Sample records for ieee internet computing

  1. Privacy Analysis of the Internet Protocol

    DTIC Science & Technology

    2002-12-01

    mixing approach first proposed for e-mail by David Chaum [Cha81]. The Onion Routing system maintains a set of mixing centers called onion routers...IEEE Computer, vol. 33, no. 5, pp. 59-67, May, 2000. 5. [Cha81] Chaum , D., Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms...the Internet,” Proceedings of IEEE COMPCON, 1997. 11. [Gol99] Goldschlag, David M., Reed, Michael G., and Syverson, Paul F., “Onion Routing for

  2. Performance Analysis of the Mobile IP Protocol (RFC 3344 and Related RFCS)

    DTIC Science & Technology

    2006-12-01

    Encapsulation HMAC Keyed-Hash Message Authentication Code ICMP Internet Control Message Protocol IEEE Institute of Electrical and Electronics Engineers IETF...Internet Engineering Task Force IOS Internetwork Operating System IP Internet Protocol ITU International Telecommunication Union LAN Local Area...network computing. Most organizations today have sophisticated networks that are connected to the Internet. The major benefit reaped from such a

  3. Extending the IEEE-LTSA.

    ERIC Educational Resources Information Center

    Voskamp, Jorg; Hambach, Sybille

    An Internet-based course management system has been under development at the Fraunhofer-Institute for Computer Graphics Rostock (Germany) for the past 5 years. It is used by experts for distributing their courses via the Internet and by students for learning with the material distributed. The "Course Management System for WWW--CMS-W3"…

  4. FloCon 2011 Proceedings

    DTIC Science & Technology

    2011-01-01

    and G. Armitage. Dening and evaluating greynets (sparse darknets ). In LCN󈧉: Proceedings of the IEEE Conference on Local Computer Networks 30th...analysis of distributed darknet trac. In IMC󈧉: Proceedings of the USENIX/ACM Internet Measurement Conference, 2005. Indexing Full Packet Capture Data

  5. Large-Scale Distributed Coalition Formation

    DTIC Science & Technology

    2009-09-01

    Ripeanu, Matei, Adriana Iamnitchi, and Ian Foster. “Mapping the Gnutella Network”. IEEE Internet Computing, 6(1):50–57, 2002. 78. Rowstron, Antony I...for Search. Working Papers 95-02-010, Santa Fe Institute, February 1995. 97. Xu, Yang, Paul Scerri, Bin Yu, Steven Okamoto, Michael Lewis, and Ka

  6. IEEE 802.11ah: A Technology to Face the IoT Challenge.

    PubMed

    Baños-Gonzalez, Victor; Afaqui, M Shahwaiz; Lopez-Aguilera, Elena; Garcia-Villegas, Eduard

    2016-11-22

    Since the conception of the Internet of things (IoT), a large number of promising applications and technologies have been developed, which will change different aspects in our daily life. This paper explores the key characteristics of the forthcoming IEEE 802.11ah specification. This future IEEE 802.11 standard aims to amend the IEEE 802.11 legacy specification to support IoT requirements. We present a thorough evaluation of the foregoing amendment in comparison to the most notable IEEE 802.11 standards. In addition, we expose the capabilities of future IEEE 802.11ah in supporting different IoT applications. Also, we provide a brief overview of the technology contenders that are competing to cover the IoT communications framework. Numerical results are presented showing how the future IEEE 802.11ah specification offers the features required by IoT communications, thus putting forward IEEE 802.11ah as a technology to cater the needs of the Internet of Things paradigm.

  7. IEEE 802.11ah: A Technology to Face the IoT Challenge

    PubMed Central

    Baños-Gonzalez, Victor; Afaqui, M. Shahwaiz; Lopez-Aguilera, Elena; Garcia-Villegas, Eduard

    2016-01-01

    Since the conception of the Internet of things (IoT), a large number of promising applications and technologies have been developed, which will change different aspects in our daily life. This paper explores the key characteristics of the forthcoming IEEE 802.11ah specification. This future IEEE 802.11 standard aims to amend the IEEE 802.11 legacy specification to support IoT requirements. We present a thorough evaluation of the foregoing amendment in comparison to the most notable IEEE 802.11 standards. In addition, we expose the capabilities of future IEEE 802.11ah in supporting different IoT applications. Also, we provide a brief overview of the technology contenders that are competing to cover the IoT communications framework. Numerical results are presented showing how the future IEEE 802.11ah specification offers the features required by IoT communications, thus putting forward IEEE 802.11ah as a technology to cater the needs of the Internet of Things paradigm. PMID:27879688

  8. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    PubMed

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  9. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    PubMed Central

    Han, Youn-Hee; Min, Sung-Gi

    2017-01-01

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism. PMID:28934152

  10. Deployment of Directory Service for IEEE N Bus Test System Information

    NASA Astrophysics Data System (ADS)

    Barman, Amal; Sil, Jaya

    2008-10-01

    Exchanging information over Internet and Intranet becomes a defacto standard in computer applications, among various users and organizations. Distributed system study, e-governance etc require transparent information exchange between applications, constituencies, manufacturers, and vendors. To serve these purposes database system is needed for storing system data and other relevant information. Directory service, which is a specialized database along with access protocol, could be the single solution since it runs over TCP/IP, supported by all POSIX compliance platforms and is based on open standard. This paper describes a way to deploy directory service, to store IEEE n bus test system data and integrating load flow program with it.

  11. Evaluating the Limits of Network Topology Inference Via Virtualized Network Emulation

    DTIC Science & Technology

    2015-06-01

    76 xi Figure 5.33 Hop-plot of five best reduction methods. KDD most closely matches the Internet plot...respectively, located around the world. These monitors provide locations from which to perform network measurement experiments, primarily using the ping ...International Symposium on Modeling, Analysis and Simulation of Computer Telecommunication Systems. IEEE, 2001, pp. 346–353. 90 [21] C. Jin , Q. Chen, and S

  12. An Internet-style Approach to Managing Wireless Link Errors

    DTIC Science & Technology

    2002-05-01

    implementation I used. Jamshid Mahdavi and Matt Mathis, then at the Pittsburgh Super- computer Center, and Vern Paxson of the Lawrence Berkeley National...Exposition. IEEE CS Press, 2002. [19] P. Bhagwat, P. Bhattacharya, A. Krishna , and S. Tripathi. Enhancing throughput over wireless LANs using channel...performance over wireless networks at the link layer. ACM Mobile Networks and Applications, 5(1):57– 71, March 2000. [97] Vern Paxson and Mark Allman

  13. Invisible watermarking optical camera communication and compatibility issues of IEEE 802.15.7r1 specification

    NASA Astrophysics Data System (ADS)

    Le, Nam-Tuan

    2017-05-01

    Copyright protection and information security are two most considered issues of digital data following the development of internet and computer network. As an important solution for protection, watermarking technology has become one of the challenged roles in industry and academic research. The watermarking technology can be classified by two categories: visible watermarking and invisible watermarking. With invisible technique, there is an advantage on user interaction because of the visibility. By applying watermarking for communication, it will be a challenge and a new direction for communication technology. In this paper we will propose one new research on communication technology using optical camera communications (OCC) based invisible watermarking. Beside the analysis on performance of proposed system, we also suggest the frame structure of PHY and MAC layer for IEEE 802.15.7r1 specification which is a revision of visible light communication (VLC) standardization.

  14. FPGA implementation cost and performance evaluation of IEEE 802.11 protocol encryption security schemes

    NASA Astrophysics Data System (ADS)

    Sklavos, N.; Selimis, G.; Koufopavlou, O.

    2005-01-01

    The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given.

  15. Intrusion detection and monitoring for wireless networks.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Thomas, Eric D.; Van Randwyk, Jamie A.; Lee, Erik J.

    Wireless computer networks are increasing exponentially around the world. They are being implemented in both the unlicensed radio frequency (RF) spectrum (IEEE 802.11a/b/g) and the licensed spectrum (e.g., Firetide [1] and Motorola Canopy [2]). Wireless networks operating in the unlicensed spectrum are by far the most popular wireless computer networks in existence. The open (i.e., proprietary) nature of the IEEE 802.11 protocols and the availability of ''free'' RF spectrum have encouraged many producers of enterprise and common off-the-shelf (COTS) computer networking equipment to jump into the wireless arena. Competition between these companies has driven down the price of 802.11 wirelessmore » networking equipment and has improved user experiences with such equipment. The end result has been an increased adoption of the equipment by businesses and consumers, the establishment of the Wi-Fi Alliance [3], and widespread use of the Alliance's ''Wi-Fi'' moniker to describe these networks. Consumers use 802.11 equipment at home to reduce the burden of running wires in existing construction, facilitate the sharing of broadband Internet services with roommates or neighbors, and increase their range of ''connectedness''. Private businesses and government entities (at all levels) are deploying wireless networks to reduce wiring costs, increase employee mobility, enable non-employees to access the Internet, and create an added revenue stream to their existing business models (coffee houses, airports, hotels, etc.). Municipalities (Philadelphia; San Francisco; Grand Haven, MI) are deploying wireless networks so they can bring broadband Internet access to places lacking such access; offer limited-speed broadband access to impoverished communities; offer broadband in places, such as marinas and state parks, that are passed over by traditional broadband providers; and provide themselves with higher quality, more complete network coverage for use by emergency responders and other municipal agencies. In short, these Wi-Fi networks are being deployed everywhere. Much thought has been and is being put into evaluating cost-benefit analyses of wired vs. wireless networks and issues such as how to effectively cover an office building or municipality, how to efficiently manage a large network of wireless access points (APs), and how to save money by replacing an Internet service provider (ISP) with 802.11 technology. In comparison, very little thought and money are being focused on wireless security and monitoring for security purposes.« less

  16. An energy-efficient transmission scheme for real-time data in wireless sensor networks.

    PubMed

    Kim, Jin-Woo; Barrado, José Ramón Ramos; Jeon, Dong-Keun

    2015-05-20

    The Internet of things (IoT) is a novel paradigm where all things or objects in daily life can communicate with other devices and provide services over the Internet. Things or objects need identifying, sensing, networking and processing capabilities to make the IoT paradigm a reality. The IEEE 802.15.4 standard is one of the main communication protocols proposed for the IoT. The IEEE 802.15.4 standard provides the guaranteed time slot (GTS) mechanism that supports the quality of service (QoS) for the real-time data transmission. In spite of some QoS features in IEEE 802.15.4 standard, the problem of end-to-end delay still remains. In order to solve this problem, we propose a cooperative medium access scheme (MAC) protocol for real-time data transmission. We also evaluate the performance of the proposed scheme through simulation. The simulation results demonstrate that the proposed scheme can improve the network performance.

  17. An Energy-Efficient Transmission Scheme for Real-Time Data in Wireless Sensor Networks

    PubMed Central

    Kim, Jin-Woo; Barrado, José Ramón Ramos; Jeon, Dong-Keun

    2015-01-01

    The Internet of things (IoT) is a novel paradigm where all things or objects in daily life can communicate with other devices and provide services over the Internet. Things or objects need identifying, sensing, networking and processing capabilities to make the IoT paradigm a reality. The IEEE 802.15.4 standard is one of the main communication protocols proposed for the IoT. The IEEE 802.15.4 standard provides the guaranteed time slot (GTS) mechanism that supports the quality of service (QoS) for the real-time data transmission. In spite of some QoS features in IEEE 802.15.4 standard, the problem of end-to-end delay still remains. In order to solve this problem, we propose a cooperative medium access scheme (MAC) protocol for real-time data transmission. We also evaluate the performance of the proposed scheme through simulation. The simulation results demonstrate that the proposed scheme can improve the network performance. PMID:26007722

  18. Introspections on the Semantic Gap

    DTIC Science & Technology

    2015-04-14

    cloud comput - ing. Zhang received an MS in computer science from Stony Brook University. Contact him at dozhang@ cs.stonybrook.edu. Donald E. Porter...designated by other documentation. ... 2 March/April 2015 Copublished by the IEEE Computer and Reliability Societies 1540-7993/15/$31.00 © 2015 IEEE IEEE S...pauses the VM, and the VMI tool introspects the process descriptor list. In contrast, an asynchronous mechanism would intro - spect memory

  19. Consideration of IP Telephony Quality on the IEEE802.11a Wireless LAN

    NASA Astrophysics Data System (ADS)

    Miyashita, Michifumi; Takamatsu, Hideyuki; Kurono, Masahiro

    Recently, IP telephony services in wired network are started, and paid attention for its charge-free nature due to IP technology. On the other hand, the Hot-Spot service, which provides one to access the Internet at the public space such as cafe, using the IEEE wireless LAN has been evolved, and it is expected that the IP telephony service on the Hot-Spot network will be developed. However, the IP telephony quality on the IEEE802.11a wireless LAN has not been fully studied yet. In this paper, we discuss about the quality of IP telephony service on the IEEE802.11a wireless LAN from the aspect of R-value, and show ability to improve the IP telephony quality on the Hot-Spot network employing PLC function defined in the ITU-T Recommendation G.711 Appendix I.

  20. 48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Environmental Assessment of Personal Computer Products. 52.223-16 Section 52.223-16 Federal Acquisition... Assessment of Personal Computer Products. As prescribed in 23.705(b)(1), insert the following clause: IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products (DEC 2007) (a) Definitions...

  1. 48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Environmental Assessment of Personal Computer Products. 52.223-16 Section 52.223-16 Federal Acquisition... Assessment of Personal Computer Products. As prescribed in 23.705(b)(1), insert the following clause: IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products (DEC 2007) (a) Definitions...

  2. 48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Environmental Assessment of Personal Computer Products. 52.223-16 Section 52.223-16 Federal Acquisition... Assessment of Personal Computer Products. As prescribed in 23.705(b)(1), insert the following clause: IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products (DEC 2007) (a) Definitions...

  3. 48 CFR 52.223-16 - IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Environmental Assessment of Personal Computer Products. 52.223-16 Section 52.223-16 Federal Acquisition... Assessment of Personal Computer Products. As prescribed in 23.706(b)(1), insert the following clause: IEEE 1680 Standard for the Environmental Assessment of Personal Computer Products (DEC 2007) (a) Definitions...

  4. 77 FR 50726 - Software Requirement Specifications for Digital Computer Software and Complex Electronics Used in...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-22

    ... Computer Software and Complex Electronics Used in Safety Systems of Nuclear Power Plants AGENCY: Nuclear...-1209, ``Software Requirement Specifications for Digital Computer Software and Complex Electronics used... Electronics Engineers (ANSI/IEEE) Standard 830-1998, ``IEEE Recommended Practice for Software Requirements...

  5. GPUs: An Emerging Platform for General-Purpose Computation

    DTIC Science & Technology

    2007-08-01

    programming; real-time cinematic quality graphics Peak stream (26) License required (limited time no- cost evaluation program) Commercially...folding.stanford.edu (accessed 30 March 2007). 2. Fan, Z.; Qiu, F.; Kaufman, A.; Yoakum-Stover, S. GPU Cluster for High Performance Computing. ACM/IEEE...accessed 30 March 2007). 8. Goodnight, N.; Wang, R.; Humphreys, G. Computation on Programmable Graphics Hardware. IEEE Computer Graphics and

  6. 78 FR 47014 - Configuration Management Plans for Digital Computer Software Used in Safety Systems of Nuclear...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-02

    ... Software Used in Safety Systems of Nuclear Power Plants AGENCY: Nuclear Regulatory Commission. ACTION... Computer Software Used in Safety Systems of Nuclear Power Plants.'' This RG endorses, with clarifications... Electrical and Electronic Engineers (IEEE) Standard 828-2005, ``IEEE Standard for Software Configuration...

  7. The Sound of Freedom. Naval Weapons Technology at Dahlgren, Virginia, 1918-2006

    DTIC Science & Technology

    2006-01-01

    the TRINITY device, before later succeeding J. Robert Oppenheimer as the director of Los Alamos National Laboratory. Other former Dahlgren...and the Computer (Cambridge, Mass.: The MIT Press, 1999); Michael R. Williams, A History of Computing Technology, 2nd ed. ( Los Alamos , Calif.: IEEE...Minutes of Advisory Council. 3. Ibid. 4. Ibid.; Michael R. Williams, A History of Computing Technology, 2nd ed. ( Los Alamos , Calif.: IEEE Computer

  8. Very High-Speed Report File System

    DTIC Science & Technology

    1992-12-15

    1.5 and 45 Mb/s and is expected 1 Introduction to reach 150 Mb/s. These new technologies pose some challenges to The Internet Protocol (IP) family (IP... Internet Engineering Task Force (IETF) has R taken up the issue, but a definitive answer is probably some time away. The basic issues are the choice of AAL...by an IEEE 802. la Subnetwork Access Protocol (SNAP) However, with a large number of networks all header. The third proposal identifies the protocol

  9. Reliability Evaluation of Computer Systems.

    DTIC Science & Technology

    1981-01-01

    algorithms in hardware is not restricted by the designs of particular circuits. Applications could be made in new computer architectures; one candidate...pp. 137-148, IEEE, Chicago, Illinois, September 1963. (With J.F. Wakerly ) "Design of Low-Cost General-Purpose Self- Diagnosing Computers," Proc...34 Proc., IEEE Int’l Solid-State Circuits Conference, Philadelphia, Pennsylvania, February 16-18, 1977. (With J.F. Wakerly ) "Microcomputers in the

  10. IEEE International Symposium on Biomedical Imaging.

    PubMed

    2017-01-01

    The IEEE International Symposium on Biomedical Imaging (ISBI) is a scientific conference dedicated to mathematical, algorithmic, and computational aspects of biological and biomedical imaging, across all scales of observation. It fosters knowledge transfer among different imaging communities and contributes to an integrative approach to biomedical imaging. ISBI is a joint initiative from the IEEE Signal Processing Society (SPS) and the IEEE Engineering in Medicine and Biology Society (EMBS). The 2018 meeting will include tutorials, and a scientific program composed of plenary talks, invited special sessions, challenges, as well as oral and poster presentations of peer-reviewed papers. High-quality papers are requested containing original contributions to the topics of interest including image formation and reconstruction, computational and statistical image processing and analysis, dynamic imaging, visualization, image quality assessment, and physical, biological, and statistical modeling. Accepted 4-page regular papers will be published in the symposium proceedings published by IEEE and included in IEEE Xplore. To encourage attendance by a broader audience of imaging scientists and offer additional presentation opportunities, ISBI 2018 will continue to have a second track featuring posters selected from 1-page abstract submissions without subsequent archival publication.

  11. DESPIC: Detecting Early Signatures of Persuasion in Information Cascades

    DTIC Science & Technology

    2015-08-27

    over NoSQL Databases, Proceedings of the 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2014). 26-MAY-14, . : , P...over NoSQL Databases. Proceedings of the 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2014). Chicago, IL, USA...distributed NoSQL databases including HBase and Riak, we finalized the requirements of the optimal computational architecture to support our framework

  12. TCP throughput adaptation in WiMax networks using replicator dynamics.

    PubMed

    Anastasopoulos, Markos P; Petraki, Dionysia K; Kannan, Rajgopal; Vasilakos, Athanasios V

    2010-06-01

    The high-frequency segment (10-66 GHz) of the IEEE 802.16 standard seems promising for the implementation of wireless backhaul networks carrying large volumes of Internet traffic. In contrast to wireline backbone networks, where channel errors seldom occur, the TCP protocol in IEEE 802.16 Worldwide Interoperability for Microwave Access networks is conditioned exclusively by wireless channel impairments rather than by congestion. This renders a cross-layer design approach between the transport and physical layers more appropriate during fading periods. In this paper, an adaptive coding and modulation (ACM) scheme for TCP throughput maximization is presented. In the current approach, Internet traffic is modulated and coded employing an adaptive scheme that is mathematically equivalent to the replicator dynamics model. The stability of the proposed ACM scheme is proven, and the dependence of the speed of convergence on various physical-layer parameters is investigated. It is also shown that convergence to the strategy that maximizes TCP throughput may be further accelerated by increasing the amount of information from the physical layer.

  13. Software And Systems Engineering Risk Management

    DTIC Science & Technology

    2010-04-01

    RSKM 2004 COSO Enterprise RSKM Framework 2006 ISO/IEC 16085 Risk Management Process 2008 ISO/IEC 12207 Software Lifecycle Processes 2009 ISO/IEC...1 Software And Systems Engineering Risk Management John Walz VP Technical and Conferences Activities, IEEE Computer Society Vice-Chair Planning...Software & Systems Engineering Standards Committee, IEEE Computer Society US TAG to ISO TMB Risk Management Working Group Systems and Software

  14. Analysis of Global Properties of Shapes

    DTIC Science & Technology

    2010-06-01

    Conference on Computer Vision (ICCV) ( Bejing , China , 2005), IEEE. [113] Thrun, S., and Wegbreit, B. Shape from symmetry. In Proceedings of the...International Conference on Computer Vision (ICCV) ( Bejing , China , 2005), IEEE. [114] Toshev, A., Shi, J., and Daniilidis, K. Image matching via saliency...applications ranging from sampling points to finding correspondences to shape simplification. Discrete variants of the Laplace-Beltrami opera - tor [108] and

  15. Reliable Internet Routing

    DTIC Science & Technology

    2011-09-01

    global coordination. IEEE/ACM Trans. Netw., 9(6):681–692, 2001. [39] S. Goldberg, D. Xiao, E. Tromer, B. Barak , and J. Rexford. Path-quality monitoring...RFC 4271). [81] Y. Rekhter, T. Li, and S. Hares. A border gateway protocol 4 (BGP-4), 2006. IETF RFC 4271. [82] E. Rosen , A. Viswanathan, and R. Callon

  16. High-precision arithmetic in mathematical physics

    DOE PAGES

    Bailey, David H.; Borwein, Jonathan M.

    2015-05-12

    For many scientific calculations, particularly those involving empirical data, IEEE 32-bit floating-point arithmetic produces results of sufficient accuracy, while for other applications IEEE 64-bit floating-point is more appropriate. But for some very demanding applications, even higher levels of precision are often required. Furthermore, this article discusses the challenge of high-precision computation, in the context of mathematical physics, and highlights what facilities are required to support future computation, in light of emerging developments in computer architecture.

  17. An Improved Cross-Layering Design for IPv6 Fast Handover with IEEE 802.16m Entry Before Break Handover

    NASA Astrophysics Data System (ADS)

    Kim, Ronny Yongho; Jung, Inuk; Kim, Young Yong

    IEEE 802.16m is an advanced air interface standard which is under development for IMT-Advanced systems, known as 4G systems. IEEE 802.16m is designed to provide a high data rate and a Quality of Service (QoS) level in order to meet user service requirements, and is especially suitable for mobilized environments. There are several factors that have great impact on such requirements. As one of the major factors, we mainly focus on latency issues. In IEEE 802.16m, an enhanced layer 2 handover scheme, described as Entry Before Break (EBB) was proposed and adopted to reduce handover latency. EBB provides significant handover interruption time reduction with respect to the legacy IEEE 802.16 handover scheme. Fast handovers for mobile IPv6 (FMIPv6) was standardized by Internet Engineering Task Force (IETF) in order to provide reduced handover interruption time from IP layer perspective. Since FMIPv6 utilizes link layer triggers to reduce handover latency, it is very critical to jointly design FMIPv6 with its underlying link layer protocol. However, FMIPv6 based on new handover scheme, EBB has not been proposed. In this paper, we propose an improved cross-layering design for FMIPv6 based on the IEEE 802.16m EBB handover. In comparison with the conventional FMIPv6 based on the legacy IEEE 802.16 network, the overall handover interruption time can be significantly reduced by employing the proposed design. Benefits of this improvement on latency reduction for mobile user applications are thoroughly investigated with both numerical analysis and simulation on various IP applications.

  18. DURIP: Mitigating Attacks on Mobile Devices and Critical Cellular Infrastructure

    DTIC Science & Technology

    2016-03-03

    Patrick Traynor, Shobha Venkataraman . Why is my smartphone slow? On the fly diagnosis of underperformance on the mobile Internet, 2013 43rd Annual IEEE...Symposium (NDSS), 2013. 4. C. Amrutkar, M. Hiltunen, T. Jim, K. Joshi, O. Spatscheck, P. Traynor and S. Venkataraman , Why is My Smartphone Slow? On The

  19. On the Network Convergence Process in RPL over IEEE 802.15.4 Multihop Networks: Improvement and Trade-Offs

    PubMed Central

    Kermajani, Hamidreza; Gomez, Carles

    2014-01-01

    The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) has been recently developed by the Internet Engineering Task Force (IETF). Given its crucial role in enabling the Internet of Things, a significant amount of research effort has already been devoted to RPL. However, the RPL network convergence process has not yet been investigated in detail. In this paper we study the influence of the main RPL parameters and mechanisms on the network convergence process of this protocol in IEEE 802.15.4 multihop networks. We also propose and evaluate a mechanism that leverages an option available in RPL for accelerating the network convergence process. We carry out extensive simulations for a wide range of conditions, considering different network scenarios in terms of size and density. Results show that network convergence performance depends dramatically on the use and adequate configuration of key RPL parameters and mechanisms. The findings and contributions of this work provide a RPL configuration guideline for network convergence performance tuning, as well as a characterization of the related performance trade-offs. PMID:25004154

  20. On the network convergence process in RPL over IEEE 802.15.4 multihop networks: improvement and trade-offs.

    PubMed

    Kermajani, Hamidreza; Gomez, Carles

    2014-07-07

    The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) has been recently developed by the Internet Engineering Task Force (IETF). Given its crucial role in enabling the Internet of Things, a significant amount of research effort has already been devoted to RPL. However, the RPL network convergence process has not yet been investigated in detail. In this paper we study the influence of the main RPL parameters and mechanisms on the network convergence process of this protocol in IEEE 802.15.4 multihop networks. We also propose and evaluate a mechanism that leverages an option available in RPL for accelerating the network convergence process. We carry out extensive simulations for a wide range of conditions, considering different network scenarios in terms of size and density. Results show that network convergence performance depends dramatically on the use and adequate configuration of key RPL parameters and mechanisms. The findings and contributions of this work provide a RPL configuration guideline for network convergence performance tuning, as well as a characterization of the related performance trade-offs.

  1. Election Verifiability: Cryptographic Definitions and an Analysis of Helios and JCJ

    DTIC Science & Technology

    2015-04-01

    anonymous credentials. In CSF’14: 27th Computer Security Foundations Symposium. IEEE Computer Society, 2014. To appear. [22] David Chaum . Untraceable...electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84–88, 1981. [23] David Chaum . Secret-ballot receipts...True voter-verifiable elections. IEEE Security and Privacy, 2(1):38–47, 2004. [24] David Chaum , Richard Carback, Jeremy Clark, Aleksander Essex, Stefan

  2. 49 CFR 395.18 - Matter incorporated by reference.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Technology—Telecommunications and information exchange between systems—Local and metropolitan area networks...) Specifications,” IEEE Computer Society, Sponsored by the LAN/MAN Standards Committee: June 12, 2007 (IEEE Std... 446-2008, American National Standard for Information Technology—Identifying Attributes for Named...

  3. Effects of Computer Architecture on FFT (Fast Fourier Transform) Algorithm Performance.

    DTIC Science & Technology

    1983-12-01

    Criteria for Efficient Implementation of FFT Algorithms," IEEE Transactions on Acoustics, Speech, and Signal Processing, Vol. ASSP-30, pp. 107-109, Feb...1982. Burrus, C. S. and P. W. Eschenbacher. "An In-Place, In-Order Prime Factor FFT Algorithm," IEEE Transactions on Acoustics, Speech, and Signal... Transactions on Acoustics, Speech, and Signal Processing, Vol. ASSP-30, pp. 217-226, Apr. 1982. Control Data Corporation. CDC Cyber 170 Computer Systems

  4. An Infrastructure for Multi-Level Secure Service-Oriented Architecture (MLS-SOA) Using the Multiple Single-Level Approach

    DTIC Science & Technology

    2009-12-17

    IEEE TDKE, 1996. 8( 1). 14. Garvey, T.D., The inference Problem for Computer Security. 1992, SRI International. 15. Chaum , D ., Blind Signatures for...Pervasive Computing Environments. IEEE Transactions on Vehicular Technology, 2006. 55(4). 17. Chaum , D ., Security without Identification: Transaction...Systems to make Big Brother Obsolete. Communications of the ACM 1985. 28(10). 18. Chaum , D ., Untraceable Electronic Mail, Return Addresses, and Digital

  5. Semiconductor Nanowire and Nanoribbon Thermoelectrics: A Comprehensive Computational Study

    DTIC Science & Technology

    2013-05-01

    August 17-20, 2010). Available online through IEEE Xplore . http://dx.doi.org/10.1109/NANO.2010.5698047 4. Z. Aksamija and I. Knezevic...Korea (August 17-20, 2010). Available online through IEEE Xplore . http://dx.doi.org/10.1109/NANO.2010.5697827 5. D. Vasileska, K. Raleva, S. M...IWCE 2010) Available online through IEEE Xplore , http://dx.doi.org/10.1109/IWCE.2010.5677916 6. E. B. Ramayya and I. Knezevic, “Ultrascaled

  6. Performance of the Sleep-Mode Mechanism of the New IEEE 802.16m Proposal for Correlated Downlink Traffic

    NASA Astrophysics Data System (ADS)

    de Turck, Koen; de Vuyst, Stijn; Fiems, Dieter; Wittevrongel, Sabine; Bruneel, Herwig

    There is a considerable interest nowadays in making wireless telecommunication more energy-efficient. The sleep-mode mechanism in WiMAX (IEEE 802.16e) is one of such energy saving measures. Recently, Samsung proposed some modifications on the sleep-mode mechanism, scheduled to appear in the forthcoming IEEE 802.16m standard, aimed at minimizing the signaling overhead. In this work, we present a performance analysis of this proposal and clarify the differences with the standard mechanism included in IEEE 802.16e. We also propose some special algorithms aimed at reducing the computational complexity of the analysis.

  7. Memorias Conferencia Internacional IEEE Mexico 1971, Sobre Sistemas, Redes Y Computadoras. Volumen I and Volumen II. (Proceedings of International Conference of IEEE Concerning Systems, Networks, and Computers. Volume I and Volume II.

    ERIC Educational Resources Information Center

    Concheiro, A. Alonso, Ed.; And Others

    The following papers in English from this international conference may be of particular interest to those in the field of education. T. Nakahara, A. Tsukamota, and M. Matsumoto describe a computer-aided design technique for an economical urban cable television system. W. D. Wasson and R. K. Chitkara outline a recognition scheme based on analysis…

  8. A Monocular SLAM Method to Estimate Relative Pose During Satellite Proximity Operations

    DTIC Science & Technology

    2015-03-26

    localization and mapping with efficient outlier handling. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 2013. 5. Herbert Bay...S.H. Spencer . Next generation advanced video guidance sensor. In Aerospace Conference, 2008 IEEE, pages 1–8, March 2008. 12. Michael Calonder, Vincent

  9. Developing a Qualia-Based Multi-Agent Architecture for Use in Malware Detection

    DTIC Science & Technology

    2010-03-01

    executables were correctly classified with a 6% false positive rate [7]. Kolter and Maloof expand Schultz’s work by analyzing different...Proceedings of the 2001 IEEE Symposium on Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 2001. [8] J. Z. Kolter and M. A. Maloof

  10. New IEEE standard enables data collection for medical applications.

    PubMed

    Kennelly, R J; Wittenber, J

    1994-01-01

    The IEEE has gone to ballot on a "Standard for Medical Device Communications", IEEE P1073. The lower layer, hardware portions of the standard are expected to be approved by the IEEE Standards Board at their December 11-13, 1994 meeting. Other portions of the standard are in the initial stages of the IEEE ballot process. The intent of the standard is to allow hospitals and other users to interface medical electronic devices to host computer systems in a standard, interchangeable manner. The standard is optimized for acute care environments such as ICU's, operating rooms, and emergency rooms. [1] IEEE General Committee and Subcommittee work has been on-going since 1984. Significant amounts of work have been done to discover and meet the needs of the patient care setting. Surveys performed in 1989 identified the following four key user requirements for medical device communications: 1) Frequent reconfiguration of the network. 2) Allow "plug and play" operation by users. 3) Associate devices with a specific bed and patient. 4) Support a wide range of hospital computer system topologies. Additionally, the most critical difference in the acute care setting is patient safety, which has an overall effect on the standard. The standard that went to ballot meets these requirements. The standard is based on existing ISO standards. P1073 is compliant with the OSI seven layer model. P1073 specifies the entire communication stack, from object-oriented software to hospital unique connectors. The standard will be able to be put forward as a true international standard, much in the way that the IEEE 802.x family of standards (like Ethernet) were presented as draft ISO standards.(ABSTRACT TRUNCATED AT 250 WORDS)

  11. Genomics, molecular imaging, bioinformatics, and bio-nano-info integration are synergistic components of translational medicine and personalized healthcare research.

    PubMed

    Yang, Jack Y; Yang, Mary Qu; Arabnia, Hamid R; Deng, Youping

    2008-09-16

    Supported by National Science Foundation (NSF), International Society of Intelligent Biological Medicine (ISIBM), International Journal of Computational Biology and Drug Design and International Journal of Functional Informatics and Personalized Medicine, IEEE 7th Bioinformatics and Bioengineering attracted more than 600 papers and 500 researchers and medical doctors. It was the only synergistic inter/multidisciplinary IEEE conference with 24 Keynote Lectures, 7 Tutorials, 5 Cutting-Edge Research Workshops and 32 Scientific Sessions including 11 Special Research Interest Sessions that were designed dynamically at Harvard in response to the current research trends and advances. The committee was very grateful for the IEEE Plenary Keynote Lectures given by: Dr. A. Keith Dunker (Indiana), Dr. Jun Liu (Harvard), Dr. Brian Athey (Michigan), Dr. Mark Borodovsky (Georgia Tech and President of ISIBM), Dr. Hamid Arabnia (Georgia and Vice-President of ISIBM), Dr. Ruzena Bajcsy (Berkeley and Member of United States National Academy of Engineering and Member of United States Institute of Medicine of the National Academies), Dr. Mary Yang (United States National Institutes of Health and Oak Ridge, DOE), Dr. Chih-Ming Ho (UCLA and Member of United States National Academy of Engineering and Academician of Academia Sinica), Dr. Andy Baxevanis (United States National Institutes of Health), Dr. Arif Ghafoor (Purdue), Dr. John Quackenbush (Harvard), Dr. Eric Jakobsson (UIUC), Dr. Vladimir Uversky (Indiana), Dr. Laura Elnitski (United States National Institutes of Health) and other world-class scientific leaders. The Harvard meeting was a large academic event 100% full-sponsored by IEEE financially and academically. After a rigorous peer-review process, the committee selected 27 high-quality research papers from 600 submissions. The committee is grateful for contributions from keynote speakers Dr. Russ Altman (IEEE BIBM conference keynote lecturer on combining simulation and machine learning to recognize function in 4D), Dr. Mary Qu Yang (IEEE BIBM workshop keynote lecturer on new initiatives of detecting microscopic disease using machine learning and molecular biology, http://ieeexplore.ieee.org/servlet/opac?punumber=4425386) and Dr. Jack Y. Yang (IEEE BIBM workshop keynote lecturer on data mining and knowledge discovery in translational medicine) from the first IEEE Computer Society BioInformatics and BioMedicine (IEEE BIBM) international conference and workshops, November 2-4, 2007, Silicon Valley, California, USA.

  12. Genomics, molecular imaging, bioinformatics, and bio-nano-info integration are synergistic components of translational medicine and personalized healthcare research

    PubMed Central

    2008-01-01

    Supported by National Science Foundation (NSF), International Society of Intelligent Biological Medicine (ISIBM), International Journal of Computational Biology and Drug Design and International Journal of Functional Informatics and Personalized Medicine, IEEE 7th Bioinformatics and Bioengineering attracted more than 600 papers and 500 researchers and medical doctors. It was the only synergistic inter/multidisciplinary IEEE conference with 24 Keynote Lectures, 7 Tutorials, 5 Cutting-Edge Research Workshops and 32 Scientific Sessions including 11 Special Research Interest Sessions that were designed dynamically at Harvard in response to the current research trends and advances. The committee was very grateful for the IEEE Plenary Keynote Lectures given by: Dr. A. Keith Dunker (Indiana), Dr. Jun Liu (Harvard), Dr. Brian Athey (Michigan), Dr. Mark Borodovsky (Georgia Tech and President of ISIBM), Dr. Hamid Arabnia (Georgia and Vice-President of ISIBM), Dr. Ruzena Bajcsy (Berkeley and Member of United States National Academy of Engineering and Member of United States Institute of Medicine of the National Academies), Dr. Mary Yang (United States National Institutes of Health and Oak Ridge, DOE), Dr. Chih-Ming Ho (UCLA and Member of United States National Academy of Engineering and Academician of Academia Sinica), Dr. Andy Baxevanis (United States National Institutes of Health), Dr. Arif Ghafoor (Purdue), Dr. John Quackenbush (Harvard), Dr. Eric Jakobsson (UIUC), Dr. Vladimir Uversky (Indiana), Dr. Laura Elnitski (United States National Institutes of Health) and other world-class scientific leaders. The Harvard meeting was a large academic event 100% full-sponsored by IEEE financially and academically. After a rigorous peer-review process, the committee selected 27 high-quality research papers from 600 submissions. The committee is grateful for contributions from keynote speakers Dr. Russ Altman (IEEE BIBM conference keynote lecturer on combining simulation and machine learning to recognize function in 4D), Dr. Mary Qu Yang (IEEE BIBM workshop keynote lecturer on new initiatives of detecting microscopic disease using machine learning and molecular biology, http://ieeexplore.ieee.org/servlet/opac?punumber=4425386) and Dr. Jack Y. Yang (IEEE BIBM workshop keynote lecturer on data mining and knowledge discovery in translational medicine) from the first IEEE Computer Society BioInformatics and BioMedicine (IEEE BIBM) international conference and workshops, November 2-4, 2007, Silicon Valley, California, USA. PMID:18831773

  13. Performance Evaluation of IEEE 802.11ah Networks With High-Throughput Bidirectional Traffic.

    PubMed

    Šljivo, Amina; Kerkhove, Dwight; Tian, Le; Famaey, Jeroen; Munteanu, Adrian; Moerman, Ingrid; Hoebeke, Jeroen; De Poorter, Eli

    2018-01-23

    So far, existing sub-GHz wireless communication technologies focused on low-bandwidth, long-range communication with large numbers of constrained devices. Although these characteristics are fine for many Internet of Things (IoT) applications, more demanding application requirements could not be met and legacy Internet technologies such as Transmission Control Protocol/Internet Protocol (TCP/IP) could not be used. This has changed with the advent of the new IEEE 802.11ah Wi-Fi standard, which is much more suitable for reliable bidirectional communication and high-throughput applications over a wide area (up to 1 km). The standard offers great possibilities for network performance optimization through a number of physical- and link-layer configurable features. However, given that the optimal configuration parameters depend on traffic patterns, the standard does not dictate how to determine them. Such a large number of configuration options can lead to sub-optimal or even incorrect configurations. Therefore, we investigated how two key mechanisms, Restricted Access Window (RAW) grouping and Traffic Indication Map (TIM) segmentation, influence scalability, throughput, latency and energy efficiency in the presence of bidirectional TCP/IP traffic. We considered both high-throughput video streaming traffic and large-scale reliable sensing traffic and investigated TCP behavior in both scenarios when the link layer introduces long delays. This article presents the relations between attainable throughput per station and attainable number of stations, as well as the influence of RAW, TIM and TCP parameters on both. We found that up to 20 continuously streaming IP-cameras can be reliably connected via IEEE 802.11ah with a maximum average data rate of 160 kbps, whereas 10 IP-cameras can achieve average data rates of up to 255 kbps over 200 m. Up to 6960 stations transmitting every 60 s can be connected over 1 km with no lost packets. The presented results enable the fine tuning of RAW and TIM parameters for throughput-demanding reliable applications (i.e., video streaming, firmware updates) on one hand, and very dense low-throughput reliable networks with bidirectional traffic on the other hand.

  14. Performance Evaluation of IEEE 802.11ah Networks With High-Throughput Bidirectional Traffic

    PubMed Central

    Kerkhove, Dwight; Tian, Le; Munteanu, Adrian; De Poorter, Eli

    2018-01-01

    So far, existing sub-GHz wireless communication technologies focused on low-bandwidth, long-range communication with large numbers of constrained devices. Although these characteristics are fine for many Internet of Things (IoT) applications, more demanding application requirements could not be met and legacy Internet technologies such as Transmission Control Protocol/Internet Protocol (TCP/IP) could not be used. This has changed with the advent of the new IEEE 802.11ah Wi-Fi standard, which is much more suitable for reliable bidirectional communication and high-throughput applications over a wide area (up to 1 km). The standard offers great possibilities for network performance optimization through a number of physical- and link-layer configurable features. However, given that the optimal configuration parameters depend on traffic patterns, the standard does not dictate how to determine them. Such a large number of configuration options can lead to sub-optimal or even incorrect configurations. Therefore, we investigated how two key mechanisms, Restricted Access Window (RAW) grouping and Traffic Indication Map (TIM) segmentation, influence scalability, throughput, latency and energy efficiency in the presence of bidirectional TCP/IP traffic. We considered both high-throughput video streaming traffic and large-scale reliable sensing traffic and investigated TCP behavior in both scenarios when the link layer introduces long delays. This article presents the relations between attainable throughput per station and attainable number of stations, as well as the influence of RAW, TIM and TCP parameters on both. We found that up to 20 continuously streaming IP-cameras can be reliably connected via IEEE 802.11ah with a maximum average data rate of 160 kbps, whereas 10 IP-cameras can achieve average data rates of up to 255 kbps over 200 m. Up to 6960 stations transmitting every 60 s can be connected over 1 km with no lost packets. The presented results enable the fine tuning of RAW and TIM parameters for throughput-demanding reliable applications (i.e., video streaming, firmware updates) on one hand, and very dense low-throughput reliable networks with bidirectional traffic on the other hand. PMID:29360798

  15. IEEE Conference on Software Engineering Education and Training (CSEE&T 2012) Proceedings (25th, Nanjing, Jiangsu, China, April 17-19, 2012)

    ERIC Educational Resources Information Center

    IEEE Conference on Software Engineering Education and Training, Proceedings (MS), 2012

    2012-01-01

    The Conference on Software Engineering Education and Training (CSEE&T) is the premier international peer-reviewed conference, sponsored by the Institute of Electrical and Electronics Engineers, Inc. (IEEE) Computer Society, which addresses all major areas related to software engineering education, training, and professionalism. This year, as…

  16. Design of an Information Technology Undergraduate Program to Produce IT Versatilists

    ERIC Educational Resources Information Center

    Koohang, Alex; Riley, Liz; Smith, Terry; Floyd, Kevin

    2010-01-01

    This paper attempts to present a model for designing an IT undergraduate program that is based on the recommendations of the Association for Computer Machinery/Institute of Electrical and Electronics Engineers--Information Technology (ACM/IEEE--IT) Curriculum Model. The main intent is to use the ACM/IEEE--IT Curriculum Model's recommendations as a…

  17. A Strategy for Improved System Assurance

    DTIC Science & Technology

    2007-06-20

    Quality (Measurements Life Cycle Safety, Security & Others) ISO /IEC 12207 * Software Life Cycle Processes ISO 9001 Quality Management System...14598 Software Product Evaluation Related ISO /IEC 90003 Guidelines for the Application of ISO 9001:2000 to Computer Software IEEE 12207 Industry...Implementation of International Standard ISO /IEC 12207 IEEE 1220 Standard for Application and Management of the System Engineering Process Use in

  18. Creating a New Model Curriculum: A Rationale for "Computing Curricula 1990".

    ERIC Educational Resources Information Center

    Bruce, Kim B.

    1991-01-01

    Describes a model for the design of undergraduate curricula in the discipline of computing that was developed by the ACM/IEEE (Association for Computing Machinery/Institute of Electrical and Electronics Engineers) Computer Society Joint Curriculum Task Force. Institutional settings and structures in which computing degrees are awarded are…

  19. Mache: No-Loss Trace Compaction

    DTIC Science & Technology

    1988-09-15

    Data Compression . IEEE Computer 176 (June 1984), 8-19. 10. ZIV , J. AND LEMPEL , A. A Universal Algorithm for Sequential Data Com- pression. IEEE... compression scheme which takes ad- vantage of repeating patterns in the sequence of bytes. I have used the Lempel - Ziv compression algorithm [9,10,11...Transactions on Information Theory 23 (1976), 75-81. 11. ZIV , J. AND LEMPEL , A. Compression of Individual Sequences via Variable-

  20. Advanced Numerical Techniques of Performance Evaluation. Volume 1

    DTIC Science & Technology

    1990-06-01

    system scheduling3thread. The scheduling thread then runs any other ready thread that can be found. A thread can only sleep or switch out on itself...Polychronopoulos and D.J. Kuck. Guided Self- Scheduling : A Practical Scheduling Scheme for Parallel Supercomputers. IEEE Transactions on Computers C...Kuck 1987] C.D. Polychronopoulos and D.J. Kuck. Guided Self- Scheduling : A Practical Scheduling Scheme for Parallel Supercomputers. IEEE Trans. on Comp

  1. Real-Time-Simulation of IEEE-5-Bus Network on OPAL-RT-OP4510 Simulator

    NASA Astrophysics Data System (ADS)

    Atul Bhandakkar, Anjali; Mathew, Lini, Dr.

    2018-03-01

    The Real-Time Simulator tools have high computing technologies, improved performance. They are widely used for design and improvement of electrical systems. The advancement of the software tools like MATLAB/SIMULINK with its Real-Time Workshop (RTW) and Real-Time Windows Target (RTWT), real-time simulators are used extensively in many engineering fields, such as industry, education, and research institutions. OPAL-RT-OP4510 is a Real-Time Simulator which is used in both industry and academia. In this paper, the real-time simulation of IEEE-5-Bus network is carried out by means of OPAL-RT-OP4510 with CRO and other hardware. The performance of the network is observed with the introduction of fault at various locations. The waveforms of voltage, current, active and reactive power are observed in the MATLAB simulation environment and on the CRO. Also, Load Flow Analysis (LFA) of IEEE-5-Bus network is computed using MATLAB/Simulink power-gui load flow tool.

  2. Interface Provides Standard-Bus Communication

    NASA Technical Reports Server (NTRS)

    Culliton, William G.

    1995-01-01

    Microprocessor-controlled interface (IEEE-488/LVABI) incorporates service-request and direct-memory-access features. Is circuit card enabling digital communication between system called "laser auto-covariance buffer interface" (LVABI) and compatible personal computer via general-purpose interface bus (GPIB) conforming to Institute for Electrical and Electronics Engineers (IEEE) Standard 488. Interface serves as second interface enabling first interface to exploit advantages of GPIB, via utility software written specifically for GPIB. Advantages include compatibility with multitasking and support of communication among multiple computers. Basic concept also applied in designing interfaces for circuits other than LVABI for unidirectional or bidirectional handling of parallel data up to 16 bits wide.

  3. An Approach to Noise Reduction in Human Skin Admittance Measurements

    DTIC Science & Technology

    2001-10-25

    1966, 4, 439-449. [ 4] D. H. Gordon, "Triboelectric interference in the ECG", IEEE Trans., 1975, BME -22, 252-255. [ 5] J. C. Huhta and J. G...Webster, ඄-Hz interference in electrocardiography", IEEE Trans., 1973, BME -20, 91-101. [ 6] S. Grimnes, "Electrovibration, cutaneous sensation of...this period he has published two textbooks about UNIX and Shell Programming, and concentrated at computer simulation and digital signal processing

  4. Parametric Study of Beta-Endpoint Energy in Direct Energy Converters

    DTIC Science & Technology

    2007-01-01

    Circuits for Ultra-high Efficiency Micro- power Generators using Nickel-63 Radioisotope . Technical Digest, ISSCC, February 2006, 418– 19. 8. Lal, A...Zakar, E.; Dubey, M.; Lal, A. MEMS Radioisotope - powered Piezoelectric Power Generator. IEEE MEMS 2006, Istanbul, Turkey, January 2006, 94–97. 16... Power : A Radioisotope - powered Piezoelectric Generator. IEEE Pervasive Computing Jan-Mar 2005, 4 (1), 53–61. Lee, C.; Guo, H.; Radhakrishnan, S.; Lal, A

  5. Computer and internet use in a community health clinic population.

    PubMed

    Peterson, Neeraja B; Dwyer, Kathleen A; Mulvaney, Shelagh A

    2009-01-01

    To determine if patients from a community health clinic have access to computers and/or the Internet and if they believe a computer is useful in their medical care. A convenience sample of 100 subjects, aged 50 years and older, from a community health clinic in Nashville, Tennessee, completed a structured interview and a health literacy assessment. Of the 100 participants, 40 did not have any computer access, 27 had computer but not Internet access, and 33 had Internet access. Participants with computer access (with or without Internet) had higher incomes, higher educational status, and higher literacy status than those without computer access. Of participants reporting current computer use (n = 54), 33% reported never using their computer to look up health and medical information. Of those who "never'' used their computer for this activity, 54% reported they did not have Internet connectivity, whereas 31% reported they did not know how to use the Internet. Although this group of individuals reported that they were comfortable using a computer (77%), they reported being uncomfortable with accessing the Internet (53%). Not only does access to computers and the Internet need to be improved before widespread use by patients, but computer users will need to be instructed on how to navigate the Internet.

  6. Accurate Energy Consumption Modeling of IEEE 802.15.4e TSCH Using Dual-BandOpenMote Hardware.

    PubMed

    Daneels, Glenn; Municio, Esteban; Van de Velde, Bruno; Ergeerts, Glenn; Weyn, Maarten; Latré, Steven; Famaey, Jeroen

    2018-02-02

    The Time-Slotted Channel Hopping (TSCH) mode of the IEEE 802.15.4e amendment aims to improve reliability and energy efficiency in industrial and other challenging Internet-of-Things (IoT) environments. This paper presents an accurate and up-to-date energy consumption model for devices using this IEEE 802.15.4e TSCH mode. The model identifies all network-related CPU and radio state changes, thus providing a precise representation of the device behavior and an accurate prediction of its energy consumption. Moreover, energy measurements were performed with a dual-band OpenMote device, running the OpenWSN firmware. This allows the model to be used for devices using 2.4 GHz, as well as 868 MHz. Using these measurements, several network simulations were conducted to observe the TSCH energy consumption effects in end-to-end communication for both frequency bands. Experimental verification of the model shows that it accurately models the consumption for all possible packet sizes and that the calculated consumption on average differs less than 3% from the measured consumption. This deviation includes measurement inaccuracies and the variations of the guard time. As such, the proposed model is very suitable for accurate energy consumption modeling of TSCH networks.

  7. Accurate Energy Consumption Modeling of IEEE 802.15.4e TSCH Using Dual-BandOpenMote Hardware

    PubMed Central

    Municio, Esteban; Van de Velde, Bruno; Latré, Steven

    2018-01-01

    The Time-Slotted Channel Hopping (TSCH) mode of the IEEE 802.15.4e amendment aims to improve reliability and energy efficiency in industrial and other challenging Internet-of-Things (IoT) environments. This paper presents an accurate and up-to-date energy consumption model for devices using this IEEE 802.15.4e TSCH mode. The model identifies all network-related CPU and radio state changes, thus providing a precise representation of the device behavior and an accurate prediction of its energy consumption. Moreover, energy measurements were performed with a dual-band OpenMote device, running the OpenWSN firmware. This allows the model to be used for devices using 2.4 GHz, as well as 868 MHz. Using these measurements, several network simulations were conducted to observe the TSCH energy consumption effects in end-to-end communication for both frequency bands. Experimental verification of the model shows that it accurately models the consumption for all possible packet sizes and that the calculated consumption on average differs less than 3% from the measured consumption. This deviation includes measurement inaccuracies and the variations of the guard time. As such, the proposed model is very suitable for accurate energy consumption modeling of TSCH networks. PMID:29393900

  8. Integration of the White Sands Complex into a Wide Area Network

    NASA Technical Reports Server (NTRS)

    Boucher, Phillip Larry; Horan, Sheila, B.

    1996-01-01

    The NASA White Sands Complex (WSC) satellite communications facility consists of two main ground stations, an auxiliary ground station, a technical support facility, and a power plant building located on White Sands Missile Range. When constructed, terrestrial communication access to these facilities was limited to copper telephone circuits. There was no local or wide area communications network capability. This project incorporated a baseband local area network (LAN) topology at WSC and connected it to NASA's wide area network using the Program Support Communications Network-Internet (PSCN-I). A campus-style LAN is configured in conformance with the International Standards Organization (ISO) Open Systems Interconnect (ISO) model. Ethernet provides the physical and data link layers. Transmission Control Protocol and Internet Protocol (TCP/IP) are used for the network and transport layers. The session, presentation, and application layers employ commercial software packages. Copper-based Ethernet collision domains are constructed in each of the primary facilities and these are interconnected by routers over optical fiber links. The network and each of its collision domains are shown to meet IEEE technical configuration guidelines. The optical fiber links are analyzed for the optical power budget and bandwidth allocation and are found to provide sufficient margin for this application. Personal computers and work stations attached to the LAN communicate with and apply a wide variety of local and remote administrative software tools. The Internet connection provides wide area network (WAN) electronic access to other NASA centers and the world wide web (WWW). The WSC network reduces and simplifies the administrative workload while providing enhanced and advanced inter-communications capabilities among White Sands Complex departments and with other NASA centers.

