Sample records for internet protocol version

  1. An Examination of the Design, Development, and Implementation of an Internet Protocol Version 6 Network: The ADTRAN Inc. Case Study

    ERIC Educational Resources Information Center

    Perigo, Levi

    2013-01-01

    In this dissertation, the author examined the capabilities of Internet Protocol version 6 (IPv6) in regard to replacing Internet Protocol version 4 (IPv4) as the internetworking technology for Medium-sized Businesses (MBs) in the Information Systems (IS) field. Transition to IPv6 is inevitable, and, thus, organizations are adopting this protocol…

  2. 48 CFR 3452.239-70 - Internet protocol version 6 (IPv6).

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... (IPv6). 3452.239-70 Section 3452.239-70 Federal Acquisition Regulations System DEPARTMENT OF EDUCATION... Clauses 3452.239-70 Internet protocol version 6 (IPv6). As prescribed in 3439.701, insert the following...) version 6 (IPv6) as set forth in Internet Engineering Task Force (IETF) Request for Comments (RFC) 2460...

  3. 48 CFR 3439.701 - Internet Protocol version 6.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Department Requirements for Acquisition of Information Technology 3439.701 Internet Protocol version 6. The contracting...

  4. 48 CFR 3439.701 - Internet Protocol version 6.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Department Requirements for Acquisition of Information Technology 3439.701 Internet Protocol version 6. The contracting...

  5. 48 CFR 3439.701 - Internet Protocol version 6.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Department Requirements for Acquisition of Information Technology 3439.701 Internet Protocol version 6. The contracting...

  6. 48 CFR 3452.239-70 - Internet protocol version 6 (IPv6).

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 6 (IPv6). 3452.239-70 Section 3452.239-70 Federal Acquisition Regulations System DEPARTMENT OF... Provisions and Clauses 3452.239-70 Internet protocol version 6 (IPv6). As prescribed in 3439.701, insert the...) version 6 (IPv6) as set forth in Internet Engineering Task Force (IETF) Request for Comments (RFC) 2460...

  7. 48 CFR 3452.239-70 - Internet protocol version 6 (IPv6).

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 6 (IPv6). 3452.239-70 Section 3452.239-70 Federal Acquisition Regulations System DEPARTMENT OF... Provisions and Clauses 3452.239-70 Internet protocol version 6 (IPv6). As prescribed in 3439.701, insert the...) version 6 (IPv6) as set forth in Internet Engineering Task Force (IETF) Request for Comments (RFC) 2460...

  8. 106-17 Telemetry Standards Chapter 7 Packet Telemetry Downlink

    DTIC Science & Technology

    2017-07-31

    Acronyms IP Internet Protocol IPv4 Internet Protocol, Version 4 IPv6 Internet Protocol, Version 6 LLP low-latency PTDP MAC media access control...o 4’b0101: PT Internet Protocol (IP) Packet o 4’b0110: PT Chapter 24 TmNSMessage Packet o 4’b0111 – 4’b1111: Reserved • Fragment (bits 17 – 16...packet is defined as a free -running 12-bit counter. The PT test counter packet shall consist of one 12-bit word and shall be encoded as one 24-bit

  9. 48 CFR 3439.701 - Internet Protocol version 6.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 6. 3439.701 Section 3439.701 Federal Acquisition Regulations System DEPARTMENT OF EDUCATION ACQUISITION REGULATION SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Department Requirements for Acquisition of Information Technology 3439.701 Internet Protocol version 6. The contracting...

  10. 75 FR 56994 - Internet Protocol Version 6 (IPv6) Workshop: The Impact of the Uptake and Deployment of IPv6...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-17

    ...The National Telecommunications and Information Administration (NTIA), on behalf of the U.S. Department of Commerce (Department), will hold a workshop on September 28, 2010, on the importance of the adoption and deployment of Internet Protocol version six (IPv6) addresses for industry, the U.S. Government, and the Internet economy.

  11. Corporations' Resistance to Innovation: The Adoption of the Internet Protocol Version 6

    ERIC Educational Resources Information Center

    Pazdrowski, Tomasz

    2013-01-01

    Computer networks that brought unprecedented growth in global communication have been using Internet Protocol version 4 (IPv4) as a standard for routing. The exponential increase in the use of the networks caused an acute shortage of available identification numbers (IP addresses). The shortage and other network communication issues are…

  12. Internet and Intranet Use with a PC: Effects of Adapter Cards, Windows Versions and TCP/IP Software on Networking Performance.

    ERIC Educational Resources Information Center

    Nieuwenhuysen, Paul

    1997-01-01

    Explores data transfer speeds obtained with various combinations of hardware and software components through a study of access to the Internet from a notebook computer connected to a local area network based on Ethernet and TCP/IP (transmission control protocol/Internet protocol) network protocols. Upgrading is recommended for higher transfer…

  13. 48 CFR 3452.239-70 - Internet protocol version 6 (IPv6).

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... utilizing system packets that are formatted in accordance with commercial standards of Internet protocol (IP... of IPv4 products. (b) Specifically, any new IP product or system developed, acquired, or produced...

  14. An Overview and Analysis of Mobile Internet Protocols in Cellular Environments.

    ERIC Educational Resources Information Center

    Chao, Han-Chieh

    2001-01-01

    Notes that cellular is the inevitable future architecture for the personal communication service system. Discusses the current cellular support based on Mobile Internet Protocol version 6 (Ipv6) and points out the shortfalls of using Mobile IP. Highlights protocols especially for mobile management schemes which can optimize a high-speed mobile…

  15. The Department of Defense’s Transition of Program of Record (POR) Systems from Internet Protocol Version Four (IPv4) to Internet Protocol Version Six (IPv6)

    DTIC Science & Technology

    2006-12-01

    Robert N. Beck, Dean Graduate School of Business and Public Policy iv THIS PAGE INTENTIONALLY...THIS PAGE INTENTIONALLY LEFT BLANK vii TABLE OF CONTENTS I. GRADUATE SCHOOL OF BUSINESS & PUBLIC POLICY JOINT...Warfighter Information Network – Tactical 1 I. GRADUATE SCHOOL OF BUSINESS & PUBLIC POLICY JOINT APPLIED PROJECT PLAN A. TENTATIVE PROJECT TITLE

  16. FTP Extensions for Variable Protocol Specification

    NASA Technical Reports Server (NTRS)

    Allman, Mark; Ostermann, Shawn

    2000-01-01

    The specification for the File Transfer Protocol (FTP) assumes that the underlying network protocols use a 32-bit network address and a 16-bit transport address (specifically IP version 4 and TCP). With the deployment of version 6 of the Internet Protocol, network addresses will no longer be 32-bits. This paper species extensions to FTP that will allow the protocol to work over a variety of network and transport protocols.

  17. A report on IPv6 deployment activities and issues at Sandia National Laboratories:FY2007.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tolendino, Lawrence F.; Eldridge, John M.; Hu, Tan Chang

    2007-06-01

    Internet Protocol version 4 (IPv4) has been a mainstay of the both the Internet and corporate networks for delivering network packets to the desired destination. However, rapid proliferation of network appliances, evolution of corporate networks, and the expanding Internet has begun to stress the limitations of the protocol. Internet Protocol version 6 (IPv6) is the replacement protocol that overcomes the constraints of IPv4. As the emerging Internet network protocol, SNL needs to prepare for its eventual deployment in international, national, customer, and local networks. Additionally, the United States Office of Management and Budget has mandated that IPv6 deployment in governmentmore » network backbones occurs by 2008. This paper explores the readiness of the Sandia National Laboratories network backbone to support IPv6, the issues that must be addressed before a deployment begins, and recommends the next steps to take to comply with government mandates. The paper describes a joint work effort of the Sandia National Laboratories ASC WAN project team and members of the System Analysis & Trouble Resolution, the Communication & Network Systems, and Network System Design & Implementation Departments.« less

  18. A report on FY06 IPv6 deployment activities and issues at Sandia National Laboratories.

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tolendino, Lawrence F.; Eldridge, John M.; Hu, Tan Chang

    2006-06-01

    Internet Protocol version 4 (IPv4) has been a mainstay of the both the Internet and corporate networks for delivering network packets to the desired destination. However, rapid proliferation of network appliances, evolution of corporate networks, and the expanding Internet has begun to stress the limitations of the protocol. Internet Protocol version 6 (IPv6) is the replacement protocol that overcomes the constraints of IPv4. IPv6 deployment in government network backbones has been mandated to occur by 2008. This paper explores the readiness of the Sandia National Laboratories' network backbone to support IPv6, the issues that must be addressed before a deploymentmore » begins, and recommends the next steps to take to comply with government mandates. The paper describes a joint, work effort of the Sandia National Laboratories ASC WAN project team and members of the System Analysis & Trouble Resolution and Network System Design & Implementation Departments.« less

  19. A security analysis of version 2 of the Network Time Protocol (NTP): A report to the privacy and security research group

    NASA Technical Reports Server (NTRS)

    Bishop, Matt

    1991-01-01

    The Network Time Protocol is being used throughout the Internet to provide an accurate time service. The security requirements are examined of such a service, version 2 of the NTP protocol is analyzed to determine how well it meets these requirements, and improvements are suggested where appropriate.

  20. DoD Needs to Reinitiate Migration to Internet Protocol Version 6 (REDACTED)

    DTIC Science & Technology

    2014-12-01

    whether DoD was effectively migrating to Internet Protocol Version 6 ( IPv6 ). Finding Although DoD satisfied the requirement to demonstrate IPv6 on the...enterprise network to IPv6 . This occurred because: • DoD Chief Information Officer (CIO) and U.S. Cyber Command (USCYBERCOM) did not make IPv6 a...resources to further DoD-wide transition toward IPv6 ; and • DoD CIO did not have a current plan of action and milestones to advance DoD IPv6 migration

  1. Analysis of Handoff Mechanisms in Mobile IP

    NASA Astrophysics Data System (ADS)

    Jayaraj, Maria Nadine Simonel; Issac, Biju; Haldar, Manas Kumar

    2011-06-01

    One of the most important challenges in mobile Internet Protocol (IP) is to provide service for a mobile node to maintain its connectivity to network when it moves from one domain to another. IP is responsible for routing packets across network. The first major version of IP is the Internet Protocol version 4 (IPv4). It is one of the dominant protocols relevant to wireless network. Later a newer version of IP called the IPv6 was proposed. Mobile IPv6 is mainly introduced for the purpose of mobility. Mobility management enables network to locate roaming nodes in order to deliver packets and maintain connections with them when moving into new domains. Handoff occurs when a mobile node moves from one network to another. It is a key factor of mobility because a mobile node can trigger several handoffs during a session. This paper briefly explains on mobile IP and its handoff issues, along with the drawbacks of mobile IP.

  2. IPV6 Mobile Network Protocol Weaknesses and a Cryptosystem Approach

    NASA Astrophysics Data System (ADS)

    Balitanas, Maricel; Kim, Tai-Hoon

    This paper reviews some of the improvements associated with the new Internet protocol version 6, an emphasis on its security-related functionality particularly in its authentication and concludes with a hybrid cryptosystem for its authentication issue. Since new generation of Internet protocol is on its way to solve the growth of IP address depletion. It is in a process that may take several years to complete. Thus, as a step to effective solution and efficient implementation this review has been made.

  3. Proof of Concept Integration of a Single-Level Service-Oriented Architecture into a Multi-Domain Secure Environment

    DTIC Science & Technology

    2008-03-01

    Machine [29]. OC4J applications support Java Servlets , Web services, and the following J2EE specific standards: Extensible Markup Language (XML...IMAP Internet Message Access Protocol IP Internet Protocol IT Information Technology xviii J2EE Java Enterprise Environment JSR 168 Java ...LDAP), World Wide Web Distributed Authoring and Versioning (WebDav), Java Specification Request 168 (JSR 168), and Web Services for Remote

  4. A Mechanism for Reliable Mobility Management for Internet of Things Using CoAP

    PubMed Central

    Chun, Seung-Man; Park, Jong-Tae

    2017-01-01

    Under unreliable constrained wireless networks for Internet of Things (IoT) environments, the loss of the signaling message may frequently occur. Mobile Internet Protocol version 6 (MIPv6) and its variants do not consider this situation. Consequently, as a constrained device moves around different wireless networks, its Internet Protocol (IP) connectivity may be frequently disrupted and power can be drained rapidly. This can result in the loss of important sensing data or a large delay for time-critical IoT services such as healthcare monitoring and disaster management. This paper presents a reliable mobility management mechanism in Internet of Things environments with lossy low-power constrained device and network characteristics. The idea is to use the Internet Engineering Task Force (IETF) Constrained Application Protocol (CoAP) retransmission mechanism to achieve both reliability and simplicity for reliable IoT mobility management. Detailed architecture, algorithms, and message extensions for reliable mobility management are presented. Finally, performance is evaluated using both mathematical analysis and simulation. PMID:28085109

  5. A Mechanism for Reliable Mobility Management for Internet of Things Using CoAP.

    PubMed

    Chun, Seung-Man; Park, Jong-Tae

    2017-01-12

    Under unreliable constrained wireless networks for Internet of Things (IoT) environments, the loss of the signaling message may frequently occur. Mobile Internet Protocol version 6 (MIPv6) and its variants do not consider this situation. Consequently, as a constrained device moves around different wireless networks, its Internet Protocol (IP) connectivity may be frequently disrupted and power can be drained rapidly. This can result in the loss of important sensing data or a large delay for time-critical IoT services such as healthcare monitoring and disaster management. This paper presents a reliable mobility management mechanism in Internet of Things environments with lossy low-power constrained device and network characteristics. The idea is to use the Internet Engineering Task Force (IETF) Constrained Application Protocol (CoAP) retransmission mechanism to achieve both reliability and simplicity for reliable IoT mobility management. Detailed architecture, algorithms, and message extensions for reliable mobility management are presented. Finally, performance is evaluated using both mathematical analysis and simulation.

  6. PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices

    PubMed Central

    Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.

    2013-01-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332

  7. PANATIKI: a network access control implementation based on PANA for IoT devices.

    PubMed

    Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F

    2013-11-01

    Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.

  8. Design and Implement AN Interoperable Internet of Things Application Based on AN Extended Ogc Sensorthings Api Standard

    NASA Astrophysics Data System (ADS)

    Huang, C. Y.; Wu, C. H.

    2016-06-01

    The Internet of Things (IoT) is an infrastructure that interconnects uniquely-identifiable devices using the Internet. By interconnecting everyday appliances, various monitoring and physical mashup applications can be constructed to improve people's daily life. However, IoT devices created by different manufacturers follow different proprietary protocols and cannot communicate with each other. This heterogeneity issue causes different products to be locked in multiple closed ecosystems that we call IoT silos. In order to address this issue, a common industrial solution is the hub approach, which implements connectors to communicate with IoT devices following different protocols. However, with the growing number of proprietary protocols proposed by device manufacturers, IoT hubs need to support and maintain a lot of customized connectors. Hence, we believe the ultimate solution to address the heterogeneity issue is to follow open and interoperable standard. Among the existing IoT standards, the Open Geospatial Consortium (OGC) SensorThings API standard supports comprehensive conceptual model and query functionalities. The first version of SensorThings API mainly focuses on connecting to IoT devices and sharing sensor observations online, which is the sensing capability. Besides the sensing capability, IoT devices could also be controlled via the Internet, which is the tasking capability. While the tasking capability was not included in the first version of the SensorThings API standard, this research aims on defining the tasking capability profile and integrates with the SensorThings API standard, which we call the extended-SensorThings API in this paper. In general, this research proposes a lightweight JSON-based web service description, the "Tasking Capability Description", allowing device owners and manufacturers to describe different IoT device protocols. Through the extended- SensorThings API, users and applications can follow a coherent protocol to control IoT devices that use different communication protocols, which could consequently achieve the interoperable Internet of Things infrastructure.

  9. Introducing the Internet.

    PubMed

    Pallen, M

    1995-11-25

    The benefits to medical practitioners of using the Internet are growing rapidly as the Internet becomes easier to use and ever more biomedical resources become available on line. The Internet is the largest computer network in the world; it is also a virtual community, larger than many nation states, with its own rules of behaviour or "netiquette." There are several types of Internet connection and various ways of acquiring a connection. Once connected, you can obtain, free of charge, programs that allow easy use of the Internet's resources and help on how to use these resources; you can access many of these resources through the hypertext references in the on line version of this series (go to http:@www.bmj.com/bmj/ to reach the electronic version). You can then explore the various methods for accessing, manipulating, or disseminating data on the Internet, such as electronic mail, telnet, file transfer protocol, and the world wide web. Results from a search of the world wide web for information on the rare condition of Recklinghausen's neurofibromatosis illustrate the breadth of medical information available on the Internet.

  10. Traffic Generator (TrafficGen) Version 1.4.2: Users Guide

    DTIC Science & Technology

    2016-06-01

    events, the user has to enter them manually . We will research and implement a way to better define and organize the multicast addresses so they can be...the network with Transmission Control Protocol and User Datagram Protocol Internet Protocol traffic. Each node generating network traffic in an...TrafficGen Graphical User Interface (GUI) 3 3.1 Anatomy of the User Interface 3 3.2 Scenario Configuration and MGEN Files 4 4. Working with

  11. Cyberspace modernization. An interest protocol planning advisory

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Keliiaa, Curtis M.; McLane, Victor N.

    A common challenge across the communications and information technology (IT) sectors is Internet + modernization + complexity + risk + cost. Cyberspace modernization and cyber security risks, issues, and concerns impact service providers, their customers, and the industry at large. Public and private sectors are struggling to solve the problem. New service opportunities lie in mobile voice, video, and data, and machine-to-machine (M2M) information and communication technologies that are migrating not only to predominant Internet Protocol (IP) communications, but also concurrently integrating IP, version 4 (IPv4) and IP, version 6 (IPv6). With reference to the Second Internet and the Internetmore » of Things, next generation information services portend business survivability in the changing global market. The planning, architecture, and design information herein is intended to increase infrastructure preparedness, security, interoperability, resilience, and trust in the midst of such unprecedented change and opportunity. This document is a product of Sandia National Laboratories Tribal Cyber and IPv6 project work. It is a Cyberspace Modernization objective advisory in support of bridging the digital divide through strategic partnership and an informed path forward.« less

  12. Design and Implementation of a Secure Modbus Protocol

    NASA Astrophysics Data System (ADS)

    Fovino, Igor Nai; Carcano, Andrea; Masera, Marcelo; Trombetta, Alberto

    The interconnectivity of modern and legacy supervisory control and data acquisition (SCADA) systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This paper describes a secure version of the Modbus SCADA protocol that incorporates integrity, authentication, non-repudiation and anti-replay mechanisms. Experimental results using a power plant testbed indicate that the augmented protocol provides good security functionality without significant overhead.

  13. Mobile Virtual Private Networking

    NASA Astrophysics Data System (ADS)

    Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  14. A Fresh Look at Internet Protocol Version 6 (IPv6) for Department of Defense (DoD) Networks

    DTIC Science & Technology

    2010-08-01

    since system administration practices (such as the use of security appliances) depend heavily on tools for network management, diagnosis and protection...are mobile ad hoc networks (MANETs) and yet there is limited practical experience with MANETs and their performance. Further, the interaction between...Systems FCS Future Combat System IETF Internet Engineering Task Force ISAT Information Science and Technology BAST Board on Army Science and

  15. The Multilayer Firewall

    DTIC Science & Technology

    1998-01-01

    84. [13] Germano Caronni, Hannes Lubich, Ashar Aziz, Tom Markson, Rich Skrenta, "SKIP - securing the internet," Proceedings of the fifth workshop on...perspective," Open Group Technical Paper DEV-DCE-TP6-1, June 10, 1991. [18] Alan O. Freier, Philip Karlton, Paul C. Kocher, "The SSL Protocol, Version

  16. A Failure to Communicate

    ERIC Educational Resources Information Center

    Fredette, Michelle

    2011-01-01

    In April, Asia officially ran out of Internet Protocol (IP) version 4 addresses--the computer equivalent of running out of telephone numbers. Over the next couple of years, the rest of the world will also run dry. Yet, unlike the Y2K bug that had some people convinced the sky would fall, this particular problem is generating little more than tired…

  17. Performance evaluation of secured DICOM image communication with next generation internet protocol IPv6

    NASA Astrophysics Data System (ADS)

    Yu, Fenghai; Zhang, Jianguo; Chen, Xiaomeng; Huang, H. K.

    2005-04-01

    Next Generation Internet (NGI) technology with new communication protocol IPv6 emerges as a potential solution for low-cost and high-speed networks for image data transmission. IPv6 is designed to solve many of the problems of the current version of IP (known as IPv4) with regard to address depletion, security, autoconfiguration, extensibility, and more. We choose CTN (Central Test Node) DICOM software developed by The Mallinckrodt Institute of Radiology to implement IPv6/IPv4 enabled DICOM communication software on different operating systems (Windows/Linux), and used this DICOM software to evaluate the performance of the IPv6/IPv4 enabled DICOM image communication with different security setting and environments. We compared the security communications of IPsec with SSL/TLS on different TCP/IP protocols (IPv6/IPv4), and find that there are some trade-offs to choose security solution between IPsec and SSL/TLS in the security implementation of IPv6/IPv4 communication networks.

  18. DARPA Internet Program. Internet and Transmission Control Specifications,

    DTIC Science & Technology

    1981-09-01

    Internet Program Protocol Specification", RFC 791, USC/ Information Sciences Institute, September 1981. [34] Postel, J., ed., "Transmission Control Protocol...DARPA Internet Program Protocol Specification", RFC 793, USC/ Information Sciences Institute, September 1981. [35] Postel, J., "Echo Process", RFC 347...Newman, March 1981. [53] Postel, J., " Internet Control Message Protocol - DARPA Internet Program Protocol Specification", RFC 792, USC/ Information

  19. Internet MEMS design tools based on component technology

    NASA Astrophysics Data System (ADS)

    Brueck, Rainer; Schumer, Christian

    1999-03-01

    The micro electromechanical systems (MEMS) industry in Europe is characterized by small and medium sized enterprises specialized on products to solve problems in specific domains like medicine, automotive sensor technology, etc. In this field of business the technology driven design approach known from micro electronics is not appropriate. Instead each design problem aims at its own, specific technology to be used for the solution. The variety of technologies at hand, like Si-surface, Si-bulk, LIGA, laser, precision engineering requires a huge set of different design tools to be available. No single SME can afford to hold licenses for all these tools. This calls for a new and flexible way of designing, implementing and distributing design software. The Internet provides a flexible manner of offering software access along with methodologies of flexible licensing e.g. on a pay-per-use basis. New communication technologies like ADSL, TV cable of satellites as carriers promise to offer a bandwidth sufficient even for interactive tools with graphical interfaces in the near future. INTERLIDO is an experimental tool suite for process specification and layout verification for lithography based MEMS technologies to be accessed via the Internet. The first version provides a Java implementation even including a graphical editor for process specification. Currently, a new version is brought into operation that is based on JavaBeans component technology. JavaBeans offers the possibility to realize independent interactive design assistants, like a design rule checking assistants, a process consistency checking assistants, a technology definition assistants, a graphical editor assistants, etc. that may reside distributed over the Internet, communicating via Internet protocols. Each potential user thus is able to configure his own dedicated version of a design tool set dedicated to the requirements of the current problem to be solved.

