics, electrophysiology, neuro-imagery, audiology and ophthalmology. In order to support clinicians, researchers and public health decision makers, we designed an information system dedicated to ASD, called TEDIS. TEDIS was designed to manage systematic, exhaustive and continuous multi-centric patient data collection via secured Internet connections. In this paper, we present the security policy and security infrastructure we developed to protect ASD' patients' clinical data and patients' privacy. We tested our system on 359 ASD patient records in a local secured intranet environment and showed that the security system is functional, with a consistent, transparent and safe encrypting-decrypting behavior. It is ready for deployment in the nine ASD expert assessment centers in the Ile de France district.
Influence of Security Mechanisms on the Quality of Service of VoIP
NASA Astrophysics Data System (ADS)
Backs, Peter; Pohlmann, Norbert
While Voice over IP (VoIP) is advancing rapidly in the telecommunications market, the interest to protect the data transmitted by this new service is also rising. However, in contrast to other internet services such as email or HTTP, VoIP is real-time media, and therefore must meet a special requirement referred to as Quality-of-Service to provide a comfortable flow of speech. Speech quality is worsened when transmitted over the network due to delays in transmission or loss of packets. Often, voice quality is at a level that even prevents comprehensive dialog. Therefore, an administrator who is to setup a VoIP infrastructure might consider avoiding additional decreases in voice quality resulting from security mechanisms, and might leave internet telephony unprotected as a result. The inspiration for this paper is to illustrate that security mechanisms have negligible impact on speech quality and should in fact be encouraged.
Cloud@Home: A New Enhanced Computing Paradigm
NASA Astrophysics Data System (ADS)
Distefano, Salvatore; Cunsolo, Vincenzo D.; Puliafito, Antonio; Scarpa, Marco
Cloud computing is a distributed computing paradigm that mixes aspects of Grid computing, ("… hardware and software infrastructure that provides dependable, consistent, pervasive, and inexpensive access to high-end computational capabilities" (Foster, 2002)) Internet Computing ("…a computing platform geographically distributed across the Internet" (Milenkovic et al., 2003)), Utility computing ("a collection of technologies and business practices that enables computing to be delivered seamlessly and reliably across multiple computers, ... available as needed and billed according to usage, much like water and electricity are today" (Ross & Westerman, 2004)) Autonomic computing ("computing systems that can manage themselves given high-level objectives from administrators" (Kephart & Chess, 2003)), Edge computing ("… provides a generic template facility for any type of application to spread its execution across a dedicated grid, balancing the load …" Davis, Parikh, & Weihl, 2004) and Green computing (a new frontier of Ethical computing1 starting from the assumption that in next future energy costs will be related to the environment pollution).
Real-time long term measurement using integrated framework for ubiquitous smart monitoring
NASA Astrophysics Data System (ADS)
Heo, Gwanghee; Lee, Giu; Lee, Woosang; Jeon, Joonryong; Kim, Pil-Joong
2007-04-01
Ubiquitous monitoring combining internet technologies and wireless communication is one of the most promising technologies of infrastructure health monitoring against the natural of man-made hazards. In this paper, an integrated framework of the ubiquitous monitoring is developed for real-time long term measurement in internet environment. This framework develops a wireless sensor system based on Bluetooth technology and sends measured acceleration data to the host computer through TCP/IP protocol. And it is also designed to respond to the request of web user on real time basis. In order to verify this system, real time monitoring tests are carried out on a prototype self-anchored suspension bridge. Also, wireless measurement system is analyzed to estimate its sensing capacity and evaluate its performance for monitoring purpose. Based on the evaluation, this paper proposes the effective strategies for integrated framework in order to detect structural deficiencies and to design an early warning system.
Mobile Crowd Sensing for Traffic Prediction in Internet of Vehicles.
Wan, Jiafu; Liu, Jianqi; Shao, Zehui; Vasilakos, Athanasios V; Imran, Muhammad; Zhou, Keliang
2016-01-11
The advances in wireless communication techniques, mobile cloud computing, automotive and intelligent terminal technology are driving the evolution of vehicle ad hoc networks into the Internet of Vehicles (IoV) paradigm. This leads to a change in the vehicle routing problem from a calculation based on static data towards real-time traffic prediction. In this paper, we first address the taxonomy of cloud-assisted IoV from the viewpoint of the service relationship between cloud computing and IoV. Then, we review the traditional traffic prediction approached used by both Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) communications. On this basis, we propose a mobile crowd sensing technology to support the creation of dynamic route choices for drivers wishing to avoid congestion. Experiments were carried out to verify the proposed approaches. Finally, we discuss the outlook of reliable traffic prediction.