  9. A Computational Model and Multi-Agent Simulation for Information Assurance

    DTIC Science & Technology

    2002-06-01

    Podell , Information Security: an Integrated Collection of Essays, IEEE Computer Society Press, Los Alamitos, CA, 1994. Brinkley, D. L. and Schell, R...R., “What is There to Worry About? An Introduction to the Computer Security Problem,” ed. Abrams and Jajodia and Podell , Information Security: an

  10. A Survey of Parallel Computing

    DTIC Science & Technology

    1988-07-01

    Evaluating Two Massively Parallel Machines. Communications of the ACM .9, , , 176 BIBLIOGRAPHY 29, 8 (August), pp. 752-758. Gajski , D.D., Padua, D.A., Kuck...Computer Architecture, edited by Gajski , D. D., Milutinovic, V. M. Siegel, H. J. and Furht, B. P. IEEE Computer Society Press, Washington, D.C., pp. 387-407

  11. Adaptive Topological Configuration of an Integrated Circuit/Packet-Switched Computer Network.

    DTIC Science & Technology

    1984-01-01

    Gitman et al. [45] state that there are basically two approaches to the integrated network design problem: (1) solve the link/capacity problem for...1972), 1385-1397. 33. Frank, H., and Gitman , I. Economic analysis of integrated voice and data networks: a case study. Proc. of IEEE 66 , 11 (Nov. 1978...1974), 1074-1079. 45. Gitman , I., Hsieh, W., and Occhiogrosso, B. J. Analysis and design of hybrid switching networks. IEEE Trans. on Comm. Com-29

  12. Performance of Wireless Unattended Sensor Network in Maritime Applications

    DTIC Science & Technology

    2007-06-01

    longevity. Crossbow Technologies produces a number of gateways for use with their motes which include the MIB510, the MIB600 and the Stargate . The...MIB510 and MIB600 gateways require interface directly with a PC while he Stargate gateway interfaces remotely using the IEEE 802.11 standard for access...dedicated PC is unfeasible, the Stargate gateway allows remote access using the IEEE 802.11 standard. This can be accomplished via a Personal Computer

  13. Neurale Netwerken en Radarsystemen (Neural Networks and Radar Systems)

    DTIC Science & Technology

    1989-08-01

    general issues in cognitive science", Parallel distributed processing, Vol 1: Foundations, Rumelhart et al. 1986 pp 110-146 THO rapport Pagina 151 36 D.E...34Neural networks (part 2)",Expert Focus, IEEE Expert, Spring 1988. 61 J.A. Anderson, " Cognitive and Psychological Computations with Neural Models", IEEE...Pagina 154 69 David H. Ackley, Geoffrey E. Hinton and Terrence J. Sejnowski, "A Learning Algorithm for Boltzmann machines", cognitive science 9, 147-169

  14. Subjective Audio Quality over a Secure IEEE 802.11n Draft 2.0 Wireless Local Area Network

    DTIC Science & Technology

    2009-03-01

    hereafter referred to as 802.11) provide users with mobile connectivity without the need for expensive and inflexible wiring. The 802.11n extension, for...through another protocol, such as Secure / Multipurpose Internet Mail Extensions ( S /MIME). SDPS is, therefore, not a complete solution for secure key...number of packets per second (“Pkts/ s ”) are visible. Audio recordings are taken at AFIT within range of several other 802.11g APs as shown in Figure

  15. A Survey on Energy Conserving Mechanisms for the Internet of Things: Wireless Networking Aspects.

    PubMed

    Abbas, Zeeshan; Yoon, Wonyong

    2015-09-25

    The Internet of Things (IoT) is an emerging key technology for future industries and everyday lives of people, where a myriad of battery operated sensors, actuators, and smart objects are connected to the Internet to provide services such as mobile healthcare, intelligent transport system, environmental monitoring, etc. Since energy efficiency is of utmost importance to these battery constrained IoT devices, IoT-related standards and research works have focused on the device energy conserving issues. This paper presents a comprehensive survey on energy conserving issues and solutions in using diverse wireless radio access technologies for IoT connectivity, e.g., the 3rd Generation Partnership Project (3GPP) machine type communications, IEEE 802.11ah, Bluetooth Low Energy (BLE), and Z-Wave. We look into the literature in broad areas of standardization, academic research, and industry development, and structurally summarize the energy conserving solutions based on several technical criteria. We also propose future research directions regarding energy conserving issues in wireless networking-based IoT.

  16. A Survey on Energy Conserving Mechanisms for the Internet of Things: Wireless Networking Aspects

    PubMed Central

    Abbas, Zeeshan; Yoon, Wonyong

    2015-01-01

    The Internet of Things (IoT) is an emerging key technology for future industries and everyday lives of people, where a myriad of battery operated sensors, actuators, and smart objects are connected to the Internet to provide services such as mobile healthcare, intelligent transport system, environmental monitoring, etc. Since energy efficiency is of utmost importance to these battery constrained IoT devices, IoT-related standards and research works have focused on the device energy conserving issues. This paper presents a comprehensive survey on energy conserving issues and solutions in using diverse wireless radio access technologies for IoT connectivity, e.g., the 3rd Generation Partnership Project (3GPP) machine type communications, IEEE 802.11ah, Bluetooth Low Energy (BLE), and Z-Wave. We look into the literature in broad areas of standardization, academic research, and industry development, and structurally summarize the energy conserving solutions based on several technical criteria. We also propose future research directions regarding energy conserving issues in wireless networking-based IoT. PMID:26404275

  17. Transmission Loss Calculation using A and B Loss Coefficients in Dynamic Economic Dispatch Problem

    NASA Astrophysics Data System (ADS)

    Jethmalani, C. H. Ram; Dumpa, Poornima; Simon, Sishaj P.; Sundareswaran, K.

    2016-04-01

    This paper analyzes the performance of A-loss coefficients while evaluating transmission losses in a Dynamic Economic Dispatch (DED) Problem. The performance analysis is carried out by comparing the losses computed using nominal A loss coefficients and nominal B loss coefficients in reference with load flow solution obtained by standard Newton-Raphson (NR) method. Density based clustering method based on connected regions with sufficiently high density (DBSCAN) is employed in identifying the best regions of A and B loss coefficients. Based on the results obtained through cluster analysis, a novel approach in improving the accuracy of network loss calculation is proposed. Here, based on the change in per unit load values between the load intervals, loss coefficients are updated for calculating the transmission losses. The proposed algorithm is tested and validated on IEEE 6 bus system, IEEE 14 bus, system IEEE 30 bus system and IEEE 118 bus system. All simulations are carried out using SCILAB 5.4 (www.scilab.org) which is an open source software.

  18. OASIS connections: results from an evaluation study.

    PubMed

    Czaja, Sara J; Lee, Chin Chin; Branham, Janice; Remis, Peggy

    2012-10-01

    The objectives of this study were to evaluate a community-based basic computer and Internet training program designed for older adults, provide recommendations for program refinement, and gather preliminary information on program sustainability. The program was developed by the OASIS Institute, a nonprofit agency serving older adults and implemented in 4 cities by community trainers across the United States. One hundred and ninety-six adults aged 40-90 years were assigned to the training or a wait-list control group. Knowledge of computers and the Internet, attitudes toward computers, and computer/Internet use were assessed at baseline, posttraining, and 3 months posttraining. The program was successful in increasing the computer/Internet skills of the trainees. The data indicated a significant increase in computer and Internet knowledge and comfort with computers among those who received the training. Further, those who completed the course reported an increase in both computer and Internet use 3 months posttraining. The findings indicate that a community-based computer and Internet training program delivered by community instructors can be effective in terms of increasing computer and Internet skills and comfort with computer technology among older adults.

  19. Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria. Version 1.

    DTIC Science & Technology

    1987-07-01

    for Secure Computer Systema, MTR-3153, The MITRE Corporation, Bedford, MA, June 1975. 1 See, for example, M. D. Abrams and H. J. Podell , Tutorial...References References Abrams, M. D. and H. J. Podell , Tutorial: Computer and Network Security, IEEE Com- puter Society Press, 1987. Addendum to the

  20. Computer and internet use by persons after traumatic spinal cord injury.

    PubMed

    Goodman, Naomi; Jette, Alan M; Houlihan, Bethlyn; Williams, Steve

    2008-08-01

    To determine whether computer and internet use by persons post spinal cord injury (SCI) is sufficiently prevalent and broad-based to consider using this technology as a long-term treatment modality for patients who have sustained SCI. A multicenter cohort study. Twenty-six past and current U.S. regional Model Spinal Cord Injury Systems. Patients with traumatic SCI (N=2926) with follow-up interviews between 2004 and 2006, conducted at 1 or 5 years postinjury. Not applicable. Results revealed that 69.2% of participants with SCI used a computer; 94.2% of computer users accessed the internet. Among computer users, 19.1% used assistive devices for computer access. Of the internet users, 68.6% went online 5 to 7 days a week. The most frequent use for internet was e-mail (90.5%) and shopping sites (65.8%), followed by health sites (61.1%). We found no statistically significant difference in computer use by sex or level of neurologic injury, and no difference in internet use by level of neurologic injury. Computer and internet access differed significantly by age, with use decreasing as age group increased. The highest computer and internet access rates were seen among participants injured before the age of 18. Computer and internet use varied by race: 76% of white compared with 46% of black subjects were computer users (P<.001), and 95.3% of white respondents who used computers used the internet, compared with 87.6% of black respondents (P<.001). Internet use increased with education level (P<.001): eighty-six percent of participants who did not graduate from high school or receive a degree used the internet, while over 97% of those with a college or associate's degree did. While the internet holds considerable potential as a long-term treatment modality after SCI, limited access to the internet by those who are black, those injured after age 18, and those with less education does reduce its usefulness in the short term for these subgroups.

  1. The Computer-Job Salary Picture.

    ERIC Educational Resources Information Center

    Basta, Nicholas

    1987-01-01

    Discusses starting salaries for graduates with various degrees in computer science and electrical engineering. Summarizes the results of a recent study by the Institute of Electrical and Electronics Engineers (IEEE) which provides salary estimates for graduates in different specialties and in different geographical locations. (TW)

  2. Universal Number Library

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Lloyd, G. Scott

    This floating-point arithmetic library contains a software implementation of Universal Numbers (unums) as described by John Gustafson [1]. The unum format is a superset of IEEE 754 floating point with several advantages. Computing with unums provides more accurate answers without rounding errors, underflow or overflow. In contrast to fixed-sized IEEE numbers, a variable number of bits can be used to encode unums. This all allows number with only a few significant digits or with a small dynamic range to be represented more compactly.

  3. Implementation of a Fault Tolerant Control Unit within an FPGA for Space Applications

    DTIC Science & Technology

    2006-12-01

    Conference 2002, September 2002. [20] M. Alderighi, A. Candelori, F. Casini, S. D’Angelo, M. Mancini, A. Paccagnella, S. Pastore , G.R. Sechi, “Heavy...Luigi Carro and Ricardo Reis , “Designing and Testing Fault-Tolerant Techniques for SRAM-based FPGAs,” in Proc. 1st Conference on Computer Frontiers, pp...susceptibility,” in IEEE Proc. 12th IEEE Intl. Symposium on On-Line Testing, pp. 89-91, 2006. [45] Fernanda Lima, Luigi Carro and Ricardo Reis

  4. Computer and Internet use among Undergraduate Medical Students in Iran

    PubMed Central

    Ayatollahi, Ali; Ayatollahi, Jamshid; Ayatollahi, Fatemeh; Ayatollahi, Reza; Shahcheraghi, Seyed Hossein

    2014-01-01

    Objective: Although computer technologies are now widely used in medicine, little is known about its use among medical students in Iran. The aim of this study was to determine the competence and access to computer and internet among the medical students. Methods: In this descriptive study, medical students of Shahid Sadoughi University of Medical Science, Yazd, Iran from the fifth years were asked to answer a questionnaire during a time-tabled lecture slot. The chi-square test was used to compare the frequency of computer and internet use between the two genders, and the level of statistical significance for all test was set at 0.05. Results: All the students have a personal computer and internet access. There were no statistically significant differences between men and women for the computer and internet access, use wireless device to access internet, having laptop and e-mail address and the difficulties encountered using internet. The main reason for less utilization of internet was slow speed of data transfer. Conclusions: Because of the wide range of computer skills and internet information among medical students in our institution, a single computer and internet course for all students would not be useful nor would it be accepted. PMID:25225525

  5. Software Aspects of IEEE Floating-Point Computations for Numerical Applications in High Energy Physics

    ScienceCinema

    Arnold, Jeffrey

    2018-05-14

    Floating-point computations are at the heart of much of the computing done in high energy physics. The correctness, speed and accuracy of these computations are of paramount importance. The lack of any of these characteristics can mean the difference between new, exciting physics and an embarrassing correction. This talk will examine practical aspects of IEEE 754-2008 floating-point arithmetic as encountered in HEP applications. After describing the basic features of IEEE floating-point arithmetic, the presentation will cover: common hardware implementations (SSE, x87) techniques for improving the accuracy of summation, multiplication and data interchange compiler options for gcc and icc affecting floating-point operations hazards to be avoided. About the speaker: Jeffrey M Arnold is a Senior Software Engineer in the Intel Compiler and Languages group at Intel Corporation. He has been part of the Digital->Compaq->Intel compiler organization for nearly 20 years; part of that time, he worked on both low- and high-level math libraries. Prior to that, he was in the VMS Engineering organization at Digital Equipment Corporation. In the late 1980s, Jeff spent 2½ years at CERN as part of the CERN/Digital Joint Project. In 2008, he returned to CERN to spent 10 weeks working with CERN/openlab. Since that time, he has returned to CERN multiple times to teach at openlab workshops and consult with various LHC experiments. Jeff received his Ph.D. in physics from Case Western Reserve University.

  6. "Reliability Of Fiber Optic Lans"

    NASA Astrophysics Data System (ADS)

    Code n, Michael; Scholl, Frederick; Hatfield, W. Bryan

    1987-02-01

    Fiber optic Local Area Network Systems are being used to interconnect increasing numbers of nodes. These nodes may include office computer peripherals and terminals, PBX switches, process control equipment and sensors, automated machine tools and robots, and military telemetry and communications equipment. The extensive shared base of capital resources in each system requires that the fiber optic LAN meet stringent reliability and maintainability requirements. These requirements are met by proper system design and by suitable manufacturing and quality procedures at all levels of a vertically integrated manufacturing operation. We will describe the reliability and maintainability of Codenoll's passive star based systems. These include LAN systems compatible with Ethernet (IEEE 802.3) and MAP (IEEE 802.4), and software compatible with IBM Token Ring (IEEE 802.5). No single point of failure exists in this system architecture.

  7. Can Humans Fly Action Understanding with Multiple Classes of Actors

    DTIC Science & Technology

    2015-06-08

    recognition using structure from motion point clouds. In European Conference on Computer Vision, 2008. [5] R. Caruana. Multitask learning. Machine Learning...tonomous driving ? the kitti vision benchmark suite. In IEEE Conference on Computer Vision and Pattern Recognition, 2012. [12] L. Gorelick, M. Blank

  8. Household computer and Internet access: The digital divide in a pediatric clinic population

    PubMed Central

    Carroll, Aaron E.; Rivara, Frederick P.; Ebel, Beth; Zimmerman, Frederick J.; Christakis, Dimitri A.

    2005-01-01

    Past studies have noted a digital divide, or inequality in computer and Internet access related to socioeconomic class. This study sought to measure how many households in a pediatric primary care outpatient clinic had household access to computers and the Internet, and whether this access differed by socio-economic status or other demographic information. We conducted a phone survey of a population-based sample of parents with children ages 0 to 11 years old. Analyses assessed predictors of having home access to a computer, the Internet, and high-speed Internet service. Overall, 88.9% of all households owned a personal computer, and 81.4% of all households had Internet access. Among households with Internet access, 48.3% had high speed Internet at home. There were statistically significant associations between parental income or education and home computer ownership and Internet access. However, the impact of this difference was lessened by the fact that over 60% of families with annual household income of $10,000–$25,000, and nearly 70% of families with only a high-school education had Internet access at home. While income and education remain significant predictors of household computer and internet access, many patients and families at all economic levels have access, and might benefit from health promotion interventions using these modalities. PMID:16779012

  9. Perceptions about computers and the internet in a pediatric clinic population.

    PubMed

    Carroll, Aaron E; Zimmerman, Frederick J; Rivara, Frederick P; Ebel, Beth E; Christakis, Dimitri A

    2005-01-01

    A digital divide with respect to computer and Internet access has been noted in numerous studies and reports. Equally important to ownership is comfort with computers and Internet technology, and concerns about privacy of personal data. To measure how households in a pediatric clinic vary in their attitudes toward computers, concerns about Internet confidentiality, and comfort using the Internet and whether these views are associated with household income or education. A phone survey was administered to a population-based sample of parents with children aged 0 to 11 years. All children received medical care from a community-based clinic network serving patients in King County, Wash. Eighty-eight percent of respondents used a computer once a week or more, and 83% of respondents reported favorable feelings toward computers. Although 97% of respondents were willing to share personal information over the Internet, many respondents considered data security important. While household income and parental education were associated with comfort and familiarity with computers, the effect is small. Respondents who already owned a computer and had Internet access did not differ in their perceptions according to socioeconomic or educational attainment. Most families like using computers and feel comfortable using the Internet regardless of socioeconomic status. Fears about the digital divide's impact on the attitudes of parents toward computers or their comfort using the Internet should not be seen as a barrier to developing Internet-based health interventions for a pediatric clinic population.

  10. Building the interspace: Digital library infrastructure for a University Engineering Community

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Schatz, B.

    A large-scale digital library is being constructed and evaluated at the University of Illinois, with the goal of bringing professional search and display to Internet information services. A testbed planned to grow to 10K documents and 100K users is being constructed in the Grainger Engineering Library Information Center, as a joint effort of the University Library and the National Center for Supercomputing Applications (NCSA), with evaluation and research by the Graduate School of Library and Information Science and the Department of Computer Science. The electronic collection will be articles from engineering and science journals and magazines, obtained directly from publishersmore » in SGML format and displayed containing all text, figures, tables, and equations. The publisher partners include IEEE Computer Society, AIAA (Aerospace Engineering), American Physical Society, and Wiley & Sons. The software will be based upon NCSA Mosaic as a network engine connected to commercial SGML displayers and full-text searchers. The users will include faculty/students across the midwestern universities in the Big Ten, with evaluations via interviews, surveys, and transaction logs. Concurrently, research into scaling the testbed is being conducted. This includes efforts in computer science, information science, library science, and information systems. These efforts will evaluate different semantic retrieval technologies, including automatic thesaurus and subject classification graphs. New architectures will be designed and implemented for a next generation digital library infrastructure, the Interspace, which supports interaction with information spread across information spaces within the Net.« less

  11. Information Security: Computer Hacker Information Available on the Internet

    DTIC Science & Technology

    1996-06-05

    INFORMATION SECURITY Computer Hacker Information Available on the Internet Statement for the Record of...Report Type N/A Dates Covered (from... to) - Title and Subtitle INFORMATION SECURITY Computer Hacker Information Available on the Internet Contract...1996 4. TITLE AND SUBTITLE Information Security: Computer Hacker Information Available on the Internet 5. FUNDING NUMBERS 6. AUTHOR(S) Jack L.

  12. 36 CFR 1254.32 - What rules apply to public access use of the Internet on NARA-supplied computers?

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... access use of the Internet on NARA-supplied computers? 1254.32 Section 1254.32 Parks, Forests, and Public... of the Internet on NARA-supplied computers? (a) Public access computers (workstations) are available for Internet use in all NARA research rooms. The number of workstations varies per location. We...

  13. 36 CFR 1254.32 - What rules apply to public access use of the Internet on NARA-supplied computers?

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... access use of the Internet on NARA-supplied computers? 1254.32 Section 1254.32 Parks, Forests, and Public... of the Internet on NARA-supplied computers? (a) Public access computers (workstations) are available for Internet use in all NARA research rooms. The number of workstations varies per location. We...

  14. Mitigating Spam Using Spatio-Temporal Reputation

    DTIC Science & Technology

    2010-01-01

    scalable; computation can occur in near real-time and over 500,000 emails can be scored an hour. 1 Introduction Roughly 90% of the total volume of email on...Sokolsky, and J. M. Smith. Dynamic trust management. IEEE Computer (Special Issue on Trust Mangement ), 2009. [11] P. Boykins and B. Roychowdhury

  15. Internet and computer access and use for health information in an underserved community.

    PubMed

    Kind, Terry; Huang, Zhihuan J; Farr, Deeonna; Pomerantz, Karyn L

    2005-01-01

    The "digital divide" is the gap between those with access to information tools such as the Internet and those without access. The gap has been described by income, education, age, and race. Little information exists on computer and Internet access and use for health information by parents, particularly among populations of low income and low education level. To describe computer and Internet access and use, including health information retrieval, among low-income, urban, African American caregivers (parents). Cross-sectional survey administered in pediatric waiting rooms of urban community-based health centers in a low-income area. Caregivers of pediatric outpatients. Access to computers, Internet access, and use of Internet for health information. In 2003, among 260 African Americans who completed surveys, 58% had a computer and 41% had home Internet access. Fifty-two percent had used the Internet for finding health information. Ninety-three percent agreed or strongly agreed that there is useful health information on the Internet. Ninety-two percent agreed or strongly agreed that they would want to talk with a medical professional about health information on the Internet. Sixty-five percent of respondents had no additional schooling after high school. Annual household income was

  16. Taming Crowded Visual Scenes

    DTIC Science & Technology

    2014-08-12

    Nolan Warner, Mubarak Shah. Tracking in Dense Crowds Using Prominenceand Neighborhood Motion Concurrence, IEEE Transactions on Pattern Analysis...of  computer  vision,   computer   graphics  and  evacuation  dynamics  by  providing  a  common  platform,  and  provides...areas  that  includes  Computer  Vision,  Computer   Graphics ,  and  Pedestrian   Evacuation  Dynamics.  Despite  the

  17. An Exploration of Middle and High School Students' Perceptions of Deviant Behavior when Using Computers and the Internet

    ERIC Educational Resources Information Center

    Daniel, Annie J.

    2005-01-01

    If the current trend continues, the use of computer technologies and the Internet will increase for teaching and education. It is urgent that researchers study computer and Internet deviance. The purpose of this study was to explore middle and high school students' perceptions of deviant behavior when using computers and the Internet. The target…

  18. The prevalence of computer and Internet addiction among pupils.

    PubMed

    Zboralski, Krzysztof; Orzechowska, Agata; Talarowska, Monika; Darmosz, Anna; Janiak, Aneta; Janiak, Marcin; Florkowski, Antoni; Gałecki, Piotr

    2009-02-02

    Media have an influence on the human psyche similar to the addictive actions of psychoactive substances or gambling. Computer overuse is claimed to be a cause of psychiatric disturbances such as computer and Internet addiction. It has not yet been recognized as a disease, but it evokes increasing controversy and results in mental disorders commonly defined as computer and Internet addiction. This study was based on a diagnostic survey in which 120 subjects participated. The participants were pupils of three kinds of schools: primary, middle, and secondary school (high school). Information for this study was obtained from a questionnaire prepared by the authors as well as the State-Trait Anxiety Inventory (STAI) and the Psychological Inventory of Aggression Syndrome (IPSA-II). he results confirmed that every fourth pupil was addicted to the Internet. Internet addiction was very common among the youngest users of computers and the Internet, especially those who had no brothers and sisters or came from families with some kind of problems. Moreover, more frequent use of the computer and the Internet was connected with higher levels of aggression and anxiety. Because computer and Internet addiction already constitute a real danger, it is worth considering preventive activities to treat this phenomenon. It is also necessary to make the youth and their parents aware of the dangers of uncontrolled Internet use and pay attention to behavior connected with Internet addiction.

  19. How medical students use the computer and Internet at a Turkish military medical school.

    PubMed

    Kir, Tayfun; Ogur, Recai; Kilic, Selim; Tekbas, Omer Faruk; Hasde, Metin

    2004-12-01

    The aim of this study was to determine how medical students use the computer and World Wide Web at a Turkish military medical school and to discuss characteristics related to this computer use. The study was conducted in 2003 in the Department of Public Health at the Gulhane Military Medical School in Ankara, Turkey. A survey developed by the authors was distributed to 508 students, after pretest. Responses were analyzed statistically by using a computer. Most of the students (86.4%) could access a computer and the Internet and all of the computers that were used by students had Internet connections, and a small group (8.9%) had owned their own computers. One-half of the students use notes provided by attending stuff and textbooks as assistant resources for their studies. The most common usage of computers was connecting to the Internet (91.9%), and the most common use of the Internet was e-mail communication (81.6%). The most preferred site category for daily visit was newspaper sites (62.8%). Approximately 44.1% of students visited medical sites when they were surfing. Also, there was a negative correlation between school performance and the time spent for computer and Internet use (-0.056 and -0.034, respectively). It was observed that medical students used the computer and Internet essentially for nonmedical purposes. To encourage students to use the computer and Internet for medical purposes, tutors should use the computer and Internet during their teaching activities, and software companies should produce assistant applications for medical students. Also, medical schools should build interactive World Wide Web sites, e-mail groups, discussion boards, and study areas for medical students.

  20. Home Computer and Internet User Security

    DTIC Science & Technology

    2005-01-01

    Information Security Model © 2005 Carnegie Mellon University (Lawrence R. Rogers, Author) Home Computer and Internet User Security...Carnegie Mellon University (Lawrence R. Rogers, Author) Home Computer and Internet User Security Version 1.0.4 – slide 50 Contact Information Lawrence R. Rogers • Email: cert@cert.org CERT website: http://www.cert.org/ ...U.S. Patent and Trademark Office Home Computer and Internet User Security Report Documentation Page Form ApprovedOMB

  1. Campus-Wide Computing: Early Results Using Legion at the University of Virginia

    DTIC Science & Technology

    2006-01-01

    Bernard et al., “Primitives for Distributed Computing in a Heterogeneous Local Area Network Environ- ment”, IEEE Trans on Soft. Eng. vol. 15, no. 12...1994. [16] F. Ferstl, “CODINE Technical Overview,” Genias, April, 1993. [17] R. F. Freund and D. S. Cornwell , “Superconcurrency: A form of distributed

  2. Scalable Vector Media-processors for Embedded Systems

    DTIC Science & Technology

    2002-05-01

    Set Architecture for Multimedia “When you do the common things in life in an uncommon way, you will command the attention of the world.” George ...Bibliography [ABHS89] M. August, G. Brost , C. Hsiung, and C. Schiffleger. Cray X-MP: The Birth of a Super- computer. IEEE Computer, 22(1):45–52, January

  3. Securing Emergency State Data in a Tactical Computing Environment

    DTIC Science & Technology

    2010-12-01

    in a Controlled Manner, 19th IEEE Symposium on Computer-Based Medical Systems (CBMS󈧊), 847–854. [38] K. Kifayat, D. Llewellyn - Jones , A. Arabo, O...Drew, M. Merabti, Q. Shi, A. Waller, R. Craddock, G. Jones , State-of-the-Art in System-of-Systems Security for Crisis Management, Fourth Annual

  4. Theoretical Investigation of Optical Computing Based on Neural Network Models.

    DTIC Science & Technology

    1987-09-29

    34 Cognitive and Psychological Computation with Neu- ral Models," IEEE Trans. Sys., Man, and cyber., SMC-13, p. 799, 1983. 20’ K. Nakano, "Association-A...7),482(1986). 211 F. Rosenblatt, Principles of Neurodynamics : Perceptron and the The- ory of Brain Mechanisms, Spartan Books, Washington,(1961). 22

  5. A Placement Test for Computer Science: Design, Implementation, and Analysis

    ERIC Educational Resources Information Center

    Nugent, Gwen; Soh, Leen-Kiat; Samal, Ashok; Lang, Jeff

    2006-01-01

    An introductory CS1 course presents problems for educators and students due to students' diverse background in programming knowledge and exposure. Students who enroll in CS1 also have different expectations and motivations. Prompted by the curricular guidelines for undergraduate programmes in computer science released in 2001 by the ACM/IEEE, and…

  6. An Investigation of Memory Latency Reduction Using an Address Prediction Buffer

    DTIC Science & Technology

    1992-12-01

    McGraw-Hill Inc.. London, England, 1991. [GAJSKI87] Gajski , D.D. et al, Computer Architecture, IEEE Computer Society Press, Washington, D.C., 1987...California, (vol 19 no 3), 1991. [NOWICK92] Nowicki, G ., "Design and Implementation of a Read Prediction Buffer", Master’s Thesis, Naval Postgraduate School

  7. Prescription for trouble: Medicare Part D and patterns of computer and internet access among the elderly.

    PubMed

    Wright, David W; Hill, Twyla J

    2009-01-01

    The Medicare Prescription Drug, Improvement, and Modernization Act of 2003 specifically encourages Medicare enrollees to use the Internet to obtain information regarding the new prescription drug insurance plans and to enroll in a plan. This reliance on computer technology and the Internet leads to practical questions regarding implementation of the insurance coverage. For example, it seems unlikely that all Medicare enrollees have access to computers and the Internet or that they are all computer literate. This study uses the 2003 Current Population Survey to examine the effects of disability and income on computer access and Internet use among the elderly. Internet access declines with age and is exacerbated by disabilities. Also, decreases in income lead to decreases in computer ownership and use. Therefore, providing prescription drug coverage primarily through the Internet seems likely to maintain or increase stratification of access to health care, especially for low-income, disabled elderly, who are also a group most in need of health care access.

  8. A note on bound constraints handling for the IEEE CEC'05 benchmark function suite.

    PubMed

    Liao, Tianjun; Molina, Daniel; de Oca, Marco A Montes; Stützle, Thomas

    2014-01-01

    The benchmark functions and some of the algorithms proposed for the special session on real parameter optimization of the 2005 IEEE Congress on Evolutionary Computation (CEC'05) have played and still play an important role in the assessment of the state of the art in continuous optimization. In this article, we show that if bound constraints are not enforced for the final reported solutions, state-of-the-art algorithms produce infeasible best candidate solutions for the majority of functions of the IEEE CEC'05 benchmark function suite. This occurs even though the optima of the CEC'05 functions are within the specified bounds. This phenomenon has important implications on algorithm comparisons, and therefore on algorithm designs. This article's goal is to draw the attention of the community to the fact that some authors might have drawn wrong conclusions from experiments using the CEC'05 problems.

  9. Connectivity to computers and the Internet among patients with schizophrenia spectrum disorders: a cross-sectional study.

    PubMed

    Välimäki, Maritta; Kuosmanen, Lauri; Hätönen, Heli; Koivunen, Marita; Pitkänen, Anneli; Athanasopoulou, Christina; Anttila, Minna

    2017-01-01

    Information and communication technologies have been developed for a variety of health care applications and user groups in the field of health care. This study examined the connectivity to computers and the Internet among patients with schizophrenia spectrum disorders (SSDs). A cross-sectional survey design was used to study 311 adults with SSDs from the inpatient units of two psychiatric hospitals in Finland. The data collection lasted for 20 months and was done through patients' medical records and a self-reported, structured questionnaire. Data analysis included descriptive statistics. In total, 297 patients were included in this study (response rate =96%). More than half of them (n=156; 55%) had a computer and less than half of them (n=127; 44%) had the Internet at home. Of those who generally had access to computers and the Internet, more than one-fourth (n=85; 29%) used computers daily, and >30% (n=96; 33%) never accessed the Internet. In total, approximately one-fourth of them (n=134; 25%) learned to use computers, and less than one-third of them (n=143; 31%) were known to use the Internet by themselves. Older people (aged 45-65 years) and those with less years of education (primary school) tended not to use the computers and the Internet at all ( P <0.001), and younger people and those with higher education were associated with more active use. Patients had quite good access to use computers and the Internet, and they mainly used the Internet to seek information. Social, occupational, and psychological functioning (which were evaluated with Global Assessment of Functioning) were not associated with access to and frequency of computer and the Internet use. The results support the use of computers and the Internet as part of clinical work in mental health care.

  10. Connectivity to computers and the Internet among patients with schizophrenia spectrum disorders: a cross-sectional study

    PubMed Central

    Välimäki, Maritta; Kuosmanen, Lauri; Hätönen, Heli; Koivunen, Marita; Pitkänen, Anneli; Athanasopoulou, Christina; Anttila, Minna

    2017-01-01

    Purpose Information and communication technologies have been developed for a variety of health care applications and user groups in the field of health care. This study examined the connectivity to computers and the Internet among patients with schizophrenia spectrum disorders (SSDs). Patients and methods A cross-sectional survey design was used to study 311 adults with SSDs from the inpatient units of two psychiatric hospitals in Finland. The data collection lasted for 20 months and was done through patients’ medical records and a self-reported, structured questionnaire. Data analysis included descriptive statistics. Results In total, 297 patients were included in this study (response rate =96%). More than half of them (n=156; 55%) had a computer and less than half of them (n=127; 44%) had the Internet at home. Of those who generally had access to computers and the Internet, more than one-fourth (n=85; 29%) used computers daily, and >30% (n=96; 33%) never accessed the Internet. In total, approximately one-fourth of them (n=134; 25%) learned to use computers, and less than one-third of them (n=143; 31%) were known to use the Internet by themselves. Older people (aged 45–65 years) and those with less years of education (primary school) tended not to use the computers and the Internet at all (P<0.001), and younger people and those with higher education were associated with more active use. Conclusion Patients had quite good access to use computers and the Internet, and they mainly used the Internet to seek information. Social, occupational, and psychological functioning (which were evaluated with Global Assessment of Functioning) were not associated with access to and frequency of computer and the Internet use. The results support the use of computers and the Internet as part of clinical work in mental health care. PMID:28490882

  11. The cortical mouse: a piece of forgotten history in noninvasive brain–computer interfaces.

    PubMed

    Principe, Jose C

    2013-07-01

    Early research on brain-computer interfaces (BCIs) was fueled by the study of event-related potentials (ERPs) by Farwell and Donchin, who are rightly credited for laying important groundwork for the BCI field. However, many other researchers have made substantial contributions that have escaped the radar screen of the current BCI community. For example, in the late 1980s, I worked with a brilliant multidisciplinary research group in electrical engineering at the University of Florida, Gainesville, headed by Dr. Donald Childers. Childers should be well known to long-time members of the IEEE Engineering in Medicine and Biology Society since he was the editor-in-chief of IEEE Transactions on Biomedical Engineering in the 1970s and the recipient of one of the most prestigious society awards, the William J. Morlock Award, in 1973.

  12. Blind quantum computing with weak coherent pulses.

    PubMed

    Dunjko, Vedran; Kashefi, Elham; Leverrier, Anthony

    2012-05-18

    The universal blind quantum computation (UBQC) protocol [A. Broadbent, J. Fitzsimons, and E. Kashefi, in Proceedings of the 50th Annual IEEE Symposiumon Foundations of Computer Science (IEEE Computer Society, Los Alamitos, CA, USA, 2009), pp. 517-526.] allows a client to perform quantum computation on a remote server. In an ideal setting, perfect privacy is guaranteed if the client is capable of producing specific, randomly chosen single qubit states. While from a theoretical point of view, this may constitute the lowest possible quantum requirement, from a pragmatic point of view, generation of such states to be sent along long distances can never be achieved perfectly. We introduce the concept of ϵ blindness for UBQC, in analogy to the concept of ϵ security developed for other cryptographic protocols, allowing us to characterize the robustness and security properties of the protocol under possible imperfections. We also present a remote blind single qubit preparation protocol with weak coherent pulses for the client to prepare, in a delegated fashion, quantum states arbitrarily close to perfect random single qubit states. This allows us to efficiently achieve ϵ-blind UBQC for any ϵ>0, even if the channel between the client and the server is arbitrarily lossy.

  13. Blind Quantum Computing with Weak Coherent Pulses

    NASA Astrophysics Data System (ADS)

    Dunjko, Vedran; Kashefi, Elham; Leverrier, Anthony

    2012-05-01

    The universal blind quantum computation (UBQC) protocol [A. Broadbent, J. Fitzsimons, and E. Kashefi, in Proceedings of the 50th Annual IEEE Symposiumon Foundations of Computer Science (IEEE Computer Society, Los Alamitos, CA, USA, 2009), pp. 517-526.] allows a client to perform quantum computation on a remote server. In an ideal setting, perfect privacy is guaranteed if the client is capable of producing specific, randomly chosen single qubit states. While from a theoretical point of view, this may constitute the lowest possible quantum requirement, from a pragmatic point of view, generation of such states to be sent along long distances can never be achieved perfectly. We introduce the concept of ɛ blindness for UBQC, in analogy to the concept of ɛ security developed for other cryptographic protocols, allowing us to characterize the robustness and security properties of the protocol under possible imperfections. We also present a remote blind single qubit preparation protocol with weak coherent pulses for the client to prepare, in a delegated fashion, quantum states arbitrarily close to perfect random single qubit states. This allows us to efficiently achieve ɛ-blind UBQC for any ɛ>0, even if the channel between the client and the server is arbitrarily lossy.

  14. Get+Connected: Development and Pilot Testing of an Intervention to Improve Computer and Internet Attitudes and Internet Use Among Women Living With HIV.

    PubMed

    Seplovich, Gabriela; Horvath, Keith J; Haughton, Lorlette J; Blackstock, Oni J

    2017-03-31

    For persons living with chronic medical conditions, the Internet can be a powerful tool for health promotion, and allow for immediate access to medical information and social support. However, women living with human immunodeficiency virus (HIV) in the United States face numerous barriers to computer and Internet use. Health behavior change models suggest that the first step towards adopting a new health behavior is to improve attitudes towards that behavior. To develop and pilot test Get+Connected, an intervention to improve computer and Internet attitudes and Internet use among women living with HIV. To develop Get+Connected, we reviewed the extant literature, adapted an existing curriculum, and conducted a focus group with HIV-positive women (n=20) at a community-based organization in the Bronx, New York. Get+Connected was comprised of five weekly sessions covering the following topics: basic computer knowledge and skills, identifying reliable health-related websites, setting up and using email and Facebook accounts, and a final review session. We recruited 12 women to participate in pilot testing. At baseline, we collected data about participants' sociodemographic information, clinical characteristics, and technology device ownership and use. At baseline, intervention completion, and three months postintervention, we collected data regarding attitudes towards computers and the Internet (Attitudes Towards Computers and the Internet Questionnaire [ATCIQ]; possible scores range from 5-50) as well as frequency of Internet use (composite measure). To examine changes in ATCIQ scores and Internet use over time, we used generalized estimating equations. We also collected qualitative data during intervention delivery. Among women in our sample, the median age was 56 years (interquartile range=52-63). All participants were black/African American and/or Latina. Seven participants (7/12, 58%) had a high school diploma (or equivalent) or higher degree. Ten participants (10/12, 83%) reported owning a mobile phone, while only one (1/12, 8%) reported owning a computer or tablet. Only one participant (1/12, 8%) reported having ever used the Internet or email. Internet nonusers cited lack of computer/Internet knowledge (6/11, 54%) and lack of access to a computer or similar device (4/11, 36%) as the main barriers to use. Over time, we observed an improvement in attitudes towards computers and the Internet (ATCIQ scores: 33.5 at baseline, 35 at intervention completion, and 36 at three months postintervention; P=.008). No significant increase in Internet use was observed (P=.61). Qualitative findings indicated excitement and enthusiasm for the intervention. In our sample of urban, technology-inexperienced HIV-positive women, participation in Get+Connected was associated with an improvement in attitudes towards computers and the Internet, but not Internet use. Changing attitudes is the first step in many health behavior change models, indicating that with improved access to computer and Internet resources, frequency of Internet use may also have increased. Future studies should consider addressing issues of access to technology in conjunction with Get+Connected. ©Gabriela Seplovich, Keith J Horvath, Lorlette J Haughton, Oni J Blackstock. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 31.03.2017.

  15. Get+Connected: Development and Pilot Testing of an Intervention to Improve Computer and Internet Attitudes and Internet Use Among Women Living With HIV

    PubMed Central

    Seplovich, Gabriela; Horvath, Keith J; Haughton, Lorlette J

    2017-01-01

    Background For persons living with chronic medical conditions, the Internet can be a powerful tool for health promotion, and allow for immediate access to medical information and social support. However, women living with human immunodeficiency virus (HIV) in the United States face numerous barriers to computer and Internet use. Health behavior change models suggest that the first step towards adopting a new health behavior is to improve attitudes towards that behavior. Objective To develop and pilot test Get+Connected, an intervention to improve computer and Internet attitudes and Internet use among women living with HIV. Methods To develop Get+Connected, we reviewed the extant literature, adapted an existing curriculum, and conducted a focus group with HIV-positive women (n=20) at a community-based organization in the Bronx, New York. Get+Connected was comprised of five weekly sessions covering the following topics: basic computer knowledge and skills, identifying reliable health-related websites, setting up and using email and Facebook accounts, and a final review session. We recruited 12 women to participate in pilot testing. At baseline, we collected data about participants’ sociodemographic information, clinical characteristics, and technology device ownership and use. At baseline, intervention completion, and three months postintervention, we collected data regarding attitudes towards computers and the Internet (Attitudes Towards Computers and the Internet Questionnaire [ATCIQ]; possible scores range from 5-50) as well as frequency of Internet use (composite measure). To examine changes in ATCIQ scores and Internet use over time, we used generalized estimating equations. We also collected qualitative data during intervention delivery. Results Among women in our sample, the median age was 56 years (interquartile range=52-63). All participants were black/African American and/or Latina. Seven participants (7/12, 58%) had a high school diploma (or equivalent) or higher degree. Ten participants (10/12, 83%) reported owning a mobile phone, while only one (1/12, 8%) reported owning a computer or tablet. Only one participant (1/12, 8%) reported having ever used the Internet or email. Internet nonusers cited lack of computer/Internet knowledge (6/11, 54%) and lack of access to a computer or similar device (4/11, 36%) as the main barriers to use. Over time, we observed an improvement in attitudes towards computers and the Internet (ATCIQ scores: 33.5 at baseline, 35 at intervention completion, and 36 at three months postintervention; P=.008). No significant increase in Internet use was observed (P=.61). Qualitative findings indicated excitement and enthusiasm for the intervention. Conclusions In our sample of urban, technology-inexperienced HIV-positive women, participation in Get+Connected was associated with an improvement in attitudes towards computers and the Internet, but not Internet use. Changing attitudes is the first step in many health behavior change models, indicating that with improved access to computer and Internet resources, frequency of Internet use may also have increased. Future studies should consider addressing issues of access to technology in conjunction with Get+Connected. PMID:28363879

  16. An Efficient and QoS Supported Multichannel MAC Protocol for Vehicular Ad Hoc Networks

    PubMed Central

    Tan, Guozhen; Yu, Chao

    2017-01-01

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety (transport efficiency and infotainment) applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. Different types of applications require different levels Quality-of-Service (QoS) support. Recently, transport efficiency and infotainment applications (e.g., electronic map download and Internet access) have received more and more attention, and this kind of applications is expected to become a big market driver in a near future. In this paper, we propose an Efficient and QoS supported Multichannel Medium Access Control (EQM-MAC) protocol for VANETs in a highway environment. The EQM-MAC protocol utilizes the service channel resources for non-safety message transmissions during the whole synchronization interval, and it dynamically adjusts minimum contention window size for different non-safety services according to the traffic conditions. Theoretical model analysis and extensive simulation results show that the EQM-MAC protocol can support QoS services, while ensuring the high saturation throughput and low transmission delay for non-safety applications. PMID:28991217

  17. On Study of Building Smart Campus under Conditions of Cloud Computing and Internet of Things

    NASA Astrophysics Data System (ADS)

    Huang, Chao

    2017-12-01

    two new concepts in the information era are cloud computing and internet of things, although they are defined differently, they share close relationship. It is a new measure to realize leap-forward development of campus by virtue of cloud computing, internet of things and other internet technologies to build smart campus. This paper, centering on the construction of smart campus, analyzes and compares differences between network in traditional campus and that in smart campus, and makes proposals on how to build smart campus finally from the perspectives of cloud computing and internet of things.

  18. Technological advancements and Internet sexuality: does private access to the Internet influence online sexual behavior?

    PubMed

    Daneback, Kristian; Månsson, Sven-Axel; Ross, Michael W

    2012-08-01

    The aim of this study was to investigate whether demographic characteristics and sexual behavior online and offline were associated with private, respectively, nonprivate access to the Internet in a Web sample of people who use the Internet for sexual purposes. A total of 1,913 respondents completed an online questionnaire about Internet sexuality, and 1,614 reported using the Internet for sexual purposes. The majority of these respondents reported having access to an Internet-connected computer no one else had access to (62 percent women and 70 percent men). The results showed that it is possible to differentiate between those who have access to an Internet-connected computer no one else has access to and those who have shared access to an Internet-connected computer. Not only did they differ in demographic characteristics, but also in the sexual activities they engaged in on the Internet. Different patterns were found for women and men. For example, men who had private access to Internet-connected computers were more likely than those who had shared access to seek information about sexual issues. Thus, having access to Internet computers no one else has access to may promote sexual knowledge and health for men. The results of this study along with the technological development implies that in future research, attention should be paid to where and how people access the Internet in relation to online behavior in general and online sexual behavior in particular.

  19. Technological Advancements and Internet Sexuality: Does Private Access to the Internet Influence Online Sexual Behavior?

    PubMed Central

    Månsson, Sven-Axel; Ross, Michael W.

    2012-01-01

    Abstract The aim of this study was to investigate whether demographic characteristics and sexual behavior online and offline were associated with private, respectively, nonprivate access to the Internet in a Web sample of people who use the Internet for sexual purposes. A total of 1,913 respondents completed an online questionnaire about Internet sexuality, and 1,614 reported using the Internet for sexual purposes. The majority of these respondents reported having access to an Internet-connected computer no one else had access to (62 percent women and 70 percent men). The results showed that it is possible to differentiate between those who have access to an Internet-connected computer no one else has access to and those who have shared access to an Internet-connected computer. Not only did they differ in demographic characteristics, but also in the sexual activities they engaged in on the Internet. Different patterns were found for women and men. For example, men who had private access to Internet-connected computers were more likely than those who had shared access to seek information about sexual issues. Thus, having access to Internet computers no one else has access to may promote sexual knowledge and health for men. The results of this study along with the technological development implies that in future research, attention should be paid to where and how people access the Internet in relation to online behavior in general and online sexual behavior in particular. PMID:22823598

  20. Commentary on the Integration of Model Sharing and Reproducibility Analysis to Scholarly Publishing Workflow in Computational Biomechanics

    PubMed Central

    Erdemir, Ahmet; Guess, Trent M.; Halloran, Jason P.; Modenese, Luca; Reinbolt, Jeffrey A.; Thelen, Darryl G.; Umberger, Brian R.

    2016-01-01

    Objective The overall goal of this document is to demonstrate that dissemination of models and analyses for assessing the reproducibility of simulation results can be incorporated in the scientific review process in biomechanics. Methods As part of a special issue on model sharing and reproducibility in IEEE Transactions on Biomedical Engineering, two manuscripts on computational biomechanics were submitted: A. Rajagopal et al., IEEE Trans. Biomed. Eng., 2016 and A. Schmitz and D. Piovesan, IEEE Trans. Biomed. Eng., 2016. Models used in these studies were shared with the scientific reviewers and the public. In addition to the standard review of the manuscripts, the reviewers downloaded the models and performed simulations that reproduced results reported in the studies. Results There was general agreement between simulation results of the authors and those of the reviewers. Discrepancies were resolved during the necessary revisions. The manuscripts and instructions for download and simulation were updated in response to the reviewers’ feedback; changes that may otherwise have been missed if explicit model sharing and simulation reproducibility analysis were not conducted in the review process. Increased burden on the authors and the reviewers, to facilitate model sharing and to repeat simulations, were noted. Conclusion When the authors of computational biomechanics studies provide access to models and data, the scientific reviewers can download and thoroughly explore the model, perform simulations, and evaluate simulation reproducibility beyond the traditional manuscript-only review process. Significance Model sharing and reproducibility analysis in scholarly publishing will result in a more rigorous review process, which will enhance the quality of modeling and simulation studies and inform future users of computational models. PMID:28072567

  1. Educational Computer Use in Leisure Contexts: A Phenomenological Study of Adolescents' Experiences at Internet Cafes

    ERIC Educational Resources Information Center

    Cilesiz, Sebnem

    2009-01-01

    Computer use is a widespread leisure activity for adolescents. Leisure contexts, such as Internet cafes, constitute specific social environments for computer use and may hold significant educational potential. This article reports a phenomenological study of adolescents' experiences of educational computer use at Internet cafes in Turkey. The…

  2. Modality-Driven Classification and Visualization of Ensemble Variance

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bensema, Kevin; Gosink, Luke; Obermaier, Harald

    Paper for the IEEE Visualization Conference Advances in computational power now enable domain scientists to address conceptual and parametric uncertainty by running simulations multiple times in order to sufficiently sample the uncertain input space.

  3. The RISC (Reduced Instruction Set Computer) Architecture and Computer Performance Evaluation.

    DTIC Science & Technology

    1986-03-01

    time where the main emphasis of the evaluation process is put on the software . The model is intended to provide a tool for computer architects to use...program, or 3) Was to be implemented in random logic more effec- tively than the equivalent sequence of software instructions. Both data and address...definition is the IEEE standard 729-1983 stating Computer Architecture as: " The process of defining a collection of hardware and software components and

  4. Organizing the History of Computing

    NASA Astrophysics Data System (ADS)

    Misa, Thomas J.

    This paper tries to distill some of the ‘lessons learned’ from the Charles Babbage Institute’s quarter-century experience (1980-present) in organizing the history of computing. It draws on the author’s (recent) experience as CBI director; conversations with Arthur Norberg, CBI’s long-time founding director; and papers delivered at a special symposium appraising CBI’s role in computing history, which appeared in the IEEE Annals of the History of Computing 29 no. 4 (October-December 2007).

  5. Socially Relevant Knowledge Based Telemedicine

    DTIC Science & Technology

    2011-10-01

    or attitude at different situations and different circumstances. Fogg mentions that there are many reasons that computers can be better persuaders...finding appropriate way to persuade users to perform various activities. Fogg [8] defines persuasive technologies as “interactive computing systems...Education, IEEE Consumer Electronics Society Conference Games Innovation, ICE-GIC, 2009, pp 54-63. [8] Fogg , B. J., Persuasive Technology: Using

  6. Knowledge and attitude about computer and internet usage among dental students in Western Rajasthan, India.

    PubMed

    Jali, Pramod K; Singh, Shamsher; Babaji, Prashant; Chaurasia, Vishwajit Rampratap; Somasundaram, P; Lau, Himani

    2014-01-01

    Internet is a useful tool to update the knowledge. The aim of the present study was to assess the current level of knowledge on the computer and internet among under graduate dental students. The study consists of self-administered close ended questionnaire survey. Questionnaires were distributed to undergraduate dental students. The study was conducted during July to September 2012. In the selected samples, response rate was 100%. Most (94.4%) of the students had computer knowledge and 77.4% had their own computer and access at home. Nearly 40.8% of students use computer for general purpose, 28.5% for entertainment and 22.8% used for research purpose. Most of the students had internet knowledge (92.9%) and they used it independently (79.1%). Nearly 42.1% used internet occasionally whereas, 34.4% used regularly, 21.7% rarely and 1.8% don't use respectively. Internet was preferred for getting information (48.8%) due to easy accessibility and recent updates. For dental purpose students used internet 2-3 times/week (45.3%). Most (95.3%) of the students responded to have computer based learning program in the curriculum. Computer knowledge was observed to be good among dental students.

  7. Generic Divide and Conquer Internet-Based Computing

    NASA Technical Reports Server (NTRS)

    Radenski, Atanas; Follen, Gregory J. (Technical Monitor)

    2001-01-01

    The rapid growth of internet-based applications and the proliferation of networking technologies have been transforming traditional commercial application areas as well as computer and computational sciences and engineering. This growth stimulates the exploration of new, internet-oriented software technologies that can open new research and application opportunities not only for the commercial world, but also for the scientific and high -performance computing applications community. The general goal of this research project is to contribute to better understanding of the transition to internet-based high -performance computing and to develop solutions for some of the difficulties of this transition. More specifically, our goal is to design an architecture for generic divide and conquer internet-based computing, to develop a portable implementation of this architecture, to create an example library of high-performance divide-and-conquer computing agents that run on top of this architecture, and to evaluate the performance of these agents. We have been designing an architecture that incorporates a master task-pool server and utilizes satellite computational servers that operate on the Internet in a dynamically changing large configuration of lower-end nodes provided by volunteer contributors. Our designed architecture is intended to be complementary to and accessible from computational grids such as Globus, Legion, and Condor. Grids provide remote access to existing high-end computing resources; in contrast, our goal is to utilize idle processor time of lower-end internet nodes. Our project is focused on a generic divide-and-conquer paradigm and its applications that operate on a loose and ever changing pool of lower-end internet nodes.

  8. Games and Diabetes: A Review Investigating Theoretical Frameworks, Evaluation Methodologies, and Opportunities for Design Grounded in Learning Theories.