  20. Examination of a Capabilities-based Prioritization Scheme for Service-Oriented Architecture Afloat

    DTIC Science & Technology

    2012-09-01

    Oriented Architecture Afloat 5. FUNDING NUMBERS 6. AUTHOR(S) Matthew C. Horton 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS (ES) Naval...Postgraduate School Monterey, CA 93943–5000 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING /MONITORING AGENCY NAME(S) AND ADDRESS (ES) N/A...within the Internet Protocol Version 4 ( IPv4 ) header (Xiao & Ni, 1999). By manipulating three bits within this byte, applications may specify

  1. Automatic Traffic-Based Internet Control Message Protocol (ICMP) Model Generation for ns-3

    DTIC Science & Technology

    2015-12-01

    through visiting the inferred automata o Fuzzing of an implementation by generating altered message formats We tested with 3 versions of Netzob. First...relationships. Afterwards, we used the Automata module to generate state machines using different functions: “generateChainedStateAutomata...The “generatePTAAutomata” takes as input several communication sessions and then identifies common paths and merges these into a single automata . The

  2. Windrum: a program for monitoring seismic signals in real time

    NASA Astrophysics Data System (ADS)

    Giudicepietro, Flora

    2017-04-01

    Windrum is a program devote to monitor seismic signals arriving from remote stations in real time. Since 2000, the Osservatorio Vesuviano (INGV) uses the first version of Windrum to monitor the seismic activity of Mt. Vesuvius, Campi Flegrei, Ischia and Stromboli volcano. The program has been also used at the Observatory of Bukittinggi (Indonesia), at the offices of the Italian National Civil Protection, at the COA in Stromboli and at the Civil Protection Center of the municipality of Pozzuoli (Napoli, Italy). In addition, the Osservatorio Vesuviano regularly uses Windrum in educational events such as the Festival of Science in Genova (Italy), FuturoRemoto and other events organized by Città della Scienza in Naples (Italy). The program displays the seismic trace of one station on a monitor, using short packet of data (typically 1 or 2 seconds) received through UTC Internet protocol. The data packets are in Trace_buffer format, a native protocol of Earthworm seismic system that is widely used for the data transmission on Internet. Windrum allows the user to visualize 24 hours of signals, to zoom selected windows of data, in order to estimate the duration Magnitude (Md) of an earthquake, in an intercative way, and to generate graphic images for the web. Moreover, Windrum can exchange Internet messages with other copies of the same program to synchronize actions, such as to zoom the same window of data or mark the beginning of an earthquake on all active monitors simultaneously. Originally, in 2000, Windrum was developed in VB6. I have now developed a new version in VB.net, which goes beyond the obsolescence problems that were appearing. The new version supports the decoding of binary packets received by soket in a more flexible way, allowing the generation of graphic images in different formats. In addition, the new version allows a more flexible layout configuration, suitable for use on large screens with high resolution. Over the past 17 years the use of Windrum for visual analysis of the seismic signals of Vesuvius, Campi Flegrei, Ischia and Stromboli has reduced the detection threshold of the events, allowing a detailed analysis of the seismogram in near real time.

  3. Internet Protocol Transition Workbook

    DTIC Science & Technology

    1982-03-01

    U N C-* INTERNET PROTOCOL TRANSITION WORKBOOK March 1982 Network Information Canter SRI International Menlo Park, CA 94025 t tv l...Feinler Network Information Center SRI International Menlo Park. California 94025 (415) 859-3695 FEINLEROSRI-NIC (Online mail) [Page ii] I.7 Internet ...31 Postel. J., " Internet Control Message Protocol - DARPA Internet Program Protocol Specification." RFC 792, USC/ Information Sciences Institute

  4. The Interplanetary Internet: a communications infrastructure for Mars exploration.

    PubMed

    Burleigh, Scott; Cerf, Vinton; Durst, Robert; Fall, Kevin; Hooke, Adrian; Scott, Keith; Weiss, Howard

    2003-01-01

    A strategy is being developed whereby the current set of internationally standardized space data communications protocols can be incrementally evolved so that a first version of an operational "Interplanetary Internet" is feasible by the end of the decade. This paper describes its architectural concepts, discusses the current set of standard space data communications capabilities that exist to support Mars exploration and reviews proposed new developments. We also speculate that these current capabilities can grow to support future scenarios where human intelligence is widely distributed across the Solar System and day-to-day communications dialog between planets is routine. c2003 American Institute of Aeronautics and Astronautics. Published by Elsevier Science Ltd. All rights reserved.

  5. The Interplanetary Internet: a communications infrastructure for Mars exploration

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott; Cerf, Vinton; Durst, Robert; Fall, Kevin; Hooke, Adrian; Scott, Keith; Weiss, Howard

    2003-01-01

    A strategy is being developed whereby the current set of internationally standardized space data communications protocols can be incrementally evolved so that a first version of an operational "Interplanetary Internet" is feasible by the end of the decade. This paper describes its architectural concepts, discusses the current set of standard space data communications capabilities that exist to support Mars exploration and reviews proposed new developments. We also speculate that these current capabilities can grow to support future scenarios where human intelligence is widely distributed across the Solar System and day-to-day communications dialog between planets is routine. c2003 American Institute of Aeronautics and Astronautics. Published by Elsevier Science Ltd. All rights reserved.

  6. Design and Development of Layered Security: Future Enhancements and Directions in Transmission

    PubMed Central

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-01

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. PMID:26751443

  7. Design and Development of Layered Security: Future Enhancements and Directions in Transmission.

    PubMed

    Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang

    2016-01-06

    Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.

  8. 78 FR 49693 - Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-15

    ...] Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services...: This is a summary of the Commission's Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech...), Internet Protocol Relay (IP Relay), and IP captioned telephone service (IP CTS) as compensable forms of TRS...

  9. Mobile Multicast in Hierarchical Proxy Mobile IPV6

    NASA Astrophysics Data System (ADS)

    Hafizah Mohd Aman, Azana; Hashim, Aisha Hassan A.; Mustafa, Amin; Abdullah, Khaizuran

    2013-12-01

    Mobile Internet Protocol Version 6 (MIPv6) environments have been developing very rapidly. Many challenges arise with the fast progress of MIPv6 technologies and its environment. Therefore the importance of improving the existing architecture and operations increases. One of the many challenges which need to be addressed is the need for performance improvement to support mobile multicast. Numerous approaches have been proposed to improve mobile multicast performance. This includes Context Transfer Protocol (CXTP), Hierarchical Mobile IPv6 (HMIPv6), Fast Mobile IPv6 (FMIPv6) and Proxy Mobile IPv6 (PMIPv6). This document describes multicast context transfer in hierarchical proxy mobile IPv6 (H-PMIPv6) to provide better multicasting performance in PMIPv6 domain.

  10. Computer Networks and Networking: A Primer.

    ERIC Educational Resources Information Center

    Collins, Mauri P.

    1993-01-01

    Provides a basic introduction to computer networks and networking terminology. Topics addressed include modems; the Internet; TCP/IP (Transmission Control Protocol/Internet Protocol); transmission lines; Internet Protocol numbers; network traffic; Fidonet; file transfer protocol (FTP); TELNET; electronic mail; discussion groups; LISTSERV; USENET;…

  11. Advanced Wireless Integrated Navy Network - AWINN

    DTIC Science & Technology

    2005-06-30

    de Sousa, GRA (5/15/05-6/30/05) George C. Hadjichristofi, GRA (4/1/05-5/14/05) Unghee Lee, GRA (33% for 4/1/05-5/14/05, 100% for 5/15/05-6/30/05...and initial implementation of test bed conversion to support Internet Protocol version 6 (IPv6). In this section, we also report on accomplishments in...below. 2.1.2 Task Activities for the Period Subtask 2. la Policy-based Quality of Service Task Obiective: The objectives of this subtask are to

  12. Aerospace physiology.

    DOT National Transportation Integrated Search

    2004-01-01

    This document defines the protocol standards for the Internet Protocol Suite (IPS), which is commonly referred to as Transmission Control Protocol/Internet Protocol (TCP/IP) protocols used for data communications within the National Airspace System (...

  13. Some New Internet Applications Coming Now to a Computer Near You

    ERIC Educational Resources Information Center

    Clyde, Laurel A.

    2005-01-01

    New Internet tools and applications are emerging all the time. Some are truly new; others are Internet versions of older technologies, or new versions of older Internet technologies. This article discusses some new Internet applications that appear to have implications for education and particularly for school libraries. These Internet…

  14. The Internet and Education: Some Lessons on Privacy and Pitfalls.

    ERIC Educational Resources Information Center

    Descy, Don E.

    1997-01-01

    Most users have misconceptions about how the Internet works. Provides a brief history of the Internet and Transmission Control Protocol/Internet Protocol (TCP/IP); discusses electronic mail, privacy, and voluntary and involuntary information gathering; and contrasts the Internet and libraries, focusing on the Internet's lack of consistent…

  15. Performance of the High Sensitivity Open Source Multi-GNSS Assisted GNSS Reference Server.

    NASA Astrophysics Data System (ADS)

    Sarwar, Ali; Rizos, Chris; Glennon, Eamonn

    2015-06-01

    The Open Source GNSS Reference Server (OSGRS) exploits the GNSS Reference Interface Protocol (GRIP) to provide assistance data to GPS receivers. Assistance can be in terms of signal acquisition and in the processing of the measurement data. The data transfer protocol is based on Extensible Mark-up Language (XML) schema. The first version of the OSGRS required a direct hardware connection to a GPS device to acquire the data necessary to generate the appropriate assistance. Scenarios of interest for the OSGRS users are weak signal strength indoors, obstructed outdoors or heavy multipath environments. This paper describes an improved version of OSGRS that provides alternative assistance support from a number of Global Navigation Satellite Systems (GNSS). The underlying protocol to transfer GNSS assistance data from global casters is the Networked Transport of RTCM (Radio Technical Commission for Maritime Services) over Internet Protocol (NTRIP), and/or the RINEX (Receiver Independent Exchange) format. This expands the assistance and support model of the OSGRS to globally available GNSS data servers connected via internet casters. A variety of formats and versions of RINEX and RTCM streams become available, which strengthens the assistance provisioning capability of the OSGRS platform. The prime motivation for this work was to enhance the system architecture of the OSGRS to take advantage of globally available GNSS data sources. Open source software architectures and assistance models provide acquisition and data processing assistance for GNSS receivers operating in weak signal environments. This paper describes test scenarios to benchmark the OSGRSv2 performance against other Assisted-GNSS solutions. Benchmarking devices include the SPOT satellite messenger, MS-Based & MS-Assisted GNSS, HSGNSS (SiRFstar-III) and Wireless Sensor Networks Assisted-GNSS. Benchmarked parameters include the number of tracked satellites, the Time to Fix First (TTFF), navigation availability and accuracy. Three different configurations of Multi-GNSS assistance servers were used, namely Cloud-Client-Server, the Demilitarized Zone (DMZ) Client-Server and PC-Client-Server; with respect to the connectivity location of client and server. The impact on the performance based on server and/or client initiation, hardware capability, network latency, processing delay and computation times with their storage, scalability, processing and load sharing capabilities, were analysed. The performance of the OSGRS is compared against commercial GNSS, Assisted-GNSS and WSN-enabled GNSS devices. The OSGRS system demonstrated lower TTFF and higher availability.

  16. 47 CFR 9.3 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.3... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... location; (3) Requires Internet protocol-compatible customer premises equipment (CPE); and (4) Permits...

  17. 47 CFR 9.3 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.3... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... location; (3) Requires Internet protocol-compatible customer premises equipment (CPE); and (4) Permits...

  18. 47 CFR 9.3 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.3... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... location; (3) Requires Internet protocol-compatible customer premises equipment (CPE); and (4) Permits...

  19. Performance Analysis of the Mobile IP Protocol (RFC 3344 and Related RFCS)

    DTIC Science & Technology

    2006-12-01

    Encapsulation HMAC Keyed-Hash Message Authentication Code ICMP Internet Control Message Protocol IEEE Institute of Electrical and Electronics Engineers IETF...Internet Engineering Task Force IOS Internetwork Operating System IP Internet Protocol ITU International Telecommunication Union LAN Local Area...network computing. Most organizations today have sophisticated networks that are connected to the Internet. The major benefit reaped from such a

  20. 78 FR 14701 - Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-07

    ...] Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services and..., the information collection associated with the Commission's Misuse of Internet Protocol (IP) Captioned... Registration and Documentation of Disability for Eligibility to Use IP Captioned Telephone Service, CG Docket...

  1. 78 FR 49717 - Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-15

    ...] Speech-to-Speech and Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services... Internet Protocol (IP) Speech-to-Speech Telecommunications Relay Services; Telecommunications Relay... (IP Relay) and video relay service (VRS), the Commission should bundle national STS outreach efforts...

  2. Towards building high performance medical image management system for clinical trials

    NASA Astrophysics Data System (ADS)

    Wang, Fusheng; Lee, Rubao; Zhang, Xiaodong; Saltz, Joel

    2011-03-01

    Medical image based biomarkers are being established for therapeutic cancer clinical trials, where image assessment is among the essential tasks. Large scale image assessment is often performed by a large group of experts by retrieving images from a centralized image repository to workstations to markup and annotate images. In such environment, it is critical to provide a high performance image management system that supports efficient concurrent image retrievals in a distributed environment. There are several major challenges: high throughput of large scale image data over the Internet from the server for multiple concurrent client users, efficient communication protocols for transporting data, and effective management of versioning of data for audit trails. We study the major bottlenecks for such a system, propose and evaluate a solution by using a hybrid image storage with solid state drives and hard disk drives, RESTfulWeb Services based protocols for exchanging image data, and a database based versioning scheme for efficient archive of image revision history. Our experiments show promising results of our methods, and our work provides a guideline for building enterprise level high performance medical image management systems.

  3. 78 FR 54201 - Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-03

    ...] Misuse of Internet Protocol (IP) Captioned Telephone Service; Telecommunications Relay Services and... further possible actions necessary to improve internet protocol captioned telephone relay service (IP CTS... for calculating the compensation rate paid to IP CTS providers. This action is necessary to ensure...

  4. Orbital

    NASA Astrophysics Data System (ADS)

    Hanson, Robert M.

    2003-06-01

    ORBITAL requires the following software, which is available for free download from the Internet: Netscape Navigator, version 4.75 or higher, or Microsoft Internet Explorer, version 5.0 or higher; Chime Plug-in, version compatible with your OS and browser (available from MDL).

  5. Validation of the Persian Version of the Problematic Internet Use Questionnaire (PIUQ).

    PubMed

    Ranjbar, Hadi; Thatcher, Andrew; Greyling, Michael; Arab, Mansour; Nasri, Nahid

    2014-10-01

    The most commonly used instrument for the research and treatment of excessive internet use is Young's Internet Addiction Test (IAT). While the IAT has been translated to several languages (including Persian) and has demonstrated good psychometric properties across several independent studies, there is still a room for alternative assessment instruments. This study reports a validation of the Persian version of the Problematic Internet Use Questionnaire (PIUQ). A sample (n = 296) from Kerman, Iran was administered the translated Persian version of the PIUQ as well as the Persian version of the University of California, Los Angeles (UCLA) Loneliness scale, Satisfaction With Life scale, and questions related to use of technology and the internet. Analyses using confirmatory and exploratory factor analyses demonstrated that the Persian version of the PIUQ had good internal reliability and concurrent validity (with loneliness and satisfaction with life), but they also had an alternative factor structure that did not support the original factor structure. The Persian version of the PIUQ produced adequate psychometric properties (internal reliability and concurrent validity), but care should be taken in the interpretation of the factor structure.

  6. Validity of the Malay version of the Internet Addiction Test: a study on a group of medical students in Malaysia.

    PubMed

    Guan, Ng Chong; Isa, Saramah Mohammed; Hashim, Aili Hanim; Pillai, Subash Kumar; Harbajan Singh, Manveen Kaur

    2015-03-01

    The use of the Internet has been increasing dramatically over the decade in Malaysia. Excessive usage of the Internet has lead to a phenomenon called Internet addiction. There is a need for a reliable, valid, and simple-to-use scale to measure Internet addiction in the Malaysian population for clinical practice and research purposes. The aim of this study was to validate the Malay version of the Internet Addiction Test, using a sample of 162 medical students. The instrument displayed good internal consistency (Cronbach's α = .91), parallel reliability (intraclass coefficient = .88, P < .001), and concurrent validity with the Compulsive Internet Use Scale (Pearson's correlation = .84, P < .001). Receiver operating characteristic analysis showed that 43 was the optimal cutoff score to discriminate students with and without Internet dependence. Principal component analysis with varimax rotation identified a 5-factor model. The Malay version of the Internet Addiction Test appeared to be a valid instrument for assessing Internet addiction in Malaysian university students. © 2012 APJPH.

  7. Satellite-Friendly Protocols and Standards

    NASA Astrophysics Data System (ADS)

    Koudelka, O.; Schmidt, M.; Ebert, J.; Schlemmer, H.; Kastner, S.; Riedler, W.

    2002-01-01

    We are currently observing a development unprecedented with other services, the enormous growth of the Internet. Video, voice and data applications can be supported via this network in high quality. Multi-media applications require high bandwidth which may not be available in many areas. When making proper use of the broadcast feature of a communications satellite, the performance of the satellite-based system can compare favourably to terrestrial solutions. Internet applications are in many cases highly asymmetric, making them very well suited to applications using small and inexpensive terminals. Data from one source may be used simultaneously by a large number of users. The Internet protocol suite has become the de-facto standard. But this protocol family in its original form has not been designed to support guaranteed quality of service, a prerequisite for real-time, high quality traffic. The Internet Protocol has to be adapted for the satellite environment, because long roundtrip delays and the error behaviour of the channel could make it inefficient over a GEO satellite. Another requirement is to utilise the satellite bandwidth as efficiently as possible. This can be achieved by adapting the access system to the nature of IP frames, which are variable in length. In the framework of ESA's ARTES project a novel satellite multimedia system was developed which utilises Multi-Frequency TDMA in a meshed network topology. The system supports Quality of Service (QoS) by reserving capacity with different QoS requirements. The system is centrally controlled by a master station with the implementation of a demand assignment (DAMA) system. A lean internal signalling system has been adopted. Network management is based on the SNMP protocol and industry-standard network management platforms, making interfaces to standard accounting and billing systems easy. Modern communication systems will have to be compliant to different standards in a very flexible manner. The developed system is based on a hardware architecture using FPGAs (Field-Programmable Gate Arrays). This provides means to configure the satellite gateway for different standards and to optimise the transmission parameters for varying user traffic, thus increasing the efficiency significantly. The paper describes the flexible system architecture and focuses particularly on the DAMA access scheme and the chosen quality-of-service implementation. Emphasis has been put on the support of IP Version 6. Different standards (e.g. RCS and possible follow-ups) and the possibility to support them are discussed.

  8. Internet Protocol Implementation Guide.

    DTIC Science & Technology

    1982-08-01

    RD-R153 624 INTERNET PROTOCOL IMPLEMENTATION GIDE(U) SRI 1/2 INTERNATIONAL MENLO PARK CA NETWORK INFORMATION CENTER AUG 82 DCA2e-83-C-8e25 N... INTERNET PROTOCOL S IMPLEMENTATION GUIDE August 1982 DTICFL. !.ECTE .-" MAY 1 31985 ;z B Q.. Network Information Center SRI International Menlo Park...this is more information than the receiving Internet * module needs. The specified procedure is to take the return route recorded in the first

  9. Internet Connections: Understanding Your Access Options.

    ERIC Educational Resources Information Center

    Notess, Greg R.

    1994-01-01

    Describes levels of Internet connectivity, physical connections, and connection speeds. Compares options for connecting to the Internet, including terminal accounts, dial-up terminal accounts, direct connections through a local area network, and direct connections using SLIP (Serial Line Internet Protocol) or PPP (Point-to-Point Protocol). (eight…

  10. A validation of well-being and happiness surveys for administration via the Internet.

    PubMed

    Howell, Ryan T; Rodzon, Katrina S; Kurai, Mark; Sanchez, Amy H

    2010-08-01

    Internet research is appealing because it is a cost- and time-efficient way to access a large number of participants; however, the validity of Internet research for important subjective well-being (SWB) surveys has not been adequately assessed. The goal of the present study was to validate the Satisfaction With Life Scale (SWLS; Diener, Emmons, Larsen, & Griffin, 1985), the Positive and Negative Affect Schedule (PANAS-X; Watson & Clark, 1994), and the Subjective Happiness Scale (SHS; Lyubomirsky & Lepper, 1999) for use on the Internet. This study compared the quality of data collected using paper-based (paper-and-pencil version in a lab setting), computer-based (Web-based version in a lab setting), and Internet (Web-based version on a computer of the participant's choosing) surveys for these three measures of SWB. The paper-based and computer-based experiment recruited two college student samples; the Internet experiments recruited a college student sample and an adult sample responding to ads on different social-networking Web sites. This study provides support for the reliability, validity, and generalizability of the Internet format of the SWLS, PANAS-X, and SHS. Across the three experiments, the results indicate that the computer-based and Internet surveys had means, standard deviations, reliabilities, and factor structures that were similar to those of the paper-based versions. The discussion examines the difficulty of higher attrition for the Internet version, the need to examine reverse-coded items in the future, and the possibility that unhappy individuals are more likely to participate in Internet surveys of SWB.

  11. Separation of Acids, Bases, and Neutral Compounds

    NASA Astrophysics Data System (ADS)

    Fujita, Megumi; Mah, Helen M.; Sgarbi, Paulo W. M.; Lall, Manjinder S.; Ly, Tai Wei; Browne, Lois M.

    2003-01-01

    Separation of Acids, Bases, and Neutral Compounds requires the following software, which is available for free download from the Internet: Netscape Navigator, version 4.75 or higher, or Microsoft Internet Explorer, version 5.0 or higher; Chime plug-in, version compatible with your OS and browser (available from MDL); and Flash player, version 5 or higher (available from Macromedia).

  12. Protocol for a Delay-Tolerant Data-Communication Network

    NASA Technical Reports Server (NTRS)

    Torgerson, Jordan; Hooke, Adrian; Burleigh, Scott; Fall, Kevin

    2004-01-01

    As its name partly indicates, the Delay-Tolerant Networking (DTN) Bundle Protocol is a protocol for delay-tolerant transmission of data via communication networks. This protocol was conceived as a result of studies of how to adapt Internet protocols so that Internet-like services could be provided across interplanetary distances in support of deep-space exploration. The protocol, and software to implement the protocol, is being developed in collaboration among experts at NASA's Jet Propulsion Laboratory and other institutions. No current Internet protocols can accommodate long transmission delay times or intermittent link connectivity. The DTN Bundle Protocol represents a departure from the standard Internet assumption that a continuous path is available from a host computer to a client computer: It provides for routing of data through networks that may be disjointed and may be characterized by long transmission delays. In addition to networks that include deepspace communication links, examples of such networks include terrestrial ones within which branches are temporarily disconnected. The protocol is based partly on the definition of a message-based overlay above the transport layers of the networks on which it is hosted.

  13. [Preferences in the format of questionnaires and use of the Internet by schoolchildren].

    PubMed

    Rajmil, L; Robles, N; Murillo, M; Rodríguez-Arjona, D; Azuara, M; Ballester, A; Codina, F

    2015-07-01

    To describe the preferences to complete questionnaires via the internet by schoolchildren, as well as to analyze the attitude towards the use of internet to communicate with health professionals. Cross-sectional study of a school population in Palafolls (Barcelona, n=923) was conducted in October and November 2013. Participants completed both internet and paper versions on a single school day, in random order, and with at least an interval of 2 hours. Preferences to answer internet vs paper version were recorded, along with the willingness to share information with health professionals. Percentages of use preferences and attitudes were estimated, and logistic regression models were fitted to analyze the association with the preferences and willingness to share information with health professionals. Participation rates were 77% (n=715), of whom 42.4% (38.7 to 46.0) preferred the internet version, and 20.6% (17.6 to 23.6) the paper version. Older children (odds ratio [OR]=0.89, 0.84 to 0.95 for age), and those from families with secondary school (OR=0.63, 0.43 to 0.93), and university degree (OR=0.61, 0.38 to 0.97) were less likely to prefer the internet version, while boys (OR=1.55, 1.10 to 2.16) and those children reporting sedentary habits (OR=1.78, 1.06 to 3.0) were more likely to prefer the internet version. Those scoring higher quality of life (OR=1.03, 1.01-1.05) and not reporting sedentary habits (OR=0.33, 0.15 to 0.73) were factors associated with a positive attitude to share information with health professionals. Younger children prefer to use the internet. Although Internet use is very widespread, it is less used to communicate with health professionals. Copyright © 2014 Asociación Española de Pediatría. Published by Elsevier España, S.L.U. All rights reserved.

  14. 77 FR 43538 - Misuse of Internet Protocol (IP) Relay Service; Telecommunications Relay Services and Speech-to...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-25

    ... the Internet, this service has become subject to abuse. Among other things, persons have been using IP...] Misuse of Internet Protocol (IP) Relay Service; Telecommunications Relay Services and Speech-to-Speech.... ACTION: Final rule. SUMMARY: In this document, the Commission adopts a measure that prohibits Internet...