Mobile Crowd Sensing for Traffic Prediction in Internet of Vehicles
Wan, Jiafu; Liu, Jianqi; Shao, Zehui; Vasilakos, Athanasios V.; Imran, Muhammad; Zhou, Keliang
2016-01-01
The advances in wireless communication techniques, mobile cloud computing, automotive and intelligent terminal technology are driving the evolution of vehicle ad hoc networks into the Internet of Vehicles (IoV) paradigm. This leads to a change in the vehicle routing problem from a calculation based on static data towards real-time traffic prediction. In this paper, we first address the taxonomy of cloud-assisted IoV from the viewpoint of the service relationship between cloud computing and IoV. Then, we review the traditional traffic prediction approached used by both Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) communications. On this basis, we propose a mobile crowd sensing technology to support the creation of dynamic route choices for drivers wishing to avoid congestion. Experiments were carried out to verify the proposed approaches. Finally, we discuss the outlook of reliable traffic prediction. PMID:26761013
A hybrid mobile-based patient location tracking system for personal healthcare applications.
Chew, S H; Chong, P A; Gunawan, E; Goh, K W; Kim, Y; Soh, C B
2006-01-01
In the next generation of Infocommunications, mobile Internet-enabled devices and third generation mobile communication networks have become reality, location based services (LBS) are expected to be a major area of growth. Providing information, content and services through positioning technologies forms the platform for new services for users and developers, as well as creating new revenue channels for service providers. These crucial advances in location based services have opened up new opportunities in real time patient tracking for personal healthcare applications. In this paper, a hybrid mobile-based location technique using the global positioning system (GPS) and cellular mobile network infrastructure is employed to provide the location tracking capability. This function will be integrated into the patient location tracking system (PLTS) to assist caregivers or family members in locating patients such as elderly or dependents when required, especially in emergencies. The capability of this PLTS is demonstrated through a series of location detection tests conducted over different operating conditions. Although the model is at its initial stage of development, it has shown relatively good accuracy for position tracking and potential of using integrated wireless technology to enhance the existing personal healthcare communication system through location based services.
Fast massive preventive security and information communication systems
NASA Astrophysics Data System (ADS)
Akopian, David; Chen, Philip; Miryakar, Susheel; Kumar, Abhinav
2008-04-01
We present a fast massive information communication system for data collection from distributive sources such as cell phone users. As a very important application one can mention preventive notification systems when timely notification and evidence communication may help to improve safety and security through wide public involvement by ensuring easy-to-access and easy-to-communicate information systems. The technology significantly simplifies the response to the events and will help e.g. special agencies to gather crucial information in time and respond as quickly as possible. Cellular phones are nowadays affordable for most of the residents and became a common personal accessory. The paper describes several ways to design such systems including existing internet access capabilities of cell phones or downloadable specialized software. We provide examples of such designs. The main idea is in structuring information in predetermined way and communicating data through a centralized gate-server which will automatically process information and forward it to a proper destination. The gate-server eliminates a need in knowing contact data and specific local community infrastructure. All the cell phones will have self-localizing capability according to FCC E911 mandate, thus the communicated information can be further tagged automatically by location and time information.
Fast Flux Watch: A mechanism for online detection of fast flux networks.
Al-Duwairi, Basheer N; Al-Hammouri, Ahmad T
2014-07-01
Fast flux networks represent a special type of botnets that are used to provide highly available web services to a backend server, which usually hosts malicious content. Detection of fast flux networks continues to be a challenging issue because of the similar behavior between these networks and other legitimate infrastructures, such as CDNs and server farms. This paper proposes Fast Flux Watch (FF-Watch), a mechanism for online detection of fast flux agents. FF-Watch is envisioned to exist as a software agent at leaf routers that connect stub networks to the Internet. The core mechanism of FF-Watch is based on the inherent feature of fast flux networks: flux agents within stub networks take the role of relaying client requests to point-of-sale websites of spam campaigns. The main idea of FF-Watch is to correlate incoming TCP connection requests to flux agents within a stub network with outgoing TCP connection requests from the same agents to the point-of-sale website. Theoretical and traffic trace driven analysis shows that the proposed mechanism can be utilized to efficiently detect fast flux agents within a stub network.
A transmission security framework for email-based telemedicine.
Caffery, Liam J; Smith, Anthony C
2010-01-01
Encryption is used to convert an email message to an unreadable format thereby securing patient privacy during the transmission of the message across the Internet. Two available means of encryption are: public key infrastructure (PKI) used in conjunction with ordinary email and secure hypertext transfer protocol (HTTPS) used by secure web-mail applications. Both of these approaches have advantages and disadvantages in terms of viability, cost, usability and compliance. The aim of this study was develop an instrument to identify the most appropriate means of encrypting email communication for telemedicine. A multi-method approach was used to construct the instrument. Technical assessment and existing bodies of knowledge regarding the utility of PKI were analyzed, along with survey results from users of Queensland Health's Child and Youth Mental Health Service secure web-mail service. The resultant decision support model identified that the following conditions affect the choice of encryption technology: correspondent's risk perception, correspondent's identification to the security afforded by encryption, email-client used by correspondents, the tolerance to human error and the availability of technical resources. A decision support model is presented as a flow chart to identify the most appropriate encryption for a specific email-based telemedicine service.
Tweeting in the Classroom: Instant feedback and assessment using a mobile web app
NASA Astrophysics Data System (ADS)
Saravanan, R.