    PubMed

    Lazem, Shaimaa; Webster, Mary; Holmes, Wayne; Wolf, Motje

    2015-09-02

    Here we review 18 articles that describe the design and evaluation of 1 or more games for diabetes from technical, methodological, and theoretical perspectives. We undertook searches covering the period 2010 to May 2015 in the ACM, IEEE, Journal of Medical Internet Research, Studies in Health Technology and Informatics, and Google Scholar online databases using the keywords "children," "computer games," "diabetes," "games," "type 1," and "type 2" in various Boolean combinations. The review sets out to establish, for future research, an understanding of the current landscape of digital games designed for children with diabetes. We briefly explored the use and impact of well-established learning theories in such games. The most frequently mentioned theoretical frameworks were social cognitive theory and social constructivism. Due to the limitations of the reported evaluation methodologies, little evidence was found to support the strong promise of games for diabetes. Furthermore, we could not establish a relation between design features and the game outcomes. We argue that an in-depth discussion about the extent to which learning theories could and should be manifested in the design decisions is required. © 2015 Diabetes Technology Society.

  9. Games and Diabetes

    PubMed Central

    Lazem, Shaimaa; Webster, Mary; Holmes, Wayne; Wolf, Motje

    2015-01-01

    Here we review 18 articles that describe the design and evaluation of 1 or more games for diabetes from technical, methodological, and theoretical perspectives. We undertook searches covering the period 2010 to May 2015 in the ACM, IEEE, Journal of Medical Internet Research, Studies in Health Technology and Informatics, and Google Scholar online databases using the keywords “children,” “computer games,” “diabetes,” “games,” “type 1,” and “type 2” in various Boolean combinations. The review sets out to establish, for future research, an understanding of the current landscape of digital games designed for children with diabetes. We briefly explored the use and impact of well-established learning theories in such games. The most frequently mentioned theoretical frameworks were social cognitive theory and social constructivism. Due to the limitations of the reported evaluation methodologies, little evidence was found to support the strong promise of games for diabetes. Furthermore, we could not establish a relation between design features and the game outcomes. We argue that an in-depth discussion about the extent to which learning theories could and should be manifested in the design decisions is required. PMID:26337753

  10. Health Social Networks as Online Life Support Groups for Patients With Cardiovascular Diseases

    PubMed Central

    Medina, Edhelmira Lima; Loques, Orlando; Mesquita, Cláudio Tinoco

    2013-01-01

    The number of patients who use the internet in search for information that might improve their health conditions has increased. Among them, those looking for virtual environments to share experiences, doubts, opinions, and emotions, and to foster relationships aimed at giving and getting support stand out. Therefore, there is an increasing need to assess how those environments can affect the patients' health. This study was aimed at identifying scientific studies on the proliferation and impact of virtual communities, known as health social networks or online support groups, directed to cardiovascular diseases, which might be useful to patients with certain conditions, providing them with information and emotional support. A systematic review of the literature was conducted with articles published from 2007 to 2012, related to cardiovascular diseases and collected from the following databases: PubMed; Association for Computing Machinery(ACM); and Institute of Electrical and Electronics Engineers (IEEE). Four articles meeting the inclusion criteria were selected. The results were interesting and relevant from the health viewpoint, identifying therapeutic benefits, such as provision of emotional support, greater compliance to treatment, and information sharing on diseases and on life experiences. PMID:24030085

  11. 36 CFR 1254.32 - What rules apply to public access use of the Internet on NARA-supplied computers?

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... access use of the Internet on NARA-supplied computers? 1254.32 Section 1254.32 Parks, Forests, and Public... of the Internet on NARA-supplied computers? (a) Public access computers (workstations) are available... should not expect privacy while using these workstations. These workstations are operated and maintained...

  12. 36 CFR 1254.32 - What rules apply to public access use of the Internet on NARA-supplied computers?

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... access use of the Internet on NARA-supplied computers? 1254.32 Section 1254.32 Parks, Forests, and Public... of the Internet on NARA-supplied computers? (a) Public access computers (workstations) are available... should not expect privacy while using these workstations. These workstations are operated and maintained...

  13. Computer and Internet Utilization among the Medical Students in Qassim University, Saudi Arabia.

    PubMed

    Aldebasi, Yousef Homood; Ahmed, Mohamed Issa

    2013-06-01

    Computer-based training (CBT) and internet-based training (IBT) have become a vital part of the Medical Education. A cross-sectional study was carried out in Qassim University-Kingdom of Saudi Arabia (KSA), with the objective of assessing the pattern of the computer and Internet utilization among both male and female medical students. A total of 500 medical students from 4 different medical colleges of Qassim University participated in this study. A semi-structured, pre-tested questionnaire was used to collect the data and the data analysis was done by using SPSS, Version 17. Forty two percent female and twenty four percent male students used computers to get general information, 80% of the students reported using computers for academic activities and 52% females and 22% males used computers for entertainment. Most of the females preferred using computers at home (84%), while 54% males used computers at cyber cafés. For the information retrieval, 84% males used the internet, followed by journals/library (36%) and textbooks (35%), while the females preferred textbooks (75%) and the internet (14%). Google was found to be most commonly used search engine. The internet creates an educational delivery system; it is highly needed to increase the credit hours for the university requirement courses in computer application and the internet use for both among the male and female students.

  14. Computer and Internet Utilization among the Medical Students in Qassim University, Saudi Arabia

    PubMed Central

    Aldebasi, Yousef Homood; Ahmed, Mohamed Issa

    2013-01-01

    Background: Computer-based training (CBT) and internet-based training (IBT) have become a vital part of the Medical Education. A cross-sectional study was carried out in Qassim University-Kingdom of Saudi Arabia (KSA), with the objective of assessing the pattern of the computer and Internet utilization among both male and female medical students. Methods: A total of 500 medical students from 4 different medical colleges of Qassim University participated in this study. A semi-structured, pre-tested questionnaire was used to collect the data and the data analysis was done by using SPSS, Version 17. Results: Forty two percent female and twenty four percent male students used computers to get general information, 80% of the students reported using computers for academic activities and 52% females and 22% males used computers for entertainment. Most of the females preferred using computers at home (84%), while 54% males used computers at cyber cafés. For the information retrieval, 84% males used the internet, followed by journals/library (36%) and textbooks (35%), while the females preferred textbooks (75%) and the internet (14%). Google was found to be most commonly used search engine. Conclusion: The internet creates an educational delivery system; it is highly needed to increase the credit hours for the university requirement courses in computer application and the internet use for both among the male and female students. PMID:23905114

  15. 36 CFR § 1254.32 - What rules apply to public access use of the Internet on NARA-supplied computers?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... access use of the Internet on NARA-supplied computers? § 1254.32 Section § 1254.32 Parks, Forests, and... public access use of the Internet on NARA-supplied computers? (a) Public access computers (workstations... equipment. (b) You should not expect privacy while using these workstations. These workstations are operated...

  16. Computer Self-Efficacy, Computer Anxiety, and Attitudes toward the Internet: A Study among Undergraduates in Unimas

    ERIC Educational Resources Information Center

    Sam, Hong Kian; Othman, Abang Ekhsan Abang; Nordin, Zaimuarifuddin Shukri

    2005-01-01

    Eighty-one female and sixty-seven male undergraduates at a Malaysian university, from seven faculties and a Center for Language Studies completed a Computer Self-Efficacy Scale, Computer Anxiety Scale, and an Attitudes toward the Internet Scale and give information about their use of the Internet. This survey research investigated undergraduates'…

  17. A 1998 Workshop on Heterogeneous Computing

    DTIC Science & Technology

    1998-09-18

    of Sussex, England, in 1994. From 1988 to 1990 he was a Lecturer with the UNAM. In 1994, he joined the Laboratorio Nacional de Informatica Avanzada...1984) and at the UNAM (1988-1991). Since 1992, he is titular Researcher and consultant at the Laboratorio Nacional de Informatica Avanzada (LANIA). He...Box 1331 Piscataway, NJ 08855-1331 Tel: + 1-908-981-1393 Fax: + 1-908-981-9667 mis.custserv@computer.org IEEE Computer Society 13, Avenue de

  18. Problematic computer game use as expression of Internet addiction and its association with self-rated health in the Lithuanian adolescent population.

    PubMed

    Ustinavičienė, Ruta; Škėmienė, Lina; Lukšienė, Dalia; Radišauskas, Ričardas; Kalinienė, Gintarė; Vasilavičius, Paulius

    2016-01-01

    Computers and the Internet have become an integral part of today's life. Problematic gaming is related to adolescent's health. The aim of our study was to evaluate the prevalence of Internet addiction among 13-18-year-old schoolchildren and its relation to sex, age, and time spent playing computer games, game type, and subjective health evaluation. A total of 1806 schoolchildren aged 13-18 years were interviewed. The evaluation of Internet addiction was conducted by the Diagnostic Questionnaire according to Young's methodology. The relation between the choice of computer games type, time spent while playing computer games and respondents' Internet addiction were assessed by using multivariate logistic regression analysis. One-tenth (10.6%) of the boys and 7.7% of the girls aged 13-18 years were Internet addicted. Internet addiction was associated with the type of computer game (action or combat vs. logic) among boys (OR=2.42; 95% CI, 1.03-5.67) and with the amount of time spent playing computer games per day during the last month (≥5 vs. <5h) among girls (OR=2.10; 95% CI, 1.19-3.70). The boys who were addicted to the Internet were more likely to rate their health poorer in comparison to their peers who were not addicted to the Internet (OR=2.48; 95% CI, 1.33-4.62). Internet addiction was significantly associated with poorer self-rated health among boys. Copyright © 2016 The Lithuanian University of Health Sciences. Production and hosting by Elsevier Urban & Partner Sp. z o.o. All rights reserved.

  19. International Guidelines on Computer-Based and Internet-Delivered Testing

    ERIC Educational Resources Information Center

    International Journal of Testing, 2006

    2006-01-01

    Developed by the International Test Commission, the International Guidelines on Computer-Based and Internet-Delivered Testing are a set of guidelines specifically developed to highlight good practice issues in relation to computer/Internet tests and testing. These guidelines have been developed from an international perspective and are directed at…

  20. College Students' Use of the Internet.

    ERIC Educational Resources Information Center

    McFadden, Anna C.

    1999-01-01

    Studied use of the Internet by college students by determining sites selected on 6 of 70 computers in a college computer laboratory. The overwhelming use of the Internet in this open lab conformed to university acceptable-use policy, with almost no use of the computers to contact pornographic sites. (SLD)

  1. Understanding the Internet.

    ERIC Educational Resources Information Center

    Oblinger, Diana

    The Internet is an international network linking hundreds of smaller computer networks in North America, Europe, and Asia. Using the Internet, computer users can connect to a variety of computers with little effort or expense. The potential for use by college faculty is enormous. The largest problem faced by most users is understanding what such…

  2. Knowledge and attitude about computer and internet usage among dental students in Western Rajasthan, India

    PubMed Central

    Jali, Pramod K.; Singh, Shamsher; Babaji, Prashant; Chaurasia, Vishwajit Rampratap; Somasundaram, P; Lau, Himani

    2014-01-01

    Background: Internet is a useful tool to update the knowledge. The aim of the present study was to assess the current level of knowledge on the computer and internet among under graduate dental students. Materials and Methods: The study consists of self-administered close ended questionnaire survey. Questionnaires were distributed to undergraduate dental students. The study was conducted during July to September 2012. Results: In the selected samples, response rate was 100%. Most (94.4%) of the students had computer knowledge and 77.4% had their own computer and access at home. Nearly 40.8% of students use computer for general purpose, 28.5% for entertainment and 22.8% used for research purpose. Most of the students had internet knowledge (92.9%) and they used it independently (79.1%). Nearly 42.1% used internet occasionally whereas, 34.4% used regularly, 21.7% rarely and 1.8% don’t use respectively. Internet was preferred for getting information (48.8%) due to easy accessibility and recent updates. For dental purpose students used internet 2-3 times/week (45.3%). Most (95.3%) of the students responded to have computer based learning program in the curriculum. Conclusion: Computer knowledge was observed to be good among dental students. PMID:24818091

  3. Perceived problems with computer gaming and internet use among adolescents: measurement tool for non-clinical survey studies

    PubMed Central

    2014-01-01

    Background Existing instruments for measuring problematic computer and console gaming and internet use are often lengthy and often based on a pathological perspective. The objective was to develop and present a new and short non-clinical measurement tool for perceived problems related to computer use and gaming among adolescents and to study the association between screen time and perceived problems. Methods Cross-sectional school-survey of 11-, 13-, and 15-year old students in thirteen schools in the City of Aarhus, Denmark, participation rate 89%, n = 2100. The main exposure was time spend on weekdays on computer- and console-gaming and internet use for communication and surfing. The outcome measures were three indexes on perceived problems related to computer and console gaming and internet use. Results The three new indexes showed high face validity and acceptable internal consistency. Most schoolchildren with high screen time did not experience problems related to computer use. Still, there was a strong and graded association between time use and perceived problems related to computer gaming, console gaming (only boys) and internet use, odds ratios ranging from 6.90 to 10.23. Conclusion The three new measures of perceived problems related to computer and console gaming and internet use among adolescents are appropriate, reliable and valid for use in non-clinical surveys about young people’s everyday life and behaviour. These new measures do not assess Internet Gaming Disorder as it is listed in the DSM and therefore has no parity with DSM criteria. We found an increasing risk of perceived problems with increasing time spent with gaming and internet use. Nevertheless, most schoolchildren who spent much time with gaming and internet use did not experience problems. PMID:24731270

  4. TomoBank: a tomographic data repository for computational x-ray science

    NASA Astrophysics Data System (ADS)

    De Carlo, Francesco; Gürsoy, Doğa; Ching, Daniel J.; Joost Batenburg, K.; Ludwig, Wolfgang; Mancini, Lucia; Marone, Federica; Mokso, Rajmund; Pelt, Daniël M.; Sijbers, Jan; Rivers, Mark

    2018-03-01

    There is a widening gap between the fast advancement of computational methods for tomographic reconstruction and their successful implementation in production software at various synchrotron facilities. This is due in part to the lack of readily available instrument datasets and phantoms representative of real materials for validation and comparison of new numerical methods. Recent advancements in detector technology have made sub-second and multi-energy tomographic data collection possible (Gibbs et al 2015 Sci. Rep. 5 11824), but have also increased the demand to develop new reconstruction methods able to handle in situ (Pelt and Batenburg 2013 IEEE Trans. Image Process. 22 5238-51) and dynamic systems (Mohan et al 2015 IEEE Trans. Comput. Imaging 1 96-111) that can be quickly incorporated in beamline production software (Gürsoy et al 2014 J. Synchrotron Radiat. 21 1188-93). The x-ray tomography data bank, tomoBank, provides a repository of experimental and simulated datasets with the aim to foster collaboration among computational scientists, beamline scientists, and experimentalists and to accelerate the development and implementation of tomographic reconstruction methods for synchrotron facility production software by providing easy access to challenging datasets and their descriptors.

  5. Computer and internet use by first year clinical and nursing students in a Nigerian teaching hospital.

    PubMed

    Ajuwon, Grace Ada

    2003-09-18

    The internet is an important source of up-to-date medical information. Although several studies in different countries have explored the extent to which health science students use the computer and the internet, few researches are available on this subject in Nigeria. The aim of this study was to assess the uptake of computer and internet by health science students studying in the country. One hundred and eighty three first year medical and nursing students of the University College Hospital, Ibadan, Nigeria, completed a-25 item questionnaire during routine Library Orientation Program in the medical library. The EPI-Info software was used for data analysis. The mean ages for medical students and the student nurses were 22 and 24.6 years respectively. Overall, 42.6% of the entire sample could use the computer, 57.4% could not. While more than half (58%) of the medical students are computer literate, majority (75.9%) of the student nurses are not. Slightly more than two thirds (60.7%) of the entire students had ever used the internet, 33. 9% had not. E-mail was the most popular of internet services used by the students (76.4%) and the cyber café was the common place where students had accessed these services. The students' mean scores on a 15-point perceived self-efficacy scale for internet-related tasks was 3.8 for medical and 0.7 for nursing students (p = 0.00). Students who are computer literate had superior mean scores (4.8) than those without (0.6) (p = 0.000). First year clinical and nursing students in Ibadan Nigeria have not fully utilised the opportunity that the use of computer and internet offer for medical education. Improved efforts such as inclusion of computer education in medical and nursing curricular and establishment of computer laboratories are required to increase the student's access to computers and internet.

  6. Computer and internet use by first year clinical and nursing students in a Nigerian teaching hospital

    PubMed Central

    Ajuwon, Grace Ada

    2003-01-01

    Background The internet is an important source of up-to-date medical information. Although several studies in different countries have explored the extent to which health science students use the computer and the internet, few researches are available on this subject in Nigeria. The aim of this study was to assess the uptake of computer and internet by health science students studying in the country. Methods One hundred and eighty three first year medical and nursing students of the University College Hospital, Ibadan, Nigeria, completed a-25 item questionnaire during routine Library Orientation Program in the medical library. The EPI-Info software was used for data analysis. Results The mean ages for medical students and the student nurses were 22 and 24.6 years respectively. Overall, 42.6% of the entire sample could use the computer, 57.4% could not. While more than half (58%) of the medical students are computer literate, majority (75.9%) of the student nurses are not. Slightly more than two thirds (60.7%) of the entire students had ever used the internet, 33. 9% had not. E-mail was the most popular of internet services used by the students (76.4%) and the cyber café was the common place where students had accessed these services. The students' mean scores on a 15-point perceived self-efficacy scale for internet-related tasks was 3.8 for medical and 0.7 for nursing students (p = 0.00). Students who are computer literate had superior mean scores (4.8) than those without (0.6) (p = 0.000). Conclusion First year clinical and nursing students in Ibadan Nigeria have not fully utilised the opportunity that the use of computer and internet offer for medical education. Improved efforts such as inclusion of computer education in medical and nursing curricular and establishment of computer laboratories are required to increase the student's access to computers and internet. PMID:14498997

  7. Personal use of work computers: distraction versus destruction.

    PubMed

    Mastrangelo, Paul M; Everton, Wendi; Jolton, Jeffery A

    2006-12-01

    To explore definitions, frequencies, and motivation for personal use of work computers, we analyzed 329 employees' responses to an online survey, which asked participants to self-report frequencies for 41 computer behaviors at work. This sample (65% female, 74% European ethnicity, mean age of 36 years) was formed by soliciting participants through Internet Usenet groups, emails, and listservs. Results support a distinction between computer use that is counterproductive and that which is merely not productive. Nonproductive Computer Use occurred more when employees were younger (r = -0.31, p < 0.01), had Internet access at work longer (r = +0.16, p < 0.01), and had faster Internet connections at work than at home (r = +0.14, p < 0.01). Counterproductive Computer Use occurred more when Internet access was newer (r = -0.16, p < 0.01) and employees knew others who had been warned about misuse (r = +0.11, p < 0.05). While most employees who engaged in computer counterproductivity also engaged in computer nonproductivity, the inverse was uncommon, suggesting the need to distinguish between the two when establishing computer policies and Internet accessibility.

  8. Use of computers and the Internet for health information by patients with epilepsy.

    PubMed

    Escoffery, Cam; Diiorio, Colleen; Yeager, Katherine A; McCarty, Frances; Robinson, Elise; Reisinger, Elizabeth; Henry, Thomas; Koganti, Archana

    2008-01-01

    The purpose of this study was to describe computer and Internet use among an online group and a clinic-based group of people with epilepsy. Greater than 95% of the online group and 60% of the clinic group have access to computers and the Internet. More than 99% of the online group and 57% of the clinic group used the Internet to find health information. A majority of people reported being likely to employ an Internet-based self-management program to control their epilepsy. About 43% reported searching for general information on epilepsy, 30% for medication, 23% for specific types of epilepsy, and 20% for treatment. This study found that people with epilepsy have access to computers and the Internet, desire epilepsy-specific information, and are receptive to online health information on how to manage their epilepsy.

  9. Analysis of Scientific Attitude, Computer Anxiety, Educational Internet Use, Problematic Internet Use, and Academic Achievement of Middle School Students According to Demographic Variables

    ERIC Educational Resources Information Center

    Bekmezci, Mehmet; Celik, Ismail; Sahin, Ismail; Kiray, Ahmet; Akturk, Ahmet Oguz

    2015-01-01

    In this research, students' scientific attitude, computer anxiety, educational use of the Internet, academic achievement, and problematic use of the Internet are analyzed based on different variables (gender, parents' educational level and daily access to the Internet). The research group involves 361 students from two middle schools which are…

  10. Enhancing the Selection of Backoff Interval Using Fuzzy Logic over Wireless Ad Hoc Networks

    PubMed Central

    Ranganathan, Radha; Kannan, Kathiravan

    2015-01-01

    IEEE 802.11 is the de facto standard for medium access over wireless ad hoc network. The collision avoidance mechanism (i.e., random binary exponential backoff—BEB) of IEEE 802.11 DCF (distributed coordination function) is inefficient and unfair especially under heavy load. In the literature, many algorithms have been proposed to tune the contention window (CW) size. However, these algorithms make every node select its backoff interval between [0, CW] in a random and uniform manner. This randomness is incorporated to avoid collisions among the nodes. But this random backoff interval can change the optimal order and frequency of channel access among competing nodes which results in unfairness and increased delay. In this paper, we propose an algorithm that schedules the medium access in a fair and effective manner. This algorithm enhances IEEE 802.11 DCF with additional level of contention resolution that prioritizes the contending nodes according to its queue length and waiting time. Each node computes its unique backoff interval using fuzzy logic based on the input parameters collected from contending nodes through overhearing. We evaluate our algorithm against IEEE 802.11, GDCF (gentle distributed coordination function) protocols using ns-2.35 simulator and show that our algorithm achieves good performance. PMID:25879066

  11. Performance Analysis of Power Saving Class of Type I for Voice Service in Two-Way Communication in IEEE 802.16e

    NASA Astrophysics Data System (ADS)

    Hwang, Eunju; Kim, Kyung Jae; Choi, Bong Dae

    In IEEE 802.16e, power saving is one of the important issues for battery-powered mobile stations (MSs). We present a performance analysis of power saving class (PSC) of type I in IEEE 802.16e standard for voice over Internet protocol (VoIP) service with silence suppression in two-way communication. On-off pattern of a voice user in two-way communication is characterized by the modified Brady model, which includes short silence gaps less than 200ms and talkspurt periods shorter than 15ms, and so differs from the Brady model. Our analysis of PSC I follows the standard-based procedure for the deactivation of the sleep mode, where a uplink packet arrival during a mutual silence period wakes up the MS immediately while a downlink packet arrival waits to be served until the next listening window. We derive the delay distribution of the first downlink packet arriving during a mutual silence period, and find the dropping probability of downlink packets since a voice packet drops if it is not transmitted within maximum delay constraint. In addition, we calculate the average power consumption under the modified Brady model. Analysis and simulation results show that the sleep mode operation for the MS with VoIP service yields 32 ∼ 39% reduction in the power consumption of the MS. Finally we obtain the optimal initial/final-sleep windows that yield the minimum average power consumption while satisfying QoS constraints on the packet dropping probability and the maximum delay.

  12. Assessing Information on the Internet: Toward Providing Library Services for Computer-Mediated Communication. A Final Report.

    ERIC Educational Resources Information Center

    Dillon, Martin; And Others

    The Online Computer Library Center Internet Resource project focused on the nature of electronic textual information available through remote access using the Internet and the problems associated with creating machine-readable cataloging (MARC) records for these objects using current USMARC format for computer files and "Anglo-American…

  13. Educators and the Internet: What's out There, How to Get Some of It.

    ERIC Educational Resources Information Center

    Rosenbaum, Howard

    1994-01-01

    Argues that K-12 media educators and librarians should become vocal advocates for Internet connection in their elementary and secondary schools. Topics include K-12 uses of the Internet; Internet resources; FrEdMail (Free Educational Electronic Mail); and a BITNET computer conference. Appendices list computer conferences, networking contracts, and…

  14. Time and Learning Efficiency in Internet-Based Learning: A Systematic Review and Meta-Analysis

    ERIC Educational Resources Information Center

    Cook, David A.; Levinson, Anthony J.; Garside, Sarah

    2010-01-01

    Authors have claimed that Internet-based instruction promotes greater learning efficiency than non-computer methods. Objectives Determine, through a systematic synthesis of evidence in health professions education, how Internet-based instruction compares with non-computer instruction in time spent learning, and what features of Internet-based…

  15. Older Adults' Knowledge of Internet Hazards

    ERIC Educational Resources Information Center

    Grimes, Galen A.; Hough, Michelle G.; Mazur, Elizabeth; Signorella, Margaret L.

    2010-01-01

    Older adults are less likely to be using computers and less knowledgeable about Internet security than are younger users. The two groups do not differ on trust of Internet information. The younger group shows no age or gender differences. Within the older group, computer users are more trusting of Internet information, and along with those with…

  16. Compliance and Functional Testing of IEEE 1451.1 for NCAP-to-NCAP Communications in a Sensor Network

    NASA Technical Reports Server (NTRS)

    Figueroa, Jorge; Gurkan, Deniz; Yuan, X.; Benhaddou, D.; Liu, H.; Singla, A.; Franzl, R.; Ma, H.; Bhatt, S.; Morris, J.; hide

    2008-01-01

    Distributed control in a networked environment is an irreplaceable feature in systems with remote sensors and actuators. Although distributed control was not originally designed to be networked, usage of off-the-shelf networking technologies has become so prevalent that control systems are desired to have access mechanisms similar to computer networks. However, proprietary transducer interfaces for network communications and distributed control overwhelmingly dominate this industry. Unless the lack of compatibility and interoperability among transducers is resolved, the mature level of access (that computer networking can deliver) will not be achieved in such networked distributed control systems. Standardization of networked transducer interfaces will enable devices from different manufacturers to talk to each other and ensure their plug-and-play capability. One such standard is the suite of IEEE 1451 for sensor network communication and transducer interfaces. The suite not only provides a standard interface for smart transducers, but also outlines the connection of an NCAP (network capable application processor) and transducers (through a transducer interface module TIM). This paper presents the design of the compliance testing of IEEE 1451.1 (referred to as Dot1) compatible NCAP-to-NCAP communications on a link-layer independent medium. The paper also represents the first demonstration of NCAP-to-NCAP communications with Dot1 compatibility: a tester NCAP and an NCAP under test (NUT).

  17. Computational estimation of magnetically induced electric fields in a rotating head

    NASA Astrophysics Data System (ADS)

    Ilvonen, Sami; Laakso, Ilkka

    2009-01-01

    Change in a magnetic field, or similarly, movement in a strong static magnetic field induces electric fields in human tissues, which could potentially cause harmful effects. In this paper, the fields induced by different rotational movements of a head in a strong homogeneous magnetic field are computed numerically. Average field magnitudes near the retinas and inner ears are studied in order to gain insight into the causes of phosphenes and vertigo-like effects, which are associated with extremely low-frequency (ELF) magnetic fields. The induced electric fields are calculated in four different anatomically realistic head models using an efficient finite-element method (FEM) solver. The results are compared with basic restriction limits by IEEE and ICNIRP. Under rotational movement of the head, with a magnetic flux rate of change of 1 T s-1, the maximum IEEE-averaged electric field and maximum ICNIRP-averaged current density were 337 mV m-1 and 8.84 mA m-2, respectively. The limits by IEEE seem significantly stricter than those by ICNIRP. The results show that a magnetic flux rate of change of 1 T s-1 may induce electric field in the range of 50 mV m-1 near retinas, and possibly even larger values near the inner ears. These results provide information for approximating the threshold electric field values of phosphenes and vertigo-like effects.

  18. Passive Localization of Multiple Sources Using Widely-Spaced Arrays With Application to Marine Mammals

    DTIC Science & Technology

    2006-09-30

    IEEE OES Student Poster Program Oceans ’05 Europe, Brest, France, June 20-23, 2005. Sponsored by Thales Underwater Systems. Student Engagement Award to E.-M. Nosal – Maui High Performance Computing Center (2005-2006).

  19. IEEE TRANSACTIONS ON CYBERNETICS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Craig R. RIeger; David H. Scheidt; William D. Smart

    2014-11-01

    MODERN societies depend on complex and critical infrastructures for energy, transportation, sustenance, medical care, emergency response, communications security. As computers, automation, and information technology (IT) have advanced, these technologies have been exploited to enhance the efficiency of operating the processes that make up these infrastructures

  20. Computer access and Internet use by urban and suburban emergency department customers.

    PubMed

    Bond, Michael C; Klemt, Ryan; Merlis, Jennifer; Kopinski, Judith E; Hirshon, Jon Mark

    2012-07-01

    Patients are increasingly using the Internet (43% in 2000 vs. 70% in 2006) to obtain health information, but is there a difference in the ability of urban and suburban emergency department (ED) customers to access the Internet? To assess computer and Internet resources available to and used by people waiting to be seen in an urban ED and a suburban ED. Individuals waiting in the ED were asked survey questions covering demographics, type of insurance, access to a primary care provider, reason for their ED visit, computer access, and ability to access the Internet for health-related matters. There were 304 individuals who participated, 185 in the urban ED and 119 in the suburban ED. Urban subjects were more likely than suburban to be women, black, have low household income, and were less likely to have insurance. The groups were similar in regard to average age, education, and having a primary care physician. Suburban respondents were more likely to own a computer, but the majority in both groups had access to computers and the Internet. Their frequency of accessing the Internet was similar, as were their reasons for using it. Individuals from the urban ED were less willing to schedule appointments via the Internet but more willing to contact their health care provider via e-mail. The groups were equally willing to use the Internet to fill prescriptions and view laboratory results. Urban and suburban ED customers had similar access to the Internet. Both groups were willing to use the Internet to access personal health information. Copyright © 2012 Elsevier Inc. All rights reserved.

  1. Taking Ownership of the ITC's Guidelines for Computer-Based and Internet-Delivered Testing: A South African Application

    ERIC Educational Resources Information Center

    Foxcroft, Cheryl D.; Davies, Caroline

    2006-01-01

    The increased use of computer-based and Internet-delivered testing has raised a number of ethical and legal issues. The International Test Commission's (this issue) Guidelines for Computer-Based and Internet-Delivered Testing represent the most recent attempt to provide test users, publishers, and developers with guidance regarding the appropriate…

  2. An IEEE 1451.1 Architecture for ISHM Applications

    NASA Technical Reports Server (NTRS)

    Morris, Jon A.; Turowski, Mark; Schmalzel, John L.; Figueroa, Jorge F.

    2007-01-01

    The IEEE 1451.1 Standard for a Smart Transducer Interface defines a common network information model for connecting and managing smart elements in control and data acquisition networks using network-capable application processors (NCAPs). The Standard is a network-neutral design model that is easily ported across operating systems and physical networks for implementing complex acquisition and control applications by simply plugging in the appropriate network level drivers. To simplify configuration and tracking of transducer and actuator details, the family of 1451 standards defines a Transducer Electronic Data Sheet (TEDS) that is associated with each physical element. The TEDS contains all of the pertinent information about the physical operations of a transducer (such as operating regions, calibration tables, and manufacturer information), which the NCAP uses to configure the system to support a specific transducer. The Integrated Systems Health Management (ISHM) group at NASA's John C. Stennis Space Center (SSC) has been developing an ISHM architecture that utilizes IEEE 1451.1 as the primary configuration and data acquisition mechanism for managing and collecting information from a network of distributed intelligent sensing elements. This work has involved collaboration with other NASA centers, universities and aerospace industries to develop IEEE 1451.1 compliant sensors and interfaces tailored to support health assessment of complex systems. This paper and presentation describe the development and implementation of an interface for the configuration, management and communication of data, information and knowledge generated by a distributed system of IEEE 1451.1 intelligent elements monitoring a rocket engine test system. In this context, an intelligent element is defined as one incorporating support for the IEEE 1451.x standards and additional ISHM functions. Our implementation supports real-time collection of both measurement data (raw ADC counts and converted engineering units) and health statistics produced by each intelligent element. The handling of configuration, calibration and health information is automated by using the TEDS in combination with other electronic data sheets extensions to convey health parameters. By integrating the IEEE 1451.1 Standard for a Smart Transducer Interface with ISHM technologies, each element within a complex system becomes a highly flexible computation engine capable of self-validation and performing other measures of the quality of information it is producing.

  3. MCloud: Secure Provenance for Mobile Cloud Users

    DTIC Science & Technology

    2016-10-03

    Feasibility of Smartphone Clouds , 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid). 04-MAY- 15, Shenzhen, China...final decision. MCloud: Secure Provenance for Mobile Cloud Users Final Report Bogdan Carbunar Florida International University Computing and...Release; Distribution Unlimited UU UU UU UU 03-10-2016 31-May-2013 30-May-2016 Final Report: MCloud: Secure Provenance for Mobile Cloud Users The views

  4. Probabilistic QoS Analysis In Wireless Sensor Networks

    DTIC Science & Technology

    2012-04-01

    and A.O. Fapojuwo. TDMA scheduling with optimized energy efficiency and minimum delay in clustered wireless sensor networks . IEEE Trans. on Mobile...Research Computer Science and Engineering, Department of 5-1-2012 Probabilistic QoS Analysis in Wireless Sensor Networks Yunbo Wang University of...Wang, Yunbo, "Probabilistic QoS Analysis in Wireless Sensor Networks " (2012). Computer Science and Engineering: Theses, Dissertations, and Student

  5. Investigation of Current State of Crytpography and Theoretical Implementation of a Cryptographic System for the Combat Service Support Control System.

    DTIC Science & Technology

    1987-05-01

    34 Advances in Crypt g: Proceedings of CRYPTO 84,r o ... .. .. _ __...o ... .. ... ....... ed. by G.R. Blakely and D. Chaum . [Wagn84b] Wagner, Neal R...in Distributed Computer Systems," IEEE Trans. on Computers, Vol. C-35, No. 7, Jul. 86, pp. 583-590. Gifford, David K., "Cryptographic Sealing for

  6. Natural Tasking of Robots Based on Human Interaction Cues

    DTIC Science & Technology

    2005-06-01

    MIT. • Matthew Marjanovic , researcher, ITA Software. • Brian Scasselatti, Assistant Professor of Computer Science, Yale. • Matthew Williamson...2004. 25 [74] Charlie C. Kemp. Shoes as a platform for vision. 7th IEEE International Symposium on Wearable Computers, 2004. [75] Matthew Marjanovic ...meso: Simulated muscles for a humanoid robot. Presentation for Humanoid Robotics Group, MIT AI Lab, August 2001. [76] Matthew J. Marjanovic . Teaching

  7. Training in software used by practising engineers should be included in university curricula

    NASA Astrophysics Data System (ADS)

    Silveira, A.; Perdigones, A.; García, J. L.

    2009-04-01

    Deally, an engineering education should prepare students, i.e., emerging engineers, to use problem-solving processes that synergistically combine creativity and imagination with rigour and discipline. Recently, pressures on curricula have resulted in the development of software-specific courses, often to the detriment of the understanding of theory [1]. However, it is also true that there is a demand for information technology courses by students other than computer science majors [2]. The emphasis on training engineers may be best placed on answering the needs of industry; indeed, many proposals are now being made to try to reduce the gap between the educational and industrial communities [3]. Training in the use of certain computer programs may be one way of better preparing engineering undergraduates for eventual employment in industry. However, industry's needs in this respect must first be known. The aim of this work was to determine which computer programs are used by practising agricultural engineers with the aim of incorporating training in their use into our department's teaching curriculum. The results showed that 72% of their working hours involved the use computer programs. The software packages most commonly used were Microsoft Office (used by 79% of respondents) and CAD (56%), as well as budgeting (27%), statistical (21%), engineering (15%) and GIS (13%) programs. As a result of this survey our university department opened an additional computer suite in order to provide students practical experience in the use of Microsoft Excel, budgeting and engineering software. The results of this survey underline the importance of computer software training in this and perhaps other fields of engineering. [1] D. J. Moore, and D. R. Voltmer, "Curriculum for an engineering renaissance," IEEE Trans. Educ., vol. 46, pp. 452-455, Nov. 2003. [2] N. Kock, R. Aiken, and C. Sandas, "Using complex IT in specific domains: developing and assessing a course for nonmajors," IEEE Trans. Educ., vol. 45, pp. 50- 56, Feb. 2002. [3] I. Vélez, and J. F. Sevillano, "A course to train digital hardware designers for industry," IEEE Trans. Educ., vol. 50, pp. 236-243, Aug. 2007. Acknowledgement: This work was supported in part by the Universidad Politécnica de Madrid, Spain.

  8. Analysing efficiency of IPv6 packet transmission over 6LoWPAN network

    NASA Astrophysics Data System (ADS)

    Kozłowski, Adam; Sosnowski, Janusz

    2017-08-01

    Practical proliferation of Internet of Things (IoT) concept depends upon communication efficiency in the related network. In the paper we outline basic features of wireless communication protocols used in IoT and concentrate on analysing communication overheads. In particular, we discuss the impact of IPv6 packet length on 6LoWPAN network operation with physical and MAC layer defined by IEEE 802.15.4 standard. The presented analysis methodology is useful in estimation of the total goodput (throughput at the application level) and energy consumptions within the whole traffic model which are the crucial features of IoT networks.

  9. Performance Of The IEEE 802.15.4 Protocol As The Marker Of Augmented Reality In Museum

    NASA Astrophysics Data System (ADS)

    Kurniawan Saputro, Adi; Sumpeno, Surya; Hariadi, Mochamad

    2018-04-01

    Museum is a place to keep the historic objects and historical education center to introduce the nation’s culture. Utilizing technology in a museum to become a smart city is a challenge. Internet of thing (IOT) is a technological advance in Information and communication (ICT) that can be applied in the museum The current ICT development is not only a transmission medium, but Augmented Reality technology is also being developed. Currently, Augmented Reality technology creates virtual objects into the real world using markers or images. In this study, researcher used signals to make virtual objects appear in the real world using the IEEE 802.14.5 protocol replacing the Augmented Reality marker. RSSI and triangulation are used as a substitute microlocation for AR objects. The result is the performance of Wireless Sensor Network could be used for data transmission in the museum. LOS research at a distance of 15 meters with 1000 ms delay found 1.4% error rate and NLOS with 2.3% error rate. So it can be concluded that utilization technology (IOT) using signal wireless sensor network as a replace for marker augmented reality can be used in museum

  10. Technography and Design-Actuality Gap-Analysis of Internet Computer Technologies-Assisted Education: Western Expectations and Global Education

    ERIC Educational Resources Information Center

    Greenhalgh-Spencer, Heather; Jerbi, Moja

    2017-01-01

    In this paper, we provide a design-actuality gap-analysis of the internet infrastructure that exists in developing nations and nations in the global South with the deployed internet computer technologies (ICT)-assisted programs that are designed to use internet infrastructure to provide educational opportunities. Programs that specifically…

  11. Integrating Web-based technology into distance education for nurses in China: computer and Internet access and attitudes.

    PubMed

    Cragg, C E Betty; Edwards, Nancy; Yue, Zhao; Xin, Song Li; Hui, Zou Dao

    2003-01-01

    To increase continuing education accessibility, nurses around the world are turning to Web-based instruction. However, for Internet education to be successful, particularly in developing countries, nurses must have access to computers and the Internet as well as positive attitudes toward this form of learning. As part of a distance education project for nurses of the Tianjin Municipality in China, a survey of nurses was conducted to examine their sources of professional knowledge as well as their computer and Internet access and attitudes. The attitudes of the nurses were generally positive, and there was evidence of rapidly increasing use of and access to computers and the Internet. This article reports the results of that survey and their implications for Web-based teaching of Chinese nurses.

  12. Message From the Editor for Contributions to the 2010 Real Time Conference Issue of TNS

    NASA Astrophysics Data System (ADS)

    Schmeling, Sascha Marc

    2011-08-01

    The 72 papers in this special issue were originally presented at the 17th IEEE-NPSS Real Time Conference (RT2010) on Computing Applications in Nuclear and Plasma Sciences, held in Lisbon, Portugal in May 2010.

  13. Proof Search in an Authorization Logic

    DTIC Science & Technology

    2009-04-14

    and Itay Neeman. DKAL: Distributed-knowledge authorization language. In Proceedings of the 21st IEEE Symposium on Computer Security Foundations (CSF...21), 2008. [33] Yuri Gurevich and Itay Neeman. The logic of infons. Technical report, Microsoft Research, 2009. [34] Joshua S. Hodas and Dale Miller

  14. A Comparative Study of University of Wisconsin-Stout Freshmen and Senior Education Major's Computing and Internet Technology Skills/Knowledge and Associated Learning Experiences

    ERIC Educational Resources Information Center

    Sveum, Evan Charles

    2010-01-01

    A study comparing University of Wisconsin-Stout freshmen and senior education majors' computing and Internet technology skills/knowledge and associated learning experiences was conducted. Instruments used in this study included the IC[superscript 3][R] Exam by Certiport, Inc. and the investigator's Computing and Internet Skills Learning…

  15. Computer Networks and Networking: A Primer.

    ERIC Educational Resources Information Center

    Collins, Mauri P.

    1993-01-01

    Provides a basic introduction to computer networks and networking terminology. Topics addressed include modems; the Internet; TCP/IP (Transmission Control Protocol/Internet Protocol); transmission lines; Internet Protocol numbers; network traffic; Fidonet; file transfer protocol (FTP); TELNET; electronic mail; discussion groups; LISTSERV; USENET;…

  16. Making Classical Ground State Spin Computing Fault-Tolerant

    DTIC Science & Technology

    2010-06-24

    approaches to perebor (brute-force searches) algorithms,” IEEE Annals of the History of Computing, 6, 384–400 (1984). [24] D. Bacon and S . T. Flammia ...Adiabatic gate teleportation,” Phys. Rev. Lett., 103, 120504 (2009). [25] D. Bacon and S . T. Flammia , “Adiabatic cluster state quantum computing...v1 [ co nd -m at . s ta t- m ec h] 2 2 Ju n 20 10 Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the

  17. A Unified Framework for Simulating Markovian Models of Highly Dependable Systems

    DTIC Science & Technology

    1989-07-01

    ependability I’valuiation of Complex lault- lolerant Computing Systems. Ptreedings of the 1-.et-enth Sv~npmiun on Falult- lolerant Comnputing. Portland, Maine...New York. [12] (icis;t, R.M. and ’I’rivedi, K.S. (1983). I!Itra-Il gh Reliability Prediction for Fault-’ lolerant Computer Systems. IEE.-E Trw.%,.cions... 1998 ). Surv’ey of Software Tools for [valuating Reli- ability. A vailability, and Serviceabilitv. ACA1 Computing S urveyjs 20. 4, 227-269). [32] Meyer

  18. Communication-Efficient Arbitration Models for Low-Resolution Data Flow Computing

    DTIC Science & Technology

    1988-12-01

    phase can be formally described as follows: Graph Partitioning Problem NP-complete: (Garey & Johnson) Given graph G = (V, E), weights w (v) for each v e V...Technical Report, MIT/LCS/TR-218, Cambridge, Mass. Agerwala, Tilak, February 1982, "Data Flow Systems", Computer, pp. 10-13. Babb, Robert G ., July 1984...34Parallel Processing with Large-Grain Data Flow Techniques," IEEE Computer 17, 7, pp. 55-61. Babb, Robert G ., II, Lise Storc, and William C. Ragsdale

  19. Interfacing computers and the internet with your allergy practice.

    PubMed

    Bernstein, Jonathan A

    2004-10-01

    Computers and the internet have begun to play a prominent role in the medical profession and, in particular, the allergy specialty. Computer technology is being used more frequently for patient and physician education, asthma management in children and adults, including environmental control, generating patient databases for research and clinical practice and in marketing and e-commerce. This article will review how computers and the internet have begun to interface with the allergy subspecialty practice in these various areas.

  20. Barriers and facilitators to home computer and internet use among urban novice computer users of low socioeconomic position.

    PubMed

    Kontos, Emily Z; Bennett, Gary G; Viswanath, K

    2007-10-22

    Despite the increasing penetration of the Internet and amount of online health information, there are significant barriers that limit its widespread adoption as a source of health information. One is the "digital divide," with people of higher socioeconomic position (SEP) demonstrating greater access and usage compared to those from lower SEP groups. However, as the access gap narrows over time and more people use the Internet, a shift in research needs to occur to explore how one might improve Internet use as well as website design for a range of audiences. This is particularly important in the case of novice users who may not have the technical skills, experience, or social connections that could help them search for health information using the Internet. The focus of our research is to investigate the challenges in the implementation of a project to improve health information seeking among low SEP groups. The goal of the project is not to promote health information seeking as much as to understand the barriers and facilitators to computer and Internet use, beyond access, among members of lower SEP groups in an urban setting. The purpose was to qualitatively describe participants' self-identified barriers and facilitators to computer and Internet use during a 1-year pilot study as well as the challenges encountered by the research team in the delivery of the intervention. Between August and November 2005, 12 low-SEP urban individuals with no or limited computer and Internet experience were recruited through a snowball sampling. Each participant received a free computer system, broadband Internet access, monthly computer training courses, and technical support for 1 year as the intervention condition. Upon completion of the study, participants were offered the opportunity to complete an in-depth semistructured interview. Interviews were approximately 1 hour in length and were conducted by the project director. The interviews were held in the participants' homes and were tape recorded for accuracy. Nine of the 12 study participants completed the semistructured interviews. Members of the research team conducted a qualitative analysis based on the transcripts from the nine interviews using the crystallization/immersion method. Nine of the 12 participants completed the in-depth interview (75% overall response rate), with three men and six women agreeing to be interviewed. Major barriers to Internet use that were mentioned included time constraints and family conflict over computer usage. The monthly training classes and technical assistance components of the intervention surfaced as the most important facilitators to computer and Internet use. The concept of received social support from other study members, such as assistance with computer-related questions, also emerged as an important facilitator to overall computer usage. This pilot study offers important insights into the self-identified barriers and facilitators in computer and Internet use among urban low-SEP novice users as well as the challenges faced by the research team in implementing the intervention.

  1. Computer and Internet usage by Canadian dentists.

    PubMed

    Flores-Mir, Carlos; Palmer, Neal G; Northcott, Herbert C; Huston, Carolyn; Major, Paul W

    2006-03-01

    To determine the frequency of computers in Canadian dental offices and to assess their use; to evaluate Internet access and use in Canadian dental offices; and to compare use of computers and the Internet by Canadian dentists, by the general public and by other dental groups. An anonymous, self-administered survey of Canadian dentists was conducted by mail. A potential mailing list of 14,052 active Canadian dentists was compiled from the 2003 records of provincial regulatory bodies. For each province, 7.8% of the general dentists were randomly selected with the help of computer software. The surveys were mailed to this stratified random sample of 1,096 dentists. The response rate was 28%. Of the 312 respondents, 4 (1%) were in full-time academic positions, 15 (5%) were not practising, and 9 (3%) provided incomplete data. Therefore, 284 survey responses were available for descriptive analysis. Two hundred and fifty-seven (90%) of the respondents had a computer in their primary practice. Computers were used mainly for administrative tasks (accounting, bookkeeping and scheduling) rather than clinical tasks. Internet access was common (185/250 or 74%), and high-speed Internet access (93/250 or 37%) was increasingly common, judging from the results of previous studies on computer use. The main reasons given for not having in-office Internet access were security or privacy concerns and no reported need for or interest in the service. Computer use was high in this sample of Canadian dentists, but a small proportion of dental offices remained without computers. Canadian dentists" use of the Internet was greater than that of American dentists, private enterprise and the North American public in general.

  2. Internet use, eHealth literacy and attitudes toward computer/internet among people with schizophrenia spectrum disorders: a cross-sectional study in two distant European regions.

    PubMed

    Athanasopoulou, Christina; Välimäki, Maritta; Koutra, Katerina; Löttyniemi, Eliisa; Bertsias, Antonios; Basta, Maria; Vgontzas, Alexandros N; Lionis, Christos

    2017-09-20

    Individuals with schizophrenia spectrum disorders use the Internet for general and health-related purposes. Their ability to find, understand, and apply the health information they acquire online in order to make appropriate health decisions - known as eHealth literacy - has never been investigated. The European agenda strives to limit health inequalities and enhance mental health literacy. Nevertheless, each European member state varies in levels of Internet use and online health information-seeking. This study aimed to examine computer/Internet use for general and health-related purposes, eHealth literacy, and attitudes toward computer/Internet among adults with schizophrenia spectrum disorders from two distant European regions. Data were collected from mental health services of psychiatric clinics in Finland (FI) and Greece (GR). A total of 229 patients (FI = 128, GR = 101) participated in the questionnaire survey. The data analysis included evaluation of frequencies and group comparisons with multiple linear and logistic regression models. The majority of Finnish participants were current Internet users (FI = 111, 87%, vs. GR = 33, 33%, P < .0001), while the majority of Greek participants had never used computers/Internet, mostly due to their perception that they do not need it. In both countries, more than half of Internet users used the Internet for health-related purposes (FI = 61, 55%, vs. GR = 20, 61%). The eHealth literacy of Internet users (previous and current Internet users) was found significantly higher in the Finnish group (FI: Mean = 27.05, SD 5.36; GR: Mean = 23.15, SD = 7.23, P < .0001) upon comparison with their Greek counterparts. For current Internet users, Internet use patterns were significantly different between country groups. When adjusting for gender, age, education and disease duration, country was a significant predictor of frequency of Internet use, eHealth literacy and Interest. The Finnish group of Internet users scored higher in eHealth literacy, while the Greek group of never Internet users had a higher Interest in computer/Internet. eHealth literacy is either moderate (Finnish group) or low (Greek group). Thus, exposure to ICT and eHealth skills training are needed for this population. Recommendations to improve the eHealth literacy and access to health information among these individuals are provided.

  3. Bio-Inspired Navigation of Chemical Plumes

    DTIC Science & Technology

    2006-07-01

    Bio-Inspired Navigation of Chemical Plumes Maynard J. Porter III, Captain, USAF Department of Electrical and Computer Engineering Air Force Institute...Li. " Chemical plume tracing via an autonomous underwater vehicle". IEEE Journal of Ocean Engineering , 30(2):428— 442, 2005. [6] G. A. Nevitt...Electrical and Computer Engineering Air Force Institute of Technology Dayton, OH 45433-7765, U.S.A. juan.vasquez@afit.edu May 31, 2006 Abstract - The

  4. Tunable Optical Sources.

    DTIC Science & Technology

    1980-11-01

    finite aperture size 5. A. E. Siegman , "Unstable optical resonators for laser of the YAG rod, applications," Proc. IEEE 53, 217-287 (1965); "Unstable...Pumped LiNbO3 Tunable Source Radial Birefringent Element Computer Controlled Laser Attenuator Slab Configuration Laser Source 20. ABSTRACT (Continue on...have invented and demonstrated a computer controlled laser attenu- ator. .... Cont inued DD Il 7 1473 EDITION OF I NOV 01 IS OBSOLETE UNCLASSIFIEDAN

  5. QCDOC: A 10-teraflops scale computer for lattice QCD

    NASA Astrophysics Data System (ADS)

    Chen, D.; Christ, N. H.; Cristian, C.; Dong, Z.; Gara, A.; Garg, K.; Joo, B.; Kim, C.; Levkova, L.; Liao, X.; Mawhinney, R. D.; Ohta, S.; Wettig, T.

    2001-03-01

    The architecture of a new class of computers, optimized for lattice QCD calculations, is described. An individual node is based on a single integrated circuit containing a PowerPC 32-bit integer processor with a 1 Gflops 64-bit IEEE floating point unit, 4 Mbyte of memory, 8 Gbit/sec nearest-neighbor communications and additional control and diagnostic circuitry. The machine's name, QCDOC, derives from "QCD On a Chip".

  6. Hybrid Architectures for Evolutionary Computing Algorithms

    DTIC Science & Technology

    2008-01-01

    other EC algorithms to FPGA Core Burns P1026/MAPLD 200532 Genetic Algorithm Hardware References S. Scott, A. Samal , and S. Seth, “HGA: A Hardware Based...on Parallel and Distributed Processing (IPPS/SPDP 󈨦), pp. 316-320, Proceedings. IEEE Computer Society 1998. [12] Scott, S. D. , Samal , A., and...Algorithm Hardware References S. Scott, A. Samal , and S. Seth, “HGA: A Hardware Based Genetic Algorithm”, Proceedings of the 1995 ACM Third

  7. Development of Computational Simulation Tools to Model Weapon Propulsors

    DTIC Science & Technology

    2004-01-01

    Calculation in Permanent Magnet Motors with Rotor Eccentricity: With Slotting Effect Considered," IEEE Transactions on Magnetics, Volume 34, No. 4, 2253-2266...1998). [3] Lieu, Dennis K., Kim, Ungtae. "Magnetic Field Calculation in Permanent Magnet Motors with Rotor Eccentricity: Without Slotting Effect

  8. Database Translator (DATALATOR) for Integrated Exploitation

    DTIC Science & Technology

    2010-10-31

    Modelling in Information Systems Engineering. 2007, Berlin : Springer, pp. 39-58. 2. Arnon Rosenthal, Len Seligman . Pragmatics and Open Problems for Inter...2004, Vol. 2938 . 21. Ahuja, S., N. Carriero and D. Gelemte,. Linda and friends. IEEE Computer. August 1986, pp. 26- 32. 40 Next Generation Software

  9. Baiting Inside Attackers using Decoy Documents

    DTIC Science & Technology

    2008-09-16

    viewed. Animated images allow the senders to monitor how long the message was displayed. The web bugs operate without alerting the user of the...Military Computer Security Policies”. IEEE Symposium on Security and Privacy, 1987. [5] Demers, A., Gehrke, J., Hong, M., Panda , B., Riedewald, M., Sharma

  10. Joint Services Electronics Program

    DTIC Science & Technology

    1991-03-05

    Parallel Computing Network and Program Professor Abhiram Ranade with M.T. Raghunath and Robert Boothe The goal of our research is to develop high...References/Publications [1] M. T. Raghunath and A. 0. Ranade. "A Simulation-Based Comparison of Interconnection Networks," Proceedings of the 2nd IEEE

  11. Local Area Networks: Part I.

    ERIC Educational Resources Information Center

    Dessy, Raymond E.