  15. Space-Based Telemetry and Range Safety (STARS) Study

    NASA Technical Reports Server (NTRS)

    Hogie, Keith; Crisuolo, Ed; Parise, Ron

    2004-01-01

    This presentation will describe the design, development, and testing of a system to collect telemetry, format it into UDP/IP packets, and deliver it to a ground test range using standard IP technologies over a TDRSS link. This presentation will discuss the goal of the STARS IP Formatter along with the overall design. It will also present performance results of the current version of the IP formatter. Finally, it will discuss key issues for supporting constant rate telemetry data delivery when using standard components such as PCI/104 processors, the Linux operating system, Internet Protocols, and synchronous serial interfaces.

  16. Factor Structure of the Internet Addiction Test in Online Gamers and Poker Players.

    PubMed

    Khazaal, Yasser; Achab, Sophia; Billieux, Joel; Thorens, Gabriel; Zullino, Daniele; Dufour, Magali; Rothen, Stéphane

    2015-01-01

    The Internet Addiction Test (IAT) is the most widely used questionnaire to screen for problematic Internet use. Nevertheless, its factorial structure is still debated, which complicates comparisons among existing studies. Most previous studies were performed with students or community samples despite the probability of there being more problematic Internet use among users of specific applications, such as online gaming or gambling. To assess the factorial structure of a modified version of the IAT that addresses specific applications, such as video games and online poker. Two adult samples-one sample of Internet gamers (n=920) and one sample of online poker players (n=214)-were recruited and completed an online version of the modified IAT. Both samples were split into two subsamples. Two principal component analyses (PCAs) followed by two confirmatory factor analyses (CFAs) were run separately. The results of principal component analysis indicated that a one-factor model fit the data well across both samples. In consideration of the weakness of some IAT items, a 17-item modified version of the IAT was proposed. This study assessed, for the first time, the factorial structure of a modified version of an Internet-administered IAT on a sample of Internet gamers and a sample of online poker players. The scale seems appropriate for the assessment of such online behaviors. Further studies on the modified 17-item IAT version are needed.

  17. Potential youth exposure to alcohol advertising on the internet: A study of internet versions of popular television programs.

    PubMed

    Siegel, Michael; Kurland, Rachel P; Castrini, Marisa; Morse, Catherine; de Groot, Alexander; Retamozo, Cynthia; Roberts, Sarah P; Ross, Craig S; Jernigan, David H

    No previous paper has examined alcohol advertising on the internet versions of television programs popular among underage youth. To assess the volume of alcohol advertising on web sites of television networks which stream television programs popular among youth. Multiple viewers analyzed the product advertising appearing on 12 television programs that are available in full episode format on the internet. During a baseline period of one week, six coders analyzed all 12 programs. For the nine programs that contained alcohol advertising, three underage coders (ages 10, 13, and 18) analyzed the programs to quantify the extent of that advertising over a four-week period. Alcohol advertisements are highly prevalent on these programs, with nine of the 12 shows carrying alcohol ads, and six programs averaging at least one alcohol ad per episode. There was no difference in alcohol ad exposure for underage and legal age viewers. There is a substantial potential for youth exposure to alcohol advertising on the internet through internet-based versions of television programs. The Federal Trade Commission should require alcohol companies to report the underage youth and adult audiences for internet versions of television programs on which they advertise.

  18. Asserting National Sovereignty in Cyberspace: The Case for Internet Border Inspection

    DTIC Science & Technology

    2003-06-01

    Influencing Foreign Policy. in Internet and International Systems: Information Technology and American Foreign Policy Decisionmaking Workshop. 1999...investigative Agencies that investigate violations of federal law IO Information Operations, military operations in information realm IP Internet ...Protocol, a specific format for Internet packet headers IW Information Warfare, part of information operations NCP Network Control Protocol NSA

  19. Ship to Shore Data Communication and Prioritization

    DTIC Science & Technology

    2011-12-01

    First Out FTP File Transfer Protocol GCCS-M Global Command and Control System Maritime HAIPE High Assurance Internet Protocol Encryptor HTTP Hypertext...Transfer Protocol (world wide web protocol ) IBS Integrated Bar Code System IDEF0 Integration Definition IER Information Exchange Requirements...INTEL Intelligence IP Internet Protocol IPT Integrated Product Team ISEA In-Service Engineering Agent ISNS Integrated Shipboard Network System IT

  20. A History of the Improvement of Internet Protocols Over Satellites Using ACTS

    NASA Technical Reports Server (NTRS)

    Allman, Mark; Kruse, Hans; Ostermann, Shawn

    2000-01-01

    This paper outlines the main results of a number of ACTS experiments on the efficacy of using standard Internet protocols over long-delay satellite channels. These experiments have been jointly conducted by NASAs Glenn Research Center and Ohio University over the last six years. The focus of our investigations has been the impact of long-delay networks with non-zero bit-error rates on the performance of the suite of Internet protocols. In particular, we have focused on the most widely used transport protocol, the Transmission Control Protocol (TCP), as well as several application layer protocols. This paper presents our main results, as well as references to more verbose discussions of our experiments.

  1. Internet-based cognitive behavioural therapy (iCBT) for posttraumatic stress disorder versus waitlist control: study protocol for a randomised controlled trial.

    PubMed

    Allen, Adrian R; Newby, Jill M; Smith, Jessica; Andrews, Gavin

    2015-12-01

    This randomised controlled trial (RCT) with two parallel arms will evaluate the efficacy of an internet-delivered six-lesson 10-week cognitive behavioural therapy (iCBT) intervention for posttraumatic stress disorder (PTSD). It will also investigate the association between changes in PTSD symptoms, intolerance of uncertainty (IU) and emotion regulation. Patients with PTSD will be recruited via the research arm of a not-for-profit clinical and research unit in Australia and randomised to a treatment group or waitlist control group. The minimum sample size for each group (alpha 0.05, power 0.80 for a g of 0.47) was identified as 72, but 10 % more will be recruited to hedge against expected attrition. PTSD diagnosis will be determined using the PTSD module from the Mini International Neuropsychiatric Interview version 5.0.0. The PTSD Checklist - Civilian version (PCL-C) will be used to measure PTSD symptoms (the primary outcome measure), with the Intolerance of Uncertainty Scale 12-item version (IUS-12) and the Emotion Regulation Questionnaire (ERQ) used to measure intolerance of uncertainty and emotion regulation, respectively. The PCL-C will be administered to the treatment group before each lesson of the PTSD program and at 3-month follow-up. The IUS-12 and ERQ will be administered before lessons 1 and 4, at post-treatment and at 3-month follow-up. The waitlist control group will complete these measures at week 1, week 5 and week 11 of the waitlist period. PTSD program efficacy will be determined using intent-to-treat mixed models. Maintenance of gains will be assessed at 3-month follow-up. Mediation analyses using PROCESS will be used to examine the association between change in PTSD symptoms over treatment and change in each of IU and emotion regulation ability in separate analyses. The current RCT seeks to replicate previous efficacy findings of iCBT for PTSD in a formally assessed PTSD sample from the general population. Findings may point to future lines of enquiry for the role of IU and emotion regulation in the mechanism of PTSD symptom change during CBT. Australian New Zealand Clinical Trials Registry: ACTRN12614001213639 , registered 18 November 2014. This trial protocol is written in compliance with the Standard Protocol Items: Recommendations for Interventional Trials (SPIRIT) guidelines.

  2. Exploitation of Existing Voice Over Internet Protocol Technology for Department of the Navy Application

    DTIC Science & Technology

    2002-09-01

    Protocol LAN Local Area Network LDAP Lightweight Directory Access Protocol LLQ Low Latency Queuing MAC Media Access Control MarCorSysCom Marine...Description Protocol SIP Session Initiation Protocol SMTP Simple Mail Transfer Protocol SPAWAR Space and Naval Warfare Systems Center SS7 ...PSTN infrastructure previously required to carry the conversation. The cost of accessing the PSTN is thereby eliminated. In cases where Internet

  3. Using the Internet for psychological research: personality testing on the World Wide Web.

    PubMed

    Buchanan, T; Smith, J L

    1999-02-01

    The Internet is increasingly being used as a medium for psychological research. To assess the validity of such efforts, an electronic version of Gangestad & Snyder's (1985) revised self-monitoring questionnaire was placed at a site on the World Wide Web. In all, 963 responses were obtained through the Internet and these were compared with those from a group of 224 undergraduates who completed a paper-and-pencil version. Comparison of model fit indices obtained through confirmatory factor analyses indicated that the Internet-mediated version had similar psychometric properties to its conventional equivalent and compared favourably as a measure of self-monitoring. Reasons for possible superiority of Internet data are discussed. Results support the notion that Web-based personality assessment is possible, but stringent validation of test instruments is urged.

  4. French validation of the compulsive internet use scale (CIUS).

    PubMed

    Khazaal, Yasser; Chatton, Anne; Horn, Alessandra; Achab, Sophia; Thorens, Gabriel; Zullino, Daniele; Billieux, Joël

    2012-12-01

    The popularity of using the Internet and related applications has grown in European countries in the last two decades. Despite numerous advantages in terms of optimizing communications among individuals and social systems, the use of the Internet may be associated with excessive use and possible Internet addiction. The goals of the current study were to validate a French version of the compulsive Internet use scale (CIUS) and to assess its links with common psychiatric symptoms such as depression (assessed with the Beck depression inventory: BDI), anxiety (assessed with the trait anxiety inventory: STAI) and alcohol misuse (assessed with the alcohol use disorder identification test: AUDIT). The French versions of the CIUS, BDI, STAI and AUDIT were administered to a sample of Internet users. Exploratory and confirmatory analyses, correlation analysis and logistic regression were performed. As previously found with the original version, a one-factor model of the CIUS had good psychometric properties and fit the data well. Excessive use of the Internet was associated with depressive symptoms.

  5. 77 FR 63757 - Extension of the Commission's Rules Regarding Outage Reporting to Interconnected Voice Over...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-17

    ... Commission's Rules Regarding Outage Reporting to Interconnected Voice Over Internet Protocol Service Providers and Broadband Internet Service Providers AGENCY: Federal Communications Commission. ACTION: Final... Regarding Outage Reporting to Interconnected Voice Over Internet Protocol Service Providers and Broadband...

  6. Factor Structure of the Internet Addiction Test in Online Gamers and Poker Players

    PubMed Central

    Achab, Sophia; Billieux, Joel; Thorens, Gabriel; Zullino, Daniele; Dufour, Magali; Rothen, Stéphane

    2015-01-01

    Background The Internet Addiction Test (IAT) is the most widely used questionnaire to screen for problematic Internet use. Nevertheless, its factorial structure is still debated, which complicates comparisons among existing studies. Most previous studies were performed with students or community samples despite the probability of there being more problematic Internet use among users of specific applications, such as online gaming or gambling. Objective To assess the factorial structure of a modified version of the IAT that addresses specific applications, such as video games and online poker. Methods Two adult samples—one sample of Internet gamers (n=920) and one sample of online poker players (n=214)—were recruited and completed an online version of the modified IAT. Both samples were split into two subsamples. Two principal component analyses (PCAs) followed by two confirmatory factor analyses (CFAs) were run separately. Results The results of principal component analysis indicated that a one-factor model fit the data well across both samples. In consideration of the weakness of some IAT items, a 17-item modified version of the IAT was proposed. Conclusions This study assessed, for the first time, the factorial structure of a modified version of an Internet-administered IAT on a sample of Internet gamers and a sample of online poker players. The scale seems appropriate for the assessment of such online behaviors. Further studies on the modified 17-item IAT version are needed. PMID:26543917

  7. 78 FR 14359 - Verizon Business Networks Services, Inc., Senior Analysts-Order Management, Voice Over Internet...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-05

    ... Business Networks Services, Inc., Senior Analysts-Order Management, Voice Over Internet Protocol, Small And Medium Business, Tampa, Florida; Verizon Business Networks Services, Inc., Senior Coordinator-Order... Business Networks Services, Inc., Senior Analysts-Order Management, Voice Over Internet Protocol, Small and...

  8. Browsing for the Best Internet Access Provider?

    ERIC Educational Resources Information Center

    Weil, Marty

    1996-01-01

    Highlights points to consider when choosing an Internet Service Provider. Serial Line Internet Protocol (SLIP) and Point to Point Protocol (PPP) are compared regarding price, performance, bandwidth, speed, and technical support. Obtaining access via local, national, consumer online, and telephone-company providers is discussed. A pricing chart and…

  9. Internet Protocol Handbook. Volume 4. The Domain Name System (DNS) handbook

    DTIC Science & Technology

    1989-08-01

    Mockapetris [Page 1] 4-11 INTERNET PROTOCOL HA TDBOOK - Voue Four 1989 RFC 1034 Domain Concepts and Facilities November 1987 bandwidth consumed in distributing...Domain Names- Concepts and Facilities KFC 1034 RFC 1034 Domain Concepts and Facilities November 1’)87 - Queries contain a bit called recursion desired...during periodic sweeps to reclaim the memory consumed by old RRS. Mockapetris [Page 33] 4-43 INTERNET PROTOCOL HANDBOOK - Volume Four 1989 RFC 1034

  10. Space Internet-Embedded Web Technologies Demonstration

    NASA Technical Reports Server (NTRS)

    Foltz, David A.

    2001-01-01

    The NASA Glenn Research Center recently demonstrated the ability to securely command and control space-based assets by using the Internet and standard Internet Protocols (IP). This is a significant accomplishment because future NASA missions will benefit by using Internet standards-based protocols. The benefits include reduced mission costs and increased mission efficiency. The Internet-Based Space Command and Control System Architecture demonstrated at the NASA Inspection 2000 event proved that this communications architecture is viable for future NASA missions.

  11. Internet-Based System for Voice Communication With the ISS

    NASA Technical Reports Server (NTRS)

    Chamberlain, James; Myers, Gerry; Clem, David; Speir, Terri

    2005-01-01

    The Internet Voice Distribution System (IVoDS) is a voice-communication system that comprises mainly computer hardware and software. The IVoDS was developed to supplement and eventually replace the Enhanced Voice Distribution System (EVoDS), which, heretofore, has constituted the terrestrial subsystem of a system for voice communications among crewmembers of the International Space Station (ISS), workers at the Payloads Operations Center at Marshall Space Flight Center, principal investigators at diverse locations who are responsible for specific payloads, and others. The IVoDS utilizes a communication infrastructure of NASA and NASArelated intranets in addition to, as its name suggests, the Internet. Whereas the EVoDS utilizes traditional circuitswitched telephony, the IVoDS is a packet-data system that utilizes a voice over Internet protocol (VOIP). Relative to the EVoDS, the IVoDS offers advantages of greater flexibility and lower cost for expansion and reconfiguration. The IVoDS is an extended version of a commercial Internet-based voice conferencing system that enables each user to participate in only one conference at a time. In the IVoDS, a user can receive audio from as many as eight conferences simultaneously while sending audio to one of them. The IVoDS also incorporates administrative controls, beyond those of the commercial system, that provide greater security and control of the capabilities and authorizations for talking and listening afforded to each user.

  12. Potential youth exposure to alcohol advertising on the internet: A study of internet versions of popular television programs

    PubMed Central

    Siegel, Michael; Kurland, Rachel P.; Castrini, Marisa; Morse, Catherine; de Groot, Alexander; Retamozo, Cynthia; Roberts, Sarah P.; Ross, Craig S.; Jernigan, David H.

    2015-01-01

    Background No previous paper has examined alcohol advertising on the internet versions of television programs popular among underage youth. Objectives To assess the volume of alcohol advertising on web sites of television networks which stream television programs popular among youth. Methods Multiple viewers analyzed the product advertising appearing on 12 television programs that are available in full episode format on the internet. During a baseline period of one week, six coders analyzed all 12 programs. For the nine programs that contained alcohol advertising, three underage coders (ages 10, 13, and 18) analyzed the programs to quantify the extent of that advertising over a four-week period. Results Alcohol advertisements are highly prevalent on these programs, with nine of the 12 shows carrying alcohol ads, and six programs averaging at least one alcohol ad per episode. There was no difference in alcohol ad exposure for underage and legal age viewers. Conclusions There is a substantial potential for youth exposure to alcohol advertising on the internet through internet-based versions of television programs. The Federal Trade Commission should require alcohol companies to report the underage youth and adult audiences for internet versions of television programs on which they advertise. PMID:27212891

  13. Internet Telephony

    DTIC Science & Technology

    1999-12-01

    compression technology . The ubiquity of routed Internet Protocol (IP) networks, and the desire to trim telephony costs are the major driving forces of the...mid- 󈨞s, data and voice began to merge, propelled by advances in compression technology . The ubiquity of routed Internet Protocol (IP) networks...transmit voice over IP networks that are privately owned or publicly utilized. If we have the technology to transmit Voice over the Internet then why not

  14. Rationale, Scenarios, and Profiles for the Application of the Internet Protocol Suite (IPS) in Space Operations

    NASA Technical Reports Server (NTRS)

    Benbenek, Daniel B.; Walsh, William

    2010-01-01

    This greenbook captures some of the current, planned and possible future uses of the Internet Protocol (IP) as part of Space Operations. It attempts to describe how the Internet Protocol is used in specific scenarios. Of primary focus is low-earth-orbit space operations, which is referred to here as the design reference mission (DRM). This is because most of the program experience drawn upon derives from this type of mission. Application profiles are provided. This includes parameter settings programs have proposed for sending IP datagrams over CCSDS links, the minimal subsets and features of the IP protocol suite and applications expected for interoperability between projects, and the configuration, operations and maintenance of these IP functions. Of special interest is capturing the lessons learned from the Constellation Program in this area, since that program included a fairly ambitious use of the Internet Protocol.

  15. DDN (Defense Data Network) Protocol Handbook. Volume 2. DARPA Internet Protocols

    DTIC Science & Technology

    1985-12-01

    header padding is used to ensure that the internet header ends on a 32 bit boundary. The padding is zero . 3.2. Discussion The implementation of a... zeros . The first of these would be interpreted as the end-of-options option, and the remainder as internet header padding , Every internet module must...several octets in length. The internet header Padding field is used to ensure that the data begins on 32 bit word boundary. The padding is zero

  16. The Rise of IPv6: Benefits and Costs of Transforming Military Cyberspace

    DTIC Science & Technology

    2015-04-01

    people, the structure of the Internet is changing for the first time in its history with the ex- haustion of the IP version four ( IPv4 ) protocol and the...have.4 The need to transition from IPv4 to IPv6 is not hy- pothetical since the global supply of IP addresses in IPv4 is quickly be- ing exhausted...Registry (RIR) IPv4 Address Run-Down Model Year RI R Ad dr es s Po ol (/ 8s ) 2013 2014 2015 2016 2017 2018 2019 2020 4.5 4 3.5 3 2.5 2 1.5 1 0.5

  17. MDP: Reliable File Transfer for Space Missions

    NASA Technical Reports Server (NTRS)

    Rash, James; Criscuolo, Ed; Hogie, Keith; Parise, Ron; Hennessy, Joseph F. (Technical Monitor)

    2002-01-01

    This paper presents work being done at NASA/GSFC by the Operating Missions as Nodes on the Internet (OMNI) project to demonstrate the application of the Multicast Dissemination Protocol (MDP) to space missions to reliably transfer files. This work builds on previous work by the OMNI project to apply Internet communication technologies to space communication. The goal of this effort is to provide an inexpensive, reliable, standard, and interoperable mechanism for transferring files in the space communication environment. Limited bandwidth, noise, delay, intermittent connectivity, link asymmetry, and one-way links are all possible issues for space missions. Although these are link-layer issues, they can have a profound effect on the performance of transport and application level protocols. MDP, a UDP-based reliable file transfer protocol, was designed for multicast environments which have to address these same issues, and it has done so successfully. Developed by the Naval Research Lab in the mid 1990's, MDP is now in daily use by both the US Post Office and the DoD. This paper describes the use of MDP to provide automated end-to-end data flow for space missions. It examines the results of a parametric study of MDP in a simulated space link environment and discusses the results in terms of their implications for space missions. Lessons learned are addressed, which suggest minor enhancements to the MDP user interface to add specific features for space mission requirements, such as dynamic control of data rate, and a checkpoint/resume capability. These are features that are provided for in the protocol, but are not implemented in the sample MDP application that was provided. A brief look is also taken at the status of standardization. A version of MDP known as NORM (Neck Oriented Reliable Multicast) is in the process of becoming an IETF standard.

  18. On Ramps: Options and Issues in Accessing the Internet.

    ERIC Educational Resources Information Center

    Bocher, Bob

    1995-01-01

    Outlines the basic options that schools and libraries have for accessing the Internet, focusing on four models: direct connection; dial access using SLIP/PPP (Serial Line Internet Protocol/Point-to-Point Protocol); dial-up using terminal emulation mode; and dial access through commercial online services. Discusses access option issues such as…

  19. French validation of the internet addiction test.

    PubMed

    Khazaal, Yasser; Billieux, Joël; Thorens, Gabriel; Khan, Riaz; Louati, Youssr; Scarlatti, Elisa; Theintz, Florence; Lederrey, Jerome; Van Der Linden, Martial; Zullino, Daniele

    2008-12-01

    The main goal of the present study is to investigate the psychometric properties of a French version of the Internet Addiction Test (IAT) and to assess its relationship with both time spent on Internet and online gaming. The French version of the Young's Internet Addiction Test (IAT) was administered to a sample of 246 adults. Exploratory and confirmatory analyses were carried out. We discovered that a one-factor model of the IAT has good psychometric properties and fits the data well, which is not the case of a six-factor model as found in previous studies using exploratory methods. Correlation analysis revealed positive significant relationships between IAT scores and both the daily duration of Internet use and the fact of being an online player. In addition, younger people scored higher on the IAT. The one-factor model found in this study has to be replicated in other IAT language versions.

  20. Psychometric validation of a German version of the compulsive Internet use scale.

    PubMed

    Wartberg, Lutz; Petersen, Kay-Uwe; Kammerl, Rudolf; Rosenkranz, Moritz; Thomasius, Rainer

    2014-02-01

    Excessive Internet use and Internet addiction are currently increasing in many industrial nations. Verified and validated measuring instruments could contribute to a better understanding of this still quite recent development. The aim of this survey was to investigate the psychometric properties of a German version of the Compulsive Internet Use Scale (CIUS). We surveyed a representative German quota sample of 1,723 adolescents aged between 14 and 17 years, as well as one parent each, with standardized questionnaires. In addition, adolescents and parents were asked whether the media use by the youth was considered problematic or excessive, and whether it led to arguments at home. We conducted confirmatory factor analyses (CFA) with maximum likelihood estimation to examine the factorial validity of the German CIUS, as well as reliability and correlation analyses. The results of the CFA indicate good psychometric properties for the German version of the CIUS. They appear in line with the findings for the original version of the questionnaire. Furthermore, the CIUS showed high internal consistency, and we found significant correlations between the "CIUS-summary score" and different ratings of problems with the media usage by the youth and the parents. The German version of the CIUS seems to be a valid and suitable diagnostic tool for measuring problematic to pathological Internet use.

  1. Internet-based monitoring and benchmarking in ambulatory surgery centers.

    PubMed

    Bovbjerg, V E; Olchanski, V; Zimberg, S E; Green, J S; Rossiter, L F

    2000-08-01

    Each year the number of surgical procedures performed on an outpatient basis increases, yet relatively little is known about assessing and improving quality of care in ambulatory surgery. Conventional methods for evaluating outcomes, which are based on assessment of inpatient services, are inadequate in the rapidly changing, geographically dispersed field of ambulatory surgery. Internet-based systems for improving outcomes and establishing benchmarks may be feasible and timely. Eleven freestanding ambulatory surgery centers (ASCs) reported process and outcome data for 3,966 outpatient surgical procedures to an outcomes monitoring system (OMS), during a demonstration period from April 1997 to April 1999. ASCs downloaded software and protocol manuals from the OMS Web site. Centers securely submitted clinical information on perioperative process and outcome measures and postoperative patient telephone interviews. Feedback to centers ranged from current and historical rates of surgical and postsurgical complications to patient satisfaction and the adequacy of postsurgical pain relief. ASCs were able to successfully implement the data collection protocols and transmit data to the OMS. Data security efforts were successful in preventing the transmission of patient identifiers. Feedback reports to ASCs were used to institute changes in ASC staffing, patient care, and patient education, as well as for accreditation and marketing. The demonstration also pointed out shortcomings in the OMS, such as the need to simplify hardware and software installation as well as data collection and transfer methods, which have been addressed in subsequent OMS versions. Internet-based benchmarking for geographically dispersed outpatient health care facilities, such as ASCs, is feasible and likely to play a major role in this effort.