2011-12-01
Cell phones with texting capabilities are ubiquitous in the college classroom, and smart phones are becoming increasingly common. These phones are used primarily for personal activities, including social networking, and are expected to remain switched off during instruction. The powerful communication capability of these devices, which could potentially facilitate novel forms of "instructional networking", remains untapped. Instead, special-purpose devices ("clickers") are used when instant feedback is desired in the classroom. A number of technical and behavioral challenges need to be overcome before mobile phones can be used routinely to assist in classroom instruction. This presentation will describe the experience of developing and deploying a mobile web app that enables students to provide instant feedback in the classroom using their mobile phones. The web app leverages existing social networking infrastructure, e.g., using the Twitter microblogging service to aggregate text messages sent by students, to promote classroom interaction. The web app was deployed both in a regular lecture hall and in a computer lab. Topics to be discussed include the technical challenges of deploying a mobile web app in a classroom setting, such as internet accessibility and latency, as well as non-technical issues relating to privacy, student reactions, etc.
A Community-Led Medical Response Effort in the Wake of Hurricane Sandy.
Kraushar, Matthew L; Rosenberg, Rebecca E
2015-08-01
On October 29, 2012, Hurricane Sandy made landfall in the neighborhood of Red Hook in Brooklyn, New York. The massive tidal surge generated by the storm submerged the coastal area, home to a population over 11,000 individuals, including the largest public housing development in Brooklyn. The infrastructure devastation was profound: the storm rendered electricity, heat, water, Internet, and phone services inoperative, whereas local ambulatory medical services including clinics, pharmacies, home health agencies, and other resources were damaged beyond functionality. Lacking these services or lines of communication, medically fragile individuals became isolated from the hospital and 911-emergency systems without a preexisting mechanism to identify or treat them. Medically fragile individuals primarily included those with chronic medical conditions dependent on frequent and consistent monitoring and treatments. In response, the Red Hook community established an ad hoc volunteer medical relief effort in the wake of the storm, filling a major gap that continues to exist in disaster medicine for low-income urban environments. Here we describe this effort, including an analysis of the medically vulnerable in this community, and recommend disaster risk reduction strategies and resilience measures for future disaster events.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bri Rolston
2005-06-01
Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills,more » and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between those threats and the defensive capabilities of control systems can be analyzed. The results of the gap analysis drive changes in the cyber security of critical infrastructure networks to close the gap between current exploits and existing defenses. The analysis also provides defenders with an idea of how threat technology is evolving and how defenses will need to be modified to address these emerging trends.« less
Collaborative Access Control For Critical Infrastructures
NASA Astrophysics Data System (ADS)
Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed
A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.
The Resilient Infrastructure Initiative
Clifford, Megan
2016-10-01
Infrastructure is, by design, largely unnoticed until it breaks down and services fail. This includes water supplies, gas pipelines, bridges and dams, phone lines and cell towers, roads and culverts, railways, and the electric grid—all of the complex systems that keep our societies and economies running. Climate change, population growth, increased urbanization, system aging, and outdated design standards stress existing infrastructure and its ability to satisfy the rapidly changing demands from users. Here, the resilience of both physical and cyber infrastructure systems, however, is critical to a community as it prepares for, responds to, and recovers from a disaster, whethermore » natural or man-made.« less
Winkelman, Warren J.; Leonard, Kevin J.; Rossos, Peter G.
2005-01-01
Objective: Patient use of online electronic medical records (EMR) holds the potential to improve health outcomes. The purpose of this study is to discover how patients living with chronic inflammatory bowel disease (IBD) value Internet-based patient access to electronic patient records. Design: This was a qualitative, exploratory, descriptive study using in-depth interviews and focus groups of a total of 12 patients with IBD of at least one-year duration at University Health Network, a tertiary care center in Toronto, Ontario. Results: Four themes have been elucidated that comprise a theoretical framework of patient-perceived information and communication technology usefulness: promotion of a sense of illness ownership, of patient-driven communication, of personalized support, and of mutual trust. Conclusions: For patients with chronic IBD, simply providing access to electronic medical records has little usefulness on its own. Useful technology for patients with IBD is multifaceted, self-care promoting, and integrated into the patient's already existing health and psychosocial support infrastructure. The four identified themes can serve as focal points for the evaluation of information technology designed for patient use, thus providing a patient-centered framework for developers seeking to adapt existing EMR systems to patient access and use for the purposes of improving health care quality and health outcomes. Further studies in other populations are needed to enhance generalizability of the emergent theory. PMID:15684128
Louie, Dexter L; Earp, Brandon E; Blazar, Philip E
2012-07-01
The Internet is available to researchers as a tool for studying long-term outcomes, but no recent research exists on how to best use it. The authors hypothesize that using the Internet can be at least 75% effective in locating patients lost to follow-up. With Institutional Review Board approval, the authors searched for 66 patients lost to follow-up after a period of 10 years or more with no contact. They tested an Internet searching protocol developed in 2004 and developed an alternate protocol. In all, 74% (49/66) of patients were located. Copyright 2012, SLACK Incorporated.