    1982-01-01

    Local area networks are common communication conduits allowing various terminals, computers, discs, printers, and other electronic devices to intercommunicate over short distances. Discusses the vocabulary of such networks including RS-232C point-to-point and IEEE-488 multidrop protocols; error detection; message packets; multiplexing; star, ring,…

  12. Message From the Editor for Contributions to the 2007 Real Time Conference Issue of TNS

    NASA Astrophysics Data System (ADS)

    Dufey, Jean-Pierre

    2008-02-01

    This issue presents 67 papers which were originally presented at the 15th IEEE-NPSS Real Time Conference (RT2007) on Computing Applications in Nuclear and Plasma Sciences held at Fermilab, Batavia, IL, April 29-May 4, 2007.

  13. IEEE Smart Grid Series of Standards IEEE 2030 (Interoperability) and IEEE 1547 (Interconnection) Status: Preprint

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Basso, T.; DeBlasio, R.

    The IEEE American National Standards smart grid publications and standards development projects IEEE 2030, which addresses smart grid interoperability, and IEEE 1547TM, which addresses distributed resources interconnection with the grid, have made substantial progress since 2009. The IEEE 2030TM and 1547 standards series focus on systems-level aspects and cover many of the technical integration issues involved in a mature smart grid. The status and highlights of these two IEEE series of standards, which are sponsored by IEEE Standards Coordinating Committee 21 (SCC21), are provided in this paper.

  14. 77 FR 20367 - Proposed Information Collection; Comment Request; Computer and Internet Use Supplement to the...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-04

    ... Internet usage survey questions. II. Method of Collection Personal visits and telephone interviews, using... Information Collection; Comment Request; Computer and Internet Use Supplement to the Census Bureau's Current Population Survey AGENCY: National Telecommunications and Information Administration, Commerce. ACTION...

  15. Research on Influence of Cloud Environment on Traditional Network Security

    NASA Astrophysics Data System (ADS)

    Ming, Xiaobo; Guo, Jinhua

    2018-02-01

    Cloud computing is a symbol of the progress of modern information network, cloud computing provides a lot of convenience to the Internet users, but it also brings a lot of risk to the Internet users. Second, one of the main reasons for Internet users to choose cloud computing is that the network security performance is great, it also is the cornerstone of cloud computing applications. This paper briefly explores the impact on cloud environment on traditional cybersecurity, and puts forward corresponding solutions.

  16. Computer and internet use among urban African Americans with type 2 diabetes.

    PubMed

    Jackson, Chandra L; Batts-Turner, Marian L; Falb, Matthew D; Yeh, Hsin-Chieh; Brancati, Frederick L; Gary, Tiffany L

    2005-12-01

    Previous studies have identified a "digital divide" between African Americans and whites, with African Americans having substantially lower rates of Internet use. However, use of the Internet to access health information has not been sufficiently evaluated in this population. Therefore, we conducted a telephone survey to determine the prevalence of computer and Internet use among 457 African American adults with type 2 diabetes. Participants were 78% female, with a mean age of 57 +/- 11 years, and about one-third had a yearly income % $7,500. Forty percent of the participants reported having a computer at home and 46% reported knowing how to use a computer. Most participants (58%) reported that they had, at some point, used a computer, and of those, 40% reported that they used the computer to find health information. In a stratified analysis, participants with lower education levels (

  17. Application of PSAT to Load Flow Analysis with STATCOM under Load Increase Scenario and Line Contingencies

    NASA Astrophysics Data System (ADS)

    Telang, Aparna S.; Bedekar, P. P.

    2017-09-01

    Load flow analysis is the initial and essential step for any power system computation. It is required for choosing better options for power system expansion to meet with ever increasing load demand. Implementation of Flexible AC Transmission System (FACTS) device like STATCOM, in the load flow, which is having fast and very flexible control, is one of the important tasks for power system researchers. This paper presents a simple and systematic approach for steady state power flow calculations with FACTS controller, static synchronous compensator (STATCOM) using command line usage of MATLAB tool-power system analysis toolbox (PSAT). The complexity of MATLAB language programming increases due to incorporation of STATCOM in an existing Newton-Raphson load flow algorithm. Thus, the main contribution of this paper is to show how command line usage of user friendly MATLAB tool, PSAT, can extensively be used for quicker and wider interpretation of the results of load flow with STATCOM. The novelty of this paper lies in the method of applying the load increase pattern, where the active and reactive loads have been changed simultaneously at all the load buses under consideration for creating stressed conditions for load flow analysis with STATCOM. The performance have been evaluated on many standard IEEE test systems and the results for standard IEEE-30 bus system, IEEE-57 bus system, and IEEE-118 bus system are presented.

  18. Influence of parental attitudes towards Internet use on the employment of online safety measures at home.

    PubMed

    Floros, Georgios; Siomos, Konstantinos; Dafouli, Evaggelia; Fisoun, Virginia; Geroukalis, Dimitrios

    2012-01-01

    In this paper we present the results of a cross-sectional study of the entire adolescent student population aged 12-18 of the island of Kos and their parents, on Internet safety-related practices and attitudes towards the Internet. Total sample was 2017 students and 1214 parent responders. Research material included extended demographics and an Internet security questionnaire, the Internet Attitudes Scale (IAS) for parents and the Adolescent Computer Addiction Test (ACAT) for children and both parents. Both parents thus provided their views on their children's computer use and an estimate for their degree of computer addiction which was tested against their child's self-report. Results indicated that fathers and mothers who had negative views of the Internet, tended to encourage less their children to engage in online activities and worried more for the possibility that their child is addicted to computer use; their worries weren't correlated with their children's results. Parental views on the Internet had no effect on the level of security precautions they employed at home. Those parents who reported a low level of security knowledge and were unsure as to what their children were doing online, tended to consider their children more likely to be addicted to computer use; those views were confirmed by their children' self-reported results.

  19. Asia-Pacific POPIN workshop on Internet.

    PubMed

    1996-01-01

    This brief article announces the accomplishments of the ESCAP Population Division of the Department of Economic and Social Information and Policy Analysis (DESIPA) in conjunction with the Asia-Pacific POPIN Internet (Information Superhighway) Training Workshop in popularizing useful new computer information technologies. A successful workshop was held in Bangkok in November 1996 for 18 people from 8 countries in the Asian and Pacific region, many of whom were from population information centers. Participants were taught some techniques for disseminating population data and information through use of the Internet computer facility. Participants learned 1) how to use Windows software in the ESCAP local area network (LAN), 2) about concepts such as HTML (hypertext mark-up language), and 3) detailed information about computer language. Computer practices involved "surfing the Net (Internet)" and linking with the global POPIN site on the Internet. Participants learned about computer programs for information handling and learned how to prepare documents using HTML, how to mount information on the World Wide Web (WWW) of the Internet, how to convert existing documents into "HTML-style" files, and how to scan graphics, such as logos, photographs, and maps, for visual display on the Internet. The Workshop and the three training modules was funded by the UN Population Fund (UNFPA). The POPIN Coordinator was pleased that competency was accomplished in such a short period of time.

  20. Internet Use for Health-Related Information via Personal Computers and Cell Phones in Japan: A Cross-Sectional Population-Based Survey

    PubMed Central

    Takahashi, Yoshimitsu; Ohura, Tomoko; Ishizaki, Tatsuro; Okamoto, Shigeru; Miki, Kenji; Naito, Mariko; Akamatsu, Rie; Sugimori, Hiroki; Yoshiike, Nobuo; Miyaki, Koichi; Shimbo, Takuro

    2011-01-01

    Background The Internet is known to be used for health purposes by the general public all over the world. However, little is known about the use of, attitudes toward, and activities regarding eHealth among the Japanese population. Objectives This study aimed to measure the prevalence of Internet use for health-related information compared with other sources, and to examine the effects on user knowledge, attitudes, and activities with regard to Internet use for health-related information in Japan. We examined the extent of use via personal computers and cell phones. Methods We conducted a cross-sectional survey of a quasi-representative sample (N = 1200) of the Japanese general population aged 15–79 years in September 2007. The main outcome measures were (1) self-reported rates of Internet use in the past year to acquire health-related information and to contact health professionals, family, friends, and peers specifically for health-related purposes, and (2) perceived effects of Internet use on health care. Results The prevalence of Internet use via personal computer for acquiring health-related information was 23.8% (286/1200) among those surveyed, whereas the prevalence via cell phone was 6% (77). Internet use via both personal computer and cell phone for communicating with health professionals, family, friends, or peers was not common. The Internet was used via personal computer for acquiring health-related information primarily by younger people, people with higher education levels, and people with higher household incomes. The majority of those who used the Internet for health care purposes responded that the Internet improved their knowledge or affected their lifestyle attitude, and that they felt confident in the health-related information they obtained from the Internet. However, less than one-quarter thought it improved their ability to manage their health or affected their health-related activities. Conclusions Japanese moderately used the Internet via personal computers for health purposes, and rarely used the Internet via cell phones. Older people, people with lower education levels, and people with lower household incomes were less likely to access the Internet via cell phone. The Internet moderately improved users’ health-related knowledge and attitudes but seldom changed their health-related abilities and activities. To encourage communication between health providers and consumers, it is important to improve eHealth literacy, especially in middle-aged people. It is also important to make adequate amendments to the reimbursement payment system and nationwide eHealth privacy and security framework, and to develop a collaborative relationship among industry, government, and academia. PMID:22169526

  1. Internet use for health-related information via personal computers and cell phones in Japan: a cross-sectional population-based survey.

    PubMed

    Takahashi, Yoshimitsu; Ohura, Tomoko; Ishizaki, Tatsuro; Okamoto, Shigeru; Miki, Kenji; Naito, Mariko; Akamatsu, Rie; Sugimori, Hiroki; Yoshiike, Nobuo; Miyaki, Koichi; Shimbo, Takuro; Nakayama, Takeo

    2011-12-14

    The Internet is known to be used for health purposes by the general public all over the world. However, little is known about the use of, attitudes toward, and activities regarding eHealth among the Japanese population. This study aimed to measure the prevalence of Internet use for health-related information compared with other sources, and to examine the effects on user knowledge, attitudes, and activities with regard to Internet use for health-related information in Japan. We examined the extent of use via personal computers and cell phones. We conducted a cross-sectional survey of a quasi-representative sample (N = 1200) of the Japanese general population aged 15-79 years in September 2007. The main outcome measures were (1) self-reported rates of Internet use in the past year to acquire health-related information and to contact health professionals, family, friends, and peers specifically for health-related purposes, and (2) perceived effects of Internet use on health care. The prevalence of Internet use via personal computer for acquiring health-related information was 23.8% (286/1200) among those surveyed, whereas the prevalence via cell phone was 6% (77). Internet use via both personal computer and cell phone for communicating with health professionals, family, friends, or peers was not common. The Internet was used via personal computer for acquiring health-related information primarily by younger people, people with higher education levels, and people with higher household incomes. The majority of those who used the Internet for health care purposes responded that the Internet improved their knowledge or affected their lifestyle attitude, and that they felt confident in the health-related information they obtained from the Internet. However, less than one-quarter thought it improved their ability to manage their health or affected their health-related activities. Japanese moderately used the Internet via personal computers for health purposes, and rarely used the Internet via cell phones. Older people, people with lower education levels, and people with lower household incomes were less likely to access the Internet via cell phone. The Internet moderately improved users' health-related knowledge and attitudes but seldom changed their health-related abilities and activities. To encourage communication between health providers and consumers, it is important to improve eHealth literacy, especially in middle-aged people. It is also important to make adequate amendments to the reimbursement payment system and nationwide eHealth privacy and security framework, and to develop a collaborative relationship among industry, government, and academia.

  2. Hand-held internet tablets for school-based data collection.

    PubMed

    Denny, Simon J; Milfont, Taciano L; Utter, Jennifer; Robinson, Elizabeth M; Ameratunga, Shanthi N; Merry, Sally N; Fleming, Theresa M; Watson, Peter D

    2008-07-26

    In the last 20 years, researchers have been using computer self-administered questionnaires to gather data on a wide range of adolescent health related behaviours. More recently, researchers collecting data in schools have started to use smaller hand-held computers for their ease of use and portability. The aim of this study is to describe a new technology with wi-fi enabled hand-held internet tablets and to compare adolescent preferences of laptop computers or hand-held internet tablets in administering a youth health and well-being questionnaire in a school setting. A total of 177 students took part in a pilot study of a national youth health and wellbeing survey. Students were randomly assigned to internet tablets or laptops at the start of the survey and were changed to the alternate mode of administration about half-way through the questionnaire. Students at the end of the questionnaire were asked which of the two modes of administration (1) they preferred, (2) was easier to use, (3) was more private and confidential, and (4) was easier to answer truthfully. Many students expressed no preference between laptop computers or internet tablets. However, among the students who expressed a preference between laptop computers or internet tablets, the majority of students found the internet tablets more private and confidential (p < 0.001) and easier to answer questions truthfully (p < 0.001) compared to laptop computers. This study demonstrates that using wi-fi enabled hand-held internet tablets is a feasible methodology for school-based surveys especially when asking about sensitive information.

  3. Hand-held internet tablets for school-based data collection

    PubMed Central

    Denny, Simon J; Milfont, Taciano L; Utter, Jennifer; Robinson, Elizabeth M; Ameratunga, Shanthi N; Merry, Sally N; Fleming, Theresa M; Watson, Peter D

    2008-01-01

    Background In the last 20 years, researchers have been using computer self-administered questionnaires to gather data on a wide range of adolescent health related behaviours. More recently, researchers collecting data in schools have started to use smaller hand-held computers for their ease of use and portability. The aim of this study is to describe a new technology with wi-fi enabled hand-held internet tablets and to compare adolescent preferences of laptop computers or hand-held internet tablets in administering a youth health and well-being questionnaire in a school setting. Methods A total of 177 students took part in a pilot study of a national youth health and wellbeing survey. Students were randomly assigned to internet tablets or laptops at the start of the survey and were changed to the alternate mode of administration about half-way through the questionnaire. Students at the end of the questionnaire were asked which of the two modes of administration (1) they preferred, (2) was easier to use, (3) was more private and confidential, and (4) was easier to answer truthfully. Results Many students expressed no preference between laptop computers or internet tablets. However, among the students who expressed a preference between laptop computers or internet tablets, the majority of students found the internet tablets more private and confidential (p < 0.001) and easier to answer questions truthfully (p < 0.001) compared to laptop computers. Conclusion This study demonstrates that using wi-fi enabled hand-held internet tablets is a feasible methodology for school-based surveys especially when asking about sensitive information. PMID:18710505

  4. The effects of Internet or interactive computer-based patient education in the field of breast cancer: a systematic literature review.

    PubMed

    Ryhänen, Anne M; Siekkinen, Mervi; Rankinen, Sirkku; Korvenranta, Heikki; Leino-Kilpi, Helena

    2010-04-01

    The aim of this systematic review was to analyze what kind of Internet or interactive computer-based patient education programs have been developed and to analyze the effectiveness of these programs in the field of breast cancer patient education. Patient education for breast cancer patients is an important intervention to empower the patient. However, we know very little about the effects and potential of Internet-based patient education in the empowerment of breast cancer patients. Complete databases were searched covering the period from the beginning of each database to November 2008. Studies were included if they concerned patient education for breast cancer patients with Internet or interactive computer programs and were based on randomized controlled, on clinical trials or quasi-experimental studies. We identified 14 articles involving 2374 participants. The design was randomized controlled trial in nine papers, in two papers clinical trial and in three quasi-experimental. Seven of the studies were randomized to experimental and control groups, in two papers participants were grouped by ethnic and racial differences and by mode of Internet use and three studies measured the same group pre- and post-tests after using a computer program. The interventions used were described as interactive computer or multimedia programs and use of the Internet. The methodological solutions of the studies varied. The effects of the studies were diverse except for knowledge-related issues. Internet or interactive computer-based patient education programs in the care of breast cancer patients may have positive effect increasing breast cancer knowledge. The results suggest a positive relationship between the Internet or computer-based patient education program use and the knowledge level of patients with breast cancer but a diverse relationship between patient's participation and other outcome measures. There is need to develop and research more Internet-based patient education. 2009 Elsevier Ireland Ltd. All rights reserved.

  5. Internet Use and Access Among Pregnant Women via Computer and Mobile Phone: Implications for Delivery of Perinatal Care.

    PubMed

    Peragallo Urrutia, Rachel; Berger, Alexander A; Ivins, Amber A; Beckham, A Jenna; Thorp, John M; Nicholson, Wanda K

    2015-03-30

    The use of Internet-based behavioral programs may be an efficient, flexible method to enhance prenatal care and improve pregnancy outcomes. There are few data about access to, and use of, the Internet via computers and mobile phones among pregnant women. We describe pregnant women's access to, and use of, computers, mobile phones, and computer technologies (eg, Internet, blogs, chat rooms) in a southern United States population. We describe the willingness of pregnant women to participate in Internet-supported weight-loss interventions delivered via computers or mobile phones. We conducted a cross-sectional survey among 100 pregnant women at a tertiary referral center ultrasound clinic in the southeast United States. Data were analyzed using Stata version 10 (StataCorp) and R (R Core Team 2013). Means and frequency procedures were used to describe demographic characteristics, access to computers and mobile phones, and use of specific Internet modalities. Chi-square testing was used to determine whether there were differences in technology access and Internet modality use according to age, race/ethnicity, income, or children in the home. The Fisher's exact test was used to describe preferences to participate in Internet-based postpartum weight-loss interventions via computer versus mobile phone. Logistic regression was used to determine demographic characteristics associated with these preferences. The study sample was 61.0% white, 26.0% black, 6.0% Hispanic, and 7.0% Asian with a mean age of 31.0 (SD 5.1). Most participants had access to a computer (89/100, 89.0%) or mobile phone (88/100, 88.0%) for at least 8 hours per week. Access remained high (>74%) across age groups, racial/ethnic groups, income levels, and number of children in the home. Internet/Web (94/100, 94.0%), email (90/100, 90.0%), and Facebook (50/100, 50.0%) were the most commonly used Internet technologies. Women aged less than 30 years were more likely to report use of Twitter and chat rooms compared to women 30 years of age or older. Of the participants, 82.0% (82/100) were fairly willing or very willing to participate in postpartum lifestyle intervention. Of the participants, 83.0% (83/100) were fairly willing or very willing to participate in an Internet intervention delivered via computer, while only 49.0% (49/100) were fairly willing or very willing to do so via mobile phone technology. Older women and women with children tended to be less likely to desire a mobile phone-based program. There is broad access and use of computer and mobile phone technology among southern US pregnant women with varied demographic characteristics. Pregnant women are willing to participate in Internet-supported perinatal interventions. Our findings can inform the development of computer- and mobile phone-based approaches for the delivery of clinical and educational interventions.

  6. Internet Use and Access Among Pregnant Women via Computer and Mobile Phone: Implications for Delivery of Perinatal Care

    PubMed Central

    Peragallo Urrutia, Rachel; Berger, Alexander A; Ivins, Amber A; Beckham, A Jenna; Thorp Jr, John M

    2015-01-01

    Background The use of Internet-based behavioral programs may be an efficient, flexible method to enhance prenatal care and improve pregnancy outcomes. There are few data about access to, and use of, the Internet via computers and mobile phones among pregnant women. Objective We describe pregnant women’s access to, and use of, computers, mobile phones, and computer technologies (eg, Internet, blogs, chat rooms) in a southern United States population. We describe the willingness of pregnant women to participate in Internet-supported weight-loss interventions delivered via computers or mobile phones. Methods We conducted a cross-sectional survey among 100 pregnant women at a tertiary referral center ultrasound clinic in the southeast United States. Data were analyzed using Stata version 10 (StataCorp) and R (R Core Team 2013). Means and frequency procedures were used to describe demographic characteristics, access to computers and mobile phones, and use of specific Internet modalities. Chi-square testing was used to determine whether there were differences in technology access and Internet modality use according to age, race/ethnicity, income, or children in the home. The Fisher’s exact test was used to describe preferences to participate in Internet-based postpartum weight-loss interventions via computer versus mobile phone. Logistic regression was used to determine demographic characteristics associated with these preferences. Results The study sample was 61.0% white, 26.0% black, 6.0% Hispanic, and 7.0% Asian with a mean age of 31.0 (SD 5.1). Most participants had access to a computer (89/100, 89.0%) or mobile phone (88/100, 88.0%) for at least 8 hours per week. Access remained high (>74%) across age groups, racial/ethnic groups, income levels, and number of children in the home. Internet/Web (94/100, 94.0%), email (90/100, 90.0%), and Facebook (50/100, 50.0%) were the most commonly used Internet technologies. Women aged less than 30 years were more likely to report use of Twitter and chat rooms compared to women 30 years of age or older. Of the participants, 82.0% (82/100) were fairly willing or very willing to participate in postpartum lifestyle intervention. Of the participants, 83.0% (83/100) were fairly willing or very willing to participate in an Internet intervention delivered via computer, while only 49.0% (49/100) were fairly willing or very willing to do so via mobile phone technology. Older women and women with children tended to be less likely to desire a mobile phone-based program. Conclusions There is broad access and use of computer and mobile phone technology among southern US pregnant women with varied demographic characteristics. Pregnant women are willing to participate in Internet-supported perinatal interventions. Our findings can inform the development of computer- and mobile phone-based approaches for the delivery of clinical and educational interventions. PMID:25835744

  7. Installing computers in older adults' homes and teaching them to access a patient education web site: a systematic approach.

    PubMed

    Dauz, Emily; Moore, Jan; Smith, Carol E; Puno, Florence; Schaag, Helen

    2004-01-01

    This article describes the experiences of nurses who, as part of a large clinical trial, brought the Internet into older adults' homes by installing a computer, if needed, and connecting to a patient education Web site. Most of these patients had not previously used the Internet and were taught even basic computer skills when necessary. Because of increasing use of the Internet in patient education, assessment, and home monitoring, nurses in various roles currently connect with patients to monitor their progress, teach about medications, and answer questions about appointments and treatments. Thus, nurses find themselves playing the role of technology managers for patients with home-based Internet connections. This article provides step-by-step procedures for computer installation and training in the form of protocols, checklists, and patient user guides. By following these procedures, nurses can install computers, arrange Internet access, teach and connect to their patients, and prepare themselves to install future generations of technological devices.

  8. Quantum Computing: Selected Internet Resources for Librarians, Researchers, and the Casually Curious

    ERIC Educational Resources Information Center

    Cirasella, Jill

    2009-01-01

    This article presents an annotated selection of the most important and informative Internet resources for learning about quantum computing, finding quantum computing literature, and tracking quantum computing news. All of the quantum computing resources described in this article are freely available, English-language web sites that fall into one…

  9. Implementing ISO/IEEE 11073: proposal of two different strategic approaches.

    PubMed

    Martínez-Espronceda, M; Serrano, L; Martínez, I; Escayola, J; Led, S; Trigo, J; García, J

    2008-01-01

    This paper explains the challenges encountered during the ISO/IEEE 11073 standard implementation process. The complexity of the standard and the consequent heavy requirements, which have not encouraged software engineers to adopt the standard. The developing complexity evaluation drives us to propose two possible implementation strategies that cover almost all possible use cases and eases handling the standard by non-expert users. The first one is focused on medical devices (MD) and proposes a low-memory and low-processor usage technique. It is based on message patterns that allow simple functions to generate ISO/IEEE 11073 messages and to process them easily. In this way a framework for MDs can be obtained. Second one is focused on more powerful machines such as data loggers or gateways (aka. computer engines (CE)), which do not have the MDs' memory and processor usage constraints. For CEs a more intelligent and adaptative Plug&Play (P&P) solution is provided. It consists on a general platform that can access to any device supported by the standard. Combining both strategies will cut developing time for applications based on ISO/EEE 11073.

  10. THE BERKELEY DATA ANALYSIS SYSTEM (BDAS): AN OPEN SOURCE PLATFORM FOR BIG DATA ANALYTICS

    DTIC Science & Technology

    2017-09-01

    Evan Sparks, Oliver Zahn, Michael J. Franklin, David A. Patterson, Saul Perlmutter. Scientific Computing Meets Big Data Technology: An Astronomy ...Processing Astronomy Imagery Using Big Data Technology. IEEE Transaction on Big Data, 2016. Approved for Public Release; Distribution Unlimited. 22 [93

  11. Local Area Networks and the Learning Lab of the Future.

    ERIC Educational Resources Information Center

    Ebersole, Dennis C.

    1987-01-01

    Considers educational applications of local area computer networks and discusses industry standards for design established by the International Standards Organization (ISO) and Institute of Electrical and Electronic Engineers (IEEE). A futuristic view of a learning laboratory using a local area network is presented. (Author/LRW)

  12. File System Virtual Appliances: Portable File System Implementations

    DTIC Science & Technology

    2009-05-01

    Mobile Computing Systems and Applications, Santa Cruz, CA, 1994. IEEE. [10] Michael Eisler , Peter Corbett, Michael Kazar, Daniel S. Nydick, and...Gingell, Joseph P. Moran, and William A. Shannon. Virtual Memory Architec- ture in SunOS. In USENIX Summer Conference, pages 81–94, Berkeley, CA, 1987

  13. Wireless Networks: New Meaning to Ubiquitous Computing.

    ERIC Educational Resources Information Center

    Drew, Wilfred, Jr.

    2003-01-01

    Discusses the use of wireless technology in academic libraries. Topics include wireless networks; standards (IEEE 802.11); wired versus wireless; why libraries implement wireless technology; wireless local area networks (WLANs); WLAN security; examples of wireless use at Indiana State University and Morrisville College (New York); and useful…

  14. Computer and Internet Interventions to Optimize Listening and Learning for People With Hearing Loss: Accessibility, Use, and Adherence.

    PubMed

    Ferguson, Melanie; Henshaw, Helen

    2015-09-01

    The aim of this research forum article was to examine accessibility, use, and adherence to computerized and online interventions for people with hearing loss. Four intervention studies of people with hearing loss were examined: 2 auditory training studies, 1 working memory training study, and 1 study of multimedia educational support. A small proportion (approximately 15%) of participants had never used a computer, which may be a barrier to the accessibility of computer and Internet-based interventions. Computer competence was not a factor in intervention use or adherence. Computer skills and Internet access influenced participant preference for the delivery method of the multimedia educational support program. It is important to be aware of current barriers to computer and Internet-delivered interventions for people with hearing loss. However, there is a clear need to develop and future-proof hearing-related applications for online delivery.

  15. Computer use, internet access, and online health searching among Harlem adults.

    PubMed

    Cohall, Alwyn T; Nye, Andrea; Moon-Howard, Joyce; Kukafka, Rita; Dye, Bonnie; Vaughan, Roger D; Northridge, Mary E

    2011-01-01

    Computer use, Internet access, and online searching for health information were assessed toward enhancing Internet use for health promotion. Cross-sectional random digit dial landline phone survey. Eight zip codes that comprised Central Harlem/Hamilton Heights and East Harlem in New York City. Adults 18 years and older (N=646). Demographic characteristics, computer use, Internet access, and online searching for health information. Frequencies for categorical variables and means and standard deviations for continuous variables were calculated and compared with analogous findings reported in national surveys from similar time periods. Among Harlem adults, ever computer use and current Internet use were 77% and 52%, respectively. High-speed home Internet connections were somewhat lower for Harlem adults than for U.S. adults overall (43% vs. 68%). Current Internet users in Harlem were more likely to be younger, white vs. black or Hispanic, better educated, and in better self-reported health than non-current users (p<.01). Of those who reported searching online for health information, 74% sought information on medical problems and thought that information found on the Internet affected the way they eat (47%) or exercise (44%). Many Harlem adults currently use the Internet to search for health information. High-speed connections and culturally relevant materials may facilitate health information searching for underserved groups. Copyright © 2011 by American Journal of Health Promotion, Inc.

  16. Interoperability and security in wireless body area network infrastructures.

    PubMed

    Warren, Steve; Lebak, Jeffrey; Yao, Jianchu; Creekmore, Jonathan; Milenkovic, Aleksandar; Jovanov, Emil

    2005-01-01

    Wireless body area networks (WBANs) and their supporting information infrastructures offer unprecedented opportunities to monitor state of health without constraining the activities of a wearer. These mobile point-of-care systems are now realizable due to the convergence of technologies such as low-power wireless communication standards, plug-and-play device buses, off-the-shelf development kits for low-power microcontrollers, handheld computers, electronic medical records, and the Internet. To increase acceptance of personal monitoring technology while lowering equipment cost, advances must be made in interoperability (at both the system and device levels) and security. This paper presents an overview of WBAN infrastructure work in these areas currently underway in the Medical Component Design Laboratory at Kansas State University (KSU) and at the University of Alabama in Huntsville (UAH). KSU efforts include the development of wearable health status monitoring systems that utilize ISO/IEEE 11073, Bluetooth, Health Level 7, and OpenEMed. WBAN efforts at UAH include the development of wearable activity and health monitors that incorporate ZigBee-compliant wireless sensor platforms with hardware-level encryption and the TinyOS development environment. WBAN infrastructures are complex, requiring many functional support elements. To realize these infrastructures through collaborative efforts, organizations such as KSU and UAH must define and utilize standard interfaces, nomenclature, and security approaches.

  17. A Standard-Based and Context-Aware Architecture for Personal Healthcare Smart Gateways.

    PubMed

    Santos, Danilo F S; Gorgônio, Kyller C; Perkusich, Angelo; Almeida, Hyggo O

    2016-10-01

    The rising availability of Personal Health Devices (PHDs) capable of Personal Network Area (PAN) communication and the desire of keeping a high quality of life are the ingredients of the Connected Health vision. In parallel, a growing number of personal and portable devices, like smartphones and tablet computers, are becoming capable of taking the role of health gateway, that is, a data collector for the sensor PHDs. However, as the number of PHDs increase, the number of other peripherals connected in PAN also increases. Therefore, PHDs are now competing for medium access with other devices, decreasing the Quality of Service (QoS) of health applications in the PAN. In this article we present a reference architecture to prioritize PHD connections based on their state and requirements, creating a healthcare Smart Gateway. Healthcare context information is extracted by observing the traffic through the gateway. A standard-based approach was used to identify health traffic based on ISO/IEEE 11073 family of standards. A reference implementation was developed showing the relevance of the problem and how the proposed architecture can assist in the prioritization. The reference Smart Gateway solution was integrated with a Connected Health System for the Internet of Things, validating its use in a real case scenario.

  18. Computer-Mediated Communication Modality and Psychological Well-Being

    ERIC Educational Resources Information Center

    Ess, Brian C.

    2013-01-01

    The growth of Internet usage in American society has added new modes of communication, primarily through computer-mediated communication (CMC)on the Internet. Research on the relationship between Internet use and psychological well-being has been mixed and this study attempted to reconcile the discrepancies in results by exploring the…

  19. The Internet in Swaziland: Services under Transformation.

    ERIC Educational Resources Information Center

    Muswazi, Paiki

    2000-01-01

    Reviews the history of libraries in Swaziland and discusses the introduction of computers in 1974 and Internet access in 1996. Topics include censorship laws that have restricted access; e-commerce; e-mail; obstacles, including limited user access in libraries and lack of computer literacy; and suggestions for extending Internet information…

  20. The Impact of Internet-Based Instruction on Teacher Education: The "Paradigm Shift."

    ERIC Educational Resources Information Center

    Lan, Jiang JoAnn

    This study incorporated Internet-based instruction into two education technology courses for preservice teachers. One was a required, undergraduate, beginning-level educational computing course. The other was a graduate, advanced-level computing course. The experiment incorporated Internet-based instruction into course delivery in order to create…

  1. Generic Divide and Conquer Internet-Based Computing

    NASA Technical Reports Server (NTRS)

    Follen, Gregory J. (Technical Monitor); Radenski, Atanas

    2003-01-01

    The growth of Internet-based applications and the proliferation of networking technologies have been transforming traditional commercial application areas as well as computer and computational sciences and engineering. This growth stimulates the exploration of Peer to Peer (P2P) software technologies that can open new research and application opportunities not only for the commercial world, but also for the scientific and high-performance computing applications community. The general goal of this project is to achieve better understanding of the transition to Internet-based high-performance computing and to develop solutions for some of the technical challenges of this transition. In particular, we are interested in creating long-term motivation for end users to provide their idle processor time to support computationally intensive tasks. We believe that a practical P2P architecture should provide useful service to both clients with high-performance computing needs and contributors of lower-end computing resources. To achieve this, we are designing dual -service architecture for P2P high-performance divide-and conquer computing; we are also experimenting with a prototype implementation. Our proposed architecture incorporates a master server, utilizes dual satellite servers, and operates on the Internet in a dynamically changing large configuration of lower-end nodes provided by volunteer contributors. A dual satellite server comprises a high-performance computing engine and a lower-end contributor service engine. The computing engine provides generic support for divide and conquer computations. The service engine is intended to provide free useful HTTP-based services to contributors of lower-end computing resources. Our proposed architecture is complementary to and accessible from computational grids, such as Globus, Legion, and Condor. Grids provide remote access to existing higher-end computing resources; in contrast, our goal is to utilize idle processor time of lower-end Internet nodes. Our project is focused on a generic divide and conquer paradigm and on mobile applications of this paradigm that can operate on a loose and ever changing pool of lower-end Internet nodes.

  2. History, structure, and function of the Internet.

    PubMed

    Glowniak, J

    1998-04-01

    The Internet stands at the forefront of telecommunications in medicine. This worldwide system of computers had its beginnings in networking projects in the United States and western Europe in the 1960s and 1970s. The precursor of the Internet was ARPANET, a long-distance telecommunication network funded by the Department of Defense that linked together computers throughout the United States. In the 1980s, ARPANET was superseded by NSFNET, a series of networks created by the National Science Foundation, which established the present-day structure of the Internet. The physical structure of the Internet resembles and is integrated with the telephone system. Long-distance data transport services are provided by large telecommunication companies, called network service providers (NSPs), through high-capacity, high-speed national and international fiber optic cables. These transport services are accessed through Internet service providers, ISPs. ISPs, the equivalent of regional Bell operating companies, provide the physical link to the NSPs for individuals and organizations. Telecommunications on the Internet are standardized by a set of communications protocols, the TCP/IP protocol suite, that describe routing of messages over the Internet, computer naming conventions, and commonly used Internet services such as e-mail. At present, the Internet consists of over 20 million computer worldwide and is continuing to grow at a rapid rate. Along with the growth of the Internet, higher speed access methods are offering a range of new services such as real-time video and voice communications. Medical education, teaching, and research, as well as clinical practice, will be affected in numerous different ways by these advances.

  3. Perceived problems with computer gaming and Internet use are associated with poorer social relations in adolescence.

    PubMed

    Rasmussen, Mette; Meilstrup, Charlotte Riebeling; Bendtsen, Pernille; Pedersen, Trine Pagh; Nielsen, Line; Madsen, Katrine Rich; Holstein, Bjørn E

    2015-02-01

    Young people's engagement in electronic gaming and Internet communication have caused concerns about potential harmful effects on their social relations, but the literature is inconclusive. The aim of this paper was to examine whether perceived problems with computer gaming and Internet communication are associated with young people's social relations. Cross-sectional questionnaire survey in 13 schools in the city of Aarhus, Denmark, in 2009. Response rate 89%, n = 2,100 students in grades 5, 7, and 9. Independent variables were perceived problems related to computer gaming and Internet use, respectively. Outcomes were measures of structural (number of days/week with friends, number of friends) and functional (confidence in others, being bullied, bullying others) dimensions of student's social relations. Perception of problems related to computer gaming were associated with almost all aspects of poor social relations among boys. Among girls, an association was only seen for bullying. For both boys and girls, perceived problems related to Internet use were associated with bullying only. Although the study is cross-sectional, the findings suggest that computer gaming and Internet use may be harmful to young people's social relations.

  4. The Role of Parents and Related Factors on Adolescent Computer Use

    PubMed Central

    Epstein, Jennifer A.

    2012-01-01

    Background Research suggested the importance of parents on their adolescents’ computer activity. Spending too much time on the computer for recreational purposes in particular has been found to be related to areas of public health concern in children/adolescents, including obesity and substance use. Design and Methods The goal of the research was to determine the association between recreational computer use and potentially linked factors (parental monitoring, social influences to use computers including parents, age of first computer use, self-control, and particular internet activities). Participants (aged 13-17 years and residing in the United States) were recruited via the Internet to complete an anonymous survey online using a survey tool. The target sample of 200 participants who completed the survey was achieved. The sample’s average age was 16 and was 63% girls. Results A set of regressions with recreational computer use as dependent variables were run. Conclusions Less parental monitoring, younger age at first computer use, listening or downloading music from the internet more frequently, using the internet for educational purposes less frequently, and parent’s use of the computer for pleasure were related to spending a greater percentage of time on non-school computer use. These findings suggest the importance of parental monitoring and parental computer use on their children’s own computer use, and the influence of some internet activities on adolescent computer use. Finally, programs aimed at parents to help them increase the age when their children start using computers and learn how to place limits on recreational computer use are needed. PMID:25170449

  5. Barriers and Facilitators to Home Computer and Internet Use Among Urban Novice Computer Users of Low Socioeconomic Position

    PubMed Central

    Bennett, Gary G; Viswanath, K

    2007-01-01

    Background Despite the increasing penetration of the Internet and amount of online health information, there are significant barriers that limit its widespread adoption as a source of health information. One is the “digital divide,” with people of higher socioeconomic position (SEP) demonstrating greater access and usage compared to those from lower SEP groups. However, as the access gap narrows over time and more people use the Internet, a shift in research needs to occur to explore how one might improve Internet use as well as website design for a range of audiences. This is particularly important in the case of novice users who may not have the technical skills, experience, or social connections that could help them search for health information using the Internet. The focus of our research is to investigate the challenges in the implementation of a project to improve health information seeking among low SEP groups. The goal of the project is not to promote health information seeking as much as to understand the barriers and facilitators to computer and Internet use, beyond access, among members of lower SEP groups in an urban setting. Objective The purpose was to qualitatively describe participants’ self-identified barriers and facilitators to computer and Internet use during a 1-year pilot study as well as the challenges encountered by the research team in the delivery of the intervention. Methods Between August and November 2005, 12 low-SEP urban individuals with no or limited computer and Internet experience were recruited through a snowball sampling. Each participant received a free computer system, broadband Internet access, monthly computer training courses, and technical support for 1 year as the intervention condition. Upon completion of the study, participants were offered the opportunity to complete an in-depth semistructured interview. Interviews were approximately 1 hour in length and were conducted by the project director. The interviews were held in the participants’ homes and were tape recorded for accuracy. Nine of the 12 study participants completed the semistructured interviews. Members of the research team conducted a qualitative analysis based on the transcripts from the nine interviews using the crystallization/immersion method. Results Nine of the 12 participants completed the in-depth interview (75% overall response rate), with three men and six women agreeing to be interviewed. Major barriers to Internet use that were mentioned included time constraints and family conflict over computer usage. The monthly training classes and technical assistance components of the intervention surfaced as the most important facilitators to computer and Internet use. The concept of received social support from other study members, such as assistance with computer-related questions, also emerged as an important facilitator to overall computer usage. Conclusions This pilot study offers important insights into the self-identified barriers and facilitators in computer and Internet use among urban low-SEP novice users as well as the challenges faced by the research team in implementing the intervention. PMID:17951215

  6. Network architecture test-beds as platforms for ubiquitous computing.

    PubMed

    Roscoe, Timothy

    2008-10-28

    Distributed systems research, and in particular ubiquitous computing, has traditionally assumed the Internet as a basic underlying communications substrate. Recently, however, the networking research community has come to question the fundamental design or 'architecture' of the Internet. This has been led by two observations: first, that the Internet as it stands is now almost impossible to evolve to support new functionality; and second, that modern applications of all kinds now use the Internet rather differently, and frequently implement their own 'overlay' networks above it to work around its perceived deficiencies. In this paper, I discuss recent academic projects to allow disruptive change to the Internet architecture, and also outline a radically different view of networking for ubiquitous computing that such proposals might facilitate.

  7. Ultrasound-Based Guidance for Partial Breast Irradiation Therapy

    DTIC Science & Technology

    2012-01-01

    displace- 0278-0062/$20.00 © IEEE Authorized licensed use limited to: IEEE Xplore . Downloaded on January 5, 2009 at 17:37 from IEEE Xplore . Restrictions...Authorized licensed use limited to: IEEE Xplore . Downloaded on January 5, 2009 at 17:37 from IEEE Xplore . Restrictions apply. RIVAZ et al...better CNR values: the Authorized licensed use limited to: IEEE Xplore . Downloaded on January 5, 2009 at 17:37 from IEEE Xplore . Restrictions apply

  8. 77 FR 38630 - Open Internet Advisory Committee

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-28

    ... Computer Science and Co-Founder of the Berkman Center for Internet and Society, Harvard University, is... of Technology Computer Science and Artificial Intelligence Laboratory, is appointed vice-chairperson... Jennifer Rexford, Professor of Computer Science, Princeton University Dennis Roberson, Vice Provost...

  9. Confabulation Based Real-time Anomaly Detection for Wide-area Surveillance Using Heterogeneous High Performance Computing Architecture

    DTIC Science & Technology

    2015-06-01

    system accuracy. The AnRAD system was also generalized for the additional application of network intrusion detection . A self-structuring technique...to Host- based Intrusion Detection Systems using Contiguous and Discontiguous System Call Patterns,” IEEE Transactions on Computer, 63(4), pp. 807...square kilometer areas. The anomaly recognition and detection (AnRAD) system was built as a cogent confabulation network . It represented road

  10. Terahertz Radiation: A Non-contact Tool for the Selective Stimulation of Biological Responses in Human Cells

    DTIC Science & Technology

    2014-01-01

    computational and empirical dosimetric tools [31]. For the computational dosimetry, we employed finite-dif- ference time- domain (FDTD) modeling techniques to...temperature-time data collected for a well exposed to THz radiation using finite-difference time- domain (FDTD) modeling techniques and thermocouples... like )). Alter- ation in the expression of such genes underscores the signif- 62 IEEE TRANSACTIONS ON TERAHERTZ SCIENCE AND TECHNOLOGY, VOL. 6, NO. 1

  11. JPRS Report, Science & Technology. China.

    DTIC Science & Technology

    1989-03-29

    Commun ., Vol COM-29, No 6, pp 895-901, June 1981. [4] R.C. Titsworth , "A Boolean-Function-Multiplexed Telemetry System," IEEE Trans, on SET, pp 42...Reagents 39 Gene-Engineered Human Epithelium Growth Factor (hEGF) 39 Superfine Snake Venom 39 COMPUTERS Ai Computer System LISP-MI [Zheng Shouqi, et...XUEBAO, No 3, Jun 88] 134 Coordinated Development of Microwave, Optical Communications [Zhang Xu; DIANXIN KUAIBAO, No 11, Nov 88] 143 Error

  12. Portable Map-Reduce Utility for MIT SuperCloud Environment

    DTIC Science & Technology

    2015-09-17

    Reuther, A. Rosa, C. Yee, “Driving Big Data With Big Compute,” IEEE HPEC, Sep 10-12, 2012, Waltham, MA. [6] Apache Hadoop 1.2.1 Documentation: HDFS... big data architecture, which is designed to address these challenges, is made of the computing resources, scheduler, central storage file system...databases, analytics software and web interfaces [1]. These components are common to many big data and supercomputing systems. The platform is

  13. Assessing Mathematics Automatically Using Computer Algebra and the Internet

    ERIC Educational Resources Information Center

    Sangwin, Chris

    2004-01-01

    This paper reports some recent developments in mathematical computer-aided assessment which employs computer algebra to evaluate students' work using the Internet. Technical and educational issues raised by this use of computer algebra are addressed. Working examples from core calculus and algebra which have been used with first year university…

  14. Planning health education: Internet and computer resources in southwestern Nigeria. 2000-2001.

    PubMed

    Oyadoke, Adebola A; Salami, Kabiru K; Brieger, William R

    The use of the Internet as a health education tool and as a resource in health education planning is widely accepted as the norm in industrialized countries. Unfortunately, access to computers and the Internet is quite limited in developing countries. Not all licensed service providers operate, many users are actually foreign nationals, telephone connections are unreliable, and electricity supplies are intermittent. In this context, computer, e-mail, Internet, and CD-Rom use by health and health education program officers in five states in southwestern Nigeria were assessed to document their present access and use. Eight of the 30 organizations visited were government health ministry departments, while the remainder were non-governmental organizations (NGOs). Six NGOs and four State Ministry of Health (MOH) departments had no computers, but nearly two-thirds of both types of agency had e-mail, less than one-third had Web browsing facilities, and six had CD-Roms, all of whom were NGOs. Only 25 of the 48 individual respondents had computer use skills. Narrative responses from individual employees showed a qualitative difference between computer and Internet access and use and type of agency. NGO staff in organizations with computers indicated having relatively free access to a computer and the Internet and used these for both program planning and administrative purposes. In government offices it appeared that computers were more likely to be located in administrative or statistics offices and used for management tasks like salaries and correspondence, limiting the access of individual health staff. These two different organizational cultures must be considered when plans are made for increasing computer availability and skills for health education planning.

  15. Evolution of Internet addiction in Greek adolescent students over a two-year period: the impact of parental bonding.

    PubMed

    Siomos, Konstantinos; Floros, Georgios; Fisoun, Virginia; Evaggelia, Dafouli; Farkonas, Nikiforos; Sergentani, Elena; Lamprou, Maria; Geroukalis, Dimitrios

    2012-04-01

    We present results from a cross-sectional study of the entire adolescent student population aged 12-18 of the island of Kos and their parents, on Internet abuse, parental bonding and parental online security practices. We also compared the level of over involvement with personal computers of the adolescents to the respective estimates of their parents. Our results indicate that Internet addiction is increased in this population where no preventive attempts were made to combat the phenomenon from the initial survey, 2 years ago. This increase is parallel to an increase in Internet availability. The best predictor variables for Internet and computer addiction were parental bonding variables and not parental security practices. Parents tend to underestimate the level of computer involvement when compared to their own children estimates. Parental safety measures on Internet browsing have only a small preventive role and cannot protect adolescents from Internet addiction. The three online activities most associated with Internet addiction were watching online pornography, online gambling and online gaming. © Springer-Verlag 2012

  16. Optimal Processor Assignment for Pipeline Computations

    DTIC Science & Technology

    1991-10-01

    the use of ratios: initially each task is assigned a procesbuor2 the remaining proceborb are distributed in proportion to the quantities f,(1), 1 < i...algorithmns. IEEE Trans. onl Parallel and Distributed Systemns, 1 (4):470-499, October 1990. [26] P. Al. Kogge. The Architeture of Pipelined Comnputers

  17. Security Enhancement of Littoral Combat Ship Class Utilizing an Autonomous Mustering and Pier Monitoring System

    DTIC Science & Technology

    2010-03-01

    allows the programmer to use the English language in an expressive manor while still maintaining the logical structure of a programming language ( Pressman ...and Choudhury Tanzeem. 2000. Face Recognition for Smart Environments, IEEE Computer, pp. 50–55. Pressman , Roger. 2010. Software Engineering A

  18. Towards Formalizing the Java Security Architecture of JDK 1.2

    DTIC Science & Technology

    1998-01-01

    and Richard E. Newman for their contributions to this paper. References 1. Balfanz , D. and Gong, L.: Experience with Secure Multi-Processing in Java...Privacy, IEEE Computer Society, Oakland, California, Pages 122-136, 1992. 18. Wallach, D. S., Balfanz , D., Dean, D., and Felton, E. W.: Extensible

  19. Device-Enabled Authorization in the Grey System

    DTIC Science & Technology

    2005-02-01

    proof checker. Journal of Automated Reasoning 31(3-4):231–260, 2003. [7] D. Balfanz , D. Dean, and M. Spreitzer. A security infrastructure for...distributed Java applications. In Proceedings of the 21st IEEE Symposium on Security and Privacy, May 2002. [8] D. Balfanz and E. Felten. Hand-held computers

  20. Managing Parallelism and Resources in Scientific Dataflow Programs

    DTIC Science & Technology

    1990-03-01

    1983. [52] K. Hiraki , K. Nishida, S. Sekiguchi, and T. Shimada. Maintainence architecture and its LSI implementation of a dataflow computer with a... Hiraki , and K. Nishida. An architecture of a data flow machine and its evaluation. In Proceedings of CompCon 84, pages 486-490. IEEE, 1984. [84] N

  1. Developing Software to Use Parallel Processing Effectively

    DTIC Science & Technology

    1988-10-01

    Experience, Vol 15(6), June 1985, p53 Gajski85 Gajski , Daniel D. and Jih-Kwon Peir, "Essential Issues in Multiprocessor Systems", IEEE Computer, June...Treleaven (eds.), Springer-Verlag, pp. 213-225 (June 1987). Kuck83 David Kuck, Duncan Lawrie, Ron Cytron, Ahmed Sameh and Daniel Gajski , The Architecture and

  2. Partial Bibliography of Work on Expert Systems,

    DTIC Science & Technology

    1982-12-01

    Bibliography: AAAI American Association for Artificial Intelligence ACM Association for Computing Machinery AFIPS American Federation of Information...Processing Societies ECAI European Conference on Artificial Intelligence IEEE Institute for Electrical and Electronic Engineers IFIPS International...Federation of Information Processing Societies IJCAI International Joint Conferences on Artificial Intelligence SIGPLAN ACM Special Interest Group on

  3. Internet addiction: definition, assessment, epidemiology and clinical management.

    PubMed

    Shaw, Martha; Black, Donald W

    2008-01-01

    Internet addiction is characterized by excessive or poorly controlled preoccupations, urges or behaviours regarding computer use and internet access that lead to impairment or distress. The condition has attracted increasing attention in the popular media and among researchers, and this attention has paralleled the growth in computer (and Internet) access. Prevalence estimates vary widely, although a recent random telephone survey of the general US population reported an estimate of 0.3-0.7%. The disorder occurs worldwide, but mainly in countries where computer access and technology are widespread. Clinical samples and a majority of relevant surveys report a male preponderance. Onset is reported to occur in the late 20s or early 30s age group, and there is often a lag of a decade or more from initial to problematic computer usage. Internet addiction has been associated with dimensionally measured depression and indicators of social isolation. Psychiatric co-morbidity is common, particularly mood, anxiety, impulse control and substance use disorders. Aetiology is unknown, but probably involves psychological, neurobiological and cultural factors. There are no evidence-based treatments for internet addiction. Cognitive behavioural approaches may be helpful. There is no proven role for psychotropic medication. Marital and family therapy may help in selected cases, and online self-help books and tapes are available. Lastly, a self-imposed ban on computer use and Internet access may be necessary in some cases.

  4. Web N.0, the New Development Trend of Internet

    NASA Astrophysics Data System (ADS)

    Sun, Zhiguo; Wang, Wensheng

    This article analyzes the Internet basic theory, the network foundation environment and the user behavior change and so on, Which analyzes the development tendency of existing partial Internet products in the future Internet environment. The article also hot on the concept of cloud computing, Demonstrates the relation between Cloud Computing and Web 2.0 from the angle of Cloud-based end-user applications, The possibly killing application in the future was discussed.

  5. The associations among computer-mediated communication, relationships, and well-being.

    PubMed

    Schiffrin, Holly; Edelman, Anna; Falkenstern, Melissa; Stewart, Cassandra

    2010-06-01

    Social support provided by interpersonal relationships is one of the most robust correlates of well-being. Self-disclosure serves as a basic building block of these relationships. With the rapid growth of the Internet in recent years, the question remains how self-disclosure, and subsequently relationships and well-being, differ when people communicate over the Internet rather than in person. The purpose of this article is to describe current Internet usage patterns as well as explore the association of Internet usage and well-being. Additionally, it directly compares the perceived benefits of face-to-face communication and computer-mediated communication. A questionnaire was administered to 99 undergraduates to measure Internet usage patterns, communication partners, self-disclosure, extraversion, and subjective well-being. Although Internet communication was found to be common, individuals perceived computer-mediated communication to be less useful than face-to-face communication. In addition, increased Internet usage was associated with decreased well-being. Implications are discussed in terms of a new Internet paradox in which people increasingly use the Internet for communication, although they perceive it to be less beneficial than face-to-face interactions and it is associated with reduced well-being.