  2. Positive imagery cognitive bias modification (CBM) and internet-based cognitive behavioural therapy (iCBT) versus control CBM and iCBT for depression: study protocol for a parallel-group randomised controlled trial.

    PubMed

    Williams, Alishia D; Blackwell, Simon E; Holmes, Emily A; Andrews, Gavin

    2013-10-29

    The current randomised controlled trial will evaluate the efficacy of an internet-delivered positive imagery cognitive bias modification (CBM) intervention for depression when compared with an active control condition and help establish the additive benefit of positive imagery CBM when delivered in combination with internet cognitive behavioural therapy for depression. Patients meeting diagnostic criteria for a current major depressive episode will be recruited through the research arm of a not-for-profit clinical and research unit in Australia. The minimum sample size for each group (α set at 0.05, power at 0.80) was identified as 29, but at least 10% more will be recruited to hedge against expected attrition. We will measure the impact of CBM on primary measures of depressive symptoms (Beck Depression Inventory-second edition (BDI-II), Patient Health Questionnaire (PHQ9)) and interpretive bias (ambiguous scenarios test-depression), and on a secondary measure of psychological distress (Kessler-10 (K10)) following the 1-week CBM intervention. Secondary outcome measures of psychological distress (K10), as well as disability (WHO disability assessment schedule-II), repetitive negative thinking (repetitive thinking questionnaire), and anxiety (state trait anxiety inventory-trait version) will be evaluated following completion of the 11-week combined intervention, in addition to the BDI-II and PHQ9. Intent-to-treat marginal and mixed effect models using restricted maximum likelihood estimation will be used to evaluate the primary hypotheses. Clinically significant change will be defined as high-end state functioning (a BDI-II score <14) combined with a total score reduction greater than the reliable change index score. Maintenance of gains will be assessed at 3-month follow-up. The current trial protocol has been approved by the Human Research Ethics Committee of St Vincent's Hospital and the University of New South Wales, Sydney. Australian New Zealand Clinical Trials Registry: ACTRN12613000139774 and Clinicaltrials.gov: NCT01787513. This trial protocol is written in compliance with the Standard Protocol Items: recommendations for Interventional Trials (SPIRIT) guidelines.

  3. Continued Development of Internet Protocols under the IBM OS/MVS Operating System

    DTIC Science & Technology

    1985-01-25

    developed a prototype TCP/IP implementation for an IBM MVS host under a previous DARPA contract’ as part of the Internet research effort on the design of...participated in the DARPA Internet research program which led to the present TCP and IP protocols. Development of a prototype implementation of TCP/IP

  4. Web Transfer Over Satellites Being Improved

    NASA Technical Reports Server (NTRS)

    Allman, Mark

    1999-01-01

    Extensive research conducted by NASA Lewis Research Center's Satellite Networks and Architectures Branch and the Ohio University has demonstrated performance improvements in World Wide Web transfers over satellite-based networks. The use of a new version of the Hypertext Transfer Protocol (HTTP) reduced the time required to load web pages over a single Transmission Control Protocol (TCP) connection traversing a satellite channel. However, an older technique of simultaneously making multiple requests of a given server has been shown to provide even faster transfer time. Unfortunately, the use of multiple simultaneous requests has been shown to be harmful to the network in general. Therefore, we are developing new mechanisms for the HTTP protocol which may allow a single request at any given time to perform as well as, or better than, multiple simultaneous requests. In the course of study, we also demonstrated that the time for web pages to load is at least as short via a satellite link as it is via a standard 28.8-kbps dialup modem channel. This demonstrates that satellites are a viable means of accessing the Internet.

  5. Vietnamese validation of the short version of Internet Addiction Test.

    PubMed

    Tran, Bach Xuan; Mai, Hue Thi; Nguyen, Long Hoang; Nguyen, Cuong Tat; Latkin, Carl A; Zhang, Melvyn W B; Ho, Roger C M

    2017-12-01

    The main goal of the present study was to examine the psychometric properties of a Vietnamese version of the short-version of Internet Addiction Test (s-IAT) and to assess the relationship between s-IAT scores and demographics, health related qualify of life and perceived stress scores in young Vietnamese. The Vietnamese version of s-IAT was administered to a sample of 589 participants. Exploratory factor and reliability analyses were performed. Regression analysis was used to identify the associated factors. The two-factor model of Vietnamese version of s-IAT demonstrated good psychometric properties. The internal consistency of Factor 1 (loss of control/time management) was high (Cronbach's alpha = 0.82) and Factor 2 (craving/social problems) was satisfactory (Cronbach's alpha = 0.75). Findings indicated that 20.9% youths were addicted to the Internet. Regression analysis revealed significant associations between Internet addiction and having problems in self-care, lower quality of life and high perceived stress scores. The Vietnamese version of s-IAT is a valid and reliable instrument to assess IA in Vietnamese population. Due to the high prevalence of IA among Vietnamese youths, IA should be paid attention in future intervention programs. s-IAT can be a useful screening tool for IA to promptly inform and treat the IA among Vietnamese youths.

  6. Development and validation of the Parents' Perceived Self-Efficacy to Manage Children's Internet Use Scale for parents of adolescents with attention-deficit/hyperactivity disorder.

    PubMed

    Hsieh, Yi-Ping; Chou, Wen-Jiun; Wang, Peng-Wei; Yen, Cheng-Fang

    2017-12-01

    Background and aims This study developed and validated the Parents' Perceived Self-Efficacy to Manage Children's Internet Use Scale (PSMIS) in the parents of children with attention-deficit/hyperactivity disorder (ADHD). Methods In total, 231 parents of children with ADHD were invited to complete the PSMIS, followed by the Chen Internet Addiction Scale and the short version of Swanson, Nolan, and Pelham, Version IV Scale - Chinese version for analyzing Internet addiction severity and ADHD symptoms, respectively. Results The results of exploratory and confirmatory factor analyses confirmed the four-factor structure of the 18-item PSMIS. The significant difference in the levels of parents' perceived self-efficacy between the parents of children with and without Internet addiction supported the criterion-related validity of the PSMIS. The internal consistency and 1-month test-retest reliability were acceptable. Conclusion The results indicate that the PSMIS has acceptable validity and reliability and can be used for measuring parents' perceived self-efficacy to manage children's Internet use among parents of children with ADHD.

  7. Study of intelligent building system based on the internet of things

    NASA Astrophysics Data System (ADS)

    Wan, Liyong; Xu, Renbo

    2017-03-01

    In accordance with the problem such as isolated subsystems, weak system linkage and expansibility of the bus type buildings management system, this paper based on the modern intelligent buildings has studied some related technologies of the intelligent buildings and internet of things, and designed system architecture of the intelligent buildings based on the Internet of Things. Meanwhile, this paper has also analyzed wireless networking modes, wireless communication protocol and wireless routing protocol of the intelligent buildings based on the Internet of Things.

  8. Entanglement percolation on a quantum internet with scale-free and clustering characters

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wu Liang; Zhu Shiqun

    The applicability of entanglement percolation protocol to real Internet structure is investigated. If the current Internet can be used directly in the quantum regime, the protocol can provide a way to establish long-distance entanglement when the links are pure nonmaximally entangled states. This applicability is primarily due to the combination of scale-free degree distribution and a high level of clustering, both of which are widely observed in many natural and artificial networks including the current Internet. It suggests that the topology of real Internet may play an important role in entanglement establishment.

  9. Entanglement percolation on a quantum internet with scale-free and clustering characters

    NASA Astrophysics Data System (ADS)

    Wu, Liang; Zhu, Shiqun

    2011-11-01

    The applicability of entanglement percolation protocol to real Internet structure is investigated. If the current Internet can be used directly in the quantum regime, the protocol can provide a way to establish long-distance entanglement when the links are pure nonmaximally entangled states. This applicability is primarily due to the combination of scale-free degree distribution and a high level of clustering, both of which are widely observed in many natural and artificial networks including the current Internet. It suggests that the topology of real Internet may play an important role in entanglement establishment.

  10. Experience with Delay-Tolerant Networking from Orbit

    NASA Technical Reports Server (NTRS)

    Ivancic, W.; Eddy, W. M.; Stewart, D.; Wood, L.; Northam, J.; Jackson, C.

    2010-01-01

    We describe the first use from space of the Bundle Protocol for Delay-Tolerant Networking (DTN) and lessons learned from experiments made and experience gained with this protocol. The Disaster Monitoring Constellation (DMC), constructed by Surrey Satellite Technology Ltd (SSTL), is a multiple-satellite Earth-imaging low-Earth-orbit sensor network in which recorded image swaths are stored onboard each satellite and later downloaded from the satellite payloads to a ground station. Store-and-forward of images with capture and later download gives each satellite the characteristics of a node in a disruption-tolerant network. Originally developed for the Interplanetary Internet, DTNs are now under investigation in an Internet Research Task Force (IRTF) DTN research group (RG), which has developed a bundle architecture and protocol. The DMC is technically advanced in its adoption of the Internet Protocol (IP) for its imaging payloads and for satellite command and control, based around reuse of commercial networking and link protocols. These satellites use of IP has enabled earlier experiments with the Cisco router in Low Earth Orbit (CLEO) onboard the constellation s UK-DMC satellite. Earth images are downloaded from the satellites using a custom IP-based high-speed transfer protocol developed by SSTL, Saratoga, which tolerates unusual link environments. Saratoga has been documented in the Internet Engineering Task Force (IETF) for wider adoption. We experiment with the use of DTNRG bundle concepts onboard the UK-DMC satellite, by examining how Saratoga can be used as a DTN convergence layer to carry the DTNRG Bundle Protocol, so that sensor images can be delivered to ground stations and beyond as bundles. Our practical experience with the first successful use of the DTNRG Bundle Protocol in a space environment gives us insights into the design of the Bundle Protocol and enables us to identify issues that must be addressed before wider deployment of the Bundle Protocol. Published in 2010 by John Wiley & Sons, Ltd. KEY WORDS: Internet; UK-DMC; satellite; Delay-Tolerant Networking (DTN); Bundle Protocol

  11. Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    2009-01-01

    A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks, the Licklider Transport Protocol Security Extensions. This document provides a security analysis of the current DTN RFCs and proposed security related internet drafts with a focus on space-based communication networks, which is a rather restricted subset of DTN networks. Note, the original focus and motivation of DTN work was for the Interplanetary Internet . This document does not address general store-and-forward network overlays, just the current work being done by the Internet Research Task Force (IRTF) and the Consultative Committee for Space Data Systems (CCSDS) Space Internetworking Services Area (SIS) - DTN working group under the DTN and Bundle umbrellas. However, much of the analysis is relevant to general store-and-forward overlays.

  12. Online interventions for problem gamblers with and without co-occurring problem drinking: study protocol of a randomized controlled trial.

    PubMed

    Cunningham, John A; Hodgins, David C; Keough, Matthew; Hendershot, Christian S; Bennett, Kylie; Bennett, Anthony; Godinho, Alexandra

    2018-05-25

    The current randomized controlled trial seeks to evaluate whether providing access to an Internet intervention for problem drinking in addition to an Internet intervention for problem gambling is beneficial for participants with gambling problems who do or do not have co-occurring problem drinking. Potential participants will be recruited online via a comprehensive advertisement strategy, if they meet the criteria for problem gambling. As part of the baseline measures, problem drinking will also be assessed. Eligible participants (N = 280) who agree to partake in the study and to be followed up for 6 months will be randomized into one of two versions of an Internet intervention for gamblers: an intervention that targets only gambling issues (G-only) and one that combines a gambling intervention with an intervention for problem drinking (G + A). For problem gamblers who exhibit co-occurring problem drinking, it is predicted that participants who are provided access to the G + A intervention will demonstrate a significantly greater level of reduction in gambling outcomes at 6 months compared to those provided access to the G-only intervention. This trial will expand upon the current research on Internet interventions for addictions and inform the development of treatments for those with co-occurring problem drinking and gambling. ClinicalTrials.gov, NCT03323606 . Registered on 24 October 2017.

  13. Real-Time Mapping: Contemporary Challenges and the Internet of Things as the Way Forward

    NASA Astrophysics Data System (ADS)

    Bęcek, Kazimierz

    2016-12-01

    The Internet of Things (IoT) is an emerging technology that was conceived in 1999. The key components of the IoT are intelligent sensors, which represent objects of interest. The adjective `intelligent' is used here in the information gathering sense, not the psychological sense. Some 30 billion sensors that `know' the current status of objects they represent are already connected to the Internet. Various studies indicate that the number of installed sensors will reach 212 billion by 2020. Various scenarios of IoT projects show sensors being able to exchange data with the network as well as between themselves. In this contribution, we discuss the possibility of deploying the IoT in cartography for real-time mapping. A real-time map is prepared using data harvested through querying sensors representing geographical objects, and the concept of a virtual sensor for abstract objects, such as a land parcel, is presented. A virtual sensor may exist as a data record in the cloud. Sensors are identified by an Internet Protocol address (IP address), which implies that geographical objects through their sensors would also have an IP address. This contribution is an updated version of a conference paper presented by the author during the International Federation of Surveyors 2014 Congress in Kuala Lumpur. The author hopes that the use of the IoT for real-time mapping will be considered by the mapmaking community.

  14. Unidata LDM-7: a Hybrid Multicast/unicast System for Highly Efficient and Reliable Real-Time Data Distribution

    NASA Astrophysics Data System (ADS)

    Emmerson, S. R.; Veeraraghavan, M.; Chen, S.; Ji, X.

    2015-12-01

    Results of a pilot deployment of a major new version of the Unidata Local Data Manager (LDM-7) are presented. The Unidata LDM was developed by the University Corporation for Atmospheric Research (UCAR) and comprises a suite of software for the distribution and local processing of data in near real-time. It is widely used in the geoscience community to distribute observational data and model output, most notably as the foundation of the Unidata Internet Data Distribution (IDD) system run by UCAR, but also in private networks operated by NOAA, NASA, USGS, etc. The current version, LDM-6, uses at least one unicast TCP connection per receiving host. With over 900 connections, the bit-rate of total outgoing IDD traffic from UCAR averages approximately 3.0 GHz, with peak data rates exceeding 6.6 GHz. Expected increases in data volume suggest that a more efficient distribution mechanism will be required in the near future. LDM-7 greatly reduces the outgoing bandwidth requirement by incorporating a recently-developed "semi-reliable" IP multicast protocol while retaining the unicast TCP mechanism for reliability. During the summer of 2015, UCAR and the University of Virginia conducted a pilot deployment of the Unidata LDM-7 among U.S. university participants with access to the Internet2 network. Results of this pilot program, along with comparisons to the existing Unidata LDM-6 system, are presented.

  15. Internet Cruising with the Internet Hunt.

    ERIC Educational Resources Information Center

    Gates, Rick

    1993-01-01

    Describes the Internet Hunt, a game designed to challenge and inform librarians about information sources available on the Internet. The use of telnet, and FTP (File Transfer Protocol) are described, and the results of the first Internet Hunt are provided. (EA)

  16. Ad Hoc Selection of Voice over Internet Streams

    NASA Technical Reports Server (NTRS)

    Macha, Mitchell G. (Inventor); Bullock, John T. (Inventor)

    2014-01-01

    A method and apparatus for a communication system technique involving ad hoc selection of at least two audio streams is provided. Each of the at least two audio streams is a packetized version of an audio source. A data connection exists between a server and a client where a transport protocol actively propagates the at least two audio streams from the server to the client. Furthermore, software instructions executable on the client indicate a presence of the at least two audio streams, allow selection of at least one of the at least two audio streams, and direct the selected at least one of the at least two audio streams for audio playback.

  17. Ad Hoc Selection of Voice over Internet Streams

    NASA Technical Reports Server (NTRS)

    Macha, Mitchell G. (Inventor); Bullock, John T. (Inventor)

    2008-01-01

    A method and apparatus for a communication system technique involving ad hoc selection of at least two audio streams is provided. Each of the at least two audio streams is a packetized version of an audio source. A data connection exists between a server and a client where a transport protocol actively propagates the at least two audio streams from the server to the client. Furthermore, software instructions executable on the client indicate a presence of the at least two audio streams, allow selection of at least one of the at least two audio streams, and direct the selected at least one of the at least two audio streams for audio playback.

  18. Legacy to Industry 4.0: A Profibus Sniffer

    NASA Astrophysics Data System (ADS)

    Tsegaye Mamo, Fesseha; Sikora, Axel; Rathfelder, Christoph

    2017-07-01

    Legacy industrial communication protocols are proved robust and functional. During the last decades, the industry has invented completely new or advanced versions of the legacy communication solutions. However, even with the high adoption rate of these new solutions, still the majority industry applications run on legacy, mostly fieldbus related technologies. Profibus is one of those technologies that still keep on growing in the market, albeit a slow in market growth in recent years. A retrofit technology that would enable these technologies to connect to the Internet of Things, utilize the ever growing potential of data analysis, predictive maintenance or cloud-based application, while at the same time not changing a running system is fundamental.

  19. Exploring Associations between Problematic Internet Use, Depressive Symptoms and Sleep Disturbance among Southern Chinese Adolescents.

    PubMed

    Tan, Yafei; Chen, Ying; Lu, Yaogui; Li, Liping

    2016-03-14

    The primary aim of this study was to examine associations between problematic Internet use, depression and sleep disturbance, and explore whether there were differential effects of problematic Internet use and depression on sleep disturbance. A total of 1772 adolescents who participated in the Shantou Adolescent Mental Health Survey were recruited in 2012 in Shantou, China. The Chinese version of the Internet Addiction Test (IAT) was used to evaluate the prevalence and severity of Internet addiction. The Chinese version of the Pittsburgh Sleep Quality Index (PSQI), a 10-item version of the Center for Epidemiologic Studies Depression Scale (CESD-10), and other socio-demographic measures were also completed. Multiple regression analysis was used to test the mediating effect of problematic Internet use and depression on sleep disturbance. Among the participants, 17.2% of adolescents met the criteria for problematic Internet use, 40.0% were also classified as suffering from sleep disturbance, and 54.4% of students had depressive symptoms. Problematic Internet use was significantly associated with depressive symptoms and sleep disturbance. The correlation between depressive symptoms and sleep disturbance was highly significant. Both problematic Internet use (β = 0.014; Sobel test Z = 12.7, p < 0.001) and depression (β = 0.232; Sobel test Z = 3.39, p < 0.001) had partially mediating effects on sleep disturbance and depression was of greater importance for sleep disturbance than problematic Internet use. There is a high prevalence of problematic Internet use, depression and sleep disturbance among high school students in southern China, and problematic Internet use and depressive symptoms are strongly associated with sleep disturbance. This study provides evidence that problematic Internet use and depression have partially mediating effects on sleep disturbance. These results are important for clinicians and policy makers with useful information for prevention and intervention efforts.

  20. Guided and unguided internet-based vestibular rehabilitation versus usual care for dizzy adults of 50 years and older: a protocol for a three-armed randomised trial

    PubMed Central

    van der Wouden, Johannes C; Bosmans, Judith E; Smalbrugge, Martin; van Diest, Willianne; Essery, Rosie; Yardley, Lucy; van der Horst, Henriëtte E; Maarsingh, Otto R

    2017-01-01

    Introduction Dizziness is a common symptom in general practice with a high prevalence among older adults. The most common cause of dizziness in general practice is peripheral vestibular disease. Vestibular rehabilitation (VR) is a safe and effective treatment for peripheral vestibular disease that entails specific exercises to maximise the central nervous system compensation for the effects of vestibular pathology. An internet-based VR intervention has recently been shown to be safe and effective. Online interventions are low cost and easily accessible, but prone to attrition and non-adherence. A combination of online and face-to-face therapy, known as blended care, may balance these advantages and disadvantages. Methods and analysis A single-blind, three-arm, randomised controlled trial among patients aged 50 years and over presenting with dizziness of vestibular origin in general practice will be performed. In this study, we will compare the clinical and cost-effectiveness of stand-alone internet-based VR and internet-based VR with physiotherapeutic support (‘blended care’) with usual care during 6 months of follow-up. We will use a translated Dutch version of a British online VR intervention. Randomisation will be stratified by dizziness severity. The primary outcome measure is the Vertigo Symptoms Scale—Short Form. Intention-to-treat analysis will be performed, adjusting for confounders. The economic evaluation will be conducted from a societal perspective. We will perform an additional analysis on the data to identify predictors of successful treatment in the same population to develop a clinical decision rule for general practitioners. Ethics and dissemination The ethical committee of the VU University Medical Center approved ethics and dissemination of the study protocol. The insights and results of this study will be widely disseminated through international peer-reviewed journals and conference presentations. Trial registration number Pre-results, NTR5712. PMID:28110290

  1. 47 CFR 9.1 - Purposes.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 1 2013-10-01 2013-10-01 false Purposes. 9.1 Section 9.1 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.1... applicable to interconnected Voice over Internet Protocol service providers, and to ensure that those...

  2. 47 CFR 9.1 - Purposes.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 1 2014-10-01 2014-10-01 false Purposes. 9.1 Section 9.1 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.1... applicable to interconnected Voice over Internet Protocol service providers, and to ensure that those...

  3. 47 CFR 9.1 - Purposes.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 1 2012-10-01 2012-10-01 false Purposes. 9.1 Section 9.1 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.1... applicable to interconnected Voice over Internet Protocol service providers, and to ensure that those...

  4. 47 CFR 9.1 - Purposes.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 1 2011-10-01 2011-10-01 false Purposes. 9.1 Section 9.1 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.1... applicable to interconnected Voice over Internet Protocol service providers, and to ensure that those...

  5. 47 CFR 9.1 - Purposes.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Purposes. 9.1 Section 9.1 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL INTERCONNECTED VOICE OVER INTERNET PROTOCOL SERVICES § 9.1... applicable to interconnected Voice over Internet Protocol service providers, and to ensure that those...

  6. Security Analysis and Improvements of Authentication and Access Control in the Internet of Things

    PubMed Central

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-01-01

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464

  7. Security analysis and improvements of authentication and access control in the Internet of Things.

    PubMed

    Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon

    2014-08-13

    Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.

  8. Implementation and Evaluation of Four Interoperable Open Standards for the Internet of Things.

    PubMed

    Jazayeri, Mohammad Ali; Liang, Steve H L; Huang, Chih-Yuan

    2015-09-22

    Recently, researchers are focusing on a new use of the Internet called the Internet of Things (IoT), in which enabled electronic devices can be remotely accessed over the Internet. As the realization of IoT concept is still in its early stages, manufacturers of Internet-connected devices and IoT web service providers are defining their proprietary protocols based on their targeted applications. Consequently, IoT becomes heterogeneous in terms of hardware capabilities and communication protocols. Addressing these heterogeneities by following open standards is a necessary step to communicate with various IoT devices. In this research, we assess the feasibility of applying existing open standards on resource-constrained IoT devices. The standard protocols developed in this research are OGC PUCK over Bluetooth, TinySOS, SOS over CoAP, and OGC SensorThings API. We believe that by hosting open standard protocols on IoT devices, not only do the devices become self-describable, self-contained, and interoperable, but innovative applications can also be easily developed with standardized interfaces. In addition, we use memory consumption, request message size, response message size, and response latency to benchmark the efficiency of the implemented protocols. In all, this research presents and evaluates standard-based solutions to better understand the feasibility of applying existing standards to the IoT vision.