  6. Internet use among Turkish adolescents.

    PubMed

    Tahiroglu, Aysegul Yolga; Celik, Gonca G; Uzel, Mehtap; Ozcan, Neslihan; Avci, Ayse

    2008-10-01

    The aim of this study was to investigate Internet use habits and problematic Internet use (PIU) in Turkish adolescents. Participants were 3,975 undergraduate students, 7.6% of whom used the Internet for more than 12 hours weekly. The Online Cognition Scale (OCS) was used. The most common purpose for using the Internet was playing games, followed by general information search. Female users mostly preferred searching for general information; male users preferred playing games (p < 0.001, gamma = 995.205). The most preferred type of game was violent games. While preference for strategy and fantasy role-play (FRP) games increased with age, preference for other games decreased (p < 0.0001, gamma = 283.767). Participants who used the Internet mostly for general information searches and school-related searches had lower OCS scores (p < 0.0001). The highest OCS scores were related to violent games, followed by FRP, strategy, and sports and motor racing games. Computers and the Internet are useful, important inventions, but like other inventions, if used improperly, they may be harmful. Risk of harm raises concerns about who should use the Internet and computers, and where, when, and why the Internet and computers should be used.

  7. Adapting Teaching Strategies To Encompass New Technologies.

    ERIC Educational Resources Information Center

    Oravec, Jo Ann

    2001-01-01

    The explosion of special-purpose computing devices--Internet appliances, handheld computers, wireless Internet, networked household appliances--challenges business educators attempting to provide computer literacy education. At a minimum, they should address connectivity, expanded applications, and social and public policy implications of these…

  8. How parental attitudes affect the risky computer and Internet usage patterns of adolescents: a population-based study in the Bursa District of Turkey.

    PubMed

    Uncu, Yeşim; Vural, Pinar; Büyükuysal, Cağatay; Alper, Züleyha; Kiliç, Emine Zinnur

    2014-12-01

    We aimed to evaluate the computer usage patterns of adolescents and to determine the effects of family life and parental attitude on these patterns. This was a descriptive, cross-sectional, population-based survey that included 935 children between 11 and 16 years of age who were students in the second level of primary school and their parents as well. The following instruments were used in the survey: student and parent questionnaires on computer usage patterns and the Parental Attitude Research Instrument (PARI) to assess parental attitudes towards child-rearing and family life. Of the study population, the majority of the students had a computer in their homes and spent a lot of time on the Internet. Parental control over the amount of time spent on the Internet and the websites that were visited had sometimes limited and contradictory effects on computer usage among the students. A democratic parental attitude was the best approach. Using the computer as a reward or punishment had a negative impact on the children's computer usage patterns. Although parents are confused concerning the benefits and harms of the Internet for their children and not certain how to manage their children's use of the computer and safe navigation of the Internet, a democratic parental attitude appears to be the best approach for reaching the most beneficial computer usage patterns for students.

  9. Internet Addiction Risk in the Academic Environment

    ERIC Educational Resources Information Center

    Ellis, William F.; McAleer, Brenda; Szakas, Joseph S.

    2015-01-01

    The Internet's effect on society is growing exponentially. One only has to look at the growth of e-commerce, social media, wireless data access, and mobile devices to see how communication is changing. The need and desire for the Internet, especially in such disciplines as Computer Science or Computer Information Systems, pose a unique risk for…

  10. An Analysis of Attitudes toward Computer Networks and Internet Addiction.

    ERIC Educational Resources Information Center

    Tsai, Chin-Chung; Lin, Sunny S. J.

    The purpose of this study was to explore the interplay between young people's attitudes toward computer networks and Internet addiction. After analyzing questionnaire responses of an initial sample of 615 Taiwanese high school students, 78 subjects, viewed as possible Internet addicts, were selected for further explorations. It was found that…

  11. Magazine Ranks Colleges on How "Wired" They Are; MIT Comes Out on Top.

    ERIC Educational Resources Information Center

    McCollum, Kelly

    1997-01-01

    A recent study rated colleges and universities on computer connectedness, using such criteria as faculty use of the Internet for academic purposes (online homework, course home pages, online academic materials); required courses in Internet use; computers, wires, and network connections for students and faculty; non-academic Internet services…

  12. CyberStrategies: How To Build an Internet-Based Information System.

    ERIC Educational Resources Information Center

    Carroll, Michael L.; Downs, W. Scott

    Many organizations grapple with a glut of electronic information spawned by stockpiles of incompatible computers. This book offers solutions in information sharing and computer interaction. Rather than being about the Internet per se, it is about approaches that are characteristic of the Internet and the managerial and technical aspects of…

  13. Communication-Efficient Arbitration Models for Low-Resolution Data Flow Computing

    DTIC Science & Technology

    1988-12-01

    Given graph G = (V, E), weights w (v) for each v e V and L (e) for each e c E, and positive integers B and J, find a partition of V into disjoint...MIT/LCS/TR-218, Cambridge, Mass. Agerwala, Tilak, February 1982, "Data Flow Systems", Computer, pp. 10-13. Babb, Robert G ., July 1984, "Parallel...Processing with Large-Grain Data Flow Techniques," IEEE Computer 17, 7, pp. 55-61. Babb, Robert G ., II, Lise Storc, and William C. Ragsdale, 1986, "A Large

  14. A validation of well-being and happiness surveys for administration via the Internet.

    PubMed

    Howell, Ryan T; Rodzon, Katrina S; Kurai, Mark; Sanchez, Amy H

    2010-08-01

    Internet research is appealing because it is a cost- and time-efficient way to access a large number of participants; however, the validity of Internet research for important subjective well-being (SWB) surveys has not been adequately assessed. The goal of the present study was to validate the Satisfaction With Life Scale (SWLS; Diener, Emmons, Larsen, & Griffin, 1985), the Positive and Negative Affect Schedule (PANAS-X; Watson & Clark, 1994), and the Subjective Happiness Scale (SHS; Lyubomirsky & Lepper, 1999) for use on the Internet. This study compared the quality of data collected using paper-based (paper-and-pencil version in a lab setting), computer-based (Web-based version in a lab setting), and Internet (Web-based version on a computer of the participant's choosing) surveys for these three measures of SWB. The paper-based and computer-based experiment recruited two college student samples; the Internet experiments recruited a college student sample and an adult sample responding to ads on different social-networking Web sites. This study provides support for the reliability, validity, and generalizability of the Internet format of the SWLS, PANAS-X, and SHS. Across the three experiments, the results indicate that the computer-based and Internet surveys had means, standard deviations, reliabilities, and factor structures that were similar to those of the paper-based versions. The discussion examines the difficulty of higher attrition for the Internet version, the need to examine reverse-coded items in the future, and the possibility that unhappy individuals are more likely to participate in Internet surveys of SWB.

  15. Internet use and attitudes towards illicit internet use behavior in a sample of Russian college students.

    PubMed

    Palesh, Oxana; Saltzman, Kasey; Koopman, Cheryl

    2004-10-01

    This study assessed Internet use and attitudes toward illicit use of the Internet in a sample of Russian college students. A sample comprised of 198 students was recruited from a university in Moscow. Each participant completed a survey assessing demographic characteristics, Internet use, and attitudes towards engaging in illicit behaviors over the Internet. About half of the students reported that they used the Internet at least several times a year, with 8% reporting daily use of the Internet. Among Internet users, most reported having Internet access either at home or at a friends' home, and 16 % reported having Internet access from work, school, or a computer center. Among Internet users, the main purpose was for school-related activities (60%), followed by e-mail (55%), entertainment (50%), chatting (24%), and searching for pornography (6%). Although most students thought it was inappropriate to read someone else's e-mail, use someone else's password or credit card information without their permission, or break into someone's computer, many students did endorse those illicit behaviors. Over a fifth of the students reported that they knew hackers. Forty three percent of students agreed that people make too much fuss about watching videos, movies or downloading music on the Internet without paying. Males were more likely than females to report using the Internet for entertainment purposes (p = 0.006) and were more likely to agree that it was okay to break into someone's computer (p = 0.04). The results of this study suggest that these Russian college students predominately use the Internet to help with their schoolwork, to communicate with others, and for entertainment. These results also suggest that interventions may be useful to change attitudes endorsing illicit uses of the Internet.

  16. Computer use and needs of internists: a survey of members of the American College of Physicians-American Society of Internal Medicine.

    PubMed Central

    Lacher, D.; Nelson, E.; Bylsma, W.; Spena, R.

    2000-01-01

    The American College of Physicians-American Society of Internal Medicine conducted a membership survey in late 1998 to assess their activities, needs, and attitudes. A total of 9,466 members (20.9% response rate) reported on 198 items related to computer use and needs of internists. Eighty-two percent of the respondents reported that they use computers for personal or professional reasons. Physicians younger than 50 years old who had full- or part-time academic affiliation reported using computers more frequently for medical applications. About two thirds of respondents who had access to computers connected to the Internet at least weekly, with most using the Internet from home for e-mail and nonmedical uses. Physicians expressed concerns about Internet security, confidentiality, and accuracy, and the lack of time to browse the Internet. In practice settings, internists used computers for administrative and financial functions. Less than 19% of respondents had partial or complete electronic clinical functions in their offices. Less than 7% of respondents exchanged e-mail with their patients on a weekly or daily basis. Also, less than 15% of respondents used computers for continuing medical education (CME). Respondents reported they wanted to increase their general computer skills and enhance their knowledge of computer-based information sources for patient care, electronic medical record systems, computer-based CME, and telemedicine While most respondents used computers and connected to the Internet, few physicians utilized computers for clinical management. Medical organizations face the challenge of increasing physician use of clinical systems and electronic CME. PMID:11079924

  17. Computer use and needs of internists: a survey of members of the American College of Physicians-American Society of Internal Medicine.

    PubMed

    Lacher, D; Nelson, E; Bylsma, W; Spena, R

    2000-01-01

    The American College of Physicians-American Society of Internal Medicine conducted a membership survey in late 1998 to assess their activities, needs, and attitudes. A total of 9,466 members (20.9% response rate) reported on 198 items related to computer use and needs of internists. Eighty-two percent of the respondents reported that they use computers for personal or professional reasons. Physicians younger than 50 years old who had full- or part-time academic affiliation reported using computers more frequently for medical applications. About two thirds of respondents who had access to computers connected to the Internet at least weekly, with most using the Internet from home for e-mail and nonmedical uses. Physicians expressed concerns about Internet security, confidentiality, and accuracy, and the lack of time to browse the Internet. In practice settings, internists used computers for administrative and financial functions. Less than 19% of respondents had partial or complete electronic clinical functions in their offices. Less than 7% of respondents exchanged e-mail with their patients on a weekly or daily basis. Also, less than 15% of respondents used computers for continuing medical education (CME). Respondents reported they wanted to increase their general computer skills and enhance their knowledge of computer-based information sources for patient care, electronic medical record systems, computer-based CME, and telemedicine While most respondents used computers and connected to the Internet, few physicians utilized computers for clinical management. Medical organizations face the challenge of increasing physician use of clinical systems and electronic CME.

  18. Interest in internet lung cancer support among rural cardiothoracic patients.

    PubMed

    Quin, Jacquelyn; Stams, Victor; Phelps, Beth; Boley, Theresa; Hazelrigg, Stephen

    2010-05-01

    The Internet may provide an alternative option for rural lung cancer patients who lack access to on-site cancer support; however, Internet access and use among rural patients is unknown. An anonymous waiting-room survey was administered to all outpatient cardiothoracic surgery patients over 3 mo. Survey questions included age, gender, and diagnosis, possession of a home computer and Internet service, estimated Internet use, and use of the Internet for health information. Patients with known or suspected lung cancer were asked to indicate their interest in on-site and Internet cancer support. There were 597 returned surveys (response rate 96%). The mean age was 64.6 y (SE 0.55), and 58% were men. Diagnoses included known or possible lung cancer (15.4%), lung disease (9.5%), heart disease (30.4%), other diagnoses (13.9%), and undetermined (30.6%). There were 343 patients (57.4%) with a home computer and 299 (50.1%) with home Internet service. Average Internet use was 8.5 h per wk (n = 298), and 225 patients used the Internet for health information. Of the 92 patients with lung cancer, 10 indicated interest in on-site support services while 37 expressed interest in Internet-based support. Based on survey results, a slight majority of rural patients have a home computer and Internet access. Internet use for health information appears relatively common. Overall interest for support services among lung cancer patients appears modest with a greater interest in Internet-based services compared with on-site support. Copyright 2010 Elsevier Inc. All rights reserved.

  19. Smart City Pilot Projects Using LoRa and IEEE802.15.4 Technologies.

    PubMed

    Pasolini, Gianni; Buratti, Chiara; Feltrin, Luca; Zabini, Flavio; De Castro, Cristina; Verdone, Roberto; Andrisano, Oreste

    2018-04-06

    Information and Communication Technologies (ICTs), through wireless communications and the Internet of Things (IoT) paradigm, are the enabling keys for transforming traditional cities into smart cities, since they provide the core infrastructure behind public utilities and services. However, to be effective, IoT-based services could require different technologies and network topologies, even when addressing the same urban scenario. In this paper, we highlight this aspect and present two smart city testbeds developed in Italy. The first one concerns a smart infrastructure for public lighting and relies on a heterogeneous network using the IEEE 802.15.4 short-range communication technology, whereas the second one addresses smart-building applications and is based on the LoRa low-rate, long-range communication technology. The smart lighting scenario is discussed providing the technical details and the economic benefits of a large-scale (around 3000 light poles) flexible and modular implementation of a public lighting infrastructure, while the smart-building testbed is investigated, through measurement campaigns and simulations, assessing the coverage and the performance of the LoRa technology in a real urban scenario. Results show that a proper parameter setting is needed to cover large urban areas while maintaining the airtime sufficiently low to keep packet losses at satisfactory levels.

  20. Smart City Pilot Projects Using LoRa and IEEE802.15.4 Technologies

    PubMed Central

    Buratti, Chiara; Zabini, Flavio; De Castro, Cristina; Verdone, Roberto; Andrisano, Oreste

    2018-01-01

    Information and Communication Technologies (ICTs), through wireless communications and the Internet of Things (IoT) paradigm, are the enabling keys for transforming traditional cities into smart cities, since they provide the core infrastructure behind public utilities and services. However, to be effective, IoT-based services could require different technologies and network topologies, even when addressing the same urban scenario. In this paper, we highlight this aspect and present two smart city testbeds developed in Italy. The first one concerns a smart infrastructure for public lighting and relies on a heterogeneous network using the IEEE 802.15.4 short-range communication technology, whereas the second one addresses smart-building applications and is based on the LoRa low-rate, long-range communication technology. The smart lighting scenario is discussed providing the technical details and the economic benefits of a large-scale (around 3000 light poles) flexible and modular implementation of a public lighting infrastructure, while the smart-building testbed is investigated, through measurement campaigns and simulations, assessing the coverage and the performance of the LoRa technology in a real urban scenario. Results show that a proper parameter setting is needed to cover large urban areas while maintaining the airtime sufficiently low to keep packet losses at satisfactory levels. PMID:29642391

  1. Computer and internet use in vascular outpatients--ready for interactive applications?

    PubMed

    Richter, J G; Schneider, M; Klein-Weigel, P

    2009-11-01

    Exploring patients' computer and internet use, their expectations and attitudes is mandatory for successful introduction of interactive online health-care applications in Angiology. We included 165 outpatients suffering from peripheral arterial disease (PAD; n = 62) and chronic venous and / or lymphatic disease (CVLD; n = 103) in a cross-sectional-study. Patients answered a paper-based questionnaire. Patients were predominantly female (54.5%). 142 (86.1%) reported regular computer use for 9.7 +/- 5.8 years and 134 (81.2 %) used the internet for 6.2 +/- 3.6 years. CVLD-patients and internet-user were younger and higher educated, resulting in a significant difference in computer and internet use between the disease groups (p < 0.01 for both). Time spent online summed up to 4.3 +/- 2.2 days per week and 1.44 +/- 1.2 hours per day for all internet users without significant differences between the groups. The topics retrieved from the internet covered a wide spectrum and searches for health information were mentioned by 41.2 %. Although confidence in the internet (3.3 +/- 1.1 on a 1-6 Likert scale) and reliability in information retrieved from the internet (3.1 +/- 1.1) were relatively low, health-related issues were of high actual and future interest. 42.8% of the patients were even interested in interactive applications like health educational programs, 37.4% in self-reported assessments and outcome questionnaires and 26.9% in chatforums; 50% demanded access to their medical data on an Internetserver. Compared to older participants those < 50 yrs. used the internet more often for shopping, chatting, and e-mailing, but not for health information retrieval and interactive applications. Computers are commonly used and the internet has been adopted as an important source of information by patients suffering from PAD and CVLD. Besides, the internet offers great potentials and new opportunities for interactive disease (self-)management in angiology. To increase confidence and reliability in the medium a careful introduction and evaluation of these new online applications is mandatory.

  2. Interoperability in digital electrocardiography: harmonization of ISO/IEEE x73-PHD and SCP-ECG.

    PubMed

    Trigo, Jesús D; Chiarugi, Franco; Alesanco, Alvaro; Martínez-Espronceda, Miguel; Serrano, Luis; Chronaki, Catherine E; Escayola, Javier; Martínez, Ignacio; García, José

    2010-11-01

    The ISO/IEEE 11073 (x73) family of standards is a reference frame for medical device interoperability. A draft for an ECG device specialization (ISO/IEEE 11073-10406-d02) has already been presented to the Personal Health Device (PHD) Working Group, and the Standard Communications Protocol for Computer-Assisted ElectroCardioGraphy (SCP-ECG) Standard for short-term diagnostic ECGs (EN1064:2005+A1:2007) has recently been approved as part of the x73 family (ISO 11073-91064:2009). These factors suggest the coordinated use of these two standards in foreseeable telecardiology environments, and hence the need to harmonize them. Such harmonization is the subject of this paper. Thus, a mapping of the mandatory attributes defined in the second draft of the ISO/IEEE 11073-10406-d02 and the minimum SCP-ECG fields is presented, and various other capabilities of the SCP-ECG Standard (such as the messaging part) are also analyzed from an x73-PHD point of view. As a result, this paper addresses and analyzes the implications of some inconsistencies in the coordinated use of these two standards. Finally, a proof-of-concept implementation of the draft x73-PHD ECG device specialization is presented, along with the conversion from x73-PHD to SCP-ECG. This paper, therefore, provides recommendations for future implementations of telecardiology systems that are compliant with both x73-PHD and SCP-ECG.

  3. Innovative Leaders Take the Phone and Run: Profiles of Four Trailblazing Programs

    ERIC Educational Resources Information Center

    Norris, Cathleen; Soloway, Elliot; Menchhofer, Kyle; Bauman, Billie Diane; Dickerson, Mindy; Schad, Lenny; Tomko, Sue

    2010-01-01

    While the Internet changed everything, mobile will change everything squared. The Internet is just a roadway, and computers--the equivalent of cars for the Internet--have been expensive. The keepers of the information roadway--the telecommunication companies--will give one a "computer," such as cell phone, mobile learning device, or MLD,…

  4. A Parallel Neuromorphic Text Recognition System and Its Implementation on a Heterogeneous High-Performance Computing Cluster

    DTIC Science & Technology

    2013-01-01

    M. Ahmadi, and M. Shridhar, “ Handwritten Numeral Recognition with Multiple Features and Multistage Classifiers,” Proc. IEEE Int’l Symp. Circuits...ARTICLE (Post Print) 3. DATES COVERED (From - To) SEP 2011 – SEP 2013 4. TITLE AND SUBTITLE A PARALLEL NEUROMORPHIC TEXT RECOGNITION SYSTEM AND ITS...research in computational intelligence has entered a new era. In this paper, we present an HPC-based context-aware intelligent text recognition

  5. Preliminary Development of a Computational Model of a Dielectric Barrier Discharge

    DTIC Science & Technology

    2004-12-01

    Gerhard Pietsch . "Microdischarges in Air-Fed Ozonizers," Journal of Physics D: Applied Physics, Vol 24, 1991, pp 564-572. 14 Baldur Eliasson. "Modeling...Gibalov and Gerhard Pietsch . "Two-dimensional Modeling of the Dielectric Barrier Discharge in Air," Plasma Sources Science Technology, 1 (1992), pp. 166...Computer Modeling," IEEE Transactions on Plasma Science, 27 (1), February 1999, pp 36-37. 19 Valentin I Gibalov and Gerhard J. Pietsch . "The

  6. Networking DEC and IBM computers

    NASA Technical Reports Server (NTRS)

    Mish, W. H.

    1983-01-01

    Local Area Networking of DEC and IBM computers within the structure of the ISO-OSI Seven Layer Reference Model at a raw signaling speed of 1 Mops or greater are discussed. After an introduction to the ISO-OSI Reference Model nd the IEEE-802 Draft Standard for Local Area Networks (LANs), there follows a detailed discussion and comparison of the products available from a variety of manufactures to perform this networking task. A summary of these products is presented in a table.

  7. Internet-based computer technology on radiotherapy.

    PubMed

    Chow, James C L

    2017-01-01

    Recent rapid development of Internet-based computer technologies has made possible many novel applications in radiation dose delivery. However, translational speed of applying these new technologies in radiotherapy could hardly catch up due to the complex commissioning process and quality assurance protocol. Implementing novel Internet-based technology in radiotherapy requires corresponding design of algorithm and infrastructure of the application, set up of related clinical policies, purchase and development of software and hardware, computer programming and debugging, and national to international collaboration. Although such implementation processes are time consuming, some recent computer advancements in the radiation dose delivery are still noticeable. In this review, we will present the background and concept of some recent Internet-based computer technologies such as cloud computing, big data processing and machine learning, followed by their potential applications in radiotherapy, such as treatment planning and dose delivery. We will also discuss the current progress of these applications and their impacts on radiotherapy. We will explore and evaluate the expected benefits and challenges in implementation as well.

  8. Correlates of, and barriers to, Internet use among older adults.

    PubMed

    Chang, Janet; McAllister, Carolyn; McCaslin, Rosemary

    2015-01-01

    Older adults constitute the group with the greatest increase in Internet usage in the past decade; however, usage varies greatly within this population. Services to older adults require a current understanding of Internet-use trends. This study utilized a quantitative survey method to examine correlates of, and barriers to, current Internet use in a demographically diverse county in Southern California. Findings indicate that the presence of a computer at home, a job requiring computer use, age, education, and ethnicity are important factors in predicting Internet use in older adults. Implications for social work practice with older adults is discussed.

  9. Bridging the digital divide through the integration of computer and information technology in science education: An action research study

    NASA Astrophysics Data System (ADS)

    Brown, Gail Laverne

    The presence of a digital divide, computer and information technology integration effectiveness, and barriers to continued usage of computer and information technology were investigated. Thirty-four African American and Caucasian American students (17 males and 17 females) in grades 9--11 from 2 Georgia high school science classes were exposed to 30 hours of hands-on computer and information technology skills. The purpose of the exposure was to improve students' computer and information technology skills. Pre-study and post-study skills surveys, and structured interviews were used to compare race, gender, income, grade-level, and age differences with respect to computer usage. A paired t-test and McNemar test determined mean differences between student pre-study and post-study perceived skills levels. The results were consistent with findings of the National Telecommunications and Information Administration (2000) that indicated the presence of a digital divide and digital inclusion. Caucasian American participants were found to have more at-home computer and Internet access than African American participants, indicating that there is a digital divide by ethnicity. Caucasian American females were found to have more computer and Internet access which was an indication of digital inclusion. Sophomores had more at-home computer access and Internet access than other levels indicating digital inclusion. Students receiving regular meals had more computer and Internet access than students receiving free/reduced meals. Older students had more computer and Internet access than younger students. African American males had been using computer and information technology the longest which is an indication of inclusion. The paired t-test and McNemar test revealed significant perceived student increases in all skills levels. Interviews did not reveal any barriers to continued usage of the computer and information technology skills.

  10. Do You Lock Your Network Doors? Some Network Management Precautions.

    ERIC Educational Resources Information Center

    Neray, Phil

    1997-01-01

    Discusses security problems and solutions for networked organizations with Internet connections. Topics include access to private networks from electronic mail information; computer viruses; computer software; corporate espionage; firewalls, that is computers that stand between a local network and the Internet; passwords; and physical security.…

  11. Robust Multi-Agent Sensor Network Systems

    DTIC Science & Technology

    2012-05-08

    Localization on the Sphere, International Journal of Intelligent Defence Support System, Vol. 4, no. 4, 2011, pp. 328-350. Quality of Network... Quality of Service (QoS). The following standards are included in the IEEE 1609 standard family: IEEE P1609.0, IEEE P1609.1, IEEE P1609.2, IEEE P1609.3...protocols to support safety services in ITS,” in IEEE International Conference on Emerging Technologies and Factory Au- tomation (ETFA), 2008, pp. 1189

  12. Survey of methods for secure connection to the internet

    NASA Astrophysics Data System (ADS)

    Matsui, Shouichi

    1994-04-01

    This paper describes a study of a security method of protecting inside network computers against outside miscreants and unwelcome visitors and a control method when these computers are connected with the Internet. In the present Internet, a method to encipher all data cannot be used, so that it is necessary to utilize PEM (Privacy Enhanced Mail) capable of the encipherment and conversion of secret information. For preventing miscreant access by eavesdropping password, one-time password is effective. The most cost-effective method is a firewall system. This system lies between the outside and inside network. By limiting computers that directly communicate with the Internet, control is centralized and inside network security is protected. If the security of firewall systems is strictly controlled under correct setting, security within the network can be secured even in open networks such as the Internet.

  13. Advanced Visual and Instruction Systems for Maintenance Support (AVIS-MS)

    DTIC Science & Technology

    2006-12-01

    Hayashi , "Augmentable Reality: Situated Communication through Physical and Digital Spaces," Proc. 2nd Int’l Symp. Wearable Computers, IEEE CS Press...H. Ohno , "An Optical See-through Display for Mutual Occlusion of Real and Virtual Environments," Proc. Int’l Symp. Augmented Reality 2000 (ISARO0

  14. Exploiting Semi-Directional Transceivers for Localization in Communication Systems

    DTIC Science & Technology

    2006-03-01

    some of those late nights. To Patrick S. and Maura D., you guys made AFIT home away from home for me. Additionally to all of my classmates and...conference on Mobile com- puting and networking, 151–159. IEEE Computer Society, ACM Press, Berkeley, CA, November 1995. 6. Kelly , Ian and Alcherio Martinoli

  15. Issues in the Convergence of Control with Communication and Computation

    DTIC Science & Technology

    2004-10-04

    Library/Upload/116/Cal1.doc. [42] M. H. Shwehdi and A. Z. Khan, “A power line data communication interface using spread spectrum technology in home ... automation ,” IEEE Transactions on Power Delivery, vol. 11, pp. 1232–1237, July 1996. ISSN: 0885-8977. [43] R. G. Olsen, “Technical considerations for

  16. Motion and Structure Estimation of Manoeuvring Objects in Multiple- Camera Image Sequences

    DTIC Science & Technology

    1992-11-01

    and Speckert [23], Gennery [24], Hallman [25], Legters and Young [26], Stuller and Krishnamurthy [27], Wu et al. [381, Matthies, Kanade, and Szeliski...26] G.R. Legters , T.Y. Young, "A mathematical model for computer image track- ing," IEEE Transactions on Pattern Analysis and Machine Intelligence

  17. Multi-scale Computational Electromagnetics for Phenomenology and Saliency Characterization in Remote Sensing

    DTIC Science & Technology

    2014-06-12

    interferometry and polarimetry . In the paper, the model was used to simulate SAR data for Mangrove (tropical) and Nezer (temperate) forests for P-band and...Scattering Model Applied to Radiometry, Interferometry, and Polarimetry at P- and L-Band. IEEE Transactions on Geoscience and Remote Sensing 44(4): 849

  18. Proceedings 3rd NASA/IEEE Workshop on Formal Approaches to Agent-Based Systems (FAABS-III)

    NASA Technical Reports Server (NTRS)

    Hinchey, Michael (Editor); Rash, James (Editor); Truszkowski, Walt (Editor); Rouff, Christopher (Editor)

    2004-01-01

    These preceedings contain 18 papers and 4 poster presentation, covering topics such as: multi-agent systems, agent-based control, formalism, norms, as well as physical and biological models of agent-based systems. Some applications presented in the proceedings include systems analysis, software engineering, computer networks and robot control.

  19. Processes in KaffeOS: Isolation, Resource Management, and Sharing in Java

    DTIC Science & Technology

    2000-04-01

    separation of garbage collection costs is not possible. Balfanz and Gong [2] describe a multi- processing JVM developed to explore the secu- rity...line in Java. In Proc. of the 7th HotOS, Rio Rico, AZ, Mar. 1999. IEEE Computer Society. [2] D. Balfanz and L. Gong. Experience with secure multi

  20. Surveillance of Space - Optimal Use of Complementary Sensors for Maximum Efficiency

    DTIC Science & Technology

    2006-04-01

    as track - before - detect [4] have been shown to allow improved sensitivity. This technique employs fast running algorithms and computing power to pre...Multifunction Radar” IEEE Signal Processing Magazine, January 2006. [4] Wallace W R “The Use of Track - Before - Detect in Pulse-Doppler Radar” IEE 490, Radar

  1. Image Based Synthesis for Airborne Minefield Data

    DTIC Science & Technology

    2005-12-01

    Jia, and C-K. Tang, "Image repairing: robust image synthesis by adaptive ND tensor voting ", Proceedings of the IEEE, Computer Society Conference on...utility is capable to synthesize a single frame data as well as list of frames along a flight path. The application is developed in MATLAB -6.5 using the

  2. Image Perception Wavelet Simulation and Enhancement for the Visually Impaired.

    DTIC Science & Technology

    1994-12-01

    and Computational Harmonic Analysis, 1:54-81 (1993). 6. Cornsweet, Tom N. "The Staircase-Method in Psychophysics," The American Journal of Psychology ...of a Visual Model," Proceedings of the IEEE, 60(7):828-842 (July 1972). 33. Taylor, M. M. and C Douglas Creelman . "PEST: Efficient Estimates on

  3. Women in biomedical engineering and health informatics and its impact on gender representation for accepted publications at IEEE EMBC 2007.

    PubMed

    McGregor, Carolyn; Smith, Kathleen P; Percival, Jennifer

    2008-01-01

    The study of women within the professions of Engineering and Computer Science has consistently been found to demonstrate women as a minority within these professions. However none of that previous work has assessed publication behaviours based on gender. This paper presents research findings on gender distribution of authors of accepted papers for the IEEE Engineering and Medicine Society annual conference for 2007 (EMBC '07) held in Lyon, France. This information is used to present a position statement of the current state of gender representation for conference publication within the domain of biomedical engineering and health informatics. Issues in data preparation resulting from the lack of inclusion of gender in information gathered from accepted authors are presented and discussed.

  4. Message From the Editor for Contributions to the 2016 Real Time Conference Issue of TNS

    NASA Astrophysics Data System (ADS)

    Schmeling, Sascha Marc

    2017-06-01

    This issue of the IEEE Transactions on Nuclear Science (TNS) is devoted to the 20th IEEE-NPSS Real Time Conference (RT2016) on Computing Applications in Nuclear and Plasma Sciences held in Padua, Italy, in June 2016. A total of 90 papers presented at the conference were submitted for possible publication in TNS. This conference issue presents 46 papers, which have been accepted so far after a thorough peer review process. These contributions come from a very broad range of fields of application, including Astrophysics, Medical Imaging, Nuclear and Plasma Physics, Particle Accelerators, and Particle Physics Experiments. Several papers were close to being accepted but did not make it into this special issue. They will be considered for further publication.

  5. Japan's Widespread Use of Cellular Telephones To Access the Internet: Implications for Educational Telecommunications.

    ERIC Educational Resources Information Center

    Scott, Douglass J.

    In the 3 years since their introduction, Internet-capable cellular telephones are used by over 47 million Japanese (37% of the population) which nearly equals the number of people using personal computers to access the Internet. If this trend continues, the cellular telephone will overtake the personal computer as the most widely used Internet…

  6. Internet Passport: NorthWestNet's Guide to Our World Online. Fourth Edition.

    ERIC Educational Resources Information Center

    Kochmer, Jonathan

    The purpose of this guide is to help computer network users get over the hurdle of new technologies. Every Internet user is different, but most network activities depend on the mastery of three basic skills: using electronic mail (e-mail) to communicate with other Internet users; logging in to remote computers with a service called Telnet, and…

  7. Usability and Navigability of an HIV/AIDS Internet Intervention for Adolescents in a Resource Limited Setting

    PubMed Central

    Ybarra, Michele; Biringi, Ruth; Prescott, Tonya; Bull, Sheana S.

    2012-01-01

    Use of Internet is growing in Sub Saharan Africa. Evidence of computer and Internet effectiveness for reduction in risk behaviors associated with HIV shown in U.S. settings has yet to be replicated in Africa. We describe the development, usability and navigability testing of an Internet-based HIV prevention program for secondary school students in Uganda, called CyberSenga. For this work, we used four data collection activities, including observation of (a) computer skills and (b) navigation, (c) focus group discussions, and (d) field assessments to document comprehension and usability of program content. We document limited skills among students, but youth with basic computers skills were able to navigate the program after instruction. Youth were most interested in activities with more interaction. Field-testing illustrated the importance of using a stand-alone electrical source during program delivery. This work suggests delivery of Internet-based health promotion content in Africa requires attention to user preparedness and literacy, bandwidth, Internet connection, and electricity. PMID:22918136

  8. [Usage patterns of internet and computer games : Results of an observational study of Tyrolean adolescents].

    PubMed

    Riedl, David; Stöckl, Andrea; Nussbaumer, Charlotte; Rumpold, Gerhard; Sevecke, Kathrin; Fuchs, Martin

    2016-12-01

    The use of digital media such as the Internet and Computer games has greatly increased. In the western world, almost all young people regularly use these relevant technologies. Against this background, forms of use with possible negative consequences for young people have been recognized and scientifically examined. The aim of our study was therefore to investigate the prevalence of pathological use of these technologies in a sample of young Tyrolean people. 398 students (average age 15.2 years, SD ± 2.3 years, 34.2% female) were interviewed by means of the structured questionnaires CIUS (Internet), CSV-S (Computer games) and SWE (Self efficacy). Additionally, socio demographic data were collected. In line with previous studies, 7.7% of the adolescents of our sample showed criteria for problematic internet use, 3.3% for pathological internet use. 5.4% of the sample reported pathological computer game usage. The most important aspect to influence our results was the gender of the subjects. Intensive users in the field of Internet and Computer games were more often young men, young women, however, showed significantly less signs of pathological computer game use. A significant percentage of Tyrolean adolescents showed difficulties in the development of competent media use, indicating the growing significance of prevention measures such as media education. In a follow-up project, a sample of adolescents with mental disorders will be examined concerning their media use and be compared with our school-sample.

  9. The use of the Internet within a dental school.

    PubMed

    Walmsley, A D; White, D A; Eynon, R; Somerfield, L

    2003-02-01

    The Internet is an increasingly popular medium for delivering educational material. The aim of this study was to determine the attitudes of students and their clinical teachers to the use of the Internet within a dental school in the UK. Questionnaires were distributed to undergraduate dental students in the three clinical years and to all their clinical academic teachers. All students and staff have access to computers and Internet at the university. The majority (72%) of students have access to a computer and 53% also have access to the Internet at home. Of the academic staff, 91% have a computer and 68% have access to the Internet at home. The reasons for use of the Internet differed between staff and students. Whilst equal proportions of students used the Internet for dentistry (38%) and for pleasure (35%), a higher proportion of staff used the Internet more for dentistry (36%) than for pleasure (14%). Students highlighted cost and time as barriers to Internet use, whereas staff lacked confidence in their ability to use the Internet. Less than half (44%) of the students are confident in the accuracy of information from the Internet compared to almost two-thirds (64%) of staff. This study revealed differences in the attitudes of staff and students to the use of Internet as a resource for dentistry. Students are positive to the suggestion that lectures should be presented on the web. Most students (74%) did not see that this would influence attendance at lectures whilst 91% of staff stated that it would decrease lecture attendance. In conclusion, this study revealed differences in the attitudes of staff and students to the use of Internet as a resource for dentistry.

  10. Computer Teacher Candidates' Metaphors about the Internet

    ERIC Educational Resources Information Center

    Saban, Aslihan

    2010-01-01

    The purpose of this study was to examine the metaphors of exit-level Turkish computer teacher candidates about the concept of "internet". Participants included 45 seniors (23 boys and 22 girls) majoring in the Department of Computer and Instructional Technologies at Selcuk University, Ahmet Kelesoglu Faculty of Education. They were asked…

  11. [Internet- and computer game addiction: phenomenology, comorbidity, etiology, diagnostics and therapeutic implications for the addictives and their relatives].

    PubMed

    Peukert, Peter; Sieslack, Sonja; Barth, Gottfried; Batra, Anil

    2010-07-01

    Excessive and addictive internet use and computer game playing is reported as an increasing problem in outpatient care. The aim of this paper is to give an overview about the current scientific discussion of the overuse and addiction of internet and computer game playing. Pubmed was used for a systematic literature research considering original papers and review articles dealing with Internet/computer game addiction. Recent epidemiological data from Germany suggest that 1.5-3.5 % of adolescent computer and internet users show signs of an overuse or addictive use of computer and video games. Moreover there is evidence that the disorder is associated with higher rates of depression, anxiety, as well as lower achievements e. g. at school. Although the nosological assignment still remains unclear there is some evidence from neurobiological data that the disorder can be conceptualized as behavioral addiction. As treatment strategy CBT-techniques have been proposed, but there is still a lack of controlled clinical trials concerning their efficacy. Since the addicted persons often show little motivation for a behavioural change we consider it a promising approach to treat and train their relatives with the aim of increasing the motivation for a behavioural change of the addicted person.

  12. The internet of things and the development of network technology in China

    NASA Astrophysics Data System (ADS)

    Wang, Ruxin; Zhao, Jianzhen; Ma, Hangtong

    2018-04-01

    The English name of the Internet of Things the Internet of Things, referred to as: the IOT. Internet of Things through the pass, radio frequency identification technology, global positioning system technology, real-time acquisition of any monitoring, connectivity, interactive objects or processes, collecting their sound, light, heat, electricity, mechanics, chemistry, biology, the location of a variety of the information you need network access through a variety of possible things and things, objects and people in the Pan-link intelligent perception of items and processes, identification and management. The Internet of Things IntelliSense recognition technology and pervasive computing, ubiquitous network integration application, known as the third wave of the world's information industry development following the computer, the Internet. Not so much the Internet of Things is a network, as Internet of Things services and applications, Internet of Things is also seen as Internet application development. Therefore, the application of innovation is the core of the development of Internet of Things, and 2.0 of the user experience as the core innovation is the soul of Things.

  13. Technology Use Among Patients in a Nonurban Southern U.S. HIV Clinic in 2015

    PubMed Central

    Waldman, Ava Lena; Ritterband, Lee; Dillingham, Rebecca; Bullock, Linda; Ingersoll, Karen S.

    2016-01-01

    Abstract Background: Behavioral interventions can be delivered over the Internet, but nonurban subpopulations living with HIV may still have inadequate Internet access to make this feasible. Methods: We report on a survey conducted in 2015 among 150 patients receiving care at a university-based Infectious Disease Clinic serving a nonurban and rural population in central Virginia. Our aim was to determine the rate of computer, tablet, and smartphone usage, as well as Internet access, to inform the delivery of a novel intervention using Internet and mobile technology. Results: The participants' mean age was 46; 111 patients used computers, 101 used smartphones, and 41 used tablets. The results showed that 87% of patients had Internet access. Of those, 49 reported daily Internet use, while 18% reported weekly Internet use, and 33% reported less frequent Internet use. Conclusions: The survey study data suggest that Internet access among nonurban and rural patients with HIV is adequate to support trials testing Internet-delivered interventions. It is time to develop and deliver Internet interventions tailored for this often isolated subpopulation. PMID:27123688

  14. A Review of the Suitability of Available Computer Aided Software Engineering (CASE) Tools for the Small Software Development Environment

    DTIC Science & Technology

    1989-07-11

    LITERATURE CITED [Boeh73] Boehm, Barry W., "Software and its Impact: A Quantitative Assessment," Datamation, 19, 5, (May 1973), pp 48-59. [Boeh76...Boehm, Barry W., "Software Engineering," IEEE Transactions on Computers, C-25, 12, (December 1976), pp 1226-1241. [Boeh81a] Boehm, Barry W., Software...Engineering Economics, Prentice-Hall, Inc., Englewood Cliffs, NJ, (1981). [Boeh8lb] Boehm, Barry W., "An Experiment in Small Scale Application Software

  15. Memristive Computational Architecture of an Echo State Network for Real-Time Speech Emotion Recognition

    DTIC Science & Technology

    2015-05-28

    recognition is simpler and requires less computational resources compared to other inputs such as facial expressions . The Berlin database of Emotional ...Processing Magazine, IEEE, vol. 18, no. 1, pp. 32– 80, 2001. [15] K. R. Scherer, T. Johnstone, and G. Klasmeyer, “Vocal expression of emotion ...Network for Real-Time Speech- Emotion Recognition 5a. CONTRACT NUMBER IN-HOUSE 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 62788F 6. AUTHOR(S) Q

  16. Distributed GPU Computing in GIScience

    NASA Astrophysics Data System (ADS)

    Jiang, Y.; Yang, C.; Huang, Q.; Li, J.; Sun, M.

    2013-12-01

    Geoscientists strived to discover potential principles and patterns hidden inside ever-growing Big Data for scientific discoveries. To better achieve this objective, more capable computing resources are required to process, analyze and visualize Big Data (Ferreira et al., 2003; Li et al., 2013). Current CPU-based computing techniques cannot promptly meet the computing challenges caused by increasing amount of datasets from different domains, such as social media, earth observation, environmental sensing (Li et al., 2013). Meanwhile CPU-based computing resources structured as cluster or supercomputer is costly. In the past several years with GPU-based technology matured in both the capability and performance, GPU-based computing has emerged as a new computing paradigm. Compare to traditional computing microprocessor, the modern GPU, as a compelling alternative microprocessor, has outstanding high parallel processing capability with cost-effectiveness and efficiency(Owens et al., 2008), although it is initially designed for graphical rendering in visualization pipe. This presentation reports a distributed GPU computing framework for integrating GPU-based computing within distributed environment. Within this framework, 1) for each single computer, computing resources of both GPU-based and CPU-based can be fully utilized to improve the performance of visualizing and processing Big Data; 2) within a network environment, a variety of computers can be used to build up a virtual super computer to support CPU-based and GPU-based computing in distributed computing environment; 3) GPUs, as a specific graphic targeted device, are used to greatly improve the rendering efficiency in distributed geo-visualization, especially for 3D/4D visualization. Key words: Geovisualization, GIScience, Spatiotemporal Studies Reference : 1. Ferreira de Oliveira, M. C., & Levkowitz, H. (2003). From visual data exploration to visual data mining: A survey. Visualization and Computer Graphics, IEEE Transactions on, 9(3), 378-394. 2. Li, J., Jiang, Y., Yang, C., Huang, Q., & Rice, M. (2013). Visualizing 3D/4D Environmental Data Using Many-core Graphics Processing Units (GPUs) and Multi-core Central Processing Units (CPUs). Computers & Geosciences, 59(9), 78-89. 3. Owens, J. D., Houston, M., Luebke, D., Green, S., Stone, J. E., & Phillips, J. C. (2008). GPU computing. Proceedings of the IEEE, 96(5), 879-899.

  17. Altered reward processing in pathological computer gamers – ERP-results from a semi-natural Gaming-Design

    PubMed Central

    Duven, Eva C P; Müller, Kai W; Beutel, Manfred E; Wölfling, Klaus

    2015-01-01

    Introduction Internet Gaming Disorder has been added as a research diagnosis in section III for the DSM-V. Previous findings from neuroscientific research indicate an enhanced motivational attention toward cues related to computer games, similar to findings in substance-related addictions. On the other hand in clinical observational studies tolerance effects are reported by patients with Internet Gaming disorder. In the present study we investigated whether an enhanced motivational attention or tolerance effects are present in patients with Internet Gaming Disorder. Methods A clinical sample from the Outpatient Clinic for Behavioral Addictions in Mainz, Germany was recruited, fulfilling the diagnostic criteria for Internet Gaming Disorder. In a semi-natural EEG design participants played a computer game during the recording of event-related potentials to assess reward processing. Results The results indicated an attenuated P300 for patients with Internet Gaming Disorder in response to rewards in comparison to healthy controls, while the latency of N100 was prolonged and the amplitude of N100 was increased. Conclusions Our findings support the hypothesis that tolerance effects are present in patients with Internet Gaming Disorder, when actively playing computer games. In addition, the initial orienting toward the gaming reward is suggested to consume more capacity for patients with Internet Gaming Disorder, which has been similarly reported by other studies with other methodological background in disorders of substance-related addictions. PMID:25722946

  18. Altered reward processing in pathological computer gamers--ERP-results from a semi-natural gaming-design.

    PubMed

    Duven, Eva C P; Müller, Kai W; Beutel, Manfred E; Wölfling, Klaus

    2015-01-01

    Internet Gaming Disorder has been added as a research diagnosis in section III for the DSM-V. Previous findings from neuroscientific research indicate an enhanced motivational attention toward cues related to computer games, similar to findings in substance-related addictions. On the other hand in clinical observational studies tolerance effects are reported by patients with Internet Gaming disorder. In the present study we investigated whether an enhanced motivational attention or tolerance effects are present in patients with Internet Gaming Disorder. A clinical sample from the Outpatient Clinic for Behavioral Addictions in Mainz, Germany was recruited, fulfilling the diagnostic criteria for Internet Gaming Disorder. In a semi-natural EEG design participants played a computer game during the recording of event-related potentials to assess reward processing. The results indicated an attenuated P300 for patients with Internet Gaming Disorder in response to rewards in comparison to healthy controls, while the latency of N100 was prolonged and the amplitude of N100 was increased. Our findings support the hypothesis that tolerance effects are present in patients with Internet Gaming Disorder, when actively playing computer games. In addition, the initial orienting toward the gaming reward is suggested to consume more capacity for patients with Internet Gaming Disorder, which has been similarly reported by other studies with other methodological background in disorders of substance-related addictions.

  19. The Internet Playground: Children's Access, Entertainment, and Mis-Education. Second Printing. Popular Culture and Everyday Life Volume 10

    ERIC Educational Resources Information Center

    Seiter, Ellen

    2007-01-01

    Based on four years of experience teaching computers to 8-12 year olds, media scholar Ellen Seiter offers parents and educators practical advice on what children need to know about the Internet and when they need to know it. "The Internet Playground" argues that, contrary to the promises of technology boosters, teaching with computers is…

  20. Resiliency in Future Cyber Combat

    DTIC Science & Technology

    2016-04-04

    including the Internet , telecommunications networks, computer systems, and embed- ded processors and controllers.”6 One important point emerging from the...definition is that while the Internet is part of cyberspace, it is not all of cyberspace. Any computer processor capable of communicating with a...central proces- sor on a modern car are all part of cyberspace, although only some of them are routinely connected to the Internet . Most modern

  1. Survey results of Internet and computer usage in veterans with epilepsy.

    PubMed

    Pramuka, Michael; Hendrickson, Rick; Van Cott, Anne C

    2010-03-01

    After our study of a self-management intervention for epilepsy, we gathered data on Internet use and computer availability to assess the feasibility of computer-based interventions in a veteran population. Veterans were asked to complete an anonymous questionnaire that gathered information regarding seizures/epilepsy in addition to demographic data, Internet use, computer availability, and interest in distance education regarding epilepsy. Three hundred twenty-four VA neurology clinic patients completed the survey. One hundred twenty-six self-reported a medical diagnosis of epilepsy and constituted the epilepsy/seizure group. For this group of veterans, the need for remote/distance-based interventions was validated given the majority of veterans traveled long distances (>2 hours). Only 51% of the epilepsy/seizure group had access to the Internet, and less than half (42%) expressed an interest in getting information on epilepsy self-management on their computer, suggesting that Web-based interventions may not be an optimal method for a self-management intervention in this population. Published by Elsevier Inc.

  2. The Use of Computer-Mediated Communication To Enhance Subsequent Face-to-Face Discussions.

    ERIC Educational Resources Information Center

    Dietz-Uhler, Beth; Bishop-Clark, Cathy

    2001-01-01

    Describes a study of undergraduate students that assessed the effects of synchronous (Internet chat) and asynchronous (Internet discussion board) computer-mediated communication on subsequent face-to-face discussions. Results showed that face-to-face discussions preceded by computer-mediated communication were perceived to be more enjoyable.…

  3. Self-reported use of internet by cervical cancer clients in two National Referral Hospitals in Kenya.

    PubMed

    Kivuti-Bitok, Lucy W; McDonnell, Geoff; Pokhariyal, Ganesh P; Roudsari, Abdul V

    2012-10-09

    Cervical cancer remains a devastating disease in Kenya accounting for more than 2000 deaths each year. Lack of information on cervical cancer prevention and management has been attributed to the apathy among women in seeking health interventions. Use of internet-based and mobile e-health tools could increase information access among cervical cancer patients. The objective of the study was; to establish the extent of use of mobile phones and internet by cervical cancer patients in accessing information related to cancer treatment and management.; find out the characteristics of patients associated with internet use and identify barriers faced by the patients in internet use. A cross sectional descriptive survey of 199 cervical patients visiting the two main referral hospitals in Kenya was done. A structured questionnaire was used to collect data. The average length of illness was 2.43 years (SD ± 3.0). Only 7.5 %( n=15) reported to having used the internet as a source of information. 92.5 %( n=184) did not use internet. With Multiple options, 70.9% did not know how to use a computer, 29.2% did not have access to a computer, 14.6% lacked the money to use computers at the local cyber cafe while other barriers identified accounted for 11.1%. Patients reported that the internet had an important role in the management of cancer of the cervix in health education (17.6%), online consultation (14.6%), booking of patients (13.6%), referrals (8.5%) and collecting data (7%). The 96.5% of the respondents who had access to a mobile phone, recommended mobile phones for health education messages (31.7%), reminder alerts for medication (29.7%) and booking appointments (21.6%). There was a statistically significant association between income of the patients and internet use (p = 0.026) in this study. There is low level use of the internet by cervical cancer clients attended in Public referral facilities in Kenya. This was attributed to; lack of knowledge on how to use computers and lack of access to a computer. High level of access to mobile phones was reported. This is an indicator of great potential for use of mobile phones in the management of cervical cancer through short messaging services (sms), without internet connectivity. There is even greater potential to internet use through web access via mobile phones.

  4. The monitoring and managing application of cloud computing based on Internet of Things.

    PubMed

    Luo, Shiliang; Ren, Bin

    2016-07-01

    Cloud computing and the Internet of Things are the two hot points in the Internet application field. The application of the two new technologies is in hot discussion and research, but quite less on the field of medical monitoring and managing application. Thus, in this paper, we study and analyze the application of cloud computing and the Internet of Things on the medical field. And we manage to make a combination of the two techniques in the medical monitoring and managing field. The model architecture for remote monitoring cloud platform of healthcare information (RMCPHI) was established firstly. Then the RMCPHI architecture was analyzed. Finally an efficient PSOSAA algorithm was proposed for the medical monitoring and managing application of cloud computing. Simulation results showed that our proposed scheme can improve the efficiency about 50%. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  5. 46 CFR 111.60-3 - Cable application.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... IEEE 1580 must meet the provisions for cable application of section 24 of IEEE 45-2002 (both... incorporated by reference; see 46 CFR 110.10-1) must meet section 24 of IEEE 45-2002, except 24.6.1, 24.6.7... constructed according to IEEE 1580 must be applied in accordance with Table 25, Note 6, of IEEE 45-2002. (2...

  6. Defining the IEEE-854 floating-point standard in PVS

    NASA Technical Reports Server (NTRS)

    Miner, Paul S.

    1995-01-01

    A significant portion of the ANSI/IEEE-854 Standard for Radix-Independent Floating-Point Arithmetic is defined in PVS (Prototype Verification System). Since IEEE-854 is a generalization of the ANSI/IEEE-754 Standard for Binary Floating-Point Arithmetic, the definition of IEEE-854 in PVS also formally defines much of IEEE-754. This collection of PVS theories provides a basis for machine checked verification of floating-point systems. This formal definition illustrates that formal specification techniques are sufficiently advanced that is is reasonable to consider their use in the development of future standards.

  7. World Wide Web and Internet: applications for radiologists.

    PubMed

    Wunderbaldinger, P; Schima, W; Turetschek, K; Helbich, T H; Bankier, A A; Herold, C J

    1999-01-01

    Global exchange of information is one of the major sources of scientific progress in medicine. For management of the rapidly growing body of medical information, computers and their applications have become an indispensable scientific tool. Approximately 36 million computer users are part of a worldwide network called the Internet or "information highway" and have created a new infrastructure to promote rapid and efficient access to medical, and thus also to radiological, information. With the establishment of the World Wide Web (WWW) by a consortium of computer users who used a standardized, nonproprietary syntax termed HyperText Markup Language (HTML) for composing documents, it has become possible to provide interactive multimedia presentations to a wide audience. The extensive use of images in radiology makes education, worldwide consultation (review) and scientific presentation via the Internet a major beneficiary of this technical development. This is possible, since both information (text) as well as medical images can be transported via the Internet. Presently, the Internet offers an extensive database for radiologists. Since many radiologists and physicians have to be considered "Internet novices" and, hence, cannot yet avail themselves of the broad spectrum of the Internet, the aim of this article is to present a general introduction to the WWW/Internet and its applications for radiologists. All Internet sites mentioned in this article can be found at the following Internet address: http://www.univie.ac. at/radio/radio.html (Department of Radiology, University of Vienna)

  8. Graphical Internet Access on a Budget: Making a Pseudo-SLIP Connection.

    ERIC Educational Resources Information Center

    McCulley, P. Michael

    1995-01-01

    Examines The Internet Adapter (TIA), an Internet protocol that allows computers to be directly on the Internet and access graphics over standard telephone lines using high-speed modems. Compares TIA's system requirements, performance, and costs to other Internet connections. Sidebars describe connections other than TIA and how to find information…

  9. Some New Internet Applications Coming Now to a Computer Near You

    ERIC Educational Resources Information Center

    Clyde, Laurel A.

    2005-01-01

    New Internet tools and applications are emerging all the time. Some are truly new; others are Internet versions of older technologies, or new versions of older Internet technologies. This article discusses some new Internet applications that appear to have implications for education and particularly for school libraries. These Internet…

  10. DoS detection in IEEE 802.11 with the presence of hidden nodes

    PubMed Central

    Soryal, Joseph; Liu, Xijie; Saadawi, Tarek

    2013-01-01

    The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF) protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel’s bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS) and the results are presented to validate the algorithm. PMID:25685510

  11. DoS detection in IEEE 802.11 with the presence of hidden nodes.

    PubMed

    Soryal, Joseph; Liu, Xijie; Saadawi, Tarek

    2014-07-01

    The paper presents a novel technique to detect Denial of Service (DoS) attacks applied by misbehaving nodes in wireless networks with the presence of hidden nodes employing the widely used IEEE 802.11 Distributed Coordination Function (DCF) protocols described in the IEEE standard [1]. Attacker nodes alter the IEEE 802.11 DCF firmware to illicitly capture the channel via elevating the probability of the average number of packets transmitted successfully using up the bandwidth share of the innocent nodes that follow the protocol standards. We obtained the theoretical network throughput by solving two-dimensional Markov Chain model as described by Bianchi [2], and Liu and Saadawi [3] to determine the channel capacity. We validated the results obtained via the theoretical computations with the results obtained by OPNET simulator [4] to define the baseline for the average attainable throughput in the channel under standard conditions where all nodes follow the standards. The main goal of the DoS attacker is to prevent the innocent nodes from accessing the channel and by capturing the channel's bandwidth. In addition, the attacker strives to appear as an innocent node that follows the standards. The protocol resides in every node to enable each node to police other nodes in its immediate wireless coverage area. All innocent nodes are able to detect and identify the DoS attacker in its wireless coverage area. We applied the protocol to two Physical Layer technologies: Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping Spread Spectrum (FHSS) and the results are presented to validate the algorithm.

  12. Methods for Identifying Object Class, Type, and Orientation in the Presence of Uncertainty

    DTIC Science & Technology

    1990-08-01

    on Range Finding Techniques for Computer Vision," IEEE Trans. on Pattern Analysis and Machine Intellegence PAMI-5 (2), pp 129-139 March 1983. 15. Yang... Artificial Intelligence Applications, pp 199-205, December 1984. 16. Flynn, P.J. and Jain, A.K.," On Reliable Curvature Estimation, " Proceedings of the

  13. Fast Electromagnetic Solvers for Large-Scale Naval Scattering Problems

    DTIC Science & Technology

    2008-09-27

    IEEE Trans. Antennas Propag., vol. 52, no. 8, pp. 2141–2146, 2004. [12] R. J. Burkholder and J. F. Lee, “Fast dual-MGS block-factorization algorithm...Golub and C. F. V. Loan, Matrix Computations. Baltimore: The Johns Hopkins University Press, 1996. [20] W. D. Li, W. Hong, and H. X. Zhou, “Integral

  14. Profile and Instrumentation Driven Methods for Embedded Signal Processing

    DTIC Science & Technology

    2015-01-01

    applications,” Computers, IEEE Transactions on, vol. 37, no. 9, pp. 1088–1098, Sep 1988. [7] Massimo Ravasi and Marco Mattavelli, “High-level algorithmic...profiling,” in Digital Media and its Application in Museum Heritages, Second Workshop on, Dec 2007, pp. 353–358. [15] H. Hubert , B. Stabernack, and K.-I. Wels

  15. Cybertechnology Ethics of University Students in Lebanon: Assessing University Students' Activities and Perceptions of Cybertechnology Ethics in Lebanon

    ERIC Educational Resources Information Center

    Jabbour, Khayrazad Kari

    2011-01-01

    Use of internet technologies is widespread in Lebanon. Technology has a revolutionary impact on our lives, behavior, and in particular a strong impact on our students. Part of our students every day routine is to use the computer and the Internet to play, learn, and communicate. Although most students use the computer and the Internet on a daily…

  16. Can the Internet be used to Reach Parents for Family-Based Childhood Obesity Interventions?

    PubMed Central

    Hohman, Katherine H.; Price, Sarah N.; Sonneville, Kendrin; Rifas-Shiman, Sheryl L.; Gortmaker, Steven L.; Gillman, Matthew W.; Taveras, Elsie M.

    2013-01-01

    Objective Identify socioeconomic correlates of computer/Internet use among parents of overweight preschool-aged children. Methods Studied 470 baseline participants in a trial to prevent obesity in children 2–6.9 years with BMI ≥ 95th percentile or 85th–95th percentile with one overweight parent. Interviews with parents used Health Information National Trends Survey (HINTS) questions. Results/Conclusions Ninety-four percent had home computers and 93% reported Internet usage. In adjusted models, parents with ≤ college degree (OR 4.8 [95% CI 1.2, 18.3]) or with household income ≤ $50,000 (OR 7.6 [95% CI 2.2, 26.8]) had decreased likelihood of computer ownership. Of parents who reported going on-line, 63% used Internet to look for health/medical information for themselves and 42% for their children. Parents with ≤ a college degree or with BMI <25 kg/m2 were less likely to use Internet. Results support using the Internet for early childhood obesity prevention with enhanced outreach efforts for low socioeconomic families. PMID:21997144

  17. Who's Surfing? Internet Access and Computer Use by Visually Impaired Youths and Adults.

    ERIC Educational Resources Information Center

    Gerber, Elaine; Kirchner, Corinne

    2001-01-01

    The Census Bureau's 1999 Survey of Income and Program Participation found that Internet access and computer use by people with visual impairments is substantially (30 percent) less than that for people with no disabilities. Age, employment, and the presence of additional impairments also affected computer use. Results suggest over a million…

  18. Wireless Internet Gateways (WINGS)

    DTIC Science & Technology

    1997-01-01

    WIRELESS INTERNET GATEWAYS (WINGS) J.J. Garcia-Luna-Aceves, Chane L. Fullmer, Ewerton Madruga Computer Engineering Department University of...rooftop.com Abstract— Today’s internetwork technology has been extremely success- ful in linking huge numbers of computers and users. However, to date...this technology has been oriented to computer interconnection in relatively stable operational environments, and thus cannot adequately support many of

  19. Unsystematic Technology Adoption in Cambodia: Students' Perceptions of Computer and Internet Use

    ERIC Educational Resources Information Center

    Richardson, Jayson W.; Nash, John B.; Flora, Kevin L.

    2014-01-01

    This study was designed to understand how upper secondary school students in Cambodia perceive the use of computers and the Internet. Data were collected from students in three urban upper secondary schools (n = 1,137) in Cambodia using questionnaires. The data indicate that the more exposure a Cambodian student had to computers and the Internet…

  20. The Role of Computer-Assisted Language Learning (CALL) in Promoting Learner Autonomy

    ERIC Educational Resources Information Center

    Mutlu, Arzu; Eroz-Tuga, Betil

    2013-01-01

    Problem Statement: Teaching a language with the help of computers and the Internet has attracted the attention of many practitioners and researchers in the last 20 years, so the number of studies that investigate whether computers and the Internet promote language learning continues to increase. These studies have focused on exploring the beliefs…

  1. Gender Differences in Availability, Internet Access and Rate of Usage of Computers among Distance Education Learners.

    ERIC Educational Resources Information Center

    Atan, Hanafi; Sulaiman, Fauziah; Rahman, Zuraidah Abd; Idrus, Rozhan Mohammed

    2002-01-01

    Explores the level of availability of computers, Internet accessibility, and the rate of usage of computers both at home and at the workplace between distance education learners according to gender. Results of questionnaires completed at the Universiti Sains Malaysia indicate that distance education reduces the gender gap. (Author/LRW)

  2. Prevalence and correlates of problematic internet experiences and computer-using time: a two-year longitudinal study in korean school children.

    PubMed

    Yang, Su-Jin; Stewart, Robert; Lee, Ju-Yeon; Kim, Jae-Min; Kim, Sung-Wan; Shin, Il-Seon; Yoon, Jin-Sang

    2014-01-01

    To measure the prevalence of and factors associated with online inappropriate sexual exposure, cyber-bullying victimisation, and computer-using time in early adolescence. A two-year, prospective school survey was performed with 1,173 children aged 13 at baseline. Data collected included demographic factors, bullying experience, depression, anxiety, coping strategies, self-esteem, psychopathology, attention-deficit hyperactivity disorder symptoms, and school performance. These factors were investigated in relation to problematic Internet experiences and computer-using time at age 15. The prevalence of online inappropriate sexual exposure, cyber-bullying victimisation, academic-purpose computer overuse, and game-purpose computer overuse was 31.6%, 19.2%, 8.5%, and 21.8%, respectively, at age 15. Having older siblings, more weekly pocket money, depressive symptoms, anxiety symptoms, and passive coping strategy were associated with reported online sexual harassment. Male gender, depressive symptoms, and anxiety symptoms were associated with reported cyber-bullying victimisation. Female gender was associated with academic-purpose computer overuse, while male gender, lower academic level, increased height, and having older siblings were associated with game-purpose computer-overuse. Different environmental and psychological factors predicted different aspects of problematic Internet experiences and computer-using time. This knowledge is important for framing public health interventions to educate adolescents about, and prevent, internet-derived problems.

  3. Computers and the internet: tools for youth empowerment.

    PubMed

    Valaitis, Ruta K

    2005-10-04

    Youth are often disenfranchised in their communities and may feel they have little voice. Since computers are an important aspect of youth culture, they may offer solutions to increasing youth participation in communities. This qualitative case study investigated the perceptions of 19 (predominantly female) inner-city school youth about their use of computers and the Internet in a school-based community development project. Youth working with public health nurses in a school-based community development project communicated with local community members using computer-mediated communication, surveyed peers online, built websites, searched for information online, and prepared project materials using computers and the Internet. Participant observation, semistructured interviews, analysis of online messages, and online- and paper-based surveys were used to gather data about youth's and adults' perceptions and use of the technologies. Constant comparison method and between-method triangulation were used in the analysis to satisfy the existence of themes. Not all youth were interested in working with computers. Some electronic messages from adults were perceived to be critical, and writing to adults was intimidating for some youth. In addition, technical problems were experienced. Despite these barriers, most youth perceived that using computers and the Internet reduced their anxiety concerning communication with adults, increased their control when dealing with adults, raised their perception of their social status, increased participation within the community, supported reflective thought, increased efficiency, and improved their access to resources. Overall, youth perceived computers and the Internet to be empowering tools, and they should be encouraged to use such technology to support them in community initiatives.

  4. Computers and the Internet: Tools for Youth Empowerment

    PubMed Central

    2005-01-01

    Background Youth are often disenfranchised in their communities and may feel they have little voice. Since computers are an important aspect of youth culture, they may offer solutions to increasing youth participation in communities. Objective This qualitative case study investigated the perceptions of 19 (predominantly female) inner-city school youth about their use of computers and the Internet in a school-based community development project. Methods Youth working with public health nurses in a school-based community development project communicated with local community members using computer-mediated communication, surveyed peers online, built websites, searched for information online, and prepared project materials using computers and the Internet. Participant observation, semistructured interviews, analysis of online messages, and online- and paper-based surveys were used to gather data about youth’s and adults’ perceptions and use of the technologies. Constant comparison method and between-method triangulation were used in the analysis to satisfy the existence of themes. Results Not all youth were interested in working with computers. Some electronic messages from adults were perceived to be critical, and writing to adults was intimidating for some youth. In addition, technical problems were experienced. Despite these barriers, most youth perceived that using computers and the Internet reduced their anxiety concerning communication with adults, increased their control when dealing with adults, raised their perception of their social status, increased participation within the community, supported reflective thought, increased efficiency, and improved their access to resources. Conclusions Overall, youth perceived computers and the Internet to be empowering tools, and they should be encouraged to use such technology to support them in community initiatives. PMID:16403715

  5. Computer Network Resources for Physical Geography Instruction.

    ERIC Educational Resources Information Center

    Bishop, Michael P.; And Others

    1993-01-01

    Asserts that the use of computer networks provides an important and effective resource for geography instruction. Describes the use of the Internet network in physical geography instruction. Provides an example of the use of Internet resources in a climatology/meteorology course. (CFR)

  6. Including Internet insurance as part of a hospital computer network security plan.

    PubMed

    Riccardi, Ken

    2002-01-01

    Cyber attacks on a hospital's computer network is a new crime to be reckoned with. Should your hospital consider internet insurance? The author explains this new phenomenon and presents a risk assessment for determining network vulnerabilities.

  7. Use of the computer and Internet among Italian families: first national study.

    PubMed

    Bricolo, Francesco; Gentile, Douglas A; Smelser, Rachel L; Serpelloni, Giovanni

    2007-12-01

    Although home Internet access has continued to increase, little is known about actual usage patterns in homes. This nationally representative study of over 4,700 Italian households with children measured computer and Internet use of each family member across 3 months. Data on actual computer and Internet usage were collected by Nielsen//NetRatings service and provide national baseline information on several variables for several age groups separately, including children, adolescents, and adult men and women. National averages are shown for the average amount of time spent using computers and on the Web, the percentage of each age group online, and the types of Web sites viewed. Overall, about one-third of children ages 2 to 11, three-fourths of adolescents and adult women, and over four-fifths of adult men access the Internet each month. Children spend an average of 22 hours/month on the computer, with a jump to 87 hours/month for adolescents. Adult women spend less time (about 60 hours/month), and adult men spend more (over 100). The types of Web sites visited are reported, including the top five for each age group. In general, search engines and Web portals are the top sites visited, regardless of age group. These data provide a baseline for comparisons across time and cultures.

  8. Use of information and communication technology among dental students at the University of Jordan.

    PubMed

    Rajab, Lamis D; Baqain, Zaid H

    2005-03-01

    The aim of this study was to investigate the current knowledge, skills, and opinions of undergraduate dental students at the University of Jordan with respect to information communication technology (ICT). Dental students from the second, third, fourth, and fifth years were asked to complete a questionnaire presented in a lecture at the end of the second semester in the 2002-03 academic year. The response rate was 81 percent. Besides free and unlimited access to computers at the school of dentistry, 74 percent of the students had access to computers at home. However, 44 percent did not use a computer regularly. Male students were more regular and longer users of computers than females (p<0.001). A significant number of students (70 percent) judged themselves competent in information technology (IT) skills. More males felt competent in basic IT skills than did females (p<0.05). More than two-thirds acquired their computer skills through sources other than at the university. The main educational use of computers was accessing the Internet, word processing, multimedia, presentations, Medline search, and data management. More clinical students felt competent in word-processing skills (p<0.05) and many more used word processing for their studies (p<0.001) than did preclinical students. More males used word processing for their studies than females (p<0.001). Students used computers for personal activities more frequently than for academic reasons. More males used computers for both academic (p<0.01) and personal activities (p<0.001) than did females. All students had access to the Internet at the university, and 54 percent had access at home. A high percentage of students (94 percent) indicated they were comfortable using the Internet, 75 percent said they were confident in the accuracy, and 80 percent said they were confident in the relevance of information obtained from the Internet. Most students (90 percent) used email. Most students (83 percent) supported the idea of placing lectures on the web, and 61.2 percent indicated that this would not influence lecture attendance. Students used the Internet more for personal reasons than for the study of dentistry. More clinical students used the Internet for dentistry than preclinical students (p<0.001). More males than females used the Internet for dentistry (p<0.01) as well as for pleasure (p<0.01). Time and availability were the main obstacles to Internet use. Dental students at the University of Jordan have access to substantial IT resources and demonstrated attitudes toward the computer and Internet technology and use that were similar to other students in other nations. However, the educational use of ICT among Jordanian students remains low.

  9. Examining Secondary School Students' Safe Computer and Internet Usage Awareness: An Example from Bartin Province=Lise Ögrencilerinin Güvenli Bilgisayar ve Internet Kullanim Farkindaliklarinin Incelenmesi: Bartin Ili Örnegi

    ERIC Educational Resources Information Center

    Yilmaz, Ramazan; Karaoglan Yilmaz, F. Gizem; Özturk, H. Tugba; Karademir, Tugra

    2017-01-01

    Information and Communication Technologies (ICT) have been rapidly prevailed among the children and youths. Personal technologies facilitating the students to gain some learning experiences both in and out of the schools also include many threats. It is important for students to have high awareness of safe internet and computer use to overcome…

  10. State of the Art of Network Security Perspectives in Cloud Computing

    NASA Astrophysics Data System (ADS)

    Oh, Tae Hwan; Lim, Shinyoung; Choi, Young B.; Park, Kwang-Roh; Lee, Heejo; Choi, Hyunsang

    Cloud computing is now regarded as one of social phenomenon that satisfy customers' needs. It is possible that the customers' needs and the primary principle of economy - gain maximum benefits from minimum investment - reflects realization of cloud computing. We are living in the connected society with flood of information and without connected computers to the Internet, our activities and work of daily living will be impossible. Cloud computing is able to provide customers with custom-tailored features of application software and user's environment based on the customer's needs by adopting on-demand outsourcing of computing resources through the Internet. It also provides cloud computing users with high-end computing power and expensive application software package, and accordingly the users will access their data and the application software where they are located at the remote system. As the cloud computing system is connected to the Internet, network security issues of cloud computing are considered as mandatory prior to real world service. In this paper, survey and issues on the network security in cloud computing are discussed from the perspective of real world service environments.

  11. Ambiguity Function Analysis for UMTS-Based Passive Multistatic Radar

    DTIC Science & Technology

    2014-04-16

    Sandeep Gogineni, Member, IEEE, Muralidhar Rangaswamy, Fellow, IEEE, Brian D . Rigling, Senior Member, IEEE, and Arye Nehorai, Fellow, IEEE Abstract—There...muralidhar.rangaswamy@us.af. mil). B. D . Rigling is with the Department of Electrical Engineering, Wright State University, Dayton, OH 45435 USA (e-mail...ieeexplore.ieee.org. Digital Object Identifier 10.1109/TSP.2014.2318135 [1]–[9] and audio broadcast signals and FM radio [10], [11], satellite-based [12], and

  12. Real-Time Station Grouping under Dynamic Traffic for IEEE 802.11ah

    PubMed Central

    Tian, Le; Latré, Steven

    2017-01-01

    IEEE 802.11ah, marketed as Wi-Fi HaLow, extends Wi-Fi to the sub-1 GHz spectrum. Through a number of physical layer (PHY) and media access control (MAC) optimizations, it aims to bring greatly increased range, energy-efficiency, and scalability. This makes 802.11ah the perfect candidate for providing connectivity to Internet of Things (IoT) devices. One of these new features, referred to as the Restricted Access Window (RAW), focuses on improving scalability in highly dense deployments. RAW divides stations into groups and reduces contention and collisions by only allowing channel access to one group at a time. However, the standard does not dictate how to determine the optimal RAW grouping parameters. The optimal parameters depend on the current network conditions, and it has been shown that incorrect configuration severely impacts throughput, latency and energy efficiency. In this paper, we propose a traffic-adaptive RAW optimization algorithm (TAROA) to adapt the RAW parameters in real time based on the current traffic conditions, optimized for sensor networks in which each sensor transmits packets with a certain (predictable) frequency and may change the transmission frequency over time. The TAROA algorithm is executed at each target beacon transmission time (TBTT), and it first estimates the packet transmission interval of each station only based on packet transmission information obtained by access point (AP) during the last beacon interval. Then, TAROA determines the RAW parameters and assigns stations to RAW slots based on this estimated transmission frequency. The simulation results show that, compared to enhanced distributed channel access/distributed coordination function (EDCA/DCF), the TAROA algorithm can highly improve the performance of IEEE 802.11ah dense networks in terms of throughput, especially when hidden nodes exist, although it does not always achieve better latency performance. This paper contributes with a practical approach to optimizing RAW grouping under dynamic traffic in real time, which is a major leap towards applying RAW mechanism in real-life IoT networks. PMID:28677617

  13. Real-Time Station Grouping under Dynamic Traffic for IEEE 802.11ah.

    PubMed

    Tian, Le; Khorov, Evgeny; Latré, Steven; Famaey, Jeroen

    2017-07-04

    IEEE 802.11ah, marketed as Wi-Fi HaLow, extends Wi-Fi to the sub-1 GHz spectrum. Through a number of physical layer (PHY) and media access control (MAC) optimizations, it aims to bring greatly increased range, energy-efficiency, and scalability. This makes 802.11ah the perfect candidate for providing connectivity to Internet of Things (IoT) devices. One of these new features, referred to as the Restricted Access Window (RAW), focuses on improving scalability in highly dense deployments. RAW divides stations into groups and reduces contention and collisions by only allowing channel access to one group at a time. However, the standard does not dictate how to determine the optimal RAW grouping parameters. The optimal parameters depend on the current network conditions, and it has been shown that incorrect configuration severely impacts throughput, latency and energy efficiency. In this paper, we propose a traffic-adaptive RAW optimization algorithm (TAROA) to adapt the RAW parameters in real time based on the current traffic conditions, optimized for sensor networks in which each sensor transmits packets with a certain (predictable) frequency and may change the transmission frequency over time. The TAROA algorithm is executed at each target beacon transmission time (TBTT), and it first estimates the packet transmission interval of each station only based on packet transmission information obtained by access point (AP) during the last beacon interval. Then, TAROA determines the RAW parameters and assigns stations to RAW slots based on this estimated transmission frequency. The simulation results show that, compared to enhanced distributed channel access/distributed coordination function (EDCA/DCF), the TAROA algorithm can highly improve the performance of IEEE 802.11ah dense networks in terms of throughput, especially when hidden nodes exist, although it does not always achieve better latency performance. This paper contributes with a practical approach to optimizing RAW grouping under dynamic traffic in real time, which is a major leap towards applying RAW mechanism in real-life IoT networks.

  14. Delay Analysis of GTS Bridging between IEEE 802.15.4 and IEEE 802.11 Networks for Healthcare Applications

    PubMed Central

    Mišić, Jelena; (Sherman) Shen, Xuemin

    2009-01-01

    We consider interconnection of IEEE 802.15.4 beacon-enabled network cluster with IEEE 802.11b network. This scenario is important in healthcare applications where IEEE 802.15.4 nodes comprise patient's body area network (BAN) and are involved in sensing some health-related data. BAN nodes have very short communication range in order to avoid harming patient's health and save energy. Sensed data needs to be transmitted to an access point in the ward room using wireless technology with higher transmission range and rate such as IEEE 802.11b. We model the interconnected network where IEEE 802.15.4-based BAN operates in guaranteed time slot (GTS) mode, and IEEE 802.11b part of the bridge conveys GTS superframe to the 802.11b access point. We then analyze the network delays. Performance analysis is performed using EKG traffic from continuous telemetry, and we discuss the delays of communication due the increasing number of patients. PMID:19107184

  15. Delay Analysis of GTS Bridging between IEEE 802.15.4 and IEEE 802.11 Networks for Healthcare Applications.

    PubMed

    Misić, Jelena; Sherman Shen, Xuemin

    2009-01-01

    We consider interconnection of IEEE 802.15.4 beacon-enabled network cluster with IEEE 802.11b network. This scenario is important in healthcare applications where IEEE 802.15.4 nodes comprise patient's body area network (BAN) and are involved in sensing some health-related data. BAN nodes have very short communication range in order to avoid harming patient's health and save energy. Sensed data needs to be transmitted to an access point in the ward room using wireless technology with higher transmission range and rate such as IEEE 802.11b. We model the interconnected network where IEEE 802.15.4-based BAN operates in guaranteed time slot (GTS) mode, and IEEE 802.11b part of the bridge conveys GTS superframe to the 802.11b access point. We then analyze the network delays. Performance analysis is performed using EKG traffic from continuous telemetry, and we discuss the delays of communication due the increasing number of patients.

  16. 78 FR 29113 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-17

    ...). Agency: National Telecommunications and Information Administration (NTIA). Title: Computer and Internet... Communications Commission (FCC), and other stakeholders to develop and advance economic and regulatory policies... cost effective responses. NTIA proposes to add 53 questions in the Computer and Internet Use Supplement...

  17. Psychological barriers to Internet usage among older adults in the UK.

    PubMed

    Adams, Nichola; Stubbs, David; Woods, Valerie

    2005-03-01

    The Internet is an important tool in assisting the older population to lead independent and social lives. However, the majority of Internet users are under 55. This study investigated the following psychological barriers to Internet use by older adults: perceived usefulness, perceived ease of use, Internet efficacy, perceived complexity of navigation and perceived complexity of terminology. Twenty-three subjects (aged 55 - 75 years) were interviewed in the UK. The influences of age, computer and Internet experience, and training on these psychological barriers were explored. The results showed that the majority of the older adults who had a positive perception of usefulness, ease of use, and efficacy of the Internet or e-mail, used the Internet or e-mail more often. In addition, it was found that computer or Internet experience increased perceptions of ease of use and efficacy of the Internet and reduced perceived complexity of navigation. There was no difference between the two age groups (55 - 65 and 66 - 75 years) in these psychological barriers. It was concluded that increased marketing of the Internet (aimed at the older user), more simple and uniformly designed Internet pages, more user-friendly online help and error message terminology, and increased provision of training for the older user would assist uptake of the World Wide Web.

  18. Self-reported wrist and finger symptoms associated with other physical/mental symptoms and use of computers/mobile phones.

    PubMed

    Korpinen, Leena; Pääkkönen, Rauno; Gobba, Fabriziomaria

    2018-03-01

    Recently, computer, mobile phone and Internet use has increased. This study aimed to determine the possible relation between self-reported wrist and finger symptoms (aches, pain or numbness) and using computers/mobile phones, and to analyze how the symptoms are specifically associated with utilizing desktop computers, portable computers or mini-computers and mobile phones. A questionnaire was sent to 15,000 working-age Finns (age 18-65). Via a questionnaire, 723 persons reported wrist and finger symptoms often or more with use. Over 80% use mobile phones daily and less than 30% use desktop computers or the Internet daily at leisure, e.g., over 89.8% quite often or often experienced pain, numbness or aches in the neck, and 61.3% had aches in the hips and the lower back. Only 33.7% connected their symptoms to computer use. In the future, the development of new devices and Internet services should incorporate the ergonomics of the hands and wrists.

  19. Is problematic internet use an indicator of eating disorders among Turkish university students?

    PubMed

    Çelik, Çiğdem Berber; Odacı, Hatice; Bayraktar, Nihal

    2015-06-01

    The aim of this study was to investigate the relationship between problematic internet use and eating attitudes in a group of university students. The study sample consisted of 314 students attending programs at the faculties of education, medicine and communications at the Karadeniz Technical University in Turkey. One hundred forty-seven (46.8 %) were male and 167 (53.2 %) female. The Problematic Internet Use Scale was used to measure problematic internet use levels among university students and the Eating Attitudes Test to determine anorexia nervosa symptoms. Additionally, a Personal Data Form was used to determine age, gender, faculty attended and computer ownership. Data were analyzed on SPSS 15.00. Pearson's product moments correlation coefficient, multiple linear regression analysis, the independent t test and one-way ANOVA were used for data analysis. The research findings showed that 46.8 % of students were female and 53.2 % male. Mean age was 20.65 (SD 1.42). Analysis showed a significant positive correlation between problematic internet use and eating attitudes (r = 0.77, p < 0.01). Problematic internet use was found to be a significant predictor of eating attitudes. The results also showed a significant difference in problematic internet use with regard to program variables [F (2,311) = 102.79]. There were no significant differences in problematic internet use in terms of gender or computer ownership. The results of this study indicate that problematic internet use is significantly correlated with eating disorders, that problematic internet use does not vary on the basis of gender or computer ownership and that variations arise in problematic internet use depending on the faculty attended.

  20. Time and learning efficiency in Internet-based learning: a systematic review and meta-analysis.

    PubMed

    Cook, David A; Levinson, Anthony J; Garside, Sarah

    2010-12-01

    Authors have claimed that Internet-based instruction promotes greater learning efficiency than non-computer methods. determine, through a systematic synthesis of evidence in health professions education, how Internet-based instruction compares with non-computer instruction in time spent learning, and what features of Internet-based instruction are associated with improved learning efficiency. we searched databases including MEDLINE, CINAHL, EMBASE, and ERIC from 1990 through November 2008. STUDY SELECTION AND DATA ABSTRACTION we included all studies quantifying learning time for Internet-based instruction for health professionals, compared with other instruction. Reviewers worked independently, in duplicate, to abstract information on interventions, outcomes, and study design. we identified 20 eligible studies. Random effects meta-analysis of 8 studies comparing Internet-based with non-Internet instruction (positive numbers indicating Internet longer) revealed pooled effect size (ES) for time -0.10 (p = 0.63). Among comparisons of two Internet-based interventions, providing feedback adds time (ES 0.67, p =0.003, two studies), and greater interactivity generally takes longer (ES 0.25, p = 0.089, five studies). One study demonstrated that adapting to learner prior knowledge saves time without significantly affecting knowledge scores. Other studies revealed that audio narration, video clips, interactive models, and animations increase learning time but also facilitate higher knowledge and/or satisfaction. Across all studies, time correlated positively with knowledge outcomes (r = 0.53, p = 0.021). on average, Internet-based instruction and non-computer instruction require similar time. Instructional strategies to enhance feedback and interactivity typically prolong learning time, but in many cases also enhance learning outcomes. Isolated examples suggest potential for improving efficiency in Internet-based instruction.

  1. Optimizing Targeting of Intrusion Detection Systems in Social Networks

    NASA Astrophysics Data System (ADS)

    Puzis, Rami; Tubi, Meytal; Elovici, Yuval

    Internet users communicate with each other in various ways: by Emails, instant messaging, social networking, accessing Web sites, etc. In the course of communicating, users may unintentionally copy files contaminated with computer viruses and worms [1, 2] to their computers and spread them to other users [3]. (Hereafter we will use the term "threats", rather than computer viruses and computer worms). The Internet is the chief source of these threats [4].

  2. Teaching an Interpersonal Senior Seminar Partially via the Internet (Computer Conferencing).

    ERIC Educational Resources Information Center

    Cahn, Dudley D.

    This paper reports on a college educator's attempts over the past two years to use computer conferencing via the Internet as a 3-week unit in a semester-long senior level seminar in Interpersonal Communication. The paper states that the educator wanted to see if he could successfully add computer conferencing as a part of an existing face-to-face…

  3. A Relative Investigation on Purposes of Computer and Internet Use of Prospective Geography Teachers in Turkey and China

    ERIC Educational Resources Information Center

    Turan, Ilhan

    2015-01-01

    This study investigated Chinese and Turkish prospective geography teachers' use of computer and internet applications as indispensable instruments in and out of education. 292 prospective geography teachers students from Shanghai, China, and Izmir, Turkey, participated in this study. The aim of this study was to examine the use of computers and…

  4. A systematic review of school-based alcohol and other drug prevention programs facilitated by computers or the internet.

    PubMed

    Champion, Katrina E; Newton, Nicola C; Barrett, Emma L; Teesson, Maree

    2013-03-01

    The use of alcohol and drugs amongst young people is a serious concern and the need for effective prevention is clear. This paper identifies and describes current school-based alcohol and other drug prevention programs facilitated by computers or the Internet. The Cochrane Library, PsycINFO and PubMed databases were searched in March 2012. Additional materials were obtained from reference lists of papers. Studies were included if they described an Internet- or computer-based prevention program for alcohol or other drugs delivered in schools. Twelve trials of 10 programs were identified. Seven trials evaluated Internet-based programs and five delivered an intervention via CD-ROM. The interventions targeted alcohol, cannabis and tobacco. Data to calculate effect size and odds ratios were unavailable for three programs. Of the seven programs with available data, six achieved reductions in alcohol, cannabis or tobacco use at post intervention and/or follow up. Two interventions were associated with decreased intentions to use tobacco, and two significantly increased alcohol and drug-related knowledge. This is the first study to review the efficacy of school-based drug and alcohol prevention programs delivered online or via computers. Findings indicate that existing computer- and Internet-based prevention programs in schools have the potential to reduce alcohol and other drug use as well as intentions to use substances in the future. These findings, together with the implementation advantages and high fidelity associated with new technology, suggest that programs facilitated by computers and the Internet offer a promising delivery method for school-based prevention. © 2012 Australasian Professional Society on Alcohol and other Drugs.

  5. Crossing the Internet Threshold: An Instructional Handbook. 2nd Edition.

    ERIC Educational Resources Information Center

    Tennant, Roy; Ober, John; Lipow, Anne G.

    This how-to manual for the beginning Internet user contains sections on: the authors; an overview of computer networking; Internet basics, including a glossary, information on getting connected and keeping current, and a bibliography; electronic mail, including electronic discussions and electronic journals: Internet Remote Login (Telnet); File…

  6. The Internet and Technical Services: A Point Break Approach.

    ERIC Educational Resources Information Center

    McCombs, Gillian M.

    1994-01-01

    Discusses implications of using the Internet for library technical services. Topics addressed include creative uses of the Internet; three basic applications on the Internet, i.e., electronic mail, remote log-in to another computer, and file transfer; electronic processing of information; electronic access to information; and electronic processing…

  7. Information Transfer Ion Wireless Networks

    DTIC Science & Technology

    2010-07-01

    conferences with proceed- ings to be made available online in the IEEE Xplore database, namely IFIP Wireless Days (WD 2008) at Dubai, UAE, and the...Poland, May 2008, pp. 61-64, IEEE Xplore , DOI = 10.1109/INFTECH. 2008.4621591. 2. J. Konorski, IEEE 802.11 LAN Capacity: Incentives and Incentive...2008, Dubai, UAE, Nov. 2008, IEEE Xplore DOI = 10.1109/WD.2008.4812857. 4. J. Konorski, QoS Provision in an Ad Hoc IEEE 802.11 WLAN: A Bayesian War

  8. Information Transfer in Wireless Networks

    DTIC Science & Technology

    2010-07-01

    conferences with proceed- ings to be made available online in the IEEE Xplore database, namely IFIP Wireless Days (WD 2008) at Dubai, UAE, and the...Poland, May 2008, pp. 61-64, IEEE Xplore , DOI = 10.1109/INFTECH. 2008.4621591. 2. J. Konorski, IEEE 802.11 LAN Capacity: Incentives and Incentive...2008, Dubai, UAE, Nov. 2008, IEEE Xplore DOI = 10.1109/WD.2008.4812857. 4. J. Konorski, QoS Provision in an Ad Hoc IEEE 802.11 WLAN: A Bayesian War

  9. Internet Architecture: Lessons Learned and Looking Forward

    DTIC Science & Technology

    2006-12-01

    Internet Architecture: Lessons Learned and Looking Forward Geoffrey G. Xie Department of Computer Science Naval Postgraduate School April 2006... Internet architecture. Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is...readers are referred there for more information about a specific protocol or concept. 2. Origin of Internet Architecture The Internet is easily

  10. Self-reported use of internet by cervical cancer clients in two National Referral Hospitals in Kenya

    PubMed Central

    2012-01-01

    Background Cervical cancer remains a devastating disease in Kenya accounting for more than 2000 deaths each year. Lack of information on cervical cancer prevention and management has been attributed to the apathy among women in seeking health interventions. Use of internet-based and mobile e-health tools could increase information access among cervical cancer patients. The objective of the study was; to establish the extent of use of mobile phones and internet by cervical cancer patients in accessing information related to cancer treatment and management.; find out the characteristics of patients associated with internet use and identify barriers faced by the patients in internet use. A cross sectional descriptive survey of 199 cervical patients visiting the two main referral hospitals in Kenya was done. A structured questionnaire was used to collect data. Findings The average length of illness was 2.43 years (SD ± 3.0). Only 7.5 %( n=15) reported to having used the internet as a source of information. 92.5 %( n=184) did not use internet. With Multiple options, 70.9% did not know how to use a computer, 29.2% did not have access to a computer, 14.6% lacked the money to use computers at the local cyber cafe while other barriers identified accounted for 11.1%. Patients reported that the internet had an important role in the management of cancer of the cervix in health education (17.6%), online consultation (14.6%), booking of patients (13.6%), referrals (8.5%) and collecting data (7%). The 96.5% of the respondents who had access to a mobile phone, recommended mobile phones for health education messages (31.7%), reminder alerts for medication (29.7%) and booking appointments (21.6%). There was a statistically significant association between income of the patients and internet use (p = 0.026) in this study. Conclusions There is low level use of the internet by cervical cancer clients attended in Public referral facilities in Kenya. This was attributed to; lack of knowledge on how to use computers and lack of access to a computer. High level of access to mobile phones was reported. This is an indicator of great potential for use of mobile phones in the management of cervical cancer through short messaging services (sms), without internet connectivity. There is even greater potential to internet use through web access via mobile phones. PMID:23046538

  11. [Factors on internet game addiction among adolescents].

    PubMed

    Park, Hyun Sook; Kwon, Yun Hee; Park, Kyung-Min

    2007-08-01

    The purpose of this study was to explore factors related to internet game addiction for adolescents. This study was a cross-sectional survey, and data was collected through self-report questionnaires. Data was analyzed using the SPSS program. In logistic regression analysis, the risk of being addicted to internet games was 2.22 times higher in males than females. Adolescents with low and middle academic performance also had a higher risk(2.08 times and 2.54 times) to become addicted to internet games. For the location of the computer, the risk of becoming addicted to internet games were .01 times lower in the living room or brother or sisters' room than in their own room. The risk of becoming addicted to internet games was 1.18 times higher in the higher usage time of internet games. The risk of becoming addicted to internet games was .49 times lower in the more accepting and autonomic parents' rearing attitude and .02 times lower in the high self-efficacy group than the low group. The result of this study suggests that there are noticeable relationships between internet game addiction and gender, academic performance, location of computer, usage time of internet games, parents' rearing attitude, and self efficacy.

  12. Internet Use for Health-Care Information by Subjects With COPD.

    PubMed

    Delgado, Cionéia K; Gazzotti, Mariana R; Santoro, Ilka L; Carvalho, Andrea K; Jardim, José R; Nascimento, Oliver A

    2015-09-01

    Although the internet is an important tool for entertainment, work, learning, shopping, and communication, it is also a possible source for information on health and disease. The aim of this study was to evaluate the proportion of subjects with COPD in São Paulo, Brazil, who use the internet to obtain information about their disease. Subjects (N = 382) with COPD answered a 17-question survey, including information regarding computer use, internet access, and searching for sites on COPD. Our sample was distributed according to the socioeconomic levels of the Brazilian population (low, 17.8%; medium, 66.5%; and high, 15.7%). Most of the subjects in the sample were male (62.6%), with a mean age of 67.0 ± 9.9 y. According to Global Initiative for Chronic Obstructive Lung Disease (GOLD) stages, 74.3% of the subjects were in stage II or III. In addition, 51.6% of the subjects had a computer, 49.7% accessed the internet, and 13.9% used it to search for information about COPD. The internet was predominantly accessed by male (70.3%) and younger (64.6 ± 9.5 y of age) subjects compared with female (29.7%, P = .04) and older (67.5 ± 9.6 y of age, P < .007) subjects. Searching for information about COPD on the internet was associated with having a computer (5.9-fold), Medical Research Council dyspnea level 1 (5.3-fold), and high social class (8.4-fold). The search for information on COPD was not influenced by GOLD staging. A low percentage of subjects with COPD in São Paulo use the internet as a tool to obtain information about their disease. This search is associated with having a computer, low dyspnea score, and high socioeconomic level. Copyright © 2015 by Daedalus Enterprises.

  13. Assessing attitudes toward computers and the use of Internet resources among undergraduate microbiology students

    NASA Astrophysics Data System (ADS)

    Anderson, Delia Marie Castro

    Computer literacy and use have become commonplace in our colleges and universities. In an environment that demands the use of technology, educators should be knowledgeable of the components that make up the overall computer attitude of students and be willing to investigate the processes and techniques of effective teaching and learning that can take place with computer technology. The purpose of this study is two fold. First, it investigates the relationship between computer attitudes and gender, ethnicity, and computer experience. Second, it addresses the question of whether, and to what extent, students' attitudes toward computers change over a 16 week period in an undergraduate microbiology course that supplements the traditional lecture with computer-driven assignments. Multiple regression analyses, using data from the Computer Attitudes Scale (Loyd & Loyd, 1985), showed that, in the experimental group, no significant relationships were found between computer anxiety and gender or ethnicity or between computer confidence and gender or ethnicity. However, students who used computers the longest (p = .001) and who were self-taught (p = .046) had the lowest computer anxiety levels. Likewise students who used computers the longest (p = .001) and who were self-taught (p = .041) had the highest confidence levels. No significant relationships between computer liking, usefulness, or the use of Internet resources and gender, ethnicity, or computer experience were found. Dependent T-tests were performed to determine whether computer attitude scores (pretest and posttest) increased over a 16-week period for students who had been exposed to computer-driven assignments and other Internet resources. Results showed that students in the experimental group were less anxious about working with computers and considered computers to be more useful. In the control group, no significant changes in computer anxiety, confidence, liking, or usefulness were noted. Overall, students in the experimental group, who responded to the use of Internet Resources Survey, were positive (mean of 3.4 on the 4-point scale) toward their use of Internet resources which included the online courseware developed by the researcher. Findings from this study suggest that (1) the digital divide with respect to gender and ethnicity may be narrowing, and (2) students who are exposed to a course that augments computer-driven courseware with traditional teaching methods appear to have less anxiety, have a clearer perception of computer usefulness, and feel that online resources enhance their learning.

  14. The Internet and the menopause consultation: menopause management in the third millennium.

    PubMed

    Cumming, Grant P; Currie, Heather

    2005-09-01

    The Internet was born in 1969; it was originally developed so that computers could share information on research and development in the scientific and military fields. The original Internet consisted of four university computers networked in the United States. Email became available two years later. The infant Internet initially required complex computing knowledge to be used. However, this was all to change with the development of the World Wide Web in the early 1990s, which made the Internet much more widely accessible. The Internet has since grown at a phenomenal rate and has evolved into a global communications tool. It is by nature anarchic, in that it is an unrestricted broadcast medium. Although this lack of censorship is a strength, it is also a weakness. The quality of information available on the Web is variable and discernment is required. With the growth of e-health, medicine and its allied specialties are faced with the challenges of providing their services in a novel way while maintaining the first principle of medicine, primum non nocere (first, do no harm). This provision of e-health care is in its infancy and this review explores issues arising from the use of the Internet as a medium for organizing menopausal health care in the third millennium.

  15. The Practical Impact of Recent Computer Advances on the Analysis and Design of Large Scale Networks

    DTIC Science & Technology

    1974-12-01

    Communications, ICC-74, June 17-19, Minneapolis, Minnesota, pp. 31C-1-21C-5. 28. Gitman , I., R, M. Van Slvke and H. Frank, "On Splitting Random Access Broadcast...1974. 29. Gitman , I., "On the Capacity of Slotted ALOHA Network and Some Design Problems," IEEE Transactions on Communications, Maren, 1975. 30

  16. Designing Robust and Resilient Tactical MANETs

    DTIC Science & Technology

    2014-09-25

    Bounds on the Throughput Efficiency of Greedy Maximal Scheduling in Wireless Networks , IEEE/ACM Transactions on Networking , (06 2011): 0. doi: N... Wireless Sensor Networks and Effects of Long Range Dependant Data, Special IWSM Issue of Sequential Analysis, (11 2012): 0. doi: A. D. Dominguez...Bushnell, R. Poovendran. A Convex Optimization Approach for Clone Detection in Wireless Sensor Networks , Pervasive and Mobile Computing, (01 2012

  17. Projector-Camera Systems for Immersive Training

    DTIC Science & Technology

    2006-01-01

    average to a sequence of 100 captured distortion corrected images. The OpenCV library [ OpenCV ] was used for camera calibration. To correct for...rendering application [Treskunov, Pair, and Swartout, 2004]. It was transposed to take into account different matrix conventions between OpenCV and...Screen Imperfections. Proc. Workshop on Projector-Camera Systems (PROCAMS), Nice, France, IEEE. OpenCV : Open Source Computer Vision. [Available

  18. Sparse Matrix Motivated Reconstruction of Far-Field Radiation Patterns

    DTIC Science & Technology

    2015-03-01

    method for base - station antenna radiation patterns. IEEE Antennas Propagation Magazine. 2001;43(2):132. 4. Vasiliadis TG, Dimitriou D, Sergiadis JD...algorithm based on sparse representations of radiation patterns using the inverse Discrete Fourier Transform (DFT) and the inverse Discrete Cosine...patterns using a Model- Based Parameter Estimation (MBPE) technique that reduces the computational time required to model radiation patterns. Another

  19. Using Artificial Physics to Control Agents

    DTIC Science & Technology

    1999-11-01

    unlimited 13. SUPPLEMENTARY NOTES IEEE International Conference on Information, Intelligence, and Systems, Oct 31 -Nov 3,1999. Bethesda, MD 14. ABSTRACT...distributed control can also perform distributed computation. 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same...1995. [9] H. Pattee. Artificial life needs a real epistemology. In Moran, Moreno, Merelo, and Chacon , editors, Advances in Artificial Life, pages

  20. IEEE Standards activities: A year in review. Annual activities report 1996

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    1997-09-01

    For IEEE Standards and the constituency it serves, 1996 was a milestone year. It was a period that signaled the beginning of the Standards Program of the future. This program responds to worldwide standards issues and to the technical, market and competitive strategies of industrial sectors. It represents technological innovation, global participation in electrotechnology standards development and dedication to the on-going advancement and promotion of new concepts and technology. Instrumental in ensuring IEEE`s growth opportunities and leadership position in electrotechnology standards development and dissemination is IEEE membership. The value of members and their involvement in IEEE Standards is vital tomore » IEEE`s ability to continuously be the best professional association in the world. To fulfill this vision, IEEE set forth five goals -- increased globalization, career enhancement, electronic dissemination of existing products and services, organizational improvements and public responsibility. Key in the process for the achievement of these goals is to make certain that IEEE members are well informed about opportunities and benefits the present system of standardization offers, and what the future system will offer. With the member in mind, the Standards Board reviewed its strategic direction and operational structures, and its ability to deliver products and services that are needed now and, more importantly, that will be needed in the future. This Annual Activities Report provides a comprehensive picture of 1996 accomplishments and performance. It gives readers a broad picture of the Standards Board`s activities, the evolving role of IEEE Standards and the technological opportunities that the Board encourages.« less

  1. Biomedical, Artificial Intelligence, and DNA Computing Photonics Applications and Web Engineering, Wilga, May 2012

    NASA Astrophysics Data System (ADS)

    Romaniuk, Ryszard S.

    2012-05-01

    This paper is the fifth part (out of five) of the research survey of WILGA Symposium work, May 2012 Edition, concerned with Biomedical, Artificial Intelligence and DNA Computing technologies. It presents a digest of chosen technical work results shown by young researchers from different technical universities from this country during the Jubilee XXXth SPIE-IEEE Wilga 2012, May Edition, symposium on Photonics and Web Engineering. Topical tracks of the symposium embraced, among others, nanomaterials and nanotechnologies for photonics, sensory and nonlinear optical fibers, object oriented design of hardware, photonic metrology, optoelectronics and photonics applications, photonics-electronics co-design, optoelectronic and electronic systems for astronomy and high energy physics experiments, JET tokamak and pi-of-the sky experiments development. The symposium is an annual summary in the development of numerable Ph.D. theses carried out in this country in the area of advanced electronic and photonic systems. It is also a great occasion for SPIE, IEEE, OSA and PSP students to meet together in a large group spanning the whole country with guests from this part of Europe. A digest of Wilga references is presented [1-270].

  2. Virtualized Traffic: reconstructing traffic flows from discrete spatiotemporal data.

    PubMed

    Sewall, Jason; van den Berg, Jur; Lin, Ming C; Manocha, Dinesh

    2011-01-01

    We present a novel concept, Virtualized Traffic, to reconstruct and visualize continuous traffic flows from discrete spatiotemporal data provided by traffic sensors or generated artificially to enhance a sense of immersion in a dynamic virtual world. Given the positions of each car at two recorded locations on a highway and the corresponding time instances, our approach can reconstruct the traffic flows (i.e., the dynamic motions of multiple cars over time) between the two locations along the highway for immersive visualization of virtual cities or other environments. Our algorithm is applicable to high-density traffic on highways with an arbitrary number of lanes and takes into account the geometric, kinematic, and dynamic constraints on the cars. Our method reconstructs the car motion that automatically minimizes the number of lane changes, respects safety distance to other cars, and computes the acceleration necessary to obtain a smooth traffic flow subject to the given constraints. Furthermore, our framework can process a continuous stream of input data in real time, enabling the users to view virtualized traffic events in a virtual world as they occur. We demonstrate our reconstruction technique with both synthetic and real-world input. © 2011 IEEE Published by the IEEE Computer Society

  3. The outcomes of anxiety, confidence, and self-efficacy with Internet health information retrieval in older adults: a pilot study.

    PubMed

    Chu, Adeline; Mastel-Smith, Beth

    2010-01-01

    Technology has a great impact on nursing practice. With the increasing numbers of older Americans using computers and the Internet in recent years, nurses have the capability to deliver effective and efficient health education to their patients and the community. Based on the theoretical framework of Bandura's self-efficacy theory, the pilot project reported findings from a 5-week computer course on Internet health searches in older adults, 65 years or older, at a senior activity learning center. Twelve participants were recruited and randomized to either the intervention or the control group. Measures of computer anxiety, computer confidence, and computer self-efficacy scores were analyzed at baseline, at the end of the program, and 6 weeks after the completion of the program. Analysis was conducted with repeated-measures analysis of variance. Findings showed participants who attended a structured computer course on Internet health information retrieval reported lowered anxiety and increased confidence and self-efficacy at the end of the 5-week program and 6 weeks after the completion of the program as compared with participants who were not in the program. The study demonstrated that a computer course can help reduce anxiety and increase confidence and self-efficacy in online health searches in older adults.

  4. Throughput analysis of the IEEE 802.4 token bus standard under heavy load

    NASA Technical Reports Server (NTRS)

    Pang, Joseph; Tobagi, Fouad

    1987-01-01

    It has become clear in the last few years that there is a trend towards integrated digital services. Parallel to the development of public Integrated Services Digital Network (ISDN) is service integration in the local area (e.g., a campus, a building, an aircraft). The types of services to be integrated depend very much on the specific local environment. However, applications tend to generate data traffic belonging to one of two classes. According to IEEE 802.4 terminology, the first major class of traffic is termed synchronous, such as packetized voice and data generated from other applications with real-time constraints, and the second class is called asynchronous which includes most computer data traffic such as file transfer or facsimile. The IEEE 802.4 token bus protocol which was designed to support both synchronous and asynchronous traffic is examined. The protocol is basically a timer-controlled token bus access scheme. By a suitable choice of the design parameters, it can be shown that access delay is bounded for synchronous traffic. As well, the bandwidth allocated to asynchronous traffic can be controlled. A throughput analysis of the protocol under heavy load with constant channel occupation of synchronous traffic and constant token-passing times is presented.

  5. Versatile, low-cost, computer-controlled, sample positioning system for vacuum applications

    NASA Technical Reports Server (NTRS)

    Vargas-Aburto, Carlos; Liff, Dale R.

    1991-01-01

    A versatile, low-cost, easy to implement, microprocessor-based motorized positioning system (MPS) suitable for accurate sample manipulation in a Second Ion Mass Spectrometry (SIMS) system, and for other ultra-high vacuum (UHV) applications was designed and built at NASA LeRC. The system can be operated manually or under computer control. In the latter case, local, as well as remote operation is possible via the IEEE-488 bus. The position of the sample can be controlled in three linear orthogonal and one angular coordinates.

  6. 10 CFR 431.447 - Department of Energy recognition of nationally recognized certification programs.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... IEEE Std 112-2004 Test Methods A and B, IEEE Std 114-2010, CSA C390-10, and CSA C747 (incorporated by... IEEE Std 112-2004 Test Methods A and B, IEEE Std 114-2010, CSA C390-10, and CSA C747- (incorporated by...

  7. 10 CFR 431.447 - Department of Energy recognition of nationally recognized certification programs.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... IEEE Std 112-2004 Test Methods A and B, IEEE Std 114-2010, CSA C390-10, and CSA C747 (incorporated by... IEEE Std 112-2004 Test Methods A and B, IEEE Std 114-2010, CSA C390-10, and CSA C747- (incorporated by...