  9. Developing Ubiquitous Sensor Network Platform Using Internet of Things: Application in Precision Agriculture.

    PubMed

    Ferrández-Pastor, Francisco Javier; García-Chamizo, Juan Manuel; Nieto-Hidalgo, Mario; Mora-Pascual, Jerónimo; Mora-Martínez, José

    2016-07-22

    The application of Information Technologies into Precision Agriculture methods has clear benefits. Precision Agriculture optimises production efficiency, increases quality, minimises environmental impact and reduces the use of resources (energy, water); however, there are different barriers that have delayed its wide development. Some of these main barriers are expensive equipment, the difficulty to operate and maintain and the standard for sensor networks are still under development. Nowadays, new technological development in embedded devices (hardware and communication protocols), the evolution of Internet technologies (Internet of Things) and ubiquitous computing (Ubiquitous Sensor Networks) allow developing less expensive systems, easier to control, install and maintain, using standard protocols with low-power consumption. This work develops and test a low-cost sensor/actuator network platform, based in Internet of Things, integrating machine-to-machine and human-machine-interface protocols. Edge computing uses this multi-protocol approach to develop control processes on Precision Agriculture scenarios. A greenhouse with hydroponic crop production was developed and tested using Ubiquitous Sensor Network monitoring and edge control on Internet of Things paradigm. The experimental results showed that the Internet technologies and Smart Object Communication Patterns can be combined to encourage development of Precision Agriculture. They demonstrated added benefits (cost, energy, smart developing, acceptance by agricultural specialists) when a project is launched.

  10. Developing Ubiquitous Sensor Network Platform Using Internet of Things: Application in Precision Agriculture

    PubMed Central

    Ferrández-Pastor, Francisco Javier; García-Chamizo, Juan Manuel; Nieto-Hidalgo, Mario; Mora-Pascual, Jerónimo; Mora-Martínez, José

    2016-01-01

    The application of Information Technologies into Precision Agriculture methods has clear benefits. Precision Agriculture optimises production efficiency, increases quality, minimises environmental impact and reduces the use of resources (energy, water); however, there are different barriers that have delayed its wide development. Some of these main barriers are expensive equipment, the difficulty to operate and maintain and the standard for sensor networks are still under development. Nowadays, new technological development in embedded devices (hardware and communication protocols), the evolution of Internet technologies (Internet of Things) and ubiquitous computing (Ubiquitous Sensor Networks) allow developing less expensive systems, easier to control, install and maintain, using standard protocols with low-power consumption. This work develops and test a low-cost sensor/actuator network platform, based in Internet of Things, integrating machine-to-machine and human-machine-interface protocols. Edge computing uses this multi-protocol approach to develop control processes on Precision Agriculture scenarios. A greenhouse with hydroponic crop production was developed and tested using Ubiquitous Sensor Network monitoring and edge control on Internet of Things paradigm. The experimental results showed that the Internet technologies and Smart Object Communication Patterns can be combined to encourage development of Precision Agriculture. They demonstrated added benefits (cost, energy, smart developing, acceptance by agricultural specialists) when a project is launched. PMID:27455265

  11. Treatment Considerations in Internet and Video Game Addiction: A Qualitative Discussion.

    PubMed

    Greenfield, David N

    2018-04-01

    Internet and video game addiction has been a steadily developing consequence of modern living. Behavioral and process addictions and particularly Internet and video game addiction require specialized treatment protocols and techniques. Recent advances in addiction medicine have improved our understanding of the neurobiology of substance and behavioral addictions. Novel research has expanded the ways we understand and apply well-established addiction treatments as well as newer therapies specific to Internet and video game addiction. This article reviews the etiology, psychology, and neurobiology of Internet and video game addiction and presents treatment strategies and protocols for addressing this growing problem. Copyright © 2017 Elsevier Inc. All rights reserved.

  12. [A security protocol for the exchange of personal medical data via Internet: monitoring treatment and drug effects].

    PubMed

    Viviani, R; Fischer, J; Spitzer, M; Freudenmann, R W

    2004-04-01

    We present a security protocol for the exchange of medical data via the Internet, based on the type/domain model. We discuss two applications of the protocol: in a system for the exchange of data for quality assurance, and in an on-line database of adverse reactions to drug use. We state that a type/domain security protocol can successfully comply with the complex requirements for data privacy and accessibility typical of such applications.

  13. Intranets: Just Another Bandwagon?

    ERIC Educational Resources Information Center

    Lynch, Gary

    1997-01-01

    Discusses intranets--the deployment and use of Internet technologies such as the World Wide Web, electronic mail, and Transmission Control Protocol/Internet Protocol (TCP/IP) on a closed network. Considers the "hype," benefits, standards, implementation, and problems of intranets, and concludes that while intranets can be beneficial,…

  14. The Interplanetary Internet: A Communications Infrastructure for Mars Exploration

    NASA Astrophysics Data System (ADS)

    Burleigh, S.; Cerf, V.; Durst, R.; Fall, K.; Hooke, A.; Scott, K.; Weiss, H.

    2002-01-01

    A successful program of Mars Exploration will depend heavily on a robust and dependable space communications infrastructure that is well integrated with the terrestrial Internet. In the same way that the underpinnings of the Internet are the standardized "TCP/IP" suite of protocols, an "Interplanetary Internet" will need a similar set of capabilities that can support reliable communications across vast distances and highly stressed communications environments. For the past twenty years, the Consultative Committee for Space Data Systems (CCSDS) has been developing standardized long- haul space link communications techniques that are now in use by over two hundred missions within the international space community. New CCSDS developments, shortly to be infused into Mars missions, include a proximity link standard and a store-and- forward file transfer protocol. As part of its `Next Generation Internet' initiative, the U.S. Defense Advanced Projects Agency (DARPA) recently supported an architectural study of a future "InterPlaNetary Internet" (IPN). The IPN architecture assumes that in short-delay environments - such as on and around Mars - standard Internet technologies will be adapted to the locally harsh environment and deployed within surface vehicles and orbiting relays. A long-haul interplanetary backbone network that includes Deep Space Network (DSN) gateways into the terrestrial Internet will interconnect these distributed internets that are scattered across the Solar System. Just as TCP/IP unites the Earth's "network of networks" to become the Internet, a new suite of protocols known as "Bundling" will enable the IPN to become a "network of internets" to support true interplanetary dialog. An InterPlaNetary Internet Research Group has been established within the Internet community to coordinate this research and NASA has begun to support the further development of the IPN architecture and the Bundling protocols. A strategy is being developed whereby the current set of standard CCSDS data communications protocols can be incrementally evolved so that true InterPlaNetary Internet operations are feasible by the end of the decade. The strategy - which is already in progress via the deployment of Mars relay links - needs individual missions to each contribute increments of capability so that a standard communications infrastructure can rapidly accrete. This paper will describe the IPN architectural concepts, discuss the current set of standard data communications capabilities that exist to support Mars exploration and review the proposed new developments. We will also postulate that the concept is scalable and can grow to support future scenarios where human intelligence is widely distributed across the Solar System and day-to-day communications dialog among planets is routine. 1 2 3 4 5

  15. Utilization of Internet Protocol-Based Voice Systems in Remote Payload Operations

    NASA Technical Reports Server (NTRS)

    Best, Susan; Nichols, Kelvin; Bradford, Robert

    2003-01-01

    This viewgraph presentation provides an overview of a proposed voice communication system for use in remote payload operations performed on the International Space Station. The system, Internet Voice Distribution System (IVoDS), would make use of existing Internet protocols, and offer a number of advantages over the system currently in use. Topics covered include: system description and operation, system software and hardware, system architecture, project status, and technology transfer applications.

  16. Components of Effective Cognitive-Behavioral Therapy for Pediatric Headache: A Mixed Methods Approach

    PubMed Central

    Law, Emily F.; Beals-Erickson, Sarah E.; Fisher, Emma; Lang, Emily A.; Palermo, Tonya M.

    2017-01-01

    Internet-delivered treatment has the potential to expand access to evidence-based cognitive-behavioral therapy (CBT) for pediatric headache, and has demonstrated efficacy in small trials for some youth with headache. We used a mixed methods approach to identify effective components of CBT for this population. In Study 1, component profile analysis identified common interventions delivered in published RCTs of effective CBT protocols for pediatric headache delivered face-to-face or via the Internet. We identified a core set of three treatment components that were common across face-to-face and Internet protocols: 1) headache education, 2) relaxation training, and 3) cognitive interventions. Biofeedback was identified as an additional core treatment component delivered in face-to-face protocols only. In Study 2, we conducted qualitative interviews to describe the perspectives of youth with headache and their parents on successful components of an Internet CBT intervention. Eleven themes emerged from the qualitative data analysis, which broadly focused on patient experiences using the treatment components and suggestions for new treatment components. In the Discussion, these mixed methods findings are integrated to inform the adaptation of an Internet CBT protocol for youth with headache. PMID:29503787

  17. Components of Effective Cognitive-Behavioral Therapy for Pediatric Headache: A Mixed Methods Approach.

    PubMed

    Law, Emily F; Beals-Erickson, Sarah E; Fisher, Emma; Lang, Emily A; Palermo, Tonya M

    2017-01-01

    Internet-delivered treatment has the potential to expand access to evidence-based cognitive-behavioral therapy (CBT) for pediatric headache, and has demonstrated efficacy in small trials for some youth with headache. We used a mixed methods approach to identify effective components of CBT for this population. In Study 1, component profile analysis identified common interventions delivered in published RCTs of effective CBT protocols for pediatric headache delivered face-to-face or via the Internet. We identified a core set of three treatment components that were common across face-to-face and Internet protocols: 1) headache education, 2) relaxation training, and 3) cognitive interventions. Biofeedback was identified as an additional core treatment component delivered in face-to-face protocols only. In Study 2, we conducted qualitative interviews to describe the perspectives of youth with headache and their parents on successful components of an Internet CBT intervention. Eleven themes emerged from the qualitative data analysis, which broadly focused on patient experiences using the treatment components and suggestions for new treatment components. In the Discussion, these mixed methods findings are integrated to inform the adaptation of an Internet CBT protocol for youth with headache.

  18. Protocol Architecture Model Report

    NASA Technical Reports Server (NTRS)

    Dhas, Chris

    2000-01-01

    NASA's Glenn Research Center (GRC) defines and develops advanced technology for high priority national needs in communications technologies for application to aeronautics and space. GRC tasked Computer Networks and Software Inc. (CNS) to examine protocols and architectures for an In-Space Internet Node. CNS has developed a methodology for network reference models to support NASA's four mission areas: Earth Science, Space Science, Human Exploration and Development of Space (REDS), Aerospace Technology. This report applies the methodology to three space Internet-based communications scenarios for future missions. CNS has conceptualized, designed, and developed space Internet-based communications protocols and architectures for each of the independent scenarios. The scenarios are: Scenario 1: Unicast communications between a Low-Earth-Orbit (LEO) spacecraft inspace Internet node and a ground terminal Internet node via a Tracking and Data Rela Satellite (TDRS) transfer; Scenario 2: Unicast communications between a Low-Earth-Orbit (LEO) International Space Station and a ground terminal Internet node via a TDRS transfer; Scenario 3: Multicast Communications (or "Multicasting"), 1 Spacecraft to N Ground Receivers, N Ground Transmitters to 1 Ground Receiver via a Spacecraft.

  19. An Educators' Guide to Information Access across the Internet.

    ERIC Educational Resources Information Center

    Hazari, Sunil

    1994-01-01

    A discussion of tools available for use of the Internet, particularly by college and university educators and students, offers information on use of various services, including electronic mailing list servers, data communications protocols for networking, inter-host connections, file transfer protocol, gopher software, bibliographic searching,…

  20. 47 CFR 79.4 - Closed captioning of video programming delivered using Internet protocol.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 4 2014-10-01 2014-10-01 false Closed captioning of video programming... (CONTINUED) BROADCAST RADIO SERVICES ACCESSIBILITY OF VIDEO PROGRAMMING Video Programming Owners, Providers, and Distributors § 79.4 Closed captioning of video programming delivered using Internet protocol. (a...

  1. Internet for Library Media Specialists.

    ERIC Educational Resources Information Center

    Simpson, Carol Mann

    This guide introduces the library media specialist to the Internet, its history and features, and provides information on specific uses of the Internet in school libraries and specific areas. Section 1, "What is the Internet?" introduces the reader to the Internet; electronic mail; telnet; file transfer protocol (FTP); wide area…

  2. Implementation and Evaluation of Four Interoperable Open Standards for the Internet of Things

    PubMed Central

    Jazayeri, Mohammad Ali; Liang, Steve H. L.; Huang, Chih-Yuan

    2015-01-01

    Recently, researchers are focusing on a new use of the Internet called the Internet of Things (IoT), in which enabled electronic devices can be remotely accessed over the Internet. As the realization of IoT concept is still in its early stages, manufacturers of Internet-connected devices and IoT web service providers are defining their proprietary protocols based on their targeted applications. Consequently, IoT becomes heterogeneous in terms of hardware capabilities and communication protocols. Addressing these heterogeneities by following open standards is a necessary step to communicate with various IoT devices. In this research, we assess the feasibility of applying existing open standards on resource-constrained IoT devices. The standard protocols developed in this research are OGC PUCK over Bluetooth, TinySOS, SOS over CoAP, and OGC SensorThings API. We believe that by hosting open standard protocols on IoT devices, not only do the devices become self-describable, self-contained, and interoperable, but innovative applications can also be easily developed with standardized interfaces. In addition, we use memory consumption, request message size, response message size, and response latency to benchmark the efficiency of the implemented protocols. In all, this research presents and evaluates standard-based solutions to better understand the feasibility of applying existing standards to the IoT vision. PMID:26402683

  3. Telemedicine using free voice over internet protocol (VoIP) technology.

    PubMed

    Miller, David J; Miljkovic, Nikola; Chiesa, Chad; Callahan, John B; Webb, Brad; Boedeker, Ben H

    2011-01-01

    Though dedicated videoteleconference (VTC) systems deliver high quality, low-latency audio and video for telemedical applications, they require expensive hardware and extensive infrastructure. The purpose of this study was to investigate free commercially available Voice over Internet Protocol (VoIP) software as a low cost alternative for telemedicine.

  4. 76 FR 18490 - Contributions to the Telecommunications Relay Service Fund

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-04

    ... voice over Internet Protocol (VoIP) service provider and each provider of non- interconnected VoIP... directs that within one year after the date of enactment of the CVAA, such VoIP providers shall... Fund (TRS Fund) by non-interconnected Voice over Internet Protocol (VoIP) service providers with...

  5. The Historian and Electronic Research: File Transfer Protocol (FTP).

    ERIC Educational Resources Information Center

    McCarthy, Michael J.

    1993-01-01

    Asserts that the Internet will become the academic communication medium for historians in the 1990s. Describes the "file transfer protocol" (FTP) access approach to the Internet and discusses its significant for historical research. Includes instructions for using FTP and a list of history-related FTP sites. (CFR)

  6. 78 FR 76097 - Request for Comment on Petition Filed by Sprint Corporation for Reconsideration of Certain Rules...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-16

    ... for Internet Protocol Captioned Telephone Service AGENCY: Federal Communications Commission. ACTION... Internet Protocol Captioned Telephone Service (IP CTS) in the IP CTS Reform Order. The Commission seeks... from the Interstate Telecommunications Relay Service Fund (TRS Fund) for minutes of use generated by...

  7. 47 CFR 79.4 - Closed captioning of video programming delivered using Internet protocol.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 4 2013-10-01 2013-10-01 false Closed captioning of video programming... (CONTINUED) BROADCAST RADIO SERVICES CLOSED CAPTIONING AND VIDEO DESCRIPTION OF VIDEO PROGRAMMING § 79.4 Closed captioning of video programming delivered using Internet protocol. (a) Definitions. For purposes...

  8. 78 FR 54612 - Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-05

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 79 [MB Docket No. 11-154; DA 13-1785] Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty-First Century Communications and Video Accessibility Act of 2010 AGENCY: Federal Communications Commission. ACTION: Proposed...

  9. 47 CFR 79.4 - Closed captioning of video programming delivered using Internet protocol.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 4 2012-10-01 2012-10-01 false Closed captioning of video programming... (CONTINUED) BROADCAST RADIO SERVICES CLOSED CAPTIONING AND VIDEO DESCRIPTION OF VIDEO PROGRAMMING § 79.4 Closed captioning of video programming delivered using Internet protocol. (a) Definitions. For purposes...

  10. 77 FR 46632 - Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-08-06

    ... video programming and apparatus closed captioning requirements. This notice is consistent with the Order... Delivered Using Internet Protocol, and Apparatus Closed Caption Requirements. Form Number: N/A. Respondents... rules governing the closed captioning capabilities of certain apparatus on which consumers view video...

  11. Internet Resources on Aging: Parts of the Internet.

    ERIC Educational Resources Information Center

    Post, Joyce A.

    1996-01-01

    Provides a brief history of the Internet and a listing of various resources on aging that can be obtained through the Internet. Components of the Internet discussed are electronic-mail applications (listservs, USENET Newsgroups, Bulletin Board Systems, Freenets, and Commercial Services); File Transfer Protocol; Telnet/Remote Login; Gophers; Wide…

  12. Internet-Protocol-Based Satellite Bus Architecture Designed

    NASA Technical Reports Server (NTRS)

    Slywczak, Richard A.

    2004-01-01

    NASA is designing future complex satellite missions ranging from single satellites and constellations to space networks and sensor webs. These missions require more interoperability, autonomy, and coordination than previous missions; in addition, a desire exists to have scientists retrieve data directly from the satellite rather than a central distribution source. To meet these goals, NASA has been studying the possibility of extending the Transmission Control Protocol/Internet Protocol (TCP/IP) suite for spacebased applications.

  13. Internet-Based Injury Profile Developer (IPD) User’s Manual, Version 1.0

    DTIC Science & Technology

    2002-10-01

    NAVAL HEALTH RESEARCH CENTER Internet-based Injury Profile Developer (IPD) User’s Manual Version 1.0 M. Knapp M. Galarneau...NAVAL HEALTH RESEARCH CENTER P. O. BOX 85122 SAN DIEGO, CA 92186-5122...Kizakevich2 1Naval Health Research Center P.O. Box 85122 San Diego, CA 92182-5122 2Research Triangle Institute P.O. Box 12194

  14. Clarifying the Links Among Online Gaming, Internet Use, Drinking Motives, and Online Pornography Use.

    PubMed

    Bőthe, Beáta; Tóth-Király, István; Orosz, Gábor

    2015-04-01

    This study was aimed at investigating the links between online gaming and online pornography use by considering gender, problematic Internet use, and different motives for alcohol drinking. University students (n=512; mean age=22.11 years; standard deviation=2.43 years; 64.06 percent women) filled in the Cyber Pornography Use Inventory, Hungarian version, the Problematic Online Gaming Questionnaire, Hungarian version (POGQ-HU), the Problematic Internet Use Questionnaire, Hungarian version (PIUQ-HU), and the Drinking Motive Questionnaire Revised Short Form, Hungarian version (DMQ-R-HU SF) questionnaires. According to hierarchical multiple regression analyses, the neglect factor of PIUQ-HU, the conformity factor of DMQ-R-HU SF, and the immersion and preoccupation factors of POGQ-HU have a significant predictive value on one's online pornography use, but gender does not. This research shows that independently from the effect of Internet and alcohol use dimensions, immersion and preoccupation factors of online gaming have significant effects on online pornography use. However, preoccupation has a negative effect on pornography use. Players scoring high on this subscale may think about gaming as the only interesting activity that rates higher than even pornography.

  15. Satellite Communications Using Commercial Protocols

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Griner, James H.; Dimond, Robert; Frantz, Brian D.; Kachmar, Brian; Shell, Dan

    2000-01-01

    NASA Glenn Research Center has been working with industry, academia, and other government agencies in assessing commercial communications protocols for satellite and space-based applications. In addition, NASA Glenn has been developing and advocating new satellite-friendly modifications to existing communications protocol standards. This paper summarizes recent research into the applicability of various commercial standard protocols for use over satellite and space- based communications networks as well as expectations for future protocol development. It serves as a reference point from which the detailed work can be readily accessed. Areas that will be addressed include asynchronous-transfer-mode quality of service; completed and ongoing work of the Internet Engineering Task Force; data-link-layer protocol development for unidirectional link routing; and protocols for aeronautical applications, including mobile Internet protocol routing for wireless/mobile hosts and the aeronautical telecommunications network protocol.

  16. Advanced Networks in Motion Mobile Sensorweb

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Stewart, David H.

    2011-01-01

    Advanced mobile networking technology applicable to mobile sensor platforms was developed, deployed and demonstrated. A two-tier sensorweb design was developed. The first tier utilized mobile network technology to provide mobility. The second tier, which sits above the first tier, utilizes 6LowPAN (Internet Protocol version 6 Low Power Wireless Personal Area Networks) sensors. The entire network was IPv6 enabled. Successful mobile sensorweb system field tests took place in late August and early September of 2009. The entire network utilized IPv6 and was monitored and controlled using a remote Web browser via IPv6 technology. This paper describes the mobile networking and 6LowPAN sensorweb design, implementation, deployment and testing as well as wireless systems and network monitoring software developed to support testing and validation.

  17. DIstributed VIRtual System (DIVIRS) Project

    NASA Technical Reports Server (NTRS)

    Schorr, Herbert; Neuman, B. Clifford; Gaines, Stockton R.; Mizell, David

    1996-01-01

    The development of Prospero moved from the University of Washington to ISI and several new versions of the software were released from ISI during the contract period. Changes in the first release from ISI included bug fixes and extensions to support the needs of specific users. Among these changes was a new option to directory queries that allows attributes to be returned for all files in a directory together with the directory listing. This change greatly improves the performance of their server and reduces the number of packets sent across their trans-pacific connection to the rest of the internet. Several new access method were added to the Prospero file method. The Prospero Data Access Protocol was designed, to support secure retrieval of data from systems running Prospero.

  18. Exploring Associations between Problematic Internet Use, Depressive Symptoms and Sleep Disturbance among Southern Chinese Adolescents

    PubMed Central

    Tan, Yafei; Chen, Ying; Lu, Yaogui; Li, Liping

    2016-01-01

    The primary aim of this study was to examine associations between problematic Internet use, depression and sleep disturbance, and explore whether there were differential effects of problematic Internet use and depression on sleep disturbance. A total of 1772 adolescents who participated in the Shantou Adolescent Mental Health Survey were recruited in 2012 in Shantou, China. The Chinese version of the Internet Addiction Test (IAT) was used to evaluate the prevalence and severity of Internet addiction. The Chinese version of the Pittsburgh Sleep Quality Index (PSQI), a 10-item version of the Center for Epidemiologic Studies Depression Scale (CESD-10), and other socio-demographic measures were also completed. Multiple regression analysis was used to test the mediating effect of problematic Internet use and depression on sleep disturbance. Among the participants, 17.2% of adolescents met the criteria for problematic Internet use, 40.0% were also classified as suffering from sleep disturbance, and 54.4% of students had depressive symptoms. Problematic Internet use was significantly associated with depressive symptoms and sleep disturbance. The correlation between depressive symptoms and sleep disturbance was highly significant. Both problematic Internet use (β = 0.014; Sobel test Z = 12.7, p < 0.001) and depression (β = 0.232; Sobel test Z = 3.39, p < 0.001) had partially mediating effects on sleep disturbance and depression was of greater importance for sleep disturbance than problematic Internet use. There is a high prevalence of problematic Internet use, depression and sleep disturbance among high school students in southern China, and problematic Internet use and depressive symptoms are strongly associated with sleep disturbance. This study provides evidence that problematic Internet use and depression have partially mediating effects on sleep disturbance. These results are important for clinicians and policy makers with useful information for prevention and intervention efforts. PMID:26985900

  19. An Internet Primer for Community College Administrators.

    ERIC Educational Resources Information Center

    Brumbaugh, Kenneth E.; McRae, Mary S.

    1995-01-01

    Provides information designed to assist administrators in utilizing the advanced information technologies available on the Internet. Describes the uses of such elements of the Internet as "e-mail,""ftp (file transfer protocol),""gopher," and "telnet." Indicates that administrators can use the internet to…

  20. Gaining Access to the Internet.

    ERIC Educational Resources Information Center

    Notess, Greg R.

    1992-01-01

    Discusses Internet services and protocols (i.e., electronic mail, file transfer, and remote login) and provides instructions for retrieving guides and directories of the Internet. Services providing access to the Internet are described, including bulletin board systems, regional networks, nationwide connections, and library organizations; and a…

  1. Internet treatment for social anxiety disorder in Romania: study protocol for a randomized controlled trial

    PubMed Central

    2012-01-01

    Background Social anxiety disorder (SAD) is one of the most common anxiety disorders and is associated with marked impairments. However, a small proportion of individuals with SAD seek and receive treatment. Internet-administrated cognitive behavior therapy (iCBT) has been found to be an effective treatment for SAD. This trial will be the first Internet-delivered guided self-help intervention for SAD in Romania. Methods Participants with social anxiety disorder (N = 96) will be recruited via newspapers, online banners and Facebook. Participants will be randomized to either: a) an active treatment, or b) a waiting list control group. The treatment will have a guided iCBT format and will last for nine weeks. Self-report questionnaires on social phobia, anxiety, depression, treatment credibility and irrational thinking will be used. All assessments will be collected pre, post and at follow-up (six months after intervention). Liebowitz Social Anxiety Scale – Self-Report version (LSAS-SR) will be the primary outcome measure and will be administrated on a weekly basis in both conditions. Discussion The present randomized controlled trial investigates the efficacy of an Internet-administered intervention in reducing social anxiety symptoms in a culture where this form of treatment has not been tested. This trial will add to the body of knowledge on the efficacy of iCBT, and the results might lead to an increase of the accessibility of evidence-based psychological treatment in Romania. Trial registration ClinicalTrials.gov: NCT01557894 PMID:23111108

  2. High-Performance, Reliable Multicasting: Foundations for Future Internet Groupware Applications

    NASA Technical Reports Server (NTRS)

    Callahan, John; Montgomery, Todd; Whetten, Brian

    1997-01-01

    Network protocols that provide efficient, reliable, and totally-ordered message delivery to large numbers of users will be needed to support many future Internet applications. The Reliable Multicast Protocol (RMP) is implemented on top of IP multicast to facilitate reliable transfer of data for replicated databases and groupware applications that will emerge on the Internet over the next decade. This paper explores some of the basic questions and applications of reliable multicasting in the context of the development and analysis of RMP.

  3. The Paperless Solution

    NASA Technical Reports Server (NTRS)

    2001-01-01

    REI Systems, Inc. developed a software solution that uses the Internet to eliminate the paperwork typically required to document and manage complex business processes. The data management solution, called Electronic Handbooks (EHBs), is presently used for the entire SBIR program processes at NASA. The EHB-based system is ideal for programs and projects whose users are geographically distributed and are involved in complex management processes and procedures. EHBs provide flexible access control and increased communications while maintaining security for systems of all sizes. Through Internet Protocol- based access, user authentication and user-based access restrictions, role-based access control, and encryption/decryption, EHBs provide the level of security required for confidential data transfer. EHBs contain electronic forms and menus, which can be used in real time to execute the described processes. EHBs use standard word processors that generate ASCII HTML code to set up electronic forms that are viewed within a web browser. EHBs require no end-user software distribution, significantly reducing operating costs. Each interactive handbook simulates a hard-copy version containing chapters with descriptions of participants' roles in the online process.

  4. Graphical Internet Access on a Budget: Making a Pseudo-SLIP Connection.

    ERIC Educational Resources Information Center

    McCulley, P. Michael

    1995-01-01

    Examines The Internet Adapter (TIA), an Internet protocol that allows computers to be directly on the Internet and access graphics over standard telephone lines using high-speed modems. Compares TIA's system requirements, performance, and costs to other Internet connections. Sidebars describe connections other than TIA and how to find information…

  5. Why You Should Establish a Connection to the Internet.

    ERIC Educational Resources Information Center

    Hill, Judy A.; Misic, Mark M.

    1996-01-01

    Provides the rationale for establishing a connection to the Internet. Describes Internet services, including e-mail, telnet, file transfer protocol (FTP), USENET, gopher, Archie, and World Wide Web. Identifies reasons why the Internet is a valuable tool. Outlines steps for establishing a connection and discusses the future of the Internet. A…

  6. On the Effective Evaluation of TCP

    NASA Technical Reports Server (NTRS)

    Allman, Mark; Falk, Aaron

    2000-01-01

    Understanding the performance of the Internet's Transmission Control Protocol (TCP) is important because it is the dominant protocol used in the Internet today. Various testing methods exist to evaluate TCP performance, however all have pitfalls an that need to be understood prior to obtaining useful results. Simulating TCP is difficult because of the wide range of variables, environments, and implementations available. Testing TCP modifications in the global Internet may not be the answer either: testing new protocols on real networks endangers other people's traffic and, if not done correctly, may also yield inaccurate or misleading results. In order for TCP research to be independently evaluated in the Internet research community there is a set of questions that researchers should try to answer. This paper attempts to list some of those questions and make recommendations as to how TCP testing can be structured to be provide useful answers.

  7. Corps Operations

    DTIC Science & Technology

    2010-11-26

    accomplishes these actions by developing, recommending, and briefing the scheme of fires, including both lethal fires and nonlethal actions (electronic...Install and operate the corps information technology help desk. Provide voice, video teleconference, e-mail—Non-Secure Internet Protocol Router...Network (NIPRNET), SECRET Internet Protocol Router Network (SIPRNET), and other communication networks—assistance, and other help desk functions

  8. Deployment of the Space Internet on a Spacecraft: Hosting CFDP and/or DTN Protocol Engines and the Resulting Resource Utilization

    NASA Astrophysics Data System (ADS)

    Foswell, Stuart D.; McLaren, David; Paramanatham, Daran; Taylor, Chris; Stanton, Dai; Farrell, Stephen

    2012-08-01

    This paper describes the outcome of analysis and simulation of how to deploy CFDP and DTN protocol engines onboard a spacecraft, so as to support the Space Internet, and the resulting spacecraft resource utilisation, under an ESA TRP contract [1].

  9. 47 CFR 12.3 - 911 and E911 analyses and reports.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... wireless 911 rules set forth in § 20.18 of this chapter; and interconnected Voice over Internet Protocol... Public Safety and Homeland Security Bureau (PSHSB) has the delegated authority to implement and activate... generation Internet Protocol-based E911 platform. (b) These reports are due 120 days from the date that the...

  10. 78 FR 55696 - Request for Comment on Petition Filed by Purple Communications, Inc. Regarding the Provision of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-11

    ... Commission's VRS Reform Order regarding the use of Internet Protocol Captioned Telephone Service (IP CTS... requested clarification would force Purple and other IP CTS providers to cease the provision of IP CTS using... of Internet Protocol Captioned Telephone Service (IP CTS) through Web or wireless technologies...

  11. 78 FR 39619 - Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-02

    ... covered apparatus may convey from the source device to the consumer equipment the information necessary to... using Internet protocol (``IP'') and apparatus used by consumers to view video programming. The action...-delivered video programming and rules governing the closed captioning capabilities of certain apparatus on...

  12. PC Utilities: Small Programs with a Big Impact

    ERIC Educational Resources Information Center

    Baule, Steven

    2004-01-01

    The three utility commercial programs available on the Internet are like software packages purchased through a vendor or the Internet, shareware programs are developed by individuals and distributed via the Internet for a small fee to obtain the complete version of the product, and freeware programs are distributed via the Internet free of cost.…

  13. Very High-Speed Report File System

    DTIC Science & Technology

    1992-12-15

    1.5 and 45 Mb/s and is expected 1 Introduction to reach 150 Mb/s. These new technologies pose some challenges to The Internet Protocol (IP) family (IP... Internet Engineering Task Force (IETF) has R taken up the issue, but a definitive answer is probably some time away. The basic issues are the choice of AAL...by an IEEE 802. la Subnetwork Access Protocol (SNAP) However, with a large number of networks all header. The third proposal identifies the protocol

  14. Finding orthopedic patients lost to follow-up for long-term outcomes research using the Internet: an update for 2012.

    PubMed

    Louie, Dexter L; Earp, Brandon E; Blazar, Philip E

    2012-07-01

    The Internet is available to researchers as a tool for studying long-term outcomes, but no recent research exists on how to best use it. The authors hypothesize that using the Internet can be at least 75% effective in locating patients lost to follow-up. With Institutional Review Board approval, the authors searched for 66 patients lost to follow-up after a period of 10 years or more with no contact. They tested an Internet searching protocol developed in 2004 and developed an alternate protocol. In all, 74% (49/66) of patients were located. Copyright 2012, SLACK Incorporated.

  15. A Comparison of Psychometric Properties Between Internet and Paper Versions of Two Depression Instruments (BDI-II and MADRS-S) Administered to Clinic Patients

    PubMed Central

    Andersson, Gerhard; Engström, Ingemar

    2010-01-01

    Background Self-report measures can guide clinical decisions and are useful when evaluating treatment outcomes. However, many clinicians do not use self-report measures systematically in their clinical practice. Internet-based questionnaires could facilitate administration, but the psychometric properties of the online version of an instrument should be explored before implementation. The recommendation from the International Test Commission is to test the psychometric properties of each questionnaire separately. Objective Our objective was to compare the psychometric properties of paper-and-pencil versions and Internet versions of two questionnaires measuring depressive symptoms. Methods The 87 participating patients were recruited from primary care and psychiatric care within the public health care system in Sweden. Participants completed the Beck Depression Inventory (BDI-II) and the Montgomery-Åsberg Depression Rating Scale—Self-rated (MADRS-S), both on paper and on the Internet. The order was randomized to control for order effects. Symptom severity in the sample ranged from mild to severe depressive symptoms. Results Psychometric properties of the two administration formats were mostly equivalent. The internal consistency was similar for the Internet and paper versions, and significant correlations were found between the formats for both MADRS-S (r = .84) and the BDI-II (r = .89). Differences between paper and Internet total scores were not statistically significant for either questionnaire nor for the MADRS-S question dealing with suicidality (item 9) when analyzed separately. The score on the BDI-II question about suicidality (item 9) was significantly lower when administered via the Internet compared with the paper score, but the difference was small (effect size, Cohen’s [d] = 0.14). There were significant main effects for order of administration on both questionnaires and significant interaction effects between format and order. This should not, however, pose a problem in clinical use as long as the administration format is not changed when repeated measurements are made. Conclusions The MADRS-S can be transferred to online use without affecting the psychometric properties in a clinically meaningful way. The full BDI-II also seems to retain its properties when transferred; however, the item measuring suicidality in the Internet version needs further investigation since it was associated with a lower score in this study. The use of online questionnaires offers clinicians a more practical way of measuring depressive symptoms and has the potential to save resources. PMID:21169165

  16. Effects of an internet-based cognitive behavioural therapy intervention on preventing major depressive episodes among workers: a protocol for a randomised controlled trial

    PubMed Central

    Imamura, Kotaro; Kawakami, Norito; Furukawa, Toshi A; Matsuyama, Yutaka; Shimazu, Akihito; Kasai, Kiyoto

    2015-01-01

    Introduction The aim of this study is to examine the effects of an internet-based cognitive behavioural therapy (iCBT) program on decreasing the risk of major depressive episodes (MDEs) among workers employed in a private corporate group in Japan, using a randomised controlled trial design. Methods and analysis All of the workers in a corporate group (n=20 000) will be recruited through an invitation email. Participants who fulfil the inclusion criteria will be randomly allocated to intervention or control groups (planned N=4050 for each group). They will be allowed to complete the six lessons of the iCBT program within 10 weeks after the baseline survey. Those in the control group will receive the same iCBT after 12 months. The program includes several CBT skills: self-monitoring, cognitive restructuring, assertiveness, problem-solving and relaxation. The primary outcome measure is no new onset of MDE (using Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition, Text Revision (DSM-IV-TR)/DSM-5 criteria) during the 12-month follow-up. Assessment will use the web version of the WHO Composite International Diagnostic Interview V.3.0 depression section. Ethics and dissemination The Research Ethics Review Board of Graduate School of Medicine, the University of Tokyo (No. 3083-(2)), approved the study procedures. Trial registration number The study protocol is registered at the UMIN Clinical Trials Registry (UMIN-CTR; ID=UMIN000014146). PMID:25968004

  17. Real-Time Multimedia on the Internet: What Will It Take?

    ERIC Educational Resources Information Center

    Sodergren, Mike

    1998-01-01

    Considers the requirements for real-time, interactive multimedia over the Internet. Topics include demand for interactivity; new pricing models for Internet service; knowledgeable suppliers; consumer education on standards; enhanced infrastructure, including bandwidth; and new technology, including RSVP, and end-to-end Internet-working protocol.…

  18. How To: Be VoIP-Savvy

    ERIC Educational Resources Information Center

    Branzburg, Jeffrey

    2005-01-01

    Cablevision, Comcast, Verizon, and many other high-speed broadband Internet providers are now also offering telephone services through "Voice over Internet Protocol" (VoIP). This technology sends ordinary telephone calls over the Internet rather than over telephone lines. While impractical without the use of a broadband Internet connection, with…

  19. Indication-Based Ordering: A New Paradigm for Glycemic Control in Hospitalized Inpatients

    PubMed Central

    Lee, Joshua; Clay, Brian; Zelazny, Ziband; Maynard, Gregory

    2008-01-01

    Background Inpatient glycemic control is a constant challenge. Institutional insulin management protocols and structured order sets are commonly advocated but poorly studied. Effective and validated methods to integrate algorithmic protocol guidance into the insulin ordering process are needed. Methods We introduced a basic structured set of computerized insulin orders (Version 1), and later introduced a paper insulin management protocol, to assist users with the order set. Metrics were devised to assess the impact of the protocol on insulin use, glycemic control, and hypoglycemia using pharmacy data and point of care glucose tests. When incremental improvement was seen (as described in the results), Version 2 of the insulin orders was created to further streamline the process. Results The percentage of regimens containing basal insulin improved with Version 1. The percentage of patient days with hypoglycemia improved from 3.68% at baseline to 2.59% with Version 1 plus the paper insulin management protocol, representing a relative risk for hypoglycemic day of 0.70 [confidence interval (CI) 0.62, 0.80]. The relative risk of an uncontrolled (mean glucose over 180 mg/dl) patient stay was reduced to 0.84 (CI 0.77, 0.91) with Version 1 and was reduced further to 0.73 (CI 0.66, 0.81) with the paper protocol. Version 2 used clinician-entered patient parameters to guide protocol-based insulin ordering and simultaneously improved the flexibility and ease of ordering over Version 1. Conclusion Patient parameter and protocol-based clinical decision support, added to computerized provider order entry, has a track record of improving glycemic control indices. This justifies the incorporation of these algorithms into online order management. PMID:19885198

  20. Teaching and Learning Foreign Languages via System of "Voice over Internet Protocol" and Language Interactions Case Study: Skype

    ERIC Educational Resources Information Center

    Wahid, Wazira Ali Abdul; Ahmed, Eqbal Sulaiman; Wahid, Muntaha Ali Abdul

    2015-01-01

    This issue expresses a research study based on the online interactions of English teaching specially conversation through utilizing VOIP (Voice over Internet Protocol) and cosmopolitan online theme. Data has been achieved by interviews. Simplifiers indicate how oral tasks require to be planned upon to facilitate engagement models propitious to…

  1. TeleHealth networks: Instant messaging and point-to-point communication over the internet

    NASA Astrophysics Data System (ADS)

    Sachpazidis, Ilias; Ohl, Roland; Kontaxakis, George; Sakas, Georgios

    2006-12-01

    This paper explores the advantages and disadvantages of a medical network based on point-to-point communication and a medical network based on Jabber instant messaging protocol. Instant messaging might be, for many people, a convenient way of chatting over the Internet. We will attempt to illustrate how an instant messaging protocol could serve in the best way medical services and provide great flexibility to the involved parts. Additionally, the directory services and presence status offered by the Jabber protocol make it very attractive to medical applications that need to have real time and store and forward communication. Furthermore, doctors connected to Internet via high-speed networks could benefit by saving time due to the data transmission acceleration over Jabber.

  2. Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems.

    PubMed

    Li, Chun-Ta; Shih, Dong-Her; Wang, Chun-Cheng

    2018-04-01

     With the rapid development of wireless communication technologies and the growing prevalence of smart devices, telecare medical information system (TMIS) allows patients to receive medical treatments from the doctors via Internet technology without visiting hospitals in person. By adopting mobile device, cloud-assisted platform and wireless body area network, the patients can collect their physiological conditions and upload them to medical cloud via their mobile devices, enabling caregivers or doctors to provide patients with appropriate treatments at anytime and anywhere. In order to protect the medical privacy of the patient and guarantee reliability of the system, before accessing the TMIS, all system participants must be authenticated.  Mohit et al. recently suggested a lightweight authentication protocol for cloud-based health care system. They claimed their protocol ensures resilience of all well-known security attacks and has several important features such as mutual authentication and patient anonymity. In this paper, we demonstrate that Mohit et al.'s authentication protocol has various security flaws and we further introduce an enhanced version of their protocol for cloud-assisted TMIS, which can ensure patient anonymity and patient unlinkability and prevent the security threats of report revelation and report forgery attacks.  The security analysis proves that our enhanced protocol is secure against various known attacks as well as found in Mohit et al.'s protocol. Compared with existing related protocols, our enhanced protocol keeps the merits of all desirable security requirements and also maintains the efficiency in terms of computation costs for cloud-assisted TMIS.  We propose a more secure mutual authentication and privacy preservation protocol for cloud-assisted TMIS, which fixes the mentioned security weaknesses found in Mohit et al.'s protocol. According to our analysis, our authentication protocol satisfies most functionality features for privacy preservation and effectively cope with cloud-assisted TMIS with better efficiency. Copyright © 2018 Elsevier B.V. All rights reserved.

  3. A Guide for Using the Internet.

    ERIC Educational Resources Information Center

    Brown, Herb

    This manual provides an instructional overview of Internet resources with student exercises. The work consists of nine chapters: (1) Introduction to the Internet; (2) How to Access the Internet; (3) Electronic Mail; (4) Gopher; (5) File Transfer Protocol-FTP; (6) Newsgroups & Newsreaders; (7) Telnet & TN3270; (8) World Wide Web; and (9)…

  4. Fundamental rate-loss trade-off for the quantum internet

    NASA Astrophysics Data System (ADS)

    Azuma, Koji; Mizutani, Akihiro; Lo, Hoi-Kwong

    2016-11-01

    The quantum internet holds promise for achieving quantum communication--such as quantum teleportation and quantum key distribution (QKD)--freely between any clients all over the globe, as well as for the simulation of the evolution of quantum many-body systems. The most primitive function of the quantum internet is to provide quantum entanglement or a secret key to two points efficiently, by using intermediate nodes connected by optical channels with each other. Here we derive a fundamental rate-loss trade-off for a quantum internet protocol, by generalizing the Takeoka-Guha-Wilde bound to be applicable to any network topology. This trade-off has essentially no scaling gap with the quantum communication efficiencies of protocols known to be indispensable to long-distance quantum communication, such as intercity QKD and quantum repeaters. Our result--putting a practical but general limitation on the quantum internet--enables us to grasp the potential of the future quantum internet.

  5. Fundamental rate-loss trade-off for the quantum internet.

    PubMed

    Azuma, Koji; Mizutani, Akihiro; Lo, Hoi-Kwong

    2016-11-25

    The quantum internet holds promise for achieving quantum communication-such as quantum teleportation and quantum key distribution (QKD)-freely between any clients all over the globe, as well as for the simulation of the evolution of quantum many-body systems. The most primitive function of the quantum internet is to provide quantum entanglement or a secret key to two points efficiently, by using intermediate nodes connected by optical channels with each other. Here we derive a fundamental rate-loss trade-off for a quantum internet protocol, by generalizing the Takeoka-Guha-Wilde bound to be applicable to any network topology. This trade-off has essentially no scaling gap with the quantum communication efficiencies of protocols known to be indispensable to long-distance quantum communication, such as intercity QKD and quantum repeaters. Our result-putting a practical but general limitation on the quantum internet-enables us to grasp the potential of the future quantum internet.

  6. Use of the Delay-Tolerant Networking Bundle Protocol from Space

    NASA Technical Reports Server (NTRS)

    Wood, Lloyd; Ivancic, William D.; Eddy, Wesley M.; Stewart, Dave; Northam, James; Jackson, Chris; daSilvaCuriel, Alex

    2009-01-01

    The Disaster Monitoring Constellation (DMC), constructed by Survey Satellite Technology Ltd (SSTL), is a multisatellite Earth-imaging low-Earth-orbit sensor network where captured image swaths are stored onboard each satellite and later downloaded from the satellite payloads to a ground station. Store-and-forward of images with capture and later download gives each satellite the characteristics of a node in a Delay/Disruption Tolerant Network (DTN). Originally developed for the Interplanetary Internet, DTNs are now under investigation in an Internet Research Task Force (IRTF) DTN research group (RG), which has developed a bundle architecture and protocol. The DMC is currently unique in its adoption of the Internet Protocol (IP) for its imaging payloads and for satellite command and control, based around reuse of commercial networking and link protocols. These satellites use of IP has enabled earlier experiments with the Cisco router in Low Earth Orbit (CLEO) onboard the constellation's UK-DMC satellite. Earth images are downloaded from the satellites using a custom IPbased high-speed transfer protocol developed by SSTL, Saratoga, which tolerates unusual link environments. Saratoga has been documented in the Internet Engineering Task Force (IETF) for wider adoption. We experiment with use of DTNRG bundle concepts onboard the UKDMC satellite, by examining how Saratoga can be used as a DTN convergence layer to carry the DTNRG Bundle Protocol, so that sensor images can be delivered to ground stations and beyond as bundles. This is the first successful use of the DTNRG Bundle Protocol in a space environment. We use our practical experience to examine the strengths and weaknesses of the Bundle Protocol for DTN use, paying attention to fragmentation, custody transfer, and reliability issues.

  7. Network Monitor and Control of Disruption-Tolerant Networks

    NASA Technical Reports Server (NTRS)

    Torgerson, J. Leigh

    2014-01-01

    For nearly a decade, NASA and many researchers in the international community have been developing Internet-like protocols that allow for automated network operations in networks where the individual links between nodes are only sporadically connected. A family of Disruption-Tolerant Networking (DTN) protocols has been developed, and many are reaching CCSDS Blue Book status. A NASA version of DTN known as the Interplanetary Overlay Network (ION) has been flight-tested on the EPOXI spacecraft and ION is currently being tested on the International Space Station. Experience has shown that in order for a DTN service-provider to set up a large scale multi-node network, a number of network monitor and control technologies need to be fielded as well as the basic DTN protocols. The NASA DTN program is developing a standardized means of querying a DTN node to ascertain its operational status, known as the DTN Management Protocol (DTNMP), and the program has developed some prototypes of DTNMP software. While DTNMP is a necessary component, it is not sufficient to accomplish Network Monitor and Control of a DTN network. JPL is developing a suite of tools that provide for network visualization, performance monitoring and ION node control software. This suite of network monitor and control tools complements the GSFC and APL-developed DTN MP software, and the combined package can form the basis for flight operations using DTN.

  8. Internet Architecture: Lessons Learned and Looking Forward

    DTIC Science & Technology

    2006-12-01

    Internet Architecture: Lessons Learned and Looking Forward Geoffrey G. Xie Department of Computer Science Naval Postgraduate School April 2006... Internet architecture. Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is...readers are referred there for more information about a specific protocol or concept. 2. Origin of Internet Architecture The Internet is easily

  9. Internet-based modular program BADI for adjustment disorder: protocol of a randomized controlled trial.

    PubMed

    Skruibis, Paulius; Eimontas, Jonas; Dovydaitiene, Migle; Mazulyte, Egle; Zelviene, Paulina; Kazlauskas, Evaldas

    2016-07-26

    Adjustment disorder is one of the most common mental health diagnoses. Still it receives relatively little attention from researchers trying to establish best interventions to treat it. With high prevalence of stressful life events, which might be leading to adjustment disorder, and limited resources of mental health service providers, online interventions could be a very practical way of helping people who have these disorders or are in the risk to develop them. The proposed study protocol is aimed to describe a randomized controlled trial of an internet-based modular intervention for adjustment disorder as it is defined in a proposal for the ICD-11. This study is a two-armed Randomized Controlled Trial (RCT) to examine the effectiveness of a web-based intervention BADI (Brief Adjustment Disorder Intervention) for adjustment disorder symptoms. BADI has four modules: Relaxation, Time management, Mindfulness and Strengthening relationships. It is based on stress and coping research and integrates evidence-based treatment approaches such as Cognitive Behavioural therapy (CBT), mindfulness and body-mind practices, as well as exercises for enhancing social support. Primary outcome of the study are symptoms of adjustment disorder and well-being. Engagement into the program and motivation for change is a secondary outcome. All participants after completing the baseline assessment are randomly assigned to one of the two groups: either to the one in which participant will instantly gain access to the BADI intervention or a group in which participants will be given access to the BADI program after waiting one month. Participants of BADI can choose exercises of the program flexibly. There is no particular order in which the exercises should be completed. Study will provide new insights of modular internet-based interventions efficacy for adjustment disorders. The study will also provide information about the role of motivation and expectancies on engagement in modular internet-based interventions. In case this RCT supports effectiveness of fully automated version of BADI, it could be used very broadly. It could become a cost-effective and accessible intervention for adjustment disorder. The study was retrospectively registered with the Australian and New Zealand Clinical Trials Registry with the registration number ACTRN12616000883415 . Registered 5 July, 2016.