  8. Rural New Zealand health professionals' perceived barriers to greater use of the internet for learning.

    PubMed

    Janes, Ron; Arroll, Bruce; Buetow, Stephen; Coster, Gregor; McCormick, Ross; Hague, Iain

    2005-01-01

    The purpose of this research was to investigate rural North Island (New Zealand) health professionals' attitudes and perceived barriers to using the internet for ongoing professional learning. A cross-sectional postal survey of all rural North Island GPs, practice nurses and pharmacists was conducted in mid-2003. The questionnaire contained both quantitative and qualitative questions. The transcripts from two open questions requiring written answers were analysed for emergent themes, which are reported here. The first open question asked: 'Do you have any comments on the questionnaire, learning, computers or the Internet?' The second open question asked those who had taken a distance-learning course using the internet to list positive and negative aspects of their course, and suggest improvements. Out of 735 rural North Island health professionals surveyed, 430 returned useable questionnaires (a response rate of 59%). Of these, 137 answered the question asking for comments on learning, computers and the internet. Twenty-eight individuals who had completed a distance-learning course using the internet, provided written responses to the second question. Multiple barriers to greater use of the internet were identified. They included lack of access to computers, poor availability of broadband (fast) internet access, lack of IT skills/knowledge, lack of time, concerns about IT costs and database security, difficulty finding quality information, lack of time, energy or motivation to learn new skills, competing priorities (eg family), and a preference for learning modalities which include more social interaction. Individuals also stated that rural health professionals needed to engage the technology, because it provided rapid, flexible access from home or work to a significant health information resource, and would save money and travelling time to urban-based education. In mid-2003, there were multiple barriers to rural North Island health professionals making greater use of the internet for learning. Now that access to broadband internet is available in all rural towns in New Zealand, there is a clear need to address the other identified barriers, especially the self-reported lack of IT skills, which are preventing many in the rural health workforce from gaining maximum advantage from both computers and the internet.

  9. IEEE Std 730 Software Quality Assurance: Supporting CMMI-DEV v1.3, Product and Process Quality Assurance

    DTIC Science & Technology

    2011-05-27

    frameworks 4 CMMI-DEV IEEE / ISO / IEC 15288 / 12207 Quality Assurance ©2011 Walz IEEE Life Cycle Processes & Artifacts • Systems Life Cycle Processes...TAG to ISO TC 176 Quality Management • Quality: ASQ, work experience • Software: three books, consulting, work experience • Systems: Telecom & DoD...and IEEE 730 SQA need to align. The P730 IEEE standards working group has expanded the scope of the SQA process standard to align with IS 12207

  10. GreenView and GreenLand Applications Development on SEE-GRID Infrastructure

    NASA Astrophysics Data System (ADS)

    Mihon, Danut; Bacu, Victor; Gorgan, Dorian; Mészáros, Róbert; Gelybó, Györgyi; Stefanut, Teodor

    2010-05-01

    The GreenView and GreenLand applications [1] have been developed through the SEE-GRID-SCI (SEE-GRID eInfrastructure for regional eScience) FP7 project co-funded by the European Commission [2]. The development of environment applications is a challenge for Grid technologies and software development methodologies. This presentation exemplifies the development of the GreenView and GreenLand applications over the SEE-GRID infrastructure by the Grid Application Development Methodology [3]. Today's environmental applications are used in vary domains of Earth Science such as meteorology, ground and atmospheric pollution, ground metal detection or weather prediction. These applications run on satellite images (e.g. Landsat, MERIS, MODIS, etc.) and the accuracy of output results depends mostly of the quality of these images. The main drawback of such environmental applications regards the need of computation power and storage power (some images are almost 1GB in size), in order to process such a large data volume. Actually, almost applications requiring high computation resources have approached the migration onto the Grid infrastructure. This infrastructure offers the computing power by running the atomic application components on different Grid nodes in sequential or parallel mode. The middleware used between the Grid infrastructure and client applications is ESIP (Environment Oriented Satellite Image Processing Platform), which is based on gProcess platform [4]. In its current format, gProcess is used for launching new processes on the Grid nodes, but also for monitoring the execution status of these processes. This presentation highlights two case studies of Grid based environmental applications, GreenView and GreenLand [5]. GreenView is used in correlation with MODIS (Moderate Resolution Imaging Spectroradiometer) satellite images and meteorological datasets, in order to produce pseudo colored temperature and vegetation maps for different geographical CEE (Central Eastern Europe) regions. On the other hand, GreenLand is used for generating maps for different vegetation indexes (e.g. NDVI, EVI, SAVI, GEMI) based on Landsat satellite images. Both applications are using interpolation and random value generation algorithms, but also specific formulas for computing vegetation index values. The GreenView and GreenLand applications have been experimented over the SEE-GRID infrastructure and the performance evaluation is reported in [6]. The improvement of the execution time (obtained through a better parallelization of jobs), the extension of geographical areas to other parts of the Earth, and new user interaction techniques on spatial data and large set of satellite images are the goals of the future work. References [1] GreenView application on Wiki, http://wiki.egee-see.org/index.php/GreenView [2] SEE-GRID-SCI Project, http://www.see-grid-sci.eu/ [3] Gorgan D., Stefanut T., Bâcu V., Mihon D., Grid based Environment Application Development Methodology, SCICOM, 7th International Conference on "Large-Scale Scientific Computations", 4-8 June, 2009, Sozopol, Bulgaria, (To be published by Springer), (2009). [4] Gorgan D., Bacu V., Stefanut T., Rodila D., Mihon D., Grid based Satellite Image Processing Platform for Earth Observation Applications Development. IDAACS'2009 - IEEE Fifth International Workshop on "Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications", 21-23 September, Cosenza, Italy, IEEE Published in Computer Press, 247-252 (2009). [5] Mihon D., Bacu V., Stefanut T., Gorgan D., "Grid Based Environment Application Development - GreenView Application". ICCP2009 - IEEE 5th International Conference on Intelligent Computer Communication and Processing, 27 Aug, 2009 Cluj-Napoca. Published by IEEE Computer Press, pp. 275-282 (2009). [6] Danut Mihon, Victor Bacu, Dorian Gorgan, Róbert Mészáros, Györgyi Gelybó, Teodor Stefanut, Practical Considerations on the GreenView Application Development and Execution over SEE-GRID. SEE-GRID-SCI User Forum, 9-10 Dec 2009, Bogazici University, Istanbul, Turkey, ISBN: 978-975-403-510-0, pp. 167-175 (2009).

  11. Technical solutions for mitigating security threats caused by health professionals in clinical settings.

    PubMed

    Fernandez-Aleman, Jose Luis; Belen Sanchez Garcia, Ana; Garcia-Mateos, Gines; Toval, Ambrosio

    2015-08-01

    The objective of this paper is to present a brief description of technical solutions for health information system security threats caused by inadequate security and privacy practices in healthcare professionals. A literature search was carried out in ScienceDirect, ACM Digital Library and IEEE Digital Library to find papers reporting technical solutions for certain security problems in information systems used in clinical settings. A total of 17 technical solutions were identified: measures for password security, the secure use of e-mail, the Internet, portable storage devices, printers and screens. Although technical safeguards are essential to the security of healthcare organization's information systems, good training, awareness programs and adopting a proper information security policy are particularly important to prevent insiders from causing security incidents.

  12. Prevalence and Correlates of Problematic Internet Experiences and Computer-Using Time: A Two-Year Longitudinal Study in Korean School Children

    PubMed Central

    Stewart, Robert; Lee, Ju-Yeon; Kim, Jae-Min; Kim, Sung-Wan; Shin, Il-Seon; Yoon, Jin-Sang

    2014-01-01

    Objective To measure the prevalence of and factors associated with online inappropriate sexual exposure, cyber-bullying victimisation, and computer-using time in early adolescence. Methods A two-year, prospective school survey was performed with 1,173 children aged 13 at baseline. Data collected included demographic factors, bullying experience, depression, anxiety, coping strategies, self-esteem, psychopathology, attention-deficit hyperactivity disorder symptoms, and school performance. These factors were investigated in relation to problematic Internet experiences and computer-using time at age 15. Results The prevalence of online inappropriate sexual exposure, cyber-bullying victimisation, academic-purpose computer overuse, and game-purpose computer overuse was 31.6%, 19.2%, 8.5%, and 21.8%, respectively, at age 15. Having older siblings, more weekly pocket money, depressive symptoms, anxiety symptoms, and passive coping strategy were associated with reported online sexual harassment. Male gender, depressive symptoms, and anxiety symptoms were associated with reported cyber-bullying victimisation. Female gender was associated with academic-purpose computer overuse, while male gender, lower academic level, increased height, and having older siblings were associated with game-purpose computer-overuse. Conclusion Different environmental and psychological factors predicted different aspects of problematic Internet experiences and computer-using time. This knowledge is important for framing public health interventions to educate adolescents about, and prevent, internet-derived problems. PMID:24605120

  13. Developing an evidence-based curriculum designed to help psychiatric nurses learn to use computers and the Internet.

    PubMed

    Koivunen, Marita; Välimäki, Maritta; Jakobsson, Tiina; Pitkänen, Anneli

    2008-01-01

    This article describes the systematic process in which an evidence-based approach was used to develop a curriculum designed to support the computer and Internet skills of nurses in psychiatric hospitals in Finland. The pressure on organizations to have skilled and motivated nurses who use modern information and communication technology in health care organizations has increased due to rapid technology development at the international and national levels. However, less frequently has the development of those computer education curricula been based on evidence-based knowledge. First, we identified psychiatric nurses' learning experiences and barriers to computer use by examining written essays. Second, nurses' computer skills were surveyed. Last, evidence from the literature was scrutinized to find effective methods that can be used to teach and learn computer use in health care. This information was integrated and used for the development process of an education curriculum designed to support nurses' computer and Internet skills.

  14. Internet: road to heaven or hell for the clinical laboratory?

    PubMed

    Chou, D

    1996-05-01

    The Internet started as a research project by the Department of Defense Advanced Research Projects Agency for networking computers. Ironically, the networking project now predominantly supports human rather than computer communications. The Internet's growth, estimated at 20% per month, has been fueled by commercial and public perception that it will become an important medium for merchandising, marketing, and advertising. For the clinical laboratory, the Internet provides high-speed communications through e-mail and allows the retrieval of important information held in repositories. All this capability comes at a price, including the need to manage a complex technology and the risk of instrusions on patient privacy.

  15. Can the Internet be used to reach parents for family-based childhood obesity interventions?

    PubMed

    Hohman, Katherine H; Price, Sarah N; Sonneville, Kendrin; Rifas-Shiman, Sheryl L; Gortmaker, Steven L; Gillman, Matthew W; Taveras, Elsie M

    2012-04-01

    This study aimed to identify socioeconomic correlates of computer/Internet use among parents of overweight preschool-aged children. A total of 470 baseline participants in a trial to prevent obesity in children 2 to 6.9 years old with body mass index ≥ 95th percentile or 85th to 95th percentile with one overweight parent were studied. Interviews with parents used Health Information National Trends Survey questions. Overall, 94% of the participants had home computers and 93% reported Internet usage. In adjusted models, parents with ≤ college degree (odds ratio = 4.8; 95% confidence interval = 1.2-18.3) or with household income ≤$50,000 (odds ratio = 7.6; 95% confidence interval = 2.2-26.8) had decreased likelihood of computer ownership. Of parents who reported going online, 63% used Internet to look for health/medical information for themselves and 42% for their children. Parents with ≤ a college degree or with body mass index <25 kg/m(2) were less likely to use Internet. Results support using the Internet for early childhood obesity prevention with enhanced outreach efforts for low socioeconomic status families.

  16. On Using Home Networks and Cloud Computing for a Future Internet of Things

    NASA Astrophysics Data System (ADS)

    Niedermayer, Heiko; Holz, Ralph; Pahl, Marc-Oliver; Carle, Georg

    In this position paper we state four requirements for a Future Internet and sketch our initial concept. The requirements: (1) more comfort, (2) integration of home networks, (3) resources like service clouds in the network, and (4) access anywhere on any machine. Future Internet needs future quality and future comfort. There need to be new possiblities for everyone. Our focus is on higher layers and related to the many overlay proposals. We consider them to run on top of a basic Future Internet core. A new user experience means to include all user devices. Home networks and services should be a fundamental part of the Future Internet. Home networks extend access and allow interaction with the environment. Cloud Computing can provide reliable resources beyond local boundaries. For access anywhere, we also need secure storage for data and profiles in the network, in particular for access with non-personal devices (Internet terminal, ticket machine, ...).

  17. An Internet-based tailored hearing protection intervention for firefighters: development process and users' feedback.

    PubMed

    Hong, OiSaeng; Eakin, Brenda L; Chin, Dal Lae; Feld, Jamie; Vogel, Stephen

    2013-07-01

    Noise-induced hearing loss is a significant occupational injury for firefighters exposed to intermittent noise on the job. It is important to educate firefighters about using hearing protection devices whenever they are exposed to loud noise. Computer technology is a relatively new health education approach and can be useful for tailoring specific aspects of behavioral change training. The purpose of this study is to present the development process of an Internet-based tailored intervention program and to assess its efficacy. The intervention programs were implemented for 372 firefighters (mean age = 44 years, Caucasian = 82%, male = 95%) in three states (California, Illinois, and Indiana). The efficacy was assessed from firefighters' feedback through an Internet-based survey. A multimedia Internet-based training program was developed through (a) determining program content and writing scripts, (b) developing decision-making algorithms for tailoring, (c) graphic design and audio and video productions, (d) creating computer software and a database, and (e) postproduction quality control and pilot testing. Participant feedback regarding the training has been very positive. Participants reported that they liked completing the training via computer (83%) and also that the Internet-based training program was well organized (97%), easy to use (97%), and effective (98%) and held their interest (79%). Almost all (95%) would recommend this Internet training program to other firefighters. Interactive multimedia computer technology using the Internet was a feasible mode of delivery for a hearing protection intervention among firefighters. Participants' favorable feedback strongly supports the continued utilization of this approach for designing and developing interventions to promote healthy behaviors.

  18. Comparison and Analysis of ISO/IEEE 11073, IHE PCD-01, and HL7 FHIR Messages for Personal Health Devices

    PubMed Central

    Do, Hyoungho

    2018-01-01

    Objectives Increasing use of medical devices outside of healthcare facilities inevitably requires connectivity and interoperability between medical devices and healthcare information systems. To this end, standards have been developed and used to provide interoperability between personal health devices (PHDs) and external systems. ISO/IEEE 11073 standards and IHE PCD-01 standard messages have been used the most in the exchange of observation data of health devices. Recently, transmitting observation data using the HL7 FHIR standard has been devised in the name of DoF (Devices on FHIR) and adopted very fast. We compare and analyze these standards and suggest that which standard will work best at the different environments of device usage. Methods We generated each message/resource of the three standards for observed vital signs from blood pressure monitor and thermometer. Then, the size, the contents, and the exchange processes of these messages are compared and analyzed. Results ISO/IEEE 11073 standard message has the smallest data size, but it has no ability to contain the key information, patient information. On the other hand, PCD-01 messages and FHIR standards have the fields for patient information. HL7 DoF standards provide reusing of information unit known as resource, and it is relatively easy to parse DoF messages since it uses widely known XML and JSON. Conclusions ISO/IEEE 11073 standards are suitable for devices having very small computing power. IHE PCD-01 and HL7 DoF messages can be used for the devices that need to be connected to hospital information systems that require patient information. When information reuse is frequent, DoF is advantageous over PCD-01. PMID:29503752

  19. Comparison and Analysis of ISO/IEEE 11073, IHE PCD-01, and HL7 FHIR Messages for Personal Health Devices.

    PubMed

    Lee, Sungkee; Do, Hyoungho

    2018-01-01

    Increasing use of medical devices outside of healthcare facilities inevitably requires connectivity and interoperability between medical devices and healthcare information systems. To this end, standards have been developed and used to provide interoperability between personal health devices (PHDs) and external systems. ISO/IEEE 11073 standards and IHE PCD-01 standard messages have been used the most in the exchange of observation data of health devices. Recently, transmitting observation data using the HL7 FHIR standard has been devised in the name of DoF (Devices on FHIR) and adopted very fast. We compare and analyze these standards and suggest that which standard will work best at the different environments of device usage. We generated each message/resource of the three standards for observed vital signs from blood pressure monitor and thermometer. Then, the size, the contents, and the exchange processes of these messages are compared and analyzed. ISO/IEEE 11073 standard message has the smallest data size, but it has no ability to contain the key information, patient information. On the other hand, PCD-01 messages and FHIR standards have the fields for patient information. HL7 DoF standards provide reusing of information unit known as resource, and it is relatively easy to parse DoF messages since it uses widely known XML and JSON. ISO/IEEE 11073 standards are suitable for devices having very small computing power. IHE PCD-01 and HL7 DoF messages can be used for the devices that need to be connected to hospital information systems that require patient information. When information reuse is frequent, DoF is advantageous over PCD-01.

  20. Automotive Research Center

    Science.gov Websites

    7, 2018, LA Times) Dr. Jason Siegel to chair IEEE Technical Committee on Automotive Controls (Feb 2018, IEEE) Dr. Anna Stefanopoulou on research of sustainable vehicle technologies (Jan 24, 2018, WEMU ) Stefanopoulou plenary at IEEE 56th CDC (Jan 17, 2018, ME) ARC Researchers at IEEE 56th Conf. Decision and

  1. ARC Events

    Science.gov Websites

    chair IEEE Technical Committee on Automotive Controls (Feb 2018, IEEE) Dr. Anna Stefanopoulou on research of sustainable vehicle technologies (Jan 24, 2018, WEMU) Stefanopoulou plenary at IEEE 56th CDC (Jan 17, 2018, ME) ARC Researchers at IEEE 56th Conf. Decision and Control (Dec 12-14, 2017, CDC) ARC

  2. A Tralinet Guide to the Internet

    DTIC Science & Technology

    1994-02-01

    Internet surfers often get stuck. The Internet is new, evolving, constantly changing, designed by computer system people rather than information retrieval...Librarians are already getting questions daily about Internet -accessible resources: providing information for their customers is about to get far...InterNIC. These are the best tools we have for looking up information about various Internet hosts. The DDN Network Information Center (NIC) is best for

  3. Internet Use among Ugandan Adolescents: Implications for HIV Intervention

    PubMed Central

    Ybarra, Michele L; Kiwanuka, Julius; Emenyonu, Nneka; Bangsberg, David R

    2006-01-01

    Background The Internet is fast gaining recognition as a powerful, low-cost method to deliver health intervention and prevention programs to large numbers of young people across diverse geographic regions. The feasibility and accessibility of Internet-based health interventions in resource-limited settings, where cost-effective interventions are most needed, is unknown. To determine the utility of developing technology-based interventions in resource-limited settings, availability and patterns of usage of the Internet first need to be assessed. Methods and Findings The Uganda Media and You Survey was a cross-sectional survey of Internet use among adolescents (ages 12–18 years) in Mbarara, Uganda, a municipality mainly serving a rural population in sub-Saharan Africa. Participants were randomly selected among eligible students attending one of five participating secondary day and boarding schools in Mbarara, Uganda. Of a total of 538 students selected, 93% (500) participated. Of the total respondents, 45% (223) reported ever having used the Internet, 78% (175) of whom reported going online in the previous week. As maternal education increased, so too did the odds of adolescent Internet use. Almost two in five respondents (38% [189]) reported already having used a computer or the Internet to search for health information. Over one-third (35% [173]) had used the computer or Internet to find information about HIV/AIDS, and 20% (102) had looked for sexual health information. Among Internet users, searching for HIV/AIDS information on a computer or online was significantly related to using the Internet weekly, emailing, visiting chat rooms, and playing online games. In contrast, going online at school was inversely related to looking for HIV/AIDS information via technology. If Internet access were free, 66% (330) reported that they would search for information about HIV/AIDS prevention online. Conclusions Both the desire to use, and the actual use of, the Internet to seek sexual health and HIV/AIDS information is high among secondary school students in Mbarara. The Internet may be a promising strategy to deliver low-cost HIV/AIDS risk reduction interventions in resource-limited settings with expanding Internet access. PMID:17090211

  4. Internet use among Ugandan adolescents: implications for HIV intervention.

    PubMed

    Ybarra, Michele L; Kiwanuka, Julius; Emenyonu, Nneka; Bangsberg, David R

    2006-11-01

    The Internet is fast gaining recognition as a powerful, low-cost method to deliver health intervention and prevention programs to large numbers of young people across diverse geographic regions. The feasibility and accessibility of Internet-based health interventions in resource-limited settings, where cost-effective interventions are most needed, is unknown. To determine the utility of developing technology-based interventions in resource-limited settings, availability and patterns of usage of the Internet first need to be assessed. The Uganda Media and You Survey was a cross-sectional survey of Internet use among adolescents (ages 12-18 years) in Mbarara, Uganda, a municipality mainly serving a rural population in sub-Saharan Africa. Participants were randomly selected among eligible students attending one of five participating secondary day and boarding schools in Mbarara, Uganda. Of a total of 538 students selected, 93% (500) participated. Of the total respondents, 45% (223) reported ever having used the Internet, 78% (175) of whom reported going online in the previous week. As maternal education increased, so too did the odds of adolescent Internet use. Almost two in five respondents (38% [189]) reported already having used a computer or the Internet to search for health information. Over one-third (35% [173]) had used the computer or Internet to find information about HIV/AIDS, and 20% (102) had looked for sexual health information. Among Internet users, searching for HIV/AIDS information on a computer or online was significantly related to using the Internet weekly, emailing, visiting chat rooms, and playing online games. In contrast, going online at school was inversely related to looking for HIV/AIDS information via technology. If Internet access were free, 66% (330) reported that they would search for information about HIV/AIDS prevention online. Both the desire to use, and the actual use of, the Internet to seek sexual health and HIV/AIDS information is high among secondary school students in Mbarara. The Internet may be a promising strategy to deliver low-cost HIV/AIDS risk reduction interventions in resource-limited settings with expanding Internet access.

  5. Towards the Internet of Smart Trains: A Review on Industrial IoT-Connected Railways.

    PubMed

    Fraga-Lamas, Paula; Fernández-Caramés, Tiago M; Castedo, Luis

    2017-06-21

    Nowadays, the railway industry is in a position where it is able to exploit the opportunities created by the IIoT (Industrial Internet of Things) and enabling communication technologies under the paradigm of Internet of Trains. This review details the evolution of communication technologies since the deployment of GSM-R, describing the main alternatives and how railway requirements, specifications and recommendations have evolved over time. The advantages of the latest generation of broadband communication systems (e.g., LTE, 5G, IEEE 802.11ad) and the emergence of Wireless Sensor Networks (WSNs) for the railway environment are also explained together with the strategic roadmap to ensure a smooth migration from GSM-R. Furthermore, this survey focuses on providing a holistic approach, identifying scenarios and architectures where railways could leverage better commercial IIoT capabilities. After reviewing the main industrial developments, short and medium-term IIoT-enabled services for smart railways are evaluated. Then, it is analyzed the latest research on predictive maintenance, smart infrastructure, advanced monitoring of assets, video surveillance systems, railway operations, Passenger and Freight Information Systems (PIS/FIS), train control systems, safety assurance, signaling systems, cyber security and energy efficiency. Overall, it can be stated that the aim of this article is to provide a detailed examination of the state-of-the-art of different technologies and services that will revolutionize the railway industry and will allow for confronting today challenges.

  6. Review on Li-Fi Technology

    NASA Astrophysics Data System (ADS)

    Chaudhuri, Rajarshi Roy; Dutta, Kaustav; Saha, Archisman

    With advent of various communication technologies one can access the whole world at one go. The impact of internet on our day to day life has been so extensive that it is impossible to think of a day without it. It has become a fundamental requirement in our daily lives. Survey reports show that nearly 46 % of homes throughout the world have access to the internet. And the percentage is growing each day. With such a high demand there has been a looming Radio Frequency spectrum crisis, which paved the way of the invention of a new technology:-LI-FI. LI-FI, acronym of light fidelity, is a new wireless technology which has the ability to provide high speed internet connection within localized environment. Till today we are familiar with WI-FI which uses radio spectrum for communication. Even though it gives a speed of nearly 150 Mbps (as per IEEE802.11n), it isn't sufficient to satisfy all users. On the other hand LI-FI uses spectrum which comprises a wide range of frequencies, from the infrared through visible, down to the ultraviolet spectrum for communication which has the ability to produce a theoretical speed of 10 Gbps. It is not only confined to light-emitting diode (LED) or laser technology or to any specific receiving technique, LI-FI is a framework for all those technologies which provides new ways to all present as well as future services or applications.

  7. Towards the Internet of Smart Trains: A Review on Industrial IoT-Connected Railways

    PubMed Central

    Fraga-Lamas, Paula; Fernández-Caramés, Tiago M.; Castedo, Luis

    2017-01-01

    Nowadays, the railway industry is in a position where it is able to exploit the opportunities created by the IIoT (Industrial Internet of Things) and enabling communication technologies under the paradigm of Internet of Trains. This review details the evolution of communication technologies since the deployment of GSM-R, describing the main alternatives and how railway requirements, specifications and recommendations have evolved over time. The advantages of the latest generation of broadband communication systems (e.g., LTE, 5G, IEEE 802.11ad) and the emergence of Wireless Sensor Networks (WSNs) for the railway environment are also explained together with the strategic roadmap to ensure a smooth migration from GSM-R. Furthermore, this survey focuses on providing a holistic approach, identifying scenarios and architectures where railways could leverage better commercial IIoT capabilities. After reviewing the main industrial developments, short and medium-term IIoT-enabled services for smart railways are evaluated. Then, it is analyzed the latest research on predictive maintenance, smart infrastructure, advanced monitoring of assets, video surveillance systems, railway operations, Passenger and Freight Information Systems (PIS/FIS), train control systems, safety assurance, signaling systems, cyber security and energy efficiency. Overall, it can be stated that the aim of this article is to provide a detailed examination of the state-of-the-art of different technologies and services that will revolutionize the railway industry and will allow for confronting today challenges. PMID:28635672

  8. 11 CFR 100.94 - Uncompensated Internet activity by individuals that is not a contribution.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... of another person's Web site; and any other form of communication distributed over the Internet. (c... not limited to: Computers, software, Internet domain names, Internet Service Providers (ISP), and any... definition of contribution: (1) Any payment for a public communication (as defined in 11 CFR 100.26) other...

  9. 11 CFR 100.94 - Uncompensated Internet activity by individuals that is not a contribution.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... of another person's Web site; and any other form of communication distributed over the Internet. (c... not limited to: Computers, software, Internet domain names, Internet Service Providers (ISP), and any... definition of contribution: (1) Any payment for a public communication (as defined in 11 CFR 100.26) other...

  10. 11 CFR 100.155 - Uncompensated Internet activity by individuals that is not an expenditure.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... another person's website; and any other form of communication distributed over the Internet. (c) Equipment... limited to: Computers, software, Internet domain names, Internet Service Providers (ISP), and any other...: (1) Any payment for a public communication (as defined in 11 CFR 100.26) other than a nominal fee; (2...

  11. 11 CFR 100.155 - Uncompensated Internet activity by individuals that is not an expenditure.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... another person's website; and any other form of communication distributed over the Internet. (c) Equipment... limited to: Computers, software, Internet domain names, Internet Service Providers (ISP), and any other...: (1) Any payment for a public communication (as defined in 11 CFR 100.26) other than a nominal fee; (2...

  12. Internet-based versus traditional teaching and learning methods.

    PubMed

    Guarino, Salvatore; Leopardi, Eleonora; Sorrenti, Salvatore; De Antoni, Enrico; Catania, Antonio; Alagaratnam, Swethan

    2014-10-01

    The rapid and dramatic incursion of the Internet and social networks in everyday life has revolutionised the methods of exchanging data. Web 2.0 represents the evolution of the Internet as we know it. Internet users are no longer passive receivers, and actively participate in the delivery of information. Medical education cannot evade this process. Increasingly, students are using tablets and smartphones to instantly retrieve medical information on the web or are exchanging materials on their Facebook pages. Medical educators cannot ignore this continuing revolution, and therefore the traditional academic schedules and didactic schemes should be questioned. Analysing opinions collected from medical students regarding old and new teaching methods and tools has become mandatory, with a view towards renovating the process of medical education. A cross-sectional online survey was created with Google® docs and administrated to all students of our medical school. Students were asked to express their opinion on their favourite teaching methods, learning tools, Internet websites and Internet delivery devices. Data analysis was performed using spss. The online survey was completed by 368 students. Although textbooks remain a cornerstone for training, students also identified Internet websites, multimedia non-online material, such as the Encyclopaedia on CD-ROM, and other non-online computer resources as being useful. The Internet represented an important aid to support students' learning needs, but textbooks are still their resource of choice. Among the websites noted, Google and Wikipedia significantly surpassed the peer-reviewed medical databases, and access to the Internet was primarily through personal computers in preference to other Internet access devices, such as mobile phones and tablet computers. Increasingly, students are using tablets and smartphones to instantly retrieve medical information. © 2014 John Wiley & Sons Ltd.

  13. The Latinas' Guide to the Information Superhighway: A Bilingual Guide for Latinas by Latinas = Guia para Mujeres Latinas sobre la Supercarretera de la Informacion: Una Guia Bilingue para Latinas por medio de Latinas.

    ERIC Educational Resources Information Center

    MANA, A National Latina Organization, Washington, DC.

    This guide to the Internet is designed to give Latinas basic information on computers and the information superhighway. Written in both Spanish and English, the guide begins by defining the Internet and making some suggestions about acquiring access to a computer. Among the topics discussed are how to choose an Internet service provider, how to…

  14. Design and implementation of a P300-based brain-computer interface for controlling an internet browser.

    PubMed

    Mugler, Emily M; Ruf, Carolin A; Halder, Sebastian; Bensch, Michael; Kubler, Andrea

    2010-12-01

    An electroencephalographic (EEG) brain-computer interface (BCI) internet browser was designed and evaluated with 10 healthy volunteers and three individuals with advanced amyotrophic lateral sclerosis (ALS), all of whom were given tasks to execute on the internet using the browser. Participants with ALS achieved an average accuracy of 73% and a subsequent information transfer rate (ITR) of 8.6 bits/min and healthy participants with no prior BCI experience over 90% accuracy and an ITR of 14.4 bits/min. We define additional criteria for unrestricted internet access for evaluation of the presented and future internet browsers, and we provide a review of the existing browsers in the literature. The P300-based browser provides unrestricted access and enables free web surfing for individuals with paralysis.

  15. Computers and Kids: Pulling the Plug Can Protect the Planet.

    ERIC Educational Resources Information Center

    Moll, Marita

    2003-01-01

    Asserts younger children spend too much time playing video games and accessing the Internet. Describes harmful effects. Cites advice from experts to restrict computer and Internet use. Advises parents and teachers to be more diligent in supervising children's use of information technology. (Contains 17 references.) (PKP)

  16. Schools (Students) Exchanging CAD/CAM Files over the Internet.

    ERIC Educational Resources Information Center

    Mahoney, Gary S.; Smallwood, James E.

    This document discusses how students and schools can benefit from exchanging computer-aided design/computer-aided manufacturing (CAD/CAM) files over the Internet, explains how files are exchanged, and examines the problem of selected hardware/software incompatibility. Key terms associated with information search services are defined, and several…

  17. ICT Proficiency and Gender: A Validation on Training and Development

    ERIC Educational Resources Information Center

    Lin, Shinyi; Shih, Tse-Hua; Lu, Ruiling

    2013-01-01

    Use of innovative learning/instruction mode, embedded in the Certification Pathway System (CPS) developed by Certiport TM, is geared toward Internet and Computing Benchmark & Mentor specifically for IC[superscript 3] certification. The Internet and Computing Core Certification (IC[superscript 3]), as an industry-based credentialing program,…

  18. Computer Programming and Biomolecular Structure Studies: A Step beyond Internet Bioinformatics

    ERIC Educational Resources Information Center

    Likic, Vladimir A.

    2006-01-01

    This article describes the experience of teaching structural bioinformatics to third year undergraduate students in a subject titled "Biomolecular Structure and Bioinformatics." Students were introduced to computer programming and used this knowledge in a practical application as an alternative to the well established Internet bioinformatics…

  19. Adaptive, Tactical Mesh Networking: Control Base MANET Model

    DTIC Science & Technology

    2010-09-01

    pp. 316–320 Available: IEEE Xplore , http://ieeexplore.ieee.org [Accessed: June 9, 2010]. [5] N. Sidiropoulos, “Multiuser Transmit Beamforming...Mobile Mesh Segments of TNT Testbed .......... 11 Figure 5. Infrastructure and Ad Hoc Mode of IEEE 802.11................................ 13 Figure...6. The Power Spectral Density of OFDM................................................ 14 Figure 7. A Typical IEEE 802.16 Network

  20. A hybrid optical switch architecture to integrate IP into optical networks to provide flexible and intelligent bandwidth on demand for cloud computing

    NASA Astrophysics Data System (ADS)

    Yang, Wei; Hall, Trevor J.

    2013-12-01

    The Internet is entering an era of cloud computing to provide more cost effective, eco-friendly and reliable services to consumer and business users. As a consequence, the nature of the Internet traffic has been fundamentally transformed from a pure packet-based pattern to today's predominantly flow-based pattern. Cloud computing has also brought about an unprecedented growth in the Internet traffic. In this paper, a hybrid optical switch architecture is presented to deal with the flow-based Internet traffic, aiming to offer flexible and intelligent bandwidth on demand to improve fiber capacity utilization. The hybrid optical switch is capable of integrating IP into optical networks for cloud-based traffic with predictable performance, for which the delay performance of the electronic module in the hybrid optical switch architecture is evaluated through simulation.

  1. Utilization of internet technology by low-income adults: the role of health literacy, health numeracy, and computer assistance.

    PubMed

    Jensen, Jakob D; King, Andy J; Davis, LaShara A; Guntzviller, Lisa M

    2010-09-01

    To examine whether low-income adults' utilization of Internet technology is predicted or mediated by health literacy, health numeracy, and computer assistance. Low-income adults (N = 131) from the midwestern United States were surveyed about their technology access and use. Individuals with low health literacy skills were less likely to use Internet technology (e.g., email, search engines, and online health information seeking), and those with low health numeracy skills were less likely to have access to Internet technology (e.g., computers and cell phones). Consistent with past research, males, older participants, and those with less education were less likely to search for health information online. The relationship between age and online health information seeking was mediated by participant literacy. The present study suggests that significant advances in technology access and use could be sparked by developing technology interfaces that are accessible to individuals with limited literacy skills.

  2. Gaming Device Usage Patterns Predict Internet Gaming Disorder: Comparison across Different Gaming Device Usage Patterns.

    PubMed

    Paik, Soo-Hyun; Cho, Hyun; Chun, Ji-Won; Jeong, Jo-Eun; Kim, Dai-Jin

    2017-12-05

    Gaming behaviors have been significantly influenced by smartphones. This study was designed to explore gaming behaviors and clinical characteristics across different gaming device usage patterns and the role of the patterns on Internet gaming disorder (IGD). Responders of an online survey regarding smartphone and online game usage were classified by different gaming device usage patterns: (1) individuals who played only computer games; (2) individuals who played computer games more than smartphone games; (3) individuals who played computer and smartphone games evenly; (4) individuals who played smartphone games more than computer games; (5) individuals who played only smartphone games. Data on demographics, gaming-related behaviors, and scales for Internet and smartphone addiction, depression, anxiety disorder, and substance use were collected. Combined users, especially those who played computer and smartphone games evenly, had higher prevalence of IGD, depression, anxiety disorder, and substance use disorder. These subjects were more prone to develop IGD than reference group (computer only gamers) (B = 0.457, odds ratio = 1.579). Smartphone only gamers had the lowest prevalence of IGD, spent the least time and money on gaming, and showed lowest scores of Internet and smartphone addiction. Our findings suggest that gaming device usage patterns may be associated with the occurrence, course, and prognosis of IGD.

  3. Reliability of a computer and Internet survey (Computer User Profile) used by adults with and without traumatic brain injury (TBI).

    PubMed

    Kilov, Andrea M; Togher, Leanne; Power, Emma

    2015-01-01

    To determine test-re-test reliability of the 'Computer User Profile' (CUP) in people with and without TBI. The CUP was administered on two occasions to people with and without TBI. The CUP investigated the nature and frequency of participants' computer and Internet use. Intra-class correlation coefficients and kappa coefficients were conducted to measure reliability of individual CUP items. Descriptive statistics were used to summarize content of responses. Sixteen adults with TBI and 40 adults without TBI were included in the study. All participants were reliable in reporting demographic information, frequency of social communication and leisure activities and computer/Internet habits and usage. Adults with TBI were reliable in 77% of their responses to survey items. Adults without TBI were reliable in 88% of their responses to survey items. The CUP was practical and valuable in capturing information about social, leisure, communication and computer/Internet habits of people with and without TBI. Adults without TBI scored more items with satisfactory reliability overall in their surveys. Future studies may include larger samples and could also include an exploration of how people with/without TBI use other digital communication technologies. This may provide further information on determining technology readiness for people with TBI in therapy programmes.

  4. Gaming Device Usage Patterns Predict Internet Gaming Disorder: Comparison across Different Gaming Device Usage Patterns

    PubMed Central

    Cho, Hyun; Chun, Ji-Won; Jeong, Jo-Eun; Kim, Dai-Jin

    2017-01-01

    Gaming behaviors have been significantly influenced by smartphones. This study was designed to explore gaming behaviors and clinical characteristics across different gaming device usage patterns and the role of the patterns on Internet gaming disorder (IGD). Responders of an online survey regarding smartphone and online game usage were classified by different gaming device usage patterns: (1) individuals who played only computer games; (2) individuals who played computer games more than smartphone games; (3) individuals who played computer and smartphone games evenly; (4) individuals who played smartphone games more than computer games; (5) individuals who played only smartphone games. Data on demographics, gaming-related behaviors, and scales for Internet and smartphone addiction, depression, anxiety disorder, and substance use were collected. Combined users, especially those who played computer and smartphone games evenly, had higher prevalence of IGD, depression, anxiety disorder, and substance use disorder. These subjects were more prone to develop IGD than reference group (computer only gamers) (B = 0.457, odds ratio = 1.579). Smartphone only gamers had the lowest prevalence of IGD, spent the least time and money on gaming, and showed lowest scores of Internet and smartphone addiction. Our findings suggest that gaming device usage patterns may be associated with the occurrence, course, and prognosis of IGD. PMID:29206183

  5. View-Dependent Simplification of Arbitrary Polygonal Environments

    DTIC Science & Technology

    2006-01-01

    of backfacing nodes are not rendered [ Kumar 96]. 4.3 Triangle-Budget Simplification The screenspace error threshold and silhouette test allow the user...Greg Turk, and Dinesh Manocha for their invaluable guidance and support throughout this project. Funding for this work was provided by DARPA...Proceedings Visualization 95 , IEEE Computer Society Press (Atlanta, GA), 1995, pp. 296-303. [ Kumar 96] Kumar , Subodh, D. Manocha, W. Garrett, M. Lin

  6. The Present Status of the Field of Digital Computer Based Industrial Control Systems and the Work of the International Purdue Workshop in Helping to Promote this Field

    DTIC Science & Technology

    1978-09-01

    Strategy for a Class of Static Systems", IEEE Trans, on Auto. Cont., AC-17, 7-15 (1972). 14. Findeisen , W., and Lefkowitz, I., "Design and Applications...of Multilayer Control", Proc. Fourth IFAC Congress, Warsaw, 1969. 15. Findeisen , W., Multilevel Control Systems, Panstwowe Wydawnictwo Naukowe

  7. High-Fidelity Design of Multimodal Restorative Interventions in Gulf War Illness

    DTIC Science & Technology

    2017-10-01

    Bockmayr A, Klarner H, Siebert H. Time series dependent analysis of unparametrized Thomas networks. IEEE/ACM Transactions on Computational Biology and...Award Number: W81XWH-15-1-0582 TITLE:High-Fidelity Design of Multimodal Restorative Interventions in Gulf War Illness PRINCIPAL INVESTIGATOR...not be construed as an official Department of the Army position, policy or decision unless so designated by other documentation. REPORT

  8. Observation Uncertainty in Gaussian Sensor Networks

    DTIC Science & Technology

    2006-01-23

    Ziv , J., and Lempel , A. A universal algorithm for sequential data compression . IEEE Transactions on Information Theory 23, 3 (1977), 337–343. 73 ...using the Lempel - Ziv algorithm [42], context-tree weighting [41], or the Burrows-Wheeler Trans- form [4], [15], for example. These source codes will...and Computation (Monticello, IL, September 2004). [4] Burrows, M., and Wheeler, D. A block sorting lossless data compression algorithm . Tech.

  9. Investigation of a Nanowire Electronic Nose by Computer Simulation

    DTIC Science & Technology

    2009-04-14

    R. D. Mileham, and D. W. Galipeau. Gas sensing based on inelastic electron tunneling spectroscopy. IEEE Sensors Journal, 8(6):983988, 2008. [6] J...explosives in the hold of passenger aircraft . More generally they can be used to detect the presence of molecules that could be a threat to human health...design suitable for subsequent fabrication and then characterization. 15. SUBJECT TERMS EOARD, Sensor Technology, electronic

  10. A Spatiotemporal Clustering Approach to Maritime Domain Awareness

    DTIC Science & Technology

    2013-09-01

    1997. [25] M. E. Celebi, “Effective initialization of k-means for color quantization,” 16th IEEE International Conference on Image Processing (ICIP...release; distribution is unlimited 12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) Spatiotemporal clustering is the process of grouping...Department of Electrical and Computer Engineering iv THIS PAGE INTENTIONALLY LEFT BLANK v ABSTRACT Spatiotemporal clustering is the process of

  11. Three-Dimensional Visualization of Ozone Process Data.

    DTIC Science & Technology

    1997-06-18

    Scattered Multivariate Data. IEEE Computer Graphics & Applications. 11 (May), 47-55. Odman, M.T. and Ingram, C.L. (1996) Multiscale Air Quality Simulation...the Multiscale Air Quality Simulation Platform (MAQSIP) modeling system. MAQSIP is a modular comprehensive air quality modeling system which MCNC...photolyzed back again to nitric oxide. Finally, oxides of 6 nitrogen are terminated through loss or combination into nitric acid, organic nitrates

  12. Assisting Design Given Multiple Performance Criteria

    DTIC Science & Technology

    1988-08-01

    with uninstantiated operators is created then each operator’s implementation is selected. g - Keywords: computer-aided design, artificial...IEEE Trans- actions on Software Engineering, SE-7(1), 1981. [BG86] Forrest D. Brewer and Daniel D. Gajski . An expert-system paradigm for de- sign. In...Teukolsky, api William T. Vet- terling. Numerical Recipes. Cambridge University Press, Cambridge, England, 1987. [RFS83] G . G . Rassweiler, M. D

  13. World Wide Web as a Research Tool for Self Motivated Learning of Ozone

    ERIC Educational Resources Information Center

    Hanna, Kim

    2009-01-01

    Student use of computers and the internet has increased rapidly in recent years. Teachers ask what types of learning experiences can be facilitated by using the internet in their classrooms (NSBF, 2007). Various surveys of U.S. teachers on internet usage report that having students use the internet for research and information gathering purposes…

  14. Broadband in Schools: Effects on Student Performance and Spillovers for Household Internet Adoption

    ERIC Educational Resources Information Center

    Belo, Rodrigo

    2012-01-01

    This work comprises studies on the effects of broadband Internet in schools at three different levels: student performance, household Internet adoption, and individual computer and Internet use patterns and skill acquisition. I focus in the case of Portugal, where by 2006 the Portuguese government had completed a major initiative that upgraded the…

  15. An Informal Discussion on Internet Matters. Moral Construction for Children and Young People

    ERIC Educational Resources Information Center

    Shaoguang, Yang

    2006-01-01

    The social problems triggered by Internet are legion. Computer games and such high-tech achievements of the Internet that used to be regarded as "angels" are today frequently playing the role of "demons." As the times advance, Internet ethics have become a new challenge facing educational workers. Today, when our country is…

  16. Summary of Internet Terms and Resources. NRC Fact Sheet

    ERIC Educational Resources Information Center

    Zubal, Rachael; Hall, Mair

    2010-01-01

    What is the Internet? The Internet is a worldwide network of computers communicating with each other. This paper offers some basic, easy-to-understand meanings of words about the Internet that individuals may have questions about.[The preparation of this fact sheet was supported in part by the National Resource Center on Supported Living and…

  17. An infrastructure with a unified control plane to integrate IP into optical metro networks to provide flexible and intelligent bandwidth on demand for cloud computing

    NASA Astrophysics Data System (ADS)

    Yang, Wei; Hall, Trevor

    2012-12-01

    The Internet is entering an era of cloud computing to provide more cost effective, eco-friendly and reliable services to consumer and business users and the nature of the Internet traffic will undertake a fundamental transformation. Consequently, the current Internet will no longer suffice for serving cloud traffic in metro areas. This work proposes an infrastructure with a unified control plane that integrates simple packet aggregation technology with optical express through the interoperation between IP routers and electrical traffic controllers in optical metro networks. The proposed infrastructure provides flexible, intelligent, and eco-friendly bandwidth on demand for cloud computing in metro areas.

  18. Multimodal Task-Driven Dictionary Learning for Image Classification

    DTIC Science & Technology

    2015-12-18

    1 Multimodal Task-Driven Dictionary Learning for Image Classification Soheil Bahrampour, Student Member, IEEE, Nasser M. Nasrabadi, Fellow, IEEE...Asok Ray, Fellow, IEEE, and W. Kenneth Jenkins, Life Fellow, IEEE Abstract— Dictionary learning algorithms have been suc- cessfully used for both...reconstructive and discriminative tasks, where an input signal is represented with a sparse linear combination of dictionary atoms. While these methods are

  19. Validating the Test Procedures Described in UL 1741 SA and IEEE P1547.1: Preprint

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mahmud, Rasel; Hoke, Anderson F; Narang, David J

    This paper investigates the test procedures specified in UL 1741 SA and the upcoming revision to IEEE P1547.1. A 550 kVA photovoltaic inverter was chosen for the tests. This research reveals some of key the components to consider while doing certification tests for UL 1741 SA and IEEE P1547.1. This paper also identifies some issues requiring consideration for future releases of the standard, i.e. IEEE P1547.1. This paper investigates the test procedures specified in UL 1741 SA and the upcoming revision to IEEE P1547.1. A 550 kVA photovoltaic inverter was chosen for the tests. This research reveals some of keymore » the components to consider while doing certification tests for UL 1741 SA and IEEE P1547.1. This paper also identifies some issues requiring consideration for future releases of the standard, i.e. IEEE P1547.1.« less

  20. An Exploratory Study of Internet Addiction, Usage and Communication Pleasure.

    ERIC Educational Resources Information Center

    Chou, Chien; Chou, Jung; Tyan, Nay-Ching Nancy

    This study examined the correlation between Internet addiction, usage, and communication pleasure. Research questions were: (1) What is computer network addiction? (2) How can one measure the degree of computer network addiction? (3) What is the correlation between the degree of users' network addiction and their network usage? (4) What is the…

  1. Adapting to the Era of Information

    ERIC Educational Resources Information Center

    Stuart, Reginald

    2008-01-01

    Despite having wireless connectivity to the Internet on campus, the students at Northwest Indian College could not afford a laptop computer of their own to access the Internet. Using the school's three computer labs was also problematic, as many students were working parents who traveled long distances and had little time to stay on campus after…

  2. 11 CFR 111.35 - If the respondent decides to challenge the alleged violation or proposed civil money penalty...

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... staff; (4) Committee computer, software or Internet service provider failures; (5) A committee's failure... software despite the respondent seeking technical assistance from Commission personnel and resources; (2) A... Commission's or respondent's computer systems or Internet service provider; and (3) Severe weather or other...

  3. Packet spacing : an enabling mechanism for delivering multimedia content in computational grids /

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Feng, A. C.; Feng, W. C.; Belford, Geneva G.

    2001-01-01

    Streaming multimedia with UDP has become increasingly popular over distributed systems like the Internet. Scientific applications that stream multimedia include remote computational steering of visualization data and video-on-demand teleconferencing over the Access Grid. However, UDP does not possess a self-regulating, congestion-control mechanism; and most best-efort traflc is served by congestion-controlled TCF! Consequently, UDP steals bandwidth from TCP such that TCP$ows starve for network resources. With the volume of Internet traffic continuing to increase, the perpetuation of UDP-based streaming will cause the Internet to collapse as it did in the mid-1980's due to the use of non-congestion-controlled TCP. To address thismore » problem, we introduce the counterintuitive notion of inter-packet spacing with control feedback to enable UDP-based applications to perform well in the next-generation Internet and computational grids. When compared with traditional UDP-based streaming, we illustrate that our approach can reduce packet loss over SO% without adversely afecting delivered throughput. Keywords: network protocol, multimedia, packet spacing, streaming, TCI: UDlq rate-adjusting congestion control, computational grid, Access Grid.« less

  4. Use of computers and Internet among people with severe mental illnesses at peer support centers.

    PubMed

    Brunette, Mary F; Aschbrenner, Kelly A; Ferron, Joelle C; Ustinich, Lee; Kelly, Michael; Grinley, Thomas

    2017-12-01

    Peer support centers are an ideal setting where people with severe mental illnesses can access the Internet via computers for online health education, peer support, and behavioral treatments. The purpose of this study was to assess computer use and Internet access in peer support agencies. A peer-assisted survey assessed the frequency with which consumers in all 13 New Hampshire peer support centers (n = 702) used computers to access Internet resources. During the 30-day survey period, 200 of the 702 peer support consumers (28%) responded to the survey. More than 3 quarters (78.5%) of respondents had gone online to seek information in the past year. About half (49%) of respondents were interested in learning about online forums that would provide information and peer support for mental health issues. Peer support centers may be a useful venue for Web-based approaches to education, peer support, and intervention. Future research should assess facilitators and barriers to use of Web-based resources among people with severe mental illness in peer support centers. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  5. Two tradeoffs between economy and reliability in loss of load probability constrained unit commitment

    NASA Astrophysics Data System (ADS)

    Liu, Yuan; Wang, Mingqiang; Ning, Xingyao

    2018-02-01

    Spinning reserve (SR) should be scheduled considering the balance between economy and reliability. To address the computational intractability cursed by the computation of loss of load probability (LOLP), many probabilistic methods use simplified formulations of LOLP to improve the computational efficiency. Two tradeoffs embedded in the SR optimization model are not explicitly analyzed in these methods. In this paper, two tradeoffs including primary tradeoff and secondary tradeoff between economy and reliability in the maximum LOLP constrained unit commitment (UC) model are explored and analyzed in a small system and in IEEE-RTS System. The analysis on the two tradeoffs can help in establishing new efficient simplified LOLP formulations and new SR optimization models.

  6. 46 CFR 111.60-1 - Construction and testing of cable.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... identification of either IEEE 1580, UL 1309, IEC 92-353, or NPFC MIL-C-24640A or NPFC MIL-C-24643A (all five... 110.10-1). (c) Medium-voltage electric cable must meet the requirements of IEEE 1580 and UL 1072... 1309, IEEE 1580, or section 8 of IEEE 45-2002 (incorporated by reference; see 46 CFR 110.10-1). (e...

  7. Menopause on the Internet: building knowledge and community on-line.

    PubMed

    MacPherson, K I

    1997-09-01

    Computers are ubiquitous throughout the developed world. Diverse discourses address the pros and cons of using this technology in higher education. Nursing has extensively used informatics but has not, as yet, been involved to any extent in teaching on the Internet. I argue that nurse educators should use computer technology to present substantive and rigorous courses that deal with complex issues, using menopause as an example. A for-credit menopause course I taught via e-mail is used to illustrate the possibility of building knowledge and a sense of community on the Internet.

  8. Brief Report: Examining the Link between Autistic Traits and Compulsive Internet Use in a Non-Clinical Sample

    ERIC Educational Resources Information Center

    Finkenauer, Catrin; Pollmann, Monique M. H.; Begeer, Sander; Kerkhof, Peter

    2012-01-01

    Individuals with autism spectrum disorders or autistic traits may profit from Internet and computer-mediated interactions, but there is concern about their Internet use becoming compulsive. This study investigated the link between autistic traits and Internet use in a 2-wave longitudinal study with a non-clinical community sample (n = 390). As…

  9. Addiction to the internet and online gaming.

    PubMed

    Ng, Brian D; Wiemer-Hastings, Peter

    2005-04-01

    As computer and Internet use become a staple of everyday life, the potential for overuse is introduced, which may lead to addiction. Research on Internet addiction has shown that users can become addicted to it. Addiction to the Internet shares some of the negative aspects of substance addiction and has been shown to lead to consequences such as failing school, family, and relationship problems.

  10. Academic Self-Efficacy and Academic Procrastination as Predictors of Problematic Internet Use in University Students

    ERIC Educational Resources Information Center

    Odaci, Hatice

    2011-01-01

    Although computers and the internet, indispensable tools in people's lives today, facilitate life on the one hand, they have brought new risks with them on the other. Internet dependency, or problematic internet use, has emerged as a new concept of addiction. Parallel to this increasing in society in general, it is also on the rise among…

  11. The Mac Internet Tour Guide: Cruising the Internet the Easy Way. [First Edition.

    ERIC Educational Resources Information Center

    Fraase, Michael

    Published exclusively for MacIntosh computer users, this guide provides an overview of Internet resources for new and experienced users. E-mail, file transfer, and decompression software used to access the resources are included on a 800k, 3.5 inch disk. The following chapters are included: (1) "What Is the Internet" covers finding your…

  12. A meta-review of Internet computer-based psychological treatments for anxiety disorders.

    PubMed

    Peñate, Wenceslao; Fumero, Ascensión

    2016-01-01

    Internet computer-based psychological treatments have enjoyed rapid growth. Today, there are a number of them available for many mental disorders and psychological problems. Internet-based psychological treatments for anxiety disorders and phobias are amongst the most frequently observed. Treatment results with these resources are promising, but inconclusive. This paper reviews 11 systematic reviews and meta-analyses about the efficacy of Internet-based psychological treatments for anxiety disorders, including studies and clinical trials covering the majority of anxiety disorders and phobias, usually with adult patient samples. In general, these reviews agree on the efficacy of Internet-based psychological treatment as compared with non-treatment groups (with large effect sizes), finding similar efficacy compared with face-to-face therapies. Internet-based psychological treatments are further improved when combined with some type of therapist contact. On the negative side, some systematic reviews highlight high attrition rates of Internet-based psychological treatments. These findings remain inconclusive and more refined reviews (involving patient samples, therapy comparisons, type of therapist contact, etc.) are needed, in order to establish the scope and limits of Internet-based psychological treatments for anxiety disorders. © The Author(s) 2015.

  13. Baby, Where Did You Get Those Eyes?: IEEE Pulse talks with Mark Sagar about the new face of artificial intelligence.

    PubMed

    Campbell, Sarah

    2015-01-01

    Mark Sagar is changing the way we look at computers by giving them faces?disconcertingly realistic human faces. Sagar first gained widespread recognition for his pioneering work in rendering faces for Hollywood movies, including Avatar and King Kong. With a Ph.D. degree in bioengineering and two Academy Awards under his belt, Sagar now directs a research lab at the University of Auckland, New Zealand, a combinatorial hub where artificial intelligence (AI), neuroscience, computer science, philosophy, and cognitive psychology intersect in creating interactive, intelligent technologies.

  14. Proceedings of the Annual ACM Symposium (11th) on Principles of Distributed Computing Held in Vancouver, British Columbia, Canada on 10-12 Aug 1992

    DTIC Science & Technology

    1992-08-10

    scheduler’s strategy. At the beginning of the is delayed at this state. A routing edge (Si,Tj), execution, the scheduler delays all messages sent for...graph G and Appendix). We remark that the choice of "play" the role ý-’ the scheduler . The scheduler’s constants in the above definition is not...34’ Annmul Symposium ical wakeup . Also, assume that during [t, t + x], for on Foundations of Computer Science. IEEE, t > 2n, a specific route of length at most

  15. Online Information-Seeking Behaviors of Parents of Children With ADHD.

    PubMed

    Sage, Adam; Carpenter, Delesha; Sayner, Robyn; Thomas, Kathleen; Mann, Larry; Sulzer, Sandy; Sandler, Adrian; Sleath, Betsy

    2018-01-01

    This article describes ( a) parent questions about ADHD (attention deficit/hyperactivity disorder), ( b) parent Internet use to seek ADHD information, and ( c) associations between type of Internet access and ADHD information-seeking. Seventy parents of children (ages 7-17 years) with ADHD completed questionnaires after their child's visit with their pediatrician. Bivariate relationships were assessed using chi-square statistics, Pearson correlation coefficients, or t tests. Parents identified an average of 8.9 questions about ADHD for their child's provider. Common questions were related to medication and long-term implications of ADHD. A majority of parents searched the Internet for general ADHD information (87%) and ADHD medication information (81%). White parents accessed the Internet significantly more via home computer, mobile phone, and tablet, and significantly less via public library than non-White parents. Parents who accessed the Internet via home computers and tablets were more likely to search the Internet for ADHD medication information than parents who did not.

  16. A Comprehensive and Cost-Effective Computer Infrastructure for K-12 Schools

    NASA Technical Reports Server (NTRS)

    Warren, G. P.; Seaton, J. M.

    1996-01-01

    Since 1993, NASA Langley Research Center has been developing and implementing a low-cost Internet connection model, including system architecture, training, and support, to provide Internet access for an entire network of computers. This infrastructure allows local area networks which exceed 50 machines per school to independently access the complete functionality of the Internet by connecting to a central site, using state-of-the-art commercial modem technology, through a single standard telephone line. By locating high-cost resources at this central site and sharing these resources and their costs among the school districts throughout a region, a practical, efficient, and affordable infrastructure for providing scale-able Internet connectivity has been developed. As the demand for faster Internet access grows, the model has a simple expansion path that eliminates the need to replace major system components and re-train personnel. Observations of optical Internet usage within an environment, particularly school classrooms, have shown that after an initial period of 'surfing,' the Internet traffic becomes repetitive. By automatically storing requested Internet information on a high-capacity networked disk drive at the local site (network based disk caching), then updating this information only when it changes, well over 80 percent of the Internet traffic that leaves a location can be eliminated by retrieving the information from the local disk cache.

  17. Development of real-time voltage stability monitoring tool for power system transmission network using Synchrophasor data

    NASA Astrophysics Data System (ADS)

    Pulok, Md Kamrul Hasan

    Intelligent and effective monitoring of power system stability in control centers is one of the key issues in smart grid technology to prevent unwanted power system blackouts. Voltage stability analysis is one of the most important requirements for control center operation in smart grid era. With the advent of Phasor Measurement Unit (PMU) or Synchrophasor technology, real time monitoring of voltage stability of power system is now a reality. This work utilizes real-time PMU data to derive a voltage stability index to monitor the voltage stability related contingency situation in power systems. The developed tool uses PMU data to calculate voltage stability index that indicates relative closeness of the instability by producing numerical indices. The IEEE 39 bus, New England power system was modeled and run on a Real-time Digital Simulator that stream PMU data over the Internet using IEEE C37.118 protocol. A Phasor data concentrator (PDC) is setup that receives streaming PMU data and stores them in Microsoft SQL database server. Then the developed voltage stability monitoring (VSM) tool retrieves phasor measurement data from SQL server, performs real-time state estimation of the whole network, calculate voltage stability index, perform real-time ranking of most vulnerable transmission lines, and finally shows all the results in a graphical user interface. All these actions are done in near real-time. Control centers can easily monitor the systems condition by using this tool and can take precautionary actions if needed.

  18. Charged Slurry Droplet Research

    DTIC Science & Technology

    1989-02-20

    IEEE/IAS annual meeting, Denver, CO, Sept. 28 - Oct. 3, 1986, p.1434. Accepted for publication IEEE Transactions on Industry Applications. 6. Lord...34Analysis of the Description of Evaporating Charged Droplets, IEEE Transactions on Industry Applications, IA-19, 771, 1983. 9. H.M.A. Elghazaly, G.S.P. Castle...34Analysis of the Instability of Evaporating Charged Liquid Drops", IEEE Transactions on Industry Applications, IA-22, 892, 1986. 10. H.M.A

  19. SAR Product Improvements and Enhancements - SARprises

    DTIC Science & Technology

    2013-09-30

    paper on current fields at Orkney, Scotland, was accepted for publication in IEEE - TGARS and is currently in press (available on IEEE Xplore as Early...Sea surface velocity vector retrieval using dual-beam interferometry: First demonstration, IEEE TGARS, 43, 2494- 2502, 2005. [2] Chapron, B., F...Bight by airborne along-track interferometric SAR, Proc. IGARSS 2002, 1822-1824, IEEE , 2002. [4] Bjerklie, D.M., S.L. Dingman, C.J. Vorosmarty, C.H

  20. Utility of computer-assisted approaches for population surveillance of physical activity.

    PubMed

    Creamer, MeLisa; Bowles, Heather R; von Hofe, Belinda; Pettee Gabriel, Kelley; Kohl, Harold W; Bauman, Adrian

    2014-08-01

    Computer-assisted techniques may be a useful way to enhance physical activity surveillance and increase accuracy of reported behaviors. Evaluate the reliability and validity of a physical activity (PA) self-report instrument administered by telephone and internet. The telephone-administered Active Australia Survey was adapted into 2 forms for internet self-administration: survey questions only (internet-text) and with videos demonstrating intensity (internet-video). Data were collected from 158 adults (20-69 years, 61% female) assigned to telephone (telephone-interview) (n = 56), internet-text (n = 51), or internet-video (n = 51). Participants wore an accelerometer and completed a logbook for 7 days. Test-retest reliability was assessed using intraclass correlation coefficients (ICC). Convergent validity was assessed using Spearman correlations. Strong test-retest reliability was observed for PA variables in the internet-text (ICC = 0.69 to 0.88), internet-video (ICC = 0.66 to 0.79), and telephone-interview (ICC = 0.69 to 0.92) groups (P-values < 0.001). For total PA, correlations (ρ) between the survey and Actigraph+logbook were ρ = 0.47 for the internet-text group, ρ = 0.57 for the internet-video group, and ρ = 0.65 for the telephone-interview group. For vigorous-intensity activity, the correlations between the survey and Actigraph+logbook were 0.52 for internet-text, 0.57 for internet-video, and 0.65 for telephone-interview (P < .05). Internet-video of the survey had similar test-retest reliability and convergent validity when compared with the telephone-interview, and should continue to be developed.

  1. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks

    PubMed Central

    2017-01-01

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle’s safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given. PMID:29231882

  2. Performance Analysis of the IEEE 802.11p Multichannel MAC Protocol in Vehicular Ad Hoc Networks.

    PubMed

    Song, Caixia

    2017-12-12

    Vehicular Ad Hoc Networks (VANETs) employ multichannel to provide a variety of safety and non-safety applications, based on the IEEE 802.11p and IEEE 1609.4 protocols. The safety applications require timely and reliable transmissions, while the non-safety applications require efficient and high throughput. In the IEEE 1609.4 protocol, operating interval is divided into alternating Control Channel (CCH) interval and Service Channel (SCH) interval with an identical length. During the CCH interval, nodes transmit safety-related messages and control messages, and Enhanced Distributed Channel Access (EDCA) mechanism is employed to allow four Access Categories (ACs) within a station with different priorities according to their criticality for the vehicle's safety. During the SCH interval, the non-safety massages are transmitted. An analytical model is proposed in this paper to evaluate performance, reliability and efficiency of the IEEE 802.11p and IEEE 1609.4 protocols. The proposed model improves the existing work by taking serval aspects and the character of multichannel switching into design consideration. Extensive performance evaluations based on analysis and simulation help to validate the accuracy of the proposed model and analyze the capabilities and limitations of the IEEE 802.11p and IEEE 1609.4 protocols, and enhancement suggestions are given.

  3. The Internet and Computer User Profile: a questionnaire for determining intervention targets in occupational therapy at mental health vocational centers.

    PubMed

    Regev, Sivan; Hadas-Lidor, Noami; Rosenberg, Limor

    2016-08-01

    In this study, the assessment tool "Internet and Computer User Profile" questionnaire (ICUP) is presented and validated. It was developed in order to gather information for setting intervention goals to meet current demands. Sixty-eight subjects aged 23-68 participated in the study. The study group (n = 28) was sampled from two vocational centers. The control group consisted of 40 participants from the general population that were sampled by convenience sampling based on the demographics of the study group. Subjects from both groups answered the ICUP questionnaire. Subjects of the study group answered the General Self- Efficacy (GSE) questionnaire and performed the Assessment of Computer Task Performance (ACTP) test in order to examine the convergent validity of the ICUP. Twenty subjects from both groups retook the ICUP questionnaire in order to obtain test-retest results. Differences between groups were tested using multiple analysis of variance (MANOVA) tests. Pearson and Spearman's tests were used for calculating correlations. Cronbach's alpha coefficient and k equivalent were used to assess internal consistency. The results indicate that the questionnaire is valid and reliable. They emphasize that the layout of the ICUP items facilitates in making a comprehensive examination of the client's perception regarding his participation in computer and internet activities. Implications for Rehabiliation The assessment tool "Internet and Computer User Profile" (ICUP) questionnaire is a novel assessment tool that evaluates operative use and individual perception of computer activities. The questionnaire is valid and reliable for use with participants of vocational centers dealing with mental illness. It is essential to facilitate access to computers for people with mental illnesses, seeing that they express similar interest in computers and internet as people from the general population of the same age. Early intervention will be particularly effective for young adults dealing with mental illness, since the digital gap between them and young people in general is relatively small.

  4. The Digital Divide Among Low-Income Homebound Older Adults: Internet Use Patterns, eHealth Literacy, and Attitudes Toward Computer/Internet Use

    PubMed Central

    DiNitto, Diana M

    2013-01-01

    Background Internet technology can provide a diverse array of online resources for low-income disabled and homebound older adults to manage their health and mental health problems and maintain social connections. Despite many previous studies of older adults’ Internet use, none focused on these most vulnerable older adults. Objective This study examined Internet use patterns, reasons for discontinued use, eHealth literacy, and attitudes toward computer/Internet use among low-income homebound individuals aged 60 and older in comparison to their younger counterparts—homebound adults under age 60. Methods Face-to-face or telephone surveys were conducted with 980 recipients of home-delivered meals in central Texas (78% were age 60 years and older and 22% under age 60). The eHealth Literacy Scale (eHEALS) and the efficacy and interest subscales of the Attitudes Toward Computer/Internet Questionnaire (ATC/IQ) were used to measure the respective constructs. Age groups were compared with chi-square tests and t tests. Correlates of Internet use were analyzed with multinomial logistic regression, and correlates of eHEALS and ATC/IQ scores were analyzed with OLS regression models. Results Only 34% of the under-60 group and 17% of the 60 years and older group currently used the Internet, and 35% and 16% of the respective group members reported discontinuing Internet use due to cost and disability. In addition to being older, never users were more likely to be black (OR 4.41; 95% CI 2.82-6.91, P<.001) or Hispanic (OR 4.69; 95% CI 2.61-8.44, P<.001), and to have lower incomes (OR 0.36; 95% CI 0.27-0.49, P<.001). Discontinued users were also more likely to be black or Hispanic and to have lower incomes. Among both age groups, approximately three-fourths of the current users used the Internet every day or every few days, and their eHEALS scores were negatively associated with age and positively associated with frequency of use. Among the 60 and older group, a depression diagnosis was also negatively associated with eHEALS scores. ATC/IQ efficacy among never users of all ages and among older adults was positively associated with living alone, income, and the number of medical conditions and inversely associated with age, Hispanic ethnicity, and Spanish as the primary language. Although ATC/IQ interest among older adults was also inversely associated with age, it was not associated with Hispanic ethnicity and Spanish as the primary language. Conclusions This study is the first to describe in detail low-income disabled and homebound adults’ and older adults’ Internet use. It shows very low rates of Internet use compared to the US population, either due to lack of exposure to computer/Internet technology; lack of financial resources to obtain computers and technology; or medical conditions, disabilities, and associated pain that restrict use. Recommendations to reduce the digital divide among these individuals are provided. PMID:23639979

  5. Examining Stakeholder Perceptions of Accessibility and Utilization of Computer and Internet Technology in the Selinsgrove Area School District

    ERIC Educational Resources Information Center

    Krause, Lorinda M.

    2014-01-01

    This study utilized a mixed methods approach to examine the issue of how parents, students, and teachers (stakeholders) perceive accessibility and the utilization of computer and Internet technology within the Selinsgrove, Pennsylvania Area School District. Quantitative data was collected through the use of questionnaires distributed to the…

  6. What is this thing called 'Internet'?

    PubMed

    Coleman, N J

    1996-04-01

    According to a survey conducted by the Australian Journal of Nursing in 1994, 43% of nurses owned personal computers and another 28% were considering the purchase of one in the next year. Given such a high ownership rate, and the interest in the 'Net' itself, some understanding of the fundamentals of online computing and the Internet would seem timely.

  7. Talk Across the Oceans: Language and Culture of the Global Internet Community.

    ERIC Educational Resources Information Center

    Takahashi, Shinji

    1996-01-01

    Discusses some of the technological difficulties associated with the use of English or other European languages on the Internet, and uses Japanese computing as an example. Examines the linguistic culture of the language with attention to English, how technology limits/expands communication, and the role of languages in the computer domain.…

  8. Technology Readiness, Internet Self-Efficacy and Computing Experience of Professional Accounting Students

    ERIC Educational Resources Information Center

    Lai, Ming-Ling

    2008-01-01

    Purpose: This study aims to assess the state of technology readiness of professional accounting students in Malaysia, to examine their level of internet self-efficacy, to assess their prior computing experience, and to explore if they are satisfied with the professional course that they are pursuing in improving their technology skills.…

  9. The Relationship between Social Cohesion and Computer-Internet Usage

    ERIC Educational Resources Information Center

    Balkan, Emre; Adalier, Ahmet

    2011-01-01

    The aim of this study is to analyze the relationship between social cohesion and computer-internet usage among university students. The research was conducted among university students in North Cyprus. The sample for the research consists of 38.8% (n=80) female, 61.2 % (n=126) male, 206 university students by using the criterion sampling method.…

  10. Lecture and Tutorial via the Internet - Experiences from a Pilot Project Connecting Five Universities.

    ERIC Educational Resources Information Center

    Wulf, Volker; Schinzel, Britta

    This paper reports on a pilot project in which German universities in Freiburg, Constance, Mannheim, Stuttgart, and Ulm connected computer science departments via the Internet for a summer 1997 telelecture and teletutorial on computers and society. The first section provides background on telelearning and introduces the case study. The second…

  11. Impact of the Digital Divide on Computer Use and Internet Access on the Poor in Nigeria

    ERIC Educational Resources Information Center

    Tayo, Omolara; Thompson, Randall; Thompson, Elizabeth

    2016-01-01

    We recruited 20 community members in Ido Local Government Area, Oyo state and Yewa Local Government Area, Ogun state in Nigeria to explore experiences and perceptions of Internet access and computer use. Face-to-face interviews were conducted using open-ended questions to collect qualitative data regarding accessibility of information and…

  12. Closing the Gap: Cybersecurity for U.S. Forces and Commands

    DTIC Science & Technology

    2017-03-30

    Dickson, Ph.D. Professor of Military Studies , JAWS Thesis Advisor Kevin Therrien, Col, USAF Committee Member Stephen Rogers, Colonel, USA Director...infrastructures, and includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers in critical industries.”5...of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and

  13. Performance Evaluation and Control of Distributed Computer Communication Networks.

    DTIC Science & Technology

    1985-09-01

    Zukerman, S. Katz, P. Rodriguez, R. Pazos , S. Resheff, Z. Tsai, Z. Zhang, L. Jong, V. Minh. Other participants are the following visiting... Pazos -Rangel "Bandwidth Allocation and Routing in ISDN’s," IEEE Communications Magazine, February 1984. Abstract The goal of communications network design...location and routing for integrated networks - is formulated, and efficient methods for its solution are presented. (2) R.A. Pazos -Rangel "Evaluation

  14. Parallel Ray Tracing Using the Message Passing Interface

    DTIC Science & Technology

    2007-09-01

    software is available for lens design and for general optical systems modeling. It tends to be designed to run on a single processor and can be very...Cameron, Senior Member, IEEE Abstract—Ray-tracing software is available for lens design and for general optical systems modeling. It tends to be designed to...National Aeronautics and Space Administration (NASA), optical ray tracing, parallel computing, parallel pro- cessing, prime numbers, ray tracing

  15. Enhanced Lesion Visualization in Image-Guided Noninvasive Surgery With Ultrasound Phased Arrays

    DTIC Science & Technology

    2001-10-25

    81, 1995. [4] N. Sanghvi et al., “Noninvasive surgery of prostate tissue by high-intensity focused ultrasound ,” IEEE Trans. UFFC, vol. 43, no. 6, pp...ENHANCED LESION VISUALIZATION IN IMAGE-GUIDED NONINVASIVE SURGERY WITH ULTRASOUND PHASED ARRAYS Hui Yao, Pornchai Phukpattaranont and Emad S. Ebbini...Department of Electrical and Computer Engineering University of Minnesota Minneapolis, MN 55455 Abstract- We describe dual-mode ultrasound phased

  16. Dataset Curation through Renders and Ontology Matching

    DTIC Science & Technology

    2015-09-01

    government .001 services .246 furniture store .299 health salon .998 assoc./organization* .029 insurance agency .103 gastronomy .001 gas & automotive .219...Stanley Michael Bileschi. StreetScenes: Towards scene understanding in still images. PhD thesis, Massachusetts Institute of Technology , 2006. 3.5, 4.4...computer animation]. In Compcon’96.’ Technologies for the Information Superhigh- way’Digest of Papers. IEEE, 1996. 2.1 Aharon Bar Hillel and Daphna Weinshall

  17. Software for Avionics.

    DTIC Science & Technology

    1983-01-01

    fonctions gfinbrales et lea uti- litaires fournis en particulier grice 41 UNIX, sont intfigrfs aelon divers points de vue: - par leur accas 41 travers le...Are They Really A Problem? Proceedings, 2nd International Conference On Software Engineering, pp 91-68. Long acCA : IEEE Computer Society. Britton...CD The Hague. Nc KLEINSCIIMIDT, M. Dr Fa. LITEF. Poatfach 774. 7800 Freiburg i. Br., Ge KLEMM, R. Dr FGAN- FFM , D 5 307 Watchberg-Werthhoven. Ge KLENK

  18. YIP Formal Synthesis of Software-Based Control Protocols for Fractionated,Composable Autonomous Systems

    DTIC Science & Technology

    2016-07-08

    Systems Using Automata Theory and Barrier Certifi- cates We developed a sound but incomplete method for the computational verification of specifications...method merges ideas from automata -based model checking with those from control theory including so-called barrier certificates and optimization-based... Automata theory meets barrier certificates: Temporal logic verification of nonlinear systems,” IEEE Transactions on Automatic Control, 2015. [J2] R

  19. Intelligence in Scientific Computing.

    DTIC Science & Technology

    1993-12-31

    simulation) a high-performance controller for a magnetic levitation system - the German Transrapid system. The new control system can stabilize maglev ...techniques. A paper by Feng Zhao and Richard Thornton about the maglev controller designed by his program was presented at the 31st IEEE conference on...Massachusetts Insti- tute of Technology, 1991. Also availible as MIT AITR 1385. Zhao, F. and Thornton, R. "Automatic Design of a Maglev Controller in

  20. A Common Interface Real-Time Multiprocessor Operating System for Embedded Systems

    DTIC Science & Technology

    1991-03-04

    Pressman , a design methodology should show hierarchical organization, lead to modules exhibiting independent functional characteristics, and be derived...Boehm, Barry W. "Software Engineering," Tutorial: Software Design Strategies, 2nd Edition. 35-50. Los Angeles CA: IEEE Computer Society Press, 1981... Pressman , Roger S. Software Engineering: A Practitioner’s Approach, Second Edi- tion. McGraw-Hill Book Company, New York, 1988. 59. Quinn, Michael J

  1. Computer Modeling of Complete IC Fabrication Process.

    DTIC Science & Technology

    1984-01-01

    Venson Shaw 10. C. S. Chang 11. Elizabeth Batson 12. Richard Pinto 13. Jacques Beauduoin SPEAKERS: 1. Tayo Akinwande 2. Dimitri Antoniadis 3. Walter...Numerical Model of Polysilicon Emitter Contacts in Bipolar Transistors,’ To be published IEEE Trans. Electron Devices. [34] M. R. Pinto , R. W. Dutton...Received PhD, Spring 1082) Balaji Swaminathan (Received PhD, Spring 1983) Len Mei Research Associate Michael Kump Research Assistant Mark Pinto Research

  2. Parallel Algorithms for Computer Vision.

    DTIC Science & Technology

    1989-01-01

    34 IEEE Tran. Pattern Ankyaij and Ma- Artifcial Intelligence , Tokyo, 1979. chine Intelligence , 6, 1984. Kirkpatrick, S., C.D. Gelatt, Jr. and M.P. Vecchi...MASSACHUSETTS INST OF TECH CAMBRIDGE ARTIFICIAL INTELLIGENCE LAB T P06010 JAN 89 ETL-0529 UNCLASSIFIED DACA76-85-C-0010 F.’G 12/1I N mommiimmmiiso...PoggioI Massachusetts Institute of Technology i Artificial Intelligence Laboratory 545 Technology Square Cambridge, Massachusetts 02139 DTIC January

  3. The Use of Empirical Studies in the Development of High End Computing Applications

    DTIC Science & Technology

    2009-12-01

    34, Proceeding of 5th ACM-IEEE International Symposium on Empirical Software Engineering (ISESE󈧊), Rio de Janeiro , Brazil, September, 2006. 8. Jeffrey C...Symposium on Empirical Software Engineering, (ISESE), Rio de Janeiro , September, 2006. [26] Zelkowitz M. , V. Basili, S. Asgari, L. Hochstein, J...data is consistently collected across studies. 4. Sanitization of sensitive data. The framework provides external researcher with access to the

  4. Principles of Adaptive Array Processing

    DTIC Science & Technology

    2006-09-01

    ACE with and without tapering (homogeneous case). These analytical results are less suited to predict the detection performance of a real system ...Nickel: Adaptive Beamforming for Phased Array Radars. Proc. Int. Radar Symposium IRS’98 (Munich, Sept. 1998), DGON and VDE /ITG, pp. 897-906.(Reprint also...strategies for airborne radar. Asilomar Conf. on Signals, Systems and Computers, Pacific Grove, CA, 1998, IEEE Cat.Nr. 0-7803-5148-7/98, pp. 1327-1331. [17

  5. Message From the Editor for Contributions to the 2012 Real Time Conference Issue of TNS

    NASA Astrophysics Data System (ADS)

    Schmeling, Sascha Marc

    2013-10-01

    The papers in this special issue were originally presented at the 18th IEEE-NPSS Real Time Conference (RT2012) on Computing Applications in Nuclear and Plasma Sciences, held in Berkeley, California, USA, in June 2012. These contributions come from a broad range of fields of application, including Astrophysics, Medical Imaging, Nuclear and Plasma Physics, Particle Accelerators, and Particle Physics Experiments.

  6. Overhead-Performance Tradeoffs in Distributed Wireless Networks

    DTIC Science & Technology

    2015-06-26

    grew this fraction. See the tutorial for details and acronym definitions. Key Publication & Abstract • Gwanmo Ku and John MacLaren Walsh, Resource...tradeoffs. Key Publication & Abstract • Gwanmo Ku , Jie Ren, and John MacLaren Walsh, Computing the Rate Distortion Region for the CEO Problem with...IID. • Jie Ren, Bradford Boyle, Gwanmo Ku , Steven Weber, John MacLaren Walsh, Overhead Performance Tradeoffs A Resource Allocation Perspective, IEEE

  7. An Overview of MSHN: The Management System for Heterogeneous Networks

    DTIC Science & Technology

    1999-04-01

    An Overview of MSHN: The Management System for Heterogeneous Networks Debra A. Hensgen†, Taylor Kidd†, David St. John§, Matthew C . Schnaidt†, Howard...ABSTRACT UU 18. NUMBER OF PAGES 15 19a. NAME OF RESPONSIBLE PERSON a. REPORT unclassified b. ABSTRACT unclassified c . THIS PAGE...Alhusaini, V. K. Prasanna, and C . S. Raghavendra, “A unified resource scheduling framework for heterogeneous computing environments,” Proc. 8th IEEE

  8. Computational Methods for Design, Control and Optimization

    DTIC Science & Technology

    2007-10-01

    Krueger Eugene M. Cliff Hoan Nguyen Traian Iliescu John Singler James Vance Eric Vugrin Adam Childers Dan Sutton References [11 J. T. Borggaard, S...Control, 45th IEEE Conference on Decision and Control, accepted. [11] L. C. Berselli, T. Iliescu and W. J. Layton , Mathematics of Large Eddy...Daniel Inman, Eric Ruggiero and John Singler, Finite Element For- mulation for Static Control of a Thin Euler-Bernoulli Beam Using Piezoelectric

  9. The Emergence of Compositional Communication in a Synthetic Ethology Framework

    DTIC Science & Technology

    2005-08-12

    34Integrating Language and Cognition: A Cognitive Robotics Approach", invited contribution to IEEE Computational Intelligence Magazine . The first two...papers address the main topic of investigation of the research proposal. In particular, we have introduced a simple structured meaning-signal mapping...Cavalli-Sforza (1982) to investigate analytically the evolution of structured com- munication codes. Let x 6 [0,1] be the proportion of individuals in a

  10. Human Resources and the Internet.

    ERIC Educational Resources Information Center

    Cohen, Suzanne; Joseph, Deborah

    Concerned about falling behind the technology curve, organizations are using the Internet or intranets to provide and communicate information to their employees and create more efficient workplaces. The Internet is not just a "network of computer networks," but a medium conveying a vast, diverse amount of information. This publication is…

  11. An Internet-Based Accounting Information Systems Project

    ERIC Educational Resources Information Center

    Miller, Louise

    2012-01-01

    This paper describes a student project assignment used in an accounting information systems course. We are now truly immersed in the internet age, and while many required accounting information systems courses and textbooks introduce database design, accounting software development, cloud computing, and internet security, projects involving the…

  12. Virtual classroom helps medical education for both Chinese and foreign students.

    PubMed

    Shi, C; Wang, L; Li, X; Chai, S; Niu, W; Kong, Y; Zhou, W; Yin, W

    2015-11-01

    The rapid development of computer and internet technology has a strong influence over one's quality of education within different fields of study. To determine the potential benefits of introducing internet into medical school classes, a pilot study was conducted in three different Chinese medical schools. Seven hundred and eight medical school undergraduates, 385 dental school students and 366 foreign students were randomly recruited to complete a self-administered questionnaire. The contents included personal information, current usage of computer and internet, and attitudes towards the computerised teaching methods. Two forum groups were created using instant message software and were randomly assigned to two classes, allowing students to freely ask or discuss questions with the help of their teachers in these two virtual classrooms. All 1539 questionnaires were accepted and analysed. Although there were some differences between Chinese and foreign undergraduates, both group of students were highly proficient in internet usage and navigation. Overwhelmingly, 88.37% of the students owned a computer and frequently logged onto the internet. Most of them believed that the internet is a helpful adjunct to their studies and held positive attitudes towards computerised teaching. Compared to the classes that were not assigned internet forums, the two experimental classes performed significantly better on the examination. Our results suggest that computerised teaching methods have significant potential to assist in learning for both Chinese and foreign medical undergraduates. © 2014 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  13. Critical care and the World Wide Web.

    PubMed

    Varon, J; Marik, P E

    1999-07-01

    The Internet was created in 1969, when the Advanced Research Projects Agency of the United States Department of Defense fired up an experimental network consisting of only four computers. Over the past five years there has been an exponential explosion in the number of computers added to this network. It is estimated that Internet traffic doubles every 100 days with more than 100 million people worldwide now on-line. The Internet is so vast that practically every aspect of human interest is represented is some form or fashion. From recreation to applied science and technology, and from Critical Care Medicine case scenarios to digitized radiology images and pathology specimens, the Internet has become increasingly useful for critical care practitioners. To date, no resource is better equipped to assist critical care providers in many of their daily tasks. This article presents some of the historical developments of the Internet as well as common applications that are useful for critical care practitioners.

  14. Use of a secure Internet Web site for collaborative medical research.

    PubMed

    Marshall, W W; Haley, R W

    2000-10-11

    Researchers who collaborate on clinical research studies from diffuse locations need a convenient, inexpensive, secure way to record and manage data. The Internet, with its World Wide Web, provides a vast network that enables researchers with diverse types of computers and operating systems anywhere in the world to log data through a common interface. Development of a Web site for scientific data collection can be organized into 10 steps, including planning the scientific database, choosing a database management software system, setting up database tables for each collaborator's variables, developing the Web site's screen layout, choosing a middleware software system to tie the database software to the Web site interface, embedding data editing and calculation routines, setting up the database on the central server computer, obtaining a unique Internet address and name for the Web site, applying security measures to the site, and training staff who enter data. Ensuring the security of an Internet database requires limiting the number of people who have access to the server, setting up the server on a stand-alone computer, requiring user-name and password authentication for server and Web site access, installing a firewall computer to prevent break-ins and block bogus information from reaching the server, verifying the identity of the server and client computers with certification from a certificate authority, encrypting information sent between server and client computers to avoid eavesdropping, establishing audit trails to record all accesses into the Web site, and educating Web site users about security techniques. When these measures are carefully undertaken, in our experience, information for scientific studies can be collected and maintained on Internet databases more efficiently and securely than through conventional systems of paper records protected by filing cabinets and locked doors. JAMA. 2000;284:1843-1849.

  15. Attentional bias in excessive Internet gamers: Experimental investigations using an addiction Stroop and a visual probe.

    PubMed

    Jeromin, Franziska; Nyenhuis, Nele; Barke, Antonia

    2016-03-01

    Background and aims Internet Gaming Disorder is included in the Diagnostic and statistical manual of mental disorders (5 th edition) as a disorder that merits further research. The diagnostic criteria are based on those for Substance Use Disorder and Gambling Disorder. Excessive gamblers and persons with Substance Use Disorder show attentional biases towards stimuli related to their addictions. We investigated whether excessive Internet gamers show a similar attentional bias, by using two established experimental paradigms. Methods We measured reaction times of excessive Internet gamers and non-gamers (N = 51, 23.7 ± 2.7 years) by using an addiction Stroop with computer-related and neutral words, as well as a visual probe with computer-related and neutral pictures. Mixed design analyses of variance with the between-subjects factor group (gamer/non-gamer) and the within-subjects factor stimulus type (computer-related/neutral) were calculated for the reaction times as well as for valence and familiarity ratings of the stimulus material. Results In the addiction Stroop, an interaction for group × word type was found: Only gamers showed longer reaction times to computer-related words compared to neutral words, thus exhibiting an attentional bias. In the visual probe, no differences in reaction time between computer-related and neutral pictures were found in either group, but the gamers were faster overall. Conclusions An attentional bias towards computer-related stimuli was found in excessive Internet gamers, by using an addiction Stroop but not by using a visual probe. A possible explanation for the discrepancy could lie in the fact that the visual probe may have been too easy for the gamers.

  16. Attentional bias in excessive Internet gamers: Experimental investigations using an addiction Stroop and a visual probe

    PubMed Central

    Jeromin, Franziska; Nyenhuis, Nele; Barke, Antonia

    2016-01-01

    Background and aims Internet Gaming Disorder is included in the Diagnostic and statistical manual of mental disorders (5th edition) as a disorder that merits further research. The diagnostic criteria are based on those for Substance Use Disorder and Gambling Disorder. Excessive gamblers and persons with Substance Use Disorder show attentional biases towards stimuli related to their addictions. We investigated whether excessive Internet gamers show a similar attentional bias, by using two established experimental paradigms. Methods We measured reaction times of excessive Internet gamers and non-gamers (N = 51, 23.7 ± 2.7 years) by using an addiction Stroop with computer-related and neutral words, as well as a visual probe with computer-related and neutral pictures. Mixed design analyses of variance with the between-subjects factor group (gamer/non-gamer) and the within-subjects factor stimulus type (computer-related/neutral) were calculated for the reaction times as well as for valence and familiarity ratings of the stimulus material. Results In the addiction Stroop, an interaction for group × word type was found: Only gamers showed longer reaction times to computer-related words compared to neutral words, thus exhibiting an attentional bias. In the visual probe, no differences in reaction time between computer-related and neutral pictures were found in either group, but the gamers were faster overall. Conclusions An attentional bias towards computer-related stimuli was found in excessive Internet gamers, by using an addiction Stroop but not by using a visual probe. A possible explanation for the discrepancy could lie in the fact that the visual probe may have been too easy for the gamers. PMID:28092198

  17. Switched on or switched off? A survey of mobile, computer and Internet use in a community mental health rehabilitation sample.

    PubMed

    Tobitt, Simon; Percival, Robert

    2017-07-04

    UK society is undergoing a technological revolution, including meeting health needs through technology. Government policy is shifting towards a "digital by default" position. Studies have trialled health technology interventions for those experiencing psychosis and shown them to be useful. To gauge levels of engagement with mobile phones (Internet-enabled or cell phone), computers and the Internet in the specific population of community mental health rehabilitation. Two surveys were conducted: with service-users on use/non-use of technologies, and interest in technology interventions and support; and with placements on facilities and support available to service-users. Levels of engagement in this population were substantially less than those recorded in the general UK and other clinical populations: 40.2% regularly use mobiles, 17.5% computers, and 14.4% the Internet. Users of all three technologies were significantly younger than non-users. Users of mobiles and computers were significantly more likely to live in lower support/higher independence placements. Of surveyed placements, 35.5% provide a communal computer and 38.7% IT skills sessions. Community mental health rehabilitation service-users risk finding themselves excluded by a "digital divide". Action is needed to ensure equal access to online opportunities, including healthcare innovations. Clinical and policy implications are discussed.

  18. A Fuzzy Logic-Based Quality Function Deployment for Selection of E-Learning Provider

    ERIC Educational Resources Information Center

    Kazancoglu, Yigit; Aksoy, Murat

    2011-01-01

    According to the Internet World Stats (2010), the growth rate of internet usage in the world is 444.8 % from 2000 to 2010. Since the number of internet users is rapidly increasing with each passed year, e-learning is often identified with web-based learning. The institutions, which deliver e-learning service via the use of computer and internet,…

  19. Ding Dong, You've Got Mail! A Lab Activity for Teaching the Internet of Things

    ERIC Educational Resources Information Center

    Frydenberg, Mark

    2017-01-01

    Connecting ordinary devices to the Internet is a defining characteristic of the Internet of Things. In this hands-on lab activity, students will connect a wireless doorbell to the Internet using a Raspberry Pi computer. By modifying and running a program on the Raspberry Pi to send an email or text message notifying a recipient that someone is at…

  20. The Effect of Internet-Based Education on Student Success in Teaching of 8th Grade Triangles Subject

    ERIC Educational Resources Information Center

    Kaya, Deniz; Kesan, Cenk; Izgiol, Dilek

    2013-01-01

    In the study, it was researched the effect of internet-based application on student success. Internet-based application was used at the teaching of triangles subject which is included in 8th grade units of triangles and algebra. The study was carried out over the internet with a computer software program: Vitamin Program. The study was carried out…

  1. Use of the Internet by burns patients, their families and friends.

    PubMed

    Rea, S; Lim, J; Falder, S; Wood, F

    2008-05-01

    The Internet has also become an increasingly important source of health-related information. However, with this exponential increase comes the problem that although the volume of information is huge, the quality, accuracy and completeness of the information are questionable, not only in the field of medicine. Previous studies of single medical conditions have suggested that web-based health information has limitations. The aim of this study was to evaluate Internet usage among burned patients and the people accompanying them to the outpatient clinic. A customised questionnaire was created and distributed to all patients and accompanying persons in the adult and paediatric burns clinics. This investigated computer usage, Internet access, usefulness of Internet search and topics searched. Two hundred and ten people completed the questionnaire, a response rate of 83%. Sixty three percent of responders were patients, parents 21.9%, spouses 3.3%, siblings, children and friends the remaining 10.8%. Seventy seven percent of attendees had been injured within the last year, 11% between 1 and 5 years previously, and 12% more than 5 years previously. Seventy four percent had computer and Internet access. Twelve percent had performed a search. Topics searched included skin grafts, scarring and scar management treatments such as pressure garments, silicone gel and massage. This study has shown that computer and Internet access is high, however a very small number actually used the Internet to access further medical information. Patients with longer standing injuries were more likely to access the Internet. Parents of burned children were more frequent Internet users. As more burn units develop their own web sites with information for patients and healthcare providers, it is important to inform patients, family members and friends that such a resource exists. By offering such a service patients are provided with accurate, reliable and easily accessible information which is appropriate to their needs.

  2. Computer-based medical education in Benha University, Egypt: knowledge, attitude, limitations, and suggestions.

    PubMed

    Bayomy, Hanaa; El Awadi, Mona; El Araby, Eman; Abed, Hala A

    2016-12-01

    Computer-assisted medical education has been developed to enhance learning and enable high-quality medical care. This study aimed to assess computer knowledge and attitude toward the inclusion of computers in medical education among second-year medical students in Benha Faculty of Medicine, Egypt, to identify limitations, and obtain suggestions for successful computer-based learning. This was a one-group pre-post-test study, which was carried out on second-year students in Benha Faculty of Medicine. A structured self-administered questionnaire was used to compare students' knowledge, attitude, limitations, and suggestions toward computer usage in medical education before and after the computer course to evaluate the change in students' responses. The majority of students were familiar with use of the mouse and keyboard, basic word processing, internet and web searching, and e-mail both before and after the computer course. The proportion of students who were familiar with software programs other than the word processing and trouble-shoot software/hardware was significantly higher after the course (P<0.001). There was a significant increase in the proportion of students who agreed on owning a computer (P=0.008), the inclusion of computer skills course in medical education, downloading lecture handouts, and computer-based exams (P<0.001) after the course. After the course, there was a significant increase in the proportion of students who agreed that the lack of central computers limited the inclusion of computer in medical education (P<0.001). Although the lack of computer labs, lack of Information Technology staff mentoring, large number of students, unclear course outline, and lack of internet access were more frequently reported before the course (P<0.001), the majority of students suggested the provision of computer labs, inviting Information Technology staff to support computer teaching, and the availability of free Wi-Fi internet access covering several areas in the university campus; all would support computer-assisted medical education. Medical students in Benha University are computer literate, which allows for computer-based medical education. Staff training, provision of computer labs, and internet access are essential requirements for enhancing computer usage in medical education in the university.

  3. Cloud@Home: A New Enhanced Computing Paradigm

    NASA Astrophysics Data System (ADS)

    Distefano, Salvatore; Cunsolo, Vincenzo D.; Puliafito, Antonio; Scarpa, Marco

    Cloud computing is a distributed computing paradigm that mixes aspects of Grid computing, ("… hardware and software infrastructure that provides dependable, consistent, pervasive, and inexpensive access to high-end computational capabilities" (Foster, 2002)) Internet Computing ("…a computing platform geographically distributed across the Internet" (Milenkovic et al., 2003)), Utility computing ("a collection of technologies and business practices that enables computing to be delivered seamlessly and reliably across multiple computers, ... available as needed and billed according to usage, much like water and electricity are today" (Ross & Westerman, 2004)) Autonomic computing ("computing systems that can manage themselves given high-level objectives from administrators" (Kephart & Chess, 2003)), Edge computing ("… provides a generic template facility for any type of application to spread its execution across a dedicated grid, balancing the load …" Davis, Parikh, & Weihl, 2004) and Green computing (a new frontier of Ethical computing1 starting from the assumption that in next future energy costs will be related to the environment pollution).

  4. Intersections between the autism spectrum and the internet: perceived benefits and preferred functions of computer-mediated communication.

    PubMed

    Gillespie-Lynch, Kristen; Kapp, Steven K; Shane-Simpson, Christina; Smith, David Shane; Hutman, Ted

    2014-12-01

    An online survey compared the perceived benefits and preferred functions of computer-mediated communication of participants with (N  =  291) and without ASD (N  =  311). Participants with autism spectrum disorder (ASD) perceived benefits of computer-mediated communication in terms of increased comprehension and control over communication, access to similar others, and the opportunity to express their true selves. They enjoyed using the Internet to meet others more, and to maintain connections with friends and family less, than did participants without ASD. People with ASD enjoyed aspects of computer-mediated communication that may be associated with special interests or advocacy, such as blogging, more than did participants without ASD. This study suggests that people with ASD may use the Internet in qualitatively different ways from those without ASD. Suggestions for interventions are discussed.

  5. JIP: Java image processing on the Internet

    NASA Astrophysics Data System (ADS)

    Wang, Dongyan; Lin, Bo; Zhang, Jun

    1998-12-01

    In this paper, we present JIP - Java Image Processing on the Internet, a new Internet based application for remote education and software presentation. JIP offers an integrate learning environment on the Internet where remote users not only can share static HTML documents and lectures notes, but also can run and reuse dynamic distributed software components, without having the source code or any extra work of software compilation, installation and configuration. By implementing a platform-independent distributed computational model, local computational resources are consumed instead of the resources on a central server. As an extended Java applet, JIP allows users to selected local image files on their computers or specify any image on the Internet using an URL as input. Multimedia lectures such as streaming video/audio and digital images are integrated into JIP and intelligently associated with specific image processing functions. Watching demonstrations an practicing the functions with user-selected input data dramatically encourages leaning interest, while promoting the understanding of image processing theory. The JIP framework can be easily applied to other subjects in education or software presentation, such as digital signal processing, business, mathematics, physics, or other areas such as employee training and charged software consumption.

  6. The Internet and World-Wide-Web: Potential Benefits to Rural Schools.

    ERIC Educational Resources Information Center

    Barker, Bruce O.

    The Internet is a decentralized collection of computer networks managed by separate groups using a common set of technical standards. The Internet has tremendous potential as an educational resource by providing access to networking through worldwide electronic mail, various databases, and electronic bulletin boards; collaborative investigation…

  7. Predicting Internet/E-Commerce Use.

    ERIC Educational Resources Information Center

    Sexton, Randall S.; Johnson, Richard A.; Hignite, Michael A.

    2002-01-01

    Describes a study that analyzed variables in order to identify accurate predictors of individuals' use of the Internet and e-commerce. Results of survey research and a neural network identifies gender, overall computer use, job-related use, and home access as important characteristics that should influence use of the Internet and e-commerce.…

  8. GINSU: Guaranteed Internet Stack Utilization

    DTIC Science & Technology

    2005-11-01

    Computer Architecture Data Links, Internet , Protocol Stacks 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT UNCLASSIFIED 18. SECURITY...AFRL-IF-RS-TR-2005-383 Final Technical Report November 2005 GINSU: GUARANTEED INTERNET STACK UTILIZATION Trusted... Information Systems, Inc. Sponsored by Defense Advanced Research Projects Agency DARPA Order No. ARPS APPROVED FOR PUBLIC

  9. Can the Internet Be Saved?

    ERIC Educational Resources Information Center

    Fischman, Josh

    2007-01-01

    The Internet has great difficulty coping with the sharp increase in mobile devices like cellphones and laptops, and handling bandwidth-hungry traffic such as video, now demanded by an increasing number of users. According to Ellen W. Zegura, chairwoman of computer sciences at the Georgia Institute of Technology, the Internet is like a big…

  10. An Evaluation of Internet-Based CAD Collaboration Tools

    ERIC Educational Resources Information Center

    Smith, Shana Shiang-Fong

    2004-01-01

    Due to the now widespread use of the Internet, most companies now require computer aided design (CAD) tools that support distributed collaborative design on the Internet. Such CAD tools should enable designers to share product models, as well as related data, from geographically distant locations. However, integrated collaborative design…

  11. The Telecom Act, the Internet, and Higher Education.

    ERIC Educational Resources Information Center

    Hundt, Reed

    1999-01-01

    Explains political factors in the development of the 1966 Telecommunications Act and how it helped elementary and secondary education in acquiring computers to connect to the Internet; describes the communications revolution; considers the role of government; and discusses how the Internet is changing the entire system of higher education. (LRW)

  12. Internet Basics. ERIC Digest.

    ERIC Educational Resources Information Center

    Tennant, Roy

    The Internet is a worldwide network of computer networks. In the United States, the National Science Foundation Network (NSFNet) serves as the Internet "backbone" (a very high speed network that connects key regions across the country). The NSFNet will likely evolve into the National Research and Education Network (NREN) as defined in…

  13. Creating Pupils' Internet Magazine

    ERIC Educational Resources Information Center

    Bognar, Branko; Šimic, Vesna

    2014-01-01

    This article presents an action research, which aimed to improve pupils' literary creativity and enable them to use computers connected to the internet. The study was conducted in a small district village school in Croatia. Creating a pupils' internet magazine appeared to be an excellent way for achieving the educational aims of almost all…

  14. Cyberspace: No Women Need Apply? Librarians and the Internet.

    ERIC Educational Resources Information Center

    Missingham, Roxanne

    1996-01-01

    The Internet affects women librarians by providing opportunities for networking, mentoring, and career development. A study of listserv traffic on FEMINIST and PACS-L, and a survey of librarians and Internet usage, found gender differences in the content and tone of postings. Computer technology could deconstruct gender relationships in the…

  15. Are Health Answers Online for Older Adults?

    ERIC Educational Resources Information Center

    Cresci, Mary K.; Jarosz, Patricia A.; Templin, Thomas N.

    2012-01-01

    The Internet has the potential for engaging urban seniors in managing their health. This study examined computer and Internet use among urban seniors and their interest in using the Internet as a health-management tool. Findings indicated that many participants were interested in storing and accessing health-related information using an…

  16. Flexible Description Language for HPC based Processing of Remote Sense Data

    NASA Astrophysics Data System (ADS)

    Nandra, Constantin; Gorgan, Dorian; Bacu, Victor

    2016-04-01

    When talking about Big Data, the most challenging aspect lays in processing them in order to gain new insight, find new patterns and gain knowledge from them. This problem is likely most apparent in the case of Earth Observation (EO) data. With ever higher numbers of data sources and increasing data acquisition rates, dealing with EO data is indeed a challenge [1]. Geoscientists should address this challenge by using flexible and efficient tools and platforms. To answer this trend, the BigEarth project [2] aims to combine the advantages of high performance computing solutions with flexible processing description methodologies in order to reduce both task execution times and task definition time and effort. As a component of the BigEarth platform, WorDeL (Workflow Description Language) [3] is intended to offer a flexible, compact and modular approach to the task definition process. WorDeL, unlike other description alternatives such as Python or shell scripts, is oriented towards the description topologies, using them as abstractions for the processing programs. This feature is intended to make it an attractive alternative for users lacking in programming experience. By promoting modular designs, WorDeL not only makes the processing descriptions more user-readable and intuitive, but also helps organizing the processing tasks into independent sub-tasks, which can be executed in parallel on multi-processor platforms in order to improve execution times. As a BigEarth platform [4] component, WorDeL represents the means by which the user interacts with the system, describing processing algorithms in terms of existing operators and workflows [5], which are ultimately translated into sets of executable commands. The WorDeL language has been designed to help in the definition of compute-intensive, batch tasks which can be distributed and executed on high-performance, cloud or grid-based architectures in order to improve the processing time. Main references for further information: [1] Gorgan, D., "Flexible and Adaptive Processing of Earth Observation Data over High Performance Computation Architectures", International Conference and Exhibition Satellite 2015, August 17-19, Houston, Texas, USA. [2] Bigearth project - flexible processing of big earth data over high performance computing architectures. http://cgis.utcluj.ro/bigearth, (2014) [3] Nandra, C., Gorgan, D., "Workflow Description Language for Defining Big Earth Data Processing Tasks", Proceedings of the Intelligent Computer Communication and Processing (ICCP), IEEE-Press, pp. 461-468, (2015). [4] Bacu, V., Stefan, T., Gorgan, D., "Adaptive Processing of Earth Observation Data on Cloud Infrastructures Based on Workflow Description", Proceedings of the Intelligent Computer Communication and Processing (ICCP), IEEE-Press, pp.444-454, (2015). [5] Mihon, D., Bacu, V., Colceriu, V., Gorgan, D., "Modeling of Earth Observation Use Cases through the KEOPS System", Proceedings of the Intelligent Computer Communication and Processing (ICCP), IEEE-Press, pp. 455-460, (2015).

  17. Digital optical processing of optical communications: towards an Optical Turing Machine

    NASA Astrophysics Data System (ADS)

    Touch, Joe; Cao, Yinwen; Ziyadi, Morteza; Almaiman, Ahmed; Mohajerin-Ariaei, Amirhossein; Willner, Alan E.

    2017-01-01

    Optical computing is needed to support Tb/s in-network processing in a way that unifies communication and computation using a single data representation that supports in-transit network packet processing, security, and big data filtering. Support for optical computation of this sort requires leveraging the native properties of optical wave mixing to enable computation and switching for programmability. As a consequence, data must be encoded digitally as phase (M-PSK), semantics-preserving regeneration is the key to high-order computation, and data processing at Tb/s rates requires mixing. Experiments have demonstrated viable approaches to phase squeezing and power restoration. This work led our team to develop the first serial, optical Internet hop-count decrement, and to design and simulate optical circuits for calculating the Internet checksum and multiplexing Internet packets. The current exploration focuses on limited-lookback computational models to reduce the need for permanent storage and hybrid nanophotonic circuits that combine phase-aligned comb sources, non-linear mixing, and switching on the same substrate to avoid the macroscopic effects that hamper benchtop prototypes.

  18. [The Key Technology Study on Cloud Computing Platform for ECG Monitoring Based on Regional Internet of Things].

    PubMed

    Yang, Shu; Qiu, Yuyan; Shi, Bo

    2016-09-01

    This paper explores the methods of building the internet of things of a regional ECG monitoring, focused on the implementation of ECG monitoring center based on cloud computing platform. It analyzes implementation principles of automatic identifi cation in the types of arrhythmia. It also studies the system architecture and key techniques of cloud computing platform, including server load balancing technology, reliable storage of massive smalfi les and the implications of quick search function.

  19. Computer and Internet use by home care and hospice agencies.

    PubMed

    Long, C O; Greenberg, E A; Ismeurt, R L; Smith, G

    2000-01-01

    Nurses in home healthcare and hospice are embracing the advances in computer science and technology to provide an edge in administration and clinical practice. Of concern to nurse managers is the extent to which personal computers and the Internet have been used in home healthcare and hospice, and what information, opportunities, and needs related to education are on the horizon. This article discusses the results of a national survey conducted exclusively on the World Wide Web to answer these questions.

  20. Useful Computer Mailing Lists for Language Teaching and Linguistics.

    ERIC Educational Resources Information Center

    Kitao, Kenji; Kitao, S. Kathleen

    This document provides information on computer mailing lists available on the Internet that may be of interest to those in the fields of language teaching and linguistics. There are more than 24,000 lists on the Internet, all are free, and each list has a specific topic and scope. Users can access each list and enter into ongoing discussions or…

Top