  10. Voice over Internet Protocol (VoIP) Technology as a Global Learning Tool: Information Systems Success and Control Belief Perspectives

    ERIC Educational Resources Information Center

    Chen, Charlie C.; Vannoy, Sandra

    2013-01-01

    Voice over Internet Protocol- (VoIP) enabled online learning service providers struggling with high attrition rates and low customer loyalty issues despite VoIP's high degree of system fit for online global learning applications. Effective solutions to this prevalent problem rely on the understanding of system quality, information quality, and…

  11. Bandwidth Management in Resource Constrained Networks

    DTIC Science & Technology

    2012-03-01

    Postgraduate School OSI Open Systems Interconnection QoS Quality of Service TCP Transmission Control Protocol/Internet Protocol TCP/IP Transmission...filtering. B. NORMAL TCP/IP COMMUNICATIONS The Internet is a “complex network WAN that connects LANs and clients around the globe” (Dean, 2009...of the Open Systems Interconnection ( OSI ) model allowing them to route traffic based on MAC address (Kurose & Ross, 2009). While switching

  12. Internet Voice Distribution System (IVoDS) Utilization in Remote Payload Operations

    NASA Technical Reports Server (NTRS)

    Best, Susan; Bradford, Bob; Chamberlain, Jim; Nichols, Kelvin; Bailey, Darrell (Technical Monitor)

    2002-01-01

    Due to limited crew availability to support science and the large number of experiments to be operated simultaneously, telescience is key to a successful International Space Station (ISS) science program. Crew, operations personnel at NASA centers, and researchers at universities and companies around the world must work closely together to perform scientific experiments on-board ISS. NASA has initiated use of Voice over Internet Protocol (VoIP) to supplement the existing HVoDS mission voice communications system used by researchers. The Internet Voice Distribution System (IVoDS) connects researchers to mission support "loops" or conferences via Internet Protocol networks such as the high-speed Internet 2. Researchers use IVoDS software on personal computers to talk with operations personnel at NASA centers. IVoDS also has the capability, if authorized, to allow researchers to communicate with the ISS crew during experiment operations. NODS was developed by Marshall Space Flight Center with contractors A2 Technology, Inc. FVC, Lockheed- Martin, and VoIP Group. IVoDS is currently undergoing field-testing with full deployment for up to 50 simultaneous users expected in 2002. Research is currently being performed to take full advantage of the digital world - the Personal Computer and Internet Protocol networks - to qualitatively enhance communications among ISS operations personnel. In addition to the current voice capability, video and data-sharing capabilities are being investigated. Major obstacles being addressed include network bandwidth capacity and strict security requirements. Techniques being investigated to reduce and overcome these obstacles include emerging audio-video protocols and network technology including multicast and quality-of-service.

  13. An Energy Efficient Protocol For The Internet Of Things

    NASA Astrophysics Data System (ADS)

    Venčkauskas, Algimantas; Jusas, Nerijus; Kazanavičius, Egidijus; Štuikys, Vytautas

    2015-01-01

    The Internet of Things (IoT) is a technological revolution that represents the future of computing and communications. One of the most important challenges of IoT is security: protection of data and privacy. The SSL protocol is the de-facto standard for secure Internet communications. The extra energy cost of encrypting and authenticating of the application data with SSL is around 15%. For IoT devices, where energy resources are limited, the increase in the cost of energy is a very significant factor. In this paper we present the energy efficient SSL protocol which ensures the maximum bandwidth and the required level of security with minimum energy consumption. The proper selection of the security level and CPU multiplier, can save up to 85% of the energy required for data encryption.

  14. Will the Internet Transform Higher Education?

    ERIC Educational Resources Information Center

    Baer, Walter S.

    This analysis of the Internet and higher education focuses on two distinct models: one which is attempting to create "better, faster, cheaper" versions of today's courses and curricula through on-campus information infrastructure, and the other which envisions the Internet as the agent to transform higher education into student-centered learning…

  15. The Internet for Educators: A User's Guide.

    ERIC Educational Resources Information Center

    Monahan, Brian D.; Dharm, Matthew

    1995-01-01

    Presents a practical guide to use of the Internet. Topics discussed include getting connected; the UNIX operating system; electronic mail; FTP (File Transfer Protocol); Finger; Telnet; Archie; Veronica; Gopher; teacher education; the Yanoff List; and expansion of the Internet. (three references) (LRW)

  16. Wireless Authentication Protocol Implementation: Descriptions of a Zero-Knowledge Proof (ZKP) Protocol Implementation for Testing on Ground and Airborne Mobile Networks

    DTIC Science & Technology

    2015-01-01

    on AFRL’s small unmanned aerial vehicle (UAV) test bed . 15. SUBJECT TERMS Zero-Knowledge Proof Protocol Testing 16. SECURITY CLASSIFICATION OF...VERIFIER*** edition Version Information: Version 1.1.3 Version Details: Successful ZK authentication between two networked machines. Fixed a bug ...that causes intermittent bignum errors. Fixed a network hang bug and now allows continually authentication at the Verifier. Also now removing

  17. Internet Protocol-Hybrid Opto-Electronic Ring Network (IP-HORNET): A Novel Internet Protocol-Over-Wavelength Division Multiplexing (IP-Over-WDM) Multiple-Access Metropolitan Area Network (MAN)

    DTIC Science & Technology

    2003-04-01

    usage times. End users may range from today’s typical users, such as home and business users, to futuristic users such as automobiles , appliances, hand...has the ability to drop a reprogrammable quantity of wavelengths into the node. The second technological requirement is a protocol that automatically...goal of the R-OADM is to have the ability to drop a reprogrammable number of wavelengths. If it is determined that at peak usage the node must receive M

  18. Internet for Educators[TM]: A Step-by-Step Guide To Help Educators Understand and Use the Internet. [Videotape].

    ERIC Educational Resources Information Center

    1996

    This 66-minute videotape is part of an ongoing Internet education series, exploring the fascinating resources of the Internet. It is a step-by-step guide demonstrating effective techniques for using the World Wide Web, e-mail, file transfer protocol and other technologies. The program examines the Internet phenomenon from the educator's point of…

  19. A Beginner's Guide to the Internet.

    ERIC Educational Resources Information Center

    McAdams, Charles A.; Nelson, Mark A.

    1995-01-01

    Maintains that the Internet offers services and opportunities for music teachers and students. Provides an overview of topics such as electronic mail, File Transfer Protocol (FTP), Gopher, and the World Wide Web (WWW). Includes two lists of music resources available on the Internet. (CFR)

  20. Lessons Learned from the Afghan Mission Network: Developing a Coalition Contingency Network

    DTIC Science & Technology

    2014-01-01

    SIPRNet Secret Internet Protocol Router Network SOP Standard Operating Procedure SVTC Secure Video Teleconference (or –Conferencing) TTP Tactics...Voice over internet protocol (VOIP) telephone connectivity • Email • Web browsing • Secure video teleconferencing (SVTC...10, 2012. As of January 15, 2013: http://www.guardian.co.uk/world/2012/oct/10/us-troops-jordan-syria-crisis Baldor, Lolita C., and Pauline Jelinek

  1. Using a Simple, Free Voice-over-Internet Protocol Service to Add Interest to Lectures and Enhance Student Engagement

    ERIC Educational Resources Information Center

    Beaton, Susan J.; Forster, Peter M.

    2013-01-01

    A large proportion of students in higher education report feeling bored during lectures, for example, Mann and Robinson (2009) put this figure at 60 per cent. This short article reviews our experiences of using a simple, free Voice-over-Internet Protocol (VoIP) service, Skype, to enhance the interest and engagement of students by holding a…

  2. Aggregating quantum repeaters for the quantum internet

    NASA Astrophysics Data System (ADS)

    Azuma, Koji; Kato, Go

    2017-09-01

    The quantum internet holds promise for accomplishing quantum teleportation and unconditionally secure communication freely between arbitrary clients all over the globe, as well as the simulation of quantum many-body systems. For such a quantum internet protocol, a general fundamental upper bound on the obtainable entanglement or secret key has been derived [K. Azuma, A. Mizutani, and H.-K. Lo, Nat. Commun. 7, 13523 (2016), 10.1038/ncomms13523]. Here we consider its converse problem. In particular, we present a universal protocol constructible from any given quantum network, which is based on running quantum repeater schemes in parallel over the network. For arbitrary lossy optical channel networks, our protocol has no scaling gap with the upper bound, even based on existing quantum repeater schemes. In an asymptotic limit, our protocol works as an optimal entanglement or secret-key distribution over any quantum network composed of practical channels such as erasure channels, dephasing channels, bosonic quantum amplifier channels, and lossy optical channels.

  3. Rethinking the NTCIP Design and Protocols - Analyzing the Issues

    DOT National Transportation Integrated Search

    1998-03-03

    This working paper discusses the issues involved in changing the current draft NTCIP standard from an X.25-based protocol stack to an Internet-based protocol stack. It contains a methodology which could be used to change NTCIP's base protocols. This ...

  4. Design and development of compact monitoring system for disaster remote health centres.

    PubMed

    Santhi, S; Sadasivam, G S

    2015-02-01

    To enhance speedy communication between the patient and the doctor through newly proposed routing protocol at the mobile node. The proposed model is applied for a telemedicine application during disaster recovery management. In this paper, Energy Efficient Link Stability Routing Protocol (EELSRP) has been developed by simulation and real time. This framework is designed for the immediate healing of affected persons in remote areas, especially at the time of the disaster where there is no hospital proximity. In case of disasters, there might be an outbreak of infectious diseases. In such cases, the patient's medical record is also transferred by the field operator from disaster place to the hospital to facilitate the identification of the disease-causing agent and to prescribe the necessary medication. The heterogeneous networking framework provides reliable, energy efficientand speedy communication between the patient and the doctor using the proposed routing protocol at the mobile node. The performance of the simulation and real time versions of the Energy Efficient Link Stability Routing Protocol (EELSRP) protocol has been analyzed. Experimental results prove the efficiency of the real-time version of EESLRP protocol. The packet delivery ratio and throughput of the real time version of EELSRP protocol is increased by 3% and 10%, respectively, when compared to the simulated version of EELSRP. The end-to-end delay and energy consumption are reduced by 10% and 2% in the real time version of EELSRP.

  5. Effectiveness of a transdiagnostic internet-based protocol for the treatment of emotional disorders versus treatment as usual in specialized care: study protocol for a randomized controlled trial.

    PubMed

    González-Robles, Alberto; García-Palacios, Azucena; Baños, Rosa; Riera, Antonio; Llorca, Ginés; Traver, Francisco; Haro, Gonzalo; Palop, Vicente; Lera, Guillem; Romeu, José Enrique; Botella, Cristina

    2015-10-31

    Emotional disorders (depression and anxiety disorders) are highly prevalent mental health problems. Although evidence showing the effectiveness of disorder-specific treatments exists, high comorbidity rates among emotional disorders limit the utility of these protocols. This has led some researchers to focus their interest on transdiagnostic interventions, a treatment perspective that might be more widely effective across these disorders. Also, the current way of delivering treatments makes it difficult provide assistance to all of the population in need. The use of the Internet in the delivery of evidence-based treatments may help to disseminate treatments among the population. In this study, we aim to test the effectiveness of EmotionRegulation, a new transdiagnostic Internet-based protocol for unipolar mood disorders, five anxiety disorders (panic disorder, agoraphobia, social anxiety disorder, generalized anxiety disorder and anxiety disorder not otherwise specified), and obsessive-compulsive disorder in comparison to treatment as usual as provided in Spanish public specialized mental health care. We will also study its potential impact on basic temperament dimensions (neuroticism/behavioral inhibition and extraversion/behavioral activation). Expectations and opinions of patients about this protocol will also be studied. The study is a randomized controlled trial. 200 participants recruited in specialized care will be allocated to one of two treatment conditions: a) EmotionRegulation or b) treatment as usual. Primary outcome measures will be the BAI and the BDI-II. Secondary outcomes will include a specific measure of the principal disorder, and measures of neuroticism/behavioral inhibition and extraversion/behavioral activation. Patients will be assessed at baseline, post-treatment, and 3- and 12-month follow-ups. Intention to treat and per protocol analyses will be performed. Although the effectiveness of face-to-face transdiagnostic protocols has been investigated in previous studies, the number of published transdiagnostic Internet-based programs is still quite low. To our knowledge, this is the first randomized controlled trial studying the effectiveness of a transdiagnostic Internet-based treatment for several emotional disorders in public specialized care. Combining both a transdiagnostic approach with an Internet-based therapy format may help to decrease the burden of mental disorders, reducing the difficulties associated with disorder-specific treatments and facilitating access to people in need of treatment. Strengths and limitations are discussed. ClinicalTrials.gov NCT02345668 . Registered 27 July 2015.

  6. [Smartphone addiction: French validation of the Internet Addiction Test-Smartphone version (IAT-smartphone) and associated psychopathological features].

    PubMed

    Barrault, S; Durousseau, F; Ballon, N; Réveillère, C; Brunault, P

    2018-02-02

    Since their first appearance in 1992 smartphones have improved constantly, and their use, combined with the rapid spread of the Internet, has increased dramatically. The recent emergence of this technology raises new issues, at both individual and societal levels. Several studies have investigated the physical and psychological harm that may be caused by smartphones. The issue of excessive smartphone use as an addictive disorder is frequently raised and debated, although it is not acknowledged in international classifications. In France, there is no validated assessment tool for smartphone addiction. Therefore, the aims of this research were: to validate a French translation of the Internet Addiction Test-smartphone version (IAT-smartphone); to study the links between smartphone addiction, Internet addiction, depression, anxiety and impulsivity. Two hundred and sixteen participants from the general population were included in the study (January to February 2016), which was available online using Sphinx software. We assessed smartphone addiction (French version of the Internet Addiction Scale - smartphone version, IAT-smartphone), specificity of smartphone use (time spent, types of activity), Internet addiction (Internet Addiction Test, IAT), impulsivity (UPPS Impulsiveness Behavior Scale), and anxiety and depression (Hospital Anxiety and Depression scale, HAD). We tested the construct validity of the IAT-smartphone (exploratory factor analysis, internal consistency, non-parametric correlation tests for convergent validity). We also carried out multiple linear regressions to determine the factors associated with IAT-smartphone. Mean age was 32.4±12.2 years; 75.5% of the participants were women. The IAT-smartphone had a one-factor structure (explaining 42 % of the variance), excellent internal consistency (α=0.93) and satisfactory convergent validity. Smartphone addiction was associated with Internet addiction (ρ=0.85), depression (ρ=0.31), anxiety (ρ=0.14), and some impulsivity subscales, including "negative urgency" (ρ=0.20; P<0.01), "positive urgency" (ρ=0.20; P<0.01), and "lack of perseverance" (ρ=0.16; P<0.05). Age was negatively associated with the IAT-S total score (ρ=-0.25; P<0.001), and there was a non-significant difference between the IAT-S total scores of men and women (29.3±10.2 vs. 32.7±12.4; P=0.06). Multiple linear regression showed that age, anxiety, depression, average time spent on the smartphone, impulsivity and Internet addiction explained 71.4 % of the variance of IAT-smartphone scores. However, this score dropped to 13.2 % when Internet addiction was removed from the model. This variable alone explained 70.8 % of the IAT-smartphone scores. The French version of the IAT-smartphone is a reliable and valid questionnaire to assess smartphone addiction. This addiction appears to be strongly linked to anxiety, depression and impulsivity. The strong association between smartphone addiction and Internet addiction suggests that smartphone addiction is one of the many forms of Internet addiction. In fact, smartphones may not be the object of the addiction but rather a medium facilitating Internet access as it makes it possible to connect anywhere anytime. This raises the issue of the potential role of smartphones in speeding up and facilitating the development of Internet addiction. Copyright © 2017 L'Encéphale, Paris. Published by Elsevier Masson SAS. All rights reserved.

  7. Internet Data Delivery for Future Space Missions

    NASA Technical Reports Server (NTRS)

    Rash, James; Casasanta, Ralph; Hogie, Keith; Hennessy, Joseph F. (Technical Monitor)

    2002-01-01

    Ongoing work at National Aeronautics and Space Administration Goddard Space Flight Center (NASA/GSFC), seeks to apply standard Internet applications and protocols to meet the technology challenge of future satellite missions. Internet protocols and technologies are under study as a future means to provide seamless dynamic communication among heterogeneous instruments, spacecraft, ground stations, constellations of spacecraft, and science investigators. The primary objective is to design and demonstrate in the laboratory the automated end-to-end transport of files in a simulated dynamic space environment using off-the-shelf, low-cost, commodity-level standard applications and protocols. The demonstrated functions and capabilities will become increasingly significant in the years to come as both earth and space science missions fly more sensors and as the need increases for more network-oriented mission operations. Another element of increasing significance will be the increased cost effectiveness of designing, building, integrating, and operating instruments and spacecraft that will come to the fore as more missions take up the approach of using commodity-level standard communications technologies. This paper describes how an IP (Internet Protocol)-based communication architecture can support all existing operations concepts and how it will enable some new and complex communication and science concepts. The authors identify specific end-to-end data flows from the instruments to the control centers and scientists, and then describe how each data flow can be supported using standard Internet protocols and applications. The scenarios include normal data downlink and command uplink as well as recovery scenarios for both onboard and ground failures. The scenarios are based on an Earth orbiting spacecraft with downlink data rates from 300 Kbps to 4 Mbps. Included examples are based on designs currently being investigated for potential use by the Global Precipitation Measurement (GPM) mission.

  8. Keeping Up with the Internet.

    ERIC Educational Resources Information Center

    Dealy, Jacqueline

    1994-01-01

    Offers instructions and resources for Internet novices wanting to access Internet services. Instructions are offered for connecting to 13 education listservs, 9 electronic journals and newsletters, 3 education databases, 7 Telnet gopher sites, Veronica and Archie search tools, and File Transfer Protocol (FTP). (Contains 16 references.) (SLW)

  9. Internet-based videoconferencing and data collaboration for the imaging community.

    PubMed

    Poon, David P; Langkals, John W; Giesel, Frederik L; Knopp, Michael V; von Tengg-Kobligk, Hendrik

    2011-01-01

    Internet protocol-based digital data collaboration with videoconferencing is not yet well utilized in the imaging community. Videoconferencing, combined with proven low-cost solutions, can provide reliable functionality and speed, which will improve rapid, time-saving, and cost-effective communications, within large multifacility institutions or globally with the unlimited reach of the Internet. The aim of this project was to demonstrate the implementation of a low-cost hardware and software setup that facilitates global data collaboration using WebEx and GoToMeeting Internet protocol-based videoconferencing software. Both products' features were tested and evaluated for feasibility across 2 different Internet networks, including a video quality and recording assessment. Cross-compatibility with an Apple OS is also noted in the evaluations. Departmental experiences with WebEx pertaining to clinical trials are also described. Real-time remote presentation of dynamic data was generally consistent across platforms. A reliable and inexpensive hardware and software setup for complete Internet-based data collaboration/videoconferencing can be achieved.

  10. Fundamental rate-loss trade-off for the quantum internet

    PubMed Central

    Azuma, Koji; Mizutani, Akihiro; Lo, Hoi-Kwong

    2016-01-01

    The quantum internet holds promise for achieving quantum communication—such as quantum teleportation and quantum key distribution (QKD)—freely between any clients all over the globe, as well as for the simulation of the evolution of quantum many-body systems. The most primitive function of the quantum internet is to provide quantum entanglement or a secret key to two points efficiently, by using intermediate nodes connected by optical channels with each other. Here we derive a fundamental rate-loss trade-off for a quantum internet protocol, by generalizing the Takeoka–Guha–Wilde bound to be applicable to any network topology. This trade-off has essentially no scaling gap with the quantum communication efficiencies of protocols known to be indispensable to long-distance quantum communication, such as intercity QKD and quantum repeaters. Our result—putting a practical but general limitation on the quantum internet—enables us to grasp the potential of the future quantum internet. PMID:27886172

  11. Home Computer and Internet User Security

    DTIC Science & Technology

    2005-01-01

    Information Security Model © 2005 Carnegie Mellon University (Lawrence R. Rogers, Author) Home Computer and Internet User Security...Carnegie Mellon University (Lawrence R. Rogers, Author) Home Computer and Internet User Security Version 1.0.4 – slide 50 Contact Information Lawrence R. Rogers • Email: cert@cert.org CERT website: http://www.cert.org/ ...U.S. Patent and Trademark Office Home Computer and Internet User Security Report Documentation Page Form ApprovedOMB

  12. Effects of an internet-based cognitive behavioural therapy intervention on preventing major depressive episodes among workers: a protocol for a randomised controlled trial.

    PubMed

    Imamura, Kotaro; Kawakami, Norito; Furukawa, Toshi A; Matsuyama, Yutaka; Shimazu, Akihito; Kasai, Kiyoto

    2015-05-12

    The aim of this study is to examine the effects of an internet-based cognitive behavioural therapy (iCBT) program on decreasing the risk of major depressive episodes (MDEs) among workers employed in a private corporate group in Japan, using a randomised controlled trial design. All of the workers in a corporate group (n=20,000) will be recruited through an invitation email. Participants who fulfil the inclusion criteria will be randomly allocated to intervention or control groups (planned N=4050 for each group). They will be allowed to complete the six lessons of the iCBT program within 10 weeks after the baseline survey. Those in the control group will receive the same iCBT after 12 months. The program includes several CBT skills: self-monitoring, cognitive restructuring, assertiveness, problem-solving and relaxation. The primary outcome measure is no new onset of MDE (using Diagnostic and Statistical Manual of Mental Disorders, Fourth Edition, Text Revision (DSM-IV-TR)/DSM-5 criteria) during the 12-month follow-up. Assessment will use the web version of the WHO Composite International Diagnostic Interview V.3.0 depression section. The Research Ethics Review Board of Graduate School of Medicine, the University of Tokyo (No. 3083-(2)), approved the study procedures. The study protocol is registered at the UMIN Clinical Trials Registry (UMIN-CTR; ID=UMIN000014146). Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  13. Interactive browsing of 3D environment over the Internet

    NASA Astrophysics Data System (ADS)

    Zhang, Cha; Li, Jin

    2000-12-01

    In this paper, we describe a system for wandering in a realistic environment over the Internet. The environment is captured by the concentric mosaic, compressed via the reference block coder (RBC), and accessed and delivered over the Internet through the virtual media (Vmedia) access protocol. Capturing the environment through the concentric mosaic is easy. We mount a camera at the end of a level beam, and shoot images as the beam rotates. The huge dataset of the concentric mosaic is then compressed through the RBC, which is specifically designed for both high compression efficiency and just-in-time (JIT) rendering. Through the JIT rendering function, only a portion of the RBC bitstream is accessed, decoded and rendered for each virtual view. A multimedia communication protocol -- the Vmedia protocol, is then proposed to deliver the compressed concentric mosaic data over the Internet. Only the bitstream segments corresponding to the current view are streamed over the Internet. Moreover, the delivered bitstream segments are managed by a local Vmedia cache so that frequently used bitstream segments need not be streamed over the Internet repeatedly, and the Vmedia is able to handle a RBC bitstream larger than its memory capacity. A Vmedia concentric mosaic interactive browser is developed where the user can freely wander in a realistic environment, e.g., rotate around, walk forward/backward and sidestep, even under a tight bandwidth of 33.6 kbps.

  14. The Effects of Pushing the Digital Divide to the Fighting Hole

    DTIC Science & Technology

    2006-02-03

    information technologies (IT), and new ways of horizontally fusing information across the battlespace...The opportunity to exploit this new “digital...brought technology , such as the Internet Protocol (IP), to the forefront. It is incumbent upon the leaders of the communications community to ensure...in a recent interview with SIGNAL magazine: In terms of potential, I see the fundamental technologies associated with Internet Protocol (IP

  15. Fingerprinting Reverse Proxies Using Timing Analysis of TCP Flows

    DTIC Science & Technology

    2013-09-01

    bayes classifier,” in Cloud Computing Security , ser. CCSW ’09. New York City, NY: ACM, 2009, pp. 31–42. [30] J. Zhang, R. Perdisci, W. Lee, U. Sarfraz...FSM Finite State Machine HTML Hypertext Markup Language HTTP Hypertext Transfer Protocol HTTPS Hypertext Transfer Protocol Secure ICMP Internet Control...This hidden traffic concept supports network access control, security protection through obfuscation, and performance boosts at the Internet facing

  16. From Fob to Noc: A Pathway to a Cyber Career for Combat Veterans

    DTIC Science & Technology

    2014-06-01

    Assurance Certifications GS general schedule HSAC Homeland Security Advisory Council IDS intrusion detection system IP internet protocol IPS...NIPRNET non-secure internet protocol router network NIST National Institute for Standards and Technology NOC network operations center NSA National...twice a day on an irregular schedule or during contact with the enemy to keep any observing enemy wary of the force protection 13 condition at any

  17. S-curve networks and an approximate method for estimating degree distributions of complex networks

    NASA Astrophysics Data System (ADS)

    Guo, Jin-Li

    2010-12-01

    In the study of complex networks almost all theoretical models have the property of infinite growth, but the size of actual networks is finite. According to statistics from the China Internet IPv4 (Internet Protocol version 4) addresses, this paper proposes a forecasting model by using S curve (logistic curve). The growing trend of IPv4 addresses in China is forecasted. There are some reference values for optimizing the distribution of IPv4 address resource and the development of IPv6. Based on the laws of IPv4 growth, that is, the bulk growth and the finitely growing limit, it proposes a finite network model with a bulk growth. The model is said to be an S-curve network. Analysis demonstrates that the analytic method based on uniform distributions (i.e., Barabási-Albert method) is not suitable for the network. It develops an approximate method to predict the growth dynamics of the individual nodes, and uses this to calculate analytically the degree distribution and the scaling exponents. The analytical result agrees with the simulation well, obeying an approximately power-law form. This method can overcome a shortcoming of Barabási-Albert method commonly used in current network research.

  18. Augmenting Instruction in Business Communication Courses with the Internet.

    ERIC Educational Resources Information Center

    Cohen, Lance

    1994-01-01

    Outlines ways in which instructors of business communication can use the Internet more effectively while teaching. Argues that by augmenting business communication courses with e-mail and Internet protocols, instructors can reach larger segments of their classes, stimulate discussions, create simulations, and strengthen their relationships with…

  19. Demonstrating a Realistic IP Mission Prototype

    NASA Technical Reports Server (NTRS)

    Rash, James; Ferrer, Arturo B.; Goodman, Nancy; Ghazi-Tehrani, Samira; Polk, Joe; Johnson, Lorin; Menke, Greg; Miller, Bill; Criscuolo, Ed; Hogie, Keith

    2003-01-01

    Flight software and hardware and realistic space communications environments were elements of recent demonstrations of the Internet Protocol (IP) mission concept in the lab. The Operating Missions as Nodes on the Internet (OMNI) Project and the Flight Software Branch at NASA/GSFC collaborated to build the prototype of a representative space mission that employed unmodified off-the-shelf Internet protocols and technologies for end-to-end communications between the spacecraft/instruments and the ground system/users. The realistic elements used in the prototype included an RF communications link simulator and components of the TRIANA mission flight software and ground support system. A web-enabled camera connected to the spacecraft computer via an Ethernet LAN represented an on-board instrument creating image data. In addition to the protocols at the link layer (HDLC), transport layer (UDP, TCP), and network (IP) layer, a reliable file delivery protocol (MDP) at the application layer enabled reliable data delivery both to and from the spacecraft. The standard Network Time Protocol (NTP) performed on-board clock synchronization with a ground time standard. The demonstrations of the prototype mission illustrated some of the advantages of using Internet standards and technologies for space missions, but also helped identify issues that must be addressed. These issues include applicability to embedded real-time systems on flight-qualified hardware, range of applicability of TCP, and liability for and maintenance of commercial off-the-shelf (COTS) products. The NASA Earth Science Technology Office (ESTO) funded the collaboration to build and demonstrate the prototype IP mission.

  20. ADHD and autistic traits, family function, parenting style, and social adjustment for Internet addiction among children and adolescents in Taiwan: a longitudinal study.

    PubMed

    Chen, Yi-Lung; Chen, Sue-Huei; Gau, Susan Shur-Fen

    2015-04-01

    This longitudinal study investigated the prevalence, predictors, and related factors for Internet addiction among elementary and junior high school students in Taiwan. A convenient sample of grades 3, 5, and 8 students (n = 1153) was recruited from six elementary and one junior high schools. They were assessed during the beginning and the end of the spring semester of 2013. Internet addiction was examined by the Chen Internet Addiction Scale (CIAS). Other factors were screened using the Chinese version of the Autism Spectrum Quotient (AQ) for autistic trait, the Parental Bonding Instrument (PBI) for parenting, the Family APGAR for family support, the Social Adjustment Inventory for Children and Adolescents for social function, and the Swanson, Nolan, and Pelham, version IV scale (SNAP-IV) for ADHD symptoms. The prevalence of Internet addiction decreased from 11.4% to 10.6%. Male, low family support, poor social adjustment, and high ADHD-related symptoms were related to Internet addiction. However, there was an inverse relationship between autistic traits and Internet addiction. Further, its predictivity could be accounted by poor academic performance, male, and protective parenting style. Internet addiction is not uncommon among youths in Taiwan. The predictors identified in this study could be the specific measures for the development of a prevention program for Internet addiction in the youth population. Copyright © 2015 Elsevier Ltd. All rights reserved.

  1. 47 CFR 54.503 - Other supported special services.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... telecommunications carriers include voice mail, interconnected voice over Internet protocol (VoIP), text messaging, Internet access, and installation and maintenance of internal connections in addition to all reasonable...

  2. State Cancer Profiles

    MedlinePlus

    ... the site again. The following web browsers and operating systems are sufficiently secure and advanced. These version numbers ... also acceptable. Microsoft Internet Explorer 7, if your operating system is Windows Vista or later. No version of ...

  3. The OAuth 2.0 Web Authorization Protocol for the Internet Addiction Bioinformatics (IABio) Database.

    PubMed

    Choi, Jeongseok; Kim, Jaekwon; Lee, Dong Kyun; Jang, Kwang Soo; Kim, Dai-Jin; Choi, In Young

    2016-03-01

    Internet addiction (IA) has become a widespread and problematic phenomenon as smart devices pervade society. Moreover, internet gaming disorder leads to increases in social expenditures for both individuals and nations alike. Although the prevention and treatment of IA are getting more important, the diagnosis of IA remains problematic. Understanding the neurobiological mechanism of behavioral addictions is essential for the development of specific and effective treatments. Although there are many databases related to other addictions, a database for IA has not been developed yet. In addition, bioinformatics databases, especially genetic databases, require a high level of security and should be designed based on medical information standards. In this respect, our study proposes the OAuth standard protocol for database access authorization. The proposed IA Bioinformatics (IABio) database system is based on internet user authentication, which is a guideline for medical information standards, and uses OAuth 2.0 for access control technology. This study designed and developed the system requirements and configuration. The OAuth 2.0 protocol is expected to establish the security of personal medical information and be applied to genomic research on IA.

  4. Trade-Off Analysis Report

    NASA Technical Reports Server (NTRS)

    Dhas, Chris

    2000-01-01

    NASAs Glenn Research Center (GRC) defines and develops advanced technology for high priority national needs in communications technologies for application to aeronautics and space. GRC tasked Computer Networks and Software Inc. (CNS) to examine protocols and architectures for an In-Space Internet Node. CNS has developed a methodology for network reference models to support NASAs four mission areas: Earth Science, Space Science, Human Exploration and Development of Space (REDS), Aerospace Technology. CNS previously developed a report which applied the methodology, to three space Internet-based communications scenarios for future missions. CNS conceptualized, designed, and developed space Internet-based communications protocols and architectures for each of the independent scenarios. GRC selected for further analysis the scenario that involved unicast communications between a Low-Earth-Orbit (LEO) International Space Station (ISS) and a ground terminal Internet node via a Tracking and Data Relay Satellite (TDRS) transfer. This report contains a tradeoff analysis on the selected scenario. The analysis examines the performance characteristics of the various protocols and architectures. The tradeoff analysis incorporates the results of a CNS developed analytical model that examined performance parameters.

  5. Internet Addiction among High Schoolers in Taiwan.

    ERIC Educational Resources Information Center

    Lin, Sunny S. J.; Tsai, Chin-Chung

    The purpose of this study was to develop a reliable and valid measurement for the identification of Internet addictive high school students. There were 615 subjects selected by a stratified sampling from the population of Taiwanese 10th to 12th graders. The final version of the Internet Addiction Scale for Taiwan High Schoolers (IAST) contained 20…

  6. Network Quality of Service Monitoring for IP Telephony.

    ERIC Educational Resources Information Center

    Ghita, B. V.; Furnell, S. M.; Lines, B. M.; Le-Foll, D.; Ifeachor, E. C.

    2001-01-01

    Discusses the development of real-time applications on the Internet for telecommunications and presents a non-intrusive way of determining network performance parameters for voice packet flows within a voice over IP (Internet Protocol), or Internet telephony call. Considers measurement of quality of service and describes results of a preliminary…

  7. GINSU: Guaranteed Internet Stack Utilization

    DTIC Science & Technology

    2005-11-01

    Computer Architecture Data Links, Internet , Protocol Stacks 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT UNCLASSIFIED 18. SECURITY...AFRL-IF-RS-TR-2005-383 Final Technical Report November 2005 GINSU: GUARANTEED INTERNET STACK UTILIZATION Trusted... Information Systems, Inc. Sponsored by Defense Advanced Research Projects Agency DARPA Order No. ARPS APPROVED FOR PUBLIC

  8. How I Found Out about the Internet.

    ERIC Educational Resources Information Center

    Pawloski, Bob

    1994-01-01

    A Nebraska consultant/former teacher explains his role in developing Internet accounts for teachers while working on a wetlands distance-learning project and an arts-education consortium. He explains ARTnet and other Internet services, including Telnet, FTP (file transfer protocol), the Gopher retrieval system, NetNews, and Listservs. Sidebars…

  9. A Scholar's Journey: Using the Internet for Adult and Distance Education Research.

    ERIC Educational Resources Information Center

    Ellsworth, Jill H.

    1993-01-01

    Discusses use of the Internet for research on adult and distance education. Highlights include a description of the Internet; scholarly discussion lists; Telnet; FTP (File Transfer Protocol); scholarship and research, including access to university library catalogs and electronic journals; and online information about networks, including user…

  10. Development of an internet version of the Lidcombe Program of early stuttering intervention: A trial of Part 1.

    PubMed

    Van Eerdenbrugh, Sabine; Packman, Ann; Onslow, Mark; O'brian, Sue; Menzies, Ross

    2018-04-01

    There is evidence that access to treatment for early stuttering is not available for all who need it. An internet version of the Lidcombe Program for early stuttering (Internet-LP) has been developed to deal with this shortfall. The LP is suitable for such development because it is delivered by parents in the child's everyday environment, with training by a speech-language pathologist. A Phase I trial of Internet-LP Part 1, comprising parent training, is reported here. Eight parents of pre-schoolers who stutter were recruited and six completed the trial. Post-trial assessment indicated that the parents scored well for identifying and measuring stuttering and for knowledge about conducting practice sessions, including how to present verbal contingencies during practice sessions. The results prompted minor adjustments to Part 1 and guided the construction of Part 2, which instructs parents during the remainder of the treatment process.

  11. The interplanetary Internet

    NASA Technical Reports Server (NTRS)

    Hooke, A. J.

    2000-01-01

    Architectural design of the interplanetary internet is now underway and prototype flight testing of some of the candidate protocols is anticipated within a year. This talk will describe the current status of the project.

  12. Comparison of Fixed-Item and Response-Sensitive Versions of an Online Tutorial

    ERIC Educational Resources Information Center

    Grant, Lyle K.; Courtoreille, Marni

    2007-01-01

    This study is a comparison of 2 versions of an Internet-based tutorial that teaches the behavior-analysis concept of positive reinforcement. A fixed-item group of students studied a version of the tutorial that included 14 interactive examples and nonexamples of the concept. A response-sensitive group of students studied a different version of the…

  13. 76 FR 59963 - Closed Captioning of Internet Protocol-Delivered Video Programming: Implementation of the Twenty...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-28

    ...In this document, the Commission proposes rules to implement provisions of the Twenty-First Century Communications and Video Accessibility Act of 2010 (``CVAA'') that mandate rules for closed captioning of certain video programming delivered using Internet protocol (``IP''). The Commission seeks comment on rules that would apply to the distributors, providers, and owners of IP-delivered video programming, as well as the devices that display such programming.

  14. VoIP Accessibility: A Usability Study of Voice over Internet Protocol (VoIP) Systems and A Survey of VoIP Users with Vision Loss

    ERIC Educational Resources Information Center

    Packer, Jaclyn; Reuschel, William

    2018-01-01

    Introduction: Accessibility of Voice over Internet Protocol (VoIP) systems was tested with a hands-on usability study and an online survey of VoIP users who are visually impaired. The survey examined the importance of common VoIP features, and both methods assessed difficulty in using those features. Methods: The usability test included four paid…

  15. Command and Control of Space Assets Through Internet-Based Technologies Demonstrated

    NASA Technical Reports Server (NTRS)

    Foltz, David A.

    2002-01-01

    The NASA Glenn Research Center successfully demonstrated a transmission-control-protocol/ Internet-protocol- (TCP/IP) based approach to the command and control of onorbit assets over a secure network. This is a significant accomplishment because future NASA missions will benefit by using Internet-standards-based protocols. Benefits of this Internet-based space command and control system architecture include reduced mission costs and increased mission efficiency. The demonstration proved that this communications architecture is viable for future NASA missions. This demonstration was a significant feat involving multiple NASA organizations and industry. Phillip Paulsen, from Glenn's Project Development and Integration Office, served as the overall project lead, and David Foltz, from Glenn's Satellite Networks and Architectures Branch, provided the hybrid networking support for the required Internet connections. The goal was to build a network that would emulate a connection between a space experiment on the International Space Station and a researcher accessing the experiment from anywhere on the Internet, as shown. The experiment was interfaced to a wireless 802.11 network inside the demonstration area. The wireless link provided connectivity to the Tracking and Data Relay Satellite System (TDRSS) Internet Link Terminal (TILT) satellite uplink terminal located 300 ft away in a parking lot on top of a panel van. TILT provided a crucial link in this demonstration. Leslie Ambrose, NASA Goddard Space Flight Center, provided the TILT/TDRSS support. The TILT unit transmitted the signal to TDRS 6 and was received at the White Sands Second TDRSS Ground Station. This station provided the gateway to the Internet. Coordination also took place at the White Sands station to install a Veridian Firewall and automated security incident measurement (ASIM) system to the Second TDRSS Ground Station Internet gateway. The firewall provides a trusted network for the simulated space experiment. A second Internet connection at the demonstration area was implemented to provide Internet connectivity to a group of workstations to serve as platforms for controlling the simulated space experiment. Installation of this Internet connection was coordinated with an Internet service provider (ISP) and local NASA Johnson Space Center personnel. Not only did this TCP/IP-based architecture prove that a principal investigator on the Internet can securely command and control on-orbit assets, it also demonstrated that valuable virtual testing of planned on-orbit activities can be conducted over the Internet prior to actual deployment in space.

  16. Final report and recommendations of the ESnet Authentication Pilot Project

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Johnson, G.R.; Moore, J.P.; Athey, C.L.

    1995-01-01

    To conduct their work, U.S. Department of Energy (DOE) researchers require access to a wide range of computing systems and information resources outside of their respective laboratories. Electronically communicating with peers using the global Internet has become a necessity to effective collaboration with university, industrial, and other government partners. DOE`s Energy Sciences Network (ESnet) needs to be engineered to facilitate this {open_quotes}collaboratory{close_quotes} while ensuring the protection of government computing resources from unauthorized use. Sensitive information and intellectual properties must be protected from unauthorized disclosure, modification, or destruction. In August 1993, DOE funded four ESnet sites (Argonne National Laboratory, Lawrence Livermoremore » National Laboratory, the National Energy Research Supercomputer Center, and Pacific Northwest Laboratory) to begin implementing and evaluating authenticated ESnet services using the advanced Kerberos Version 5. The purpose of this project was to identify, understand, and resolve the technical, procedural, cultural, and policy issues surrounding peer-to-peer authentication in an inter-organization internet. The investigators have concluded that, with certain conditions, Kerberos Version 5 is a suitable technology to enable ESnet users to freely share resources and information without compromising the integrity of their systems and data. The pilot project has demonstrated that Kerberos Version 5 is capable of supporting trusted third-party authentication across an inter-organization internet and that Kerberos Version 5 would be practical to implement across the ESnet community within the U.S. The investigators made several modifications to the Kerberos Version 5 system that are necessary for operation in the current Internet environment and have documented other technical shortcomings that must be addressed before large-scale deployment is attempted.« less

  17. Psychometric properties of the Turkish version of the Internet Addiction Test (IAT).

    PubMed

    Boysan, Murat; Kuss, Daria J; Barut, Yaşar; Ayköse, Nafi; Güleç, Mustafa; Özdemir, Osman

    2017-01-01

    Of many instruments developed to assess Internet addiction, the Internet Addiction Test (IAT), an expanded version of the Internet Addiction Diagnostic Questionnaire (IADQ), has been the most widely used scale in English and non-English speaking populations. In this study, our aim was to investigate the psychometric properties of short and expanded versions of the IAT in a Turkish undergraduate sample. Overall, 455 undergraduate students from Turkey aged between 18 and 30 participated in the study (63.53% were females). Explanatory and confirmatory factor analytic procedures investigated factor structures of the IADQ and IAT. The Internet Addiction Scale (IAS), Coping Inventory for Stressful Situations (CISS), Obsessive Compulsive Inventory-Revised (OCI-R) and Dissociative Experiences Scale (DES) were administered to assess convergent and divergent validities of the IADQ and IAT. Internal consistency and 15-day test-retest reliability were computed. In the factorial analytic investigation, we found a unidimensional factor structure for each measure fit the current data best. Significant but weak to moderate correlations of the IADQ and the IAT with the CISS, OCI-R and DES provided empirical evidence for divergent validity, whereas strong associations with the subscales of the IAS pointed to the convergent validity of Young's Internet addiction construct. Internal consistency of the IADQ was weak (α=0.67) and of the IAT was high (α=0.93). Temporal reliability of both instruments was very high (α=0.81 and α=0.87; respectively). The IAT revealed promising and sound psychometric properties in a Turkish sample. Copyright © 2015 Elsevier Ltd. All rights reserved.

  18. Potentially inappropriate medicines in elderly hospitalised patients according to the EU(7)-PIM list, STOPP version 2 criteria and comprehensive protocol.

    PubMed

    Mucalo, Iva; Hadžiabdić, Maja Ortner; Brajković, Andrea; Lukić, Sonja; Marić, Patricia; Marinović, Ivana; Bačić-Vrca, Vesna

    2017-08-01

    The aim of this study was to measure the prevalence of potentially inappropriate medications (PIMs) by using the EU(7)-PIM list, STOPP (Screening Tool of Older Persons' potentially inappropriate Prescriptions) version 2 criteria and the new comprehensive protocol. This prospective study involved a sample of 276 consecutive elderly patients discharged from the university teaching hospital. Age, gender, diagnoses, medication history and medicines at discharge were recorded. The main outcome measure was the prevalence of PIMs according to each set of criteria: EU(7)-PIM list, STOPP version 2 criteria and comprehensive protocol. The median patient age (range) was 74 (65-92) years. The median number of prescribed medications was 7 (1-17). STOPP identified 393 PIMs affecting 190 patients (69%), EU(7)-PIM list identified 330 PIMs in 184 patients (66.7%) whilst the comprehensive protocol identified 134 PIMs in 102 patients (37%). STOPP version 2 criteria identified significantly more PIMs per patient than the other two protocols (p < 0.001). Gender (p = 0.002), glomerular filtration rate (p = 0.039) and number of comorbidities (p = 0.001) were associated with the proportion of PIMs for the STOPP version 2 criteria only. A very high PIM prevalence at discharge was reported suggesting the urgent need for actions to reduce them. STOPP version 2 criteria identified significantly more PIMs than the EU(7)-PIM list and the comprehensive protocol and was found as a more sensitive tool for PIM detection.

  19. The Deployment of IPv6 in an IPv4 World and Transition Strategies.

    ERIC Educational Resources Information Center

    Bouras, C.; Ganos, P.; Karaliotas, A.

    2003-01-01

    The current version of the IP protocol, IPv4, is the most widely used protocol in computer networks. This article describes mechanisms that can be used to facilitate the transition to the new version of the IP protocol, IPv6, and examines usability, usefulness and manageability. Describes how some of these mechanisms were applied to the Greek…

  20. Design and Analysis of Optimization Algorithms to Minimize Cryptographic Processing in BGP Security Protocols.

    PubMed

    Sriram, Vinay K; Montgomery, Doug

    2017-07-01

    The Internet is subject to attacks due to vulnerabilities in its routing protocols. One proposed approach to attain greater security is to cryptographically protect network reachability announcements exchanged between Border Gateway Protocol (BGP) routers. This study proposes and evaluates the performance and efficiency of various optimization algorithms for validation of digitally signed BGP updates. In particular, this investigation focuses on the BGPSEC (BGP with SECurity extensions) protocol, currently under consideration for standardization in the Internet Engineering Task Force. We analyze three basic BGPSEC update processing algorithms: Unoptimized, Cache Common Segments (CCS) optimization, and Best Path Only (BPO) optimization. We further propose and study cache management schemes to be used in conjunction with the CCS and BPO algorithms. The performance metrics used in the analyses are: (1) routing table convergence time after BGPSEC peering reset or router reboot events and (2) peak-second signature verification workload. Both analytical modeling and detailed trace-driven simulation were performed. Results show that the BPO algorithm is 330% to 628% faster than the unoptimized algorithm for routing table convergence in a typical Internet core-facing provider edge router.

  1. [Self-Medication, Health and Online Orders: An Online Survey].

    PubMed

    Eichenberg, C; Hübner, L

    2017-02-01

    Background: The intensive use of Internet as health guide is proved by a current representative survey. Online orders of OTC pharmaceuticals and prescription medicine represent a special way of utillisation. Intention: The aim of the following study is to investigate motives and backgrounds of self-medication in coherency of health and ordering of OTC pharmaceuticals via Internet. Method: With an online questionnaire developed in particular for this thesis N=104 internet users (mean age M=32,7; SD=11,1 consisting of 73 female and 31 male participants) were questioned concerning the relevant topics. Furthermore, the subjects were interviewed with regard to identification of their quality of life (with the German version of the EUROHIS-QOL 8 item index), their well-being (by using the German version of the WHO-5 well-being index, version II). Results: The wish for (especially temporal) independence from a physicians treatment and the idea of a faster convalescence or prevention of worse ailment could be identified as motives for self-medication. The most frequently selected advantages of ordering drugs via internet were the lower price, organisational aspects such as direct home delivery or saving time without a consultation. In contrast, the lack of advice was often mentioned as a possible disadvantage, just like the risk of undetected and undiagnosed diseases. Compared to participants who did not do any Internet orders, participants who ordered their non-prescription drugs on the Internet were less aware of possible risks and they also used painkillers available without prescription more frequently. However, there were no differences in the total amount of applied OTC medications, which made a drug abuse less likely. Overall, self-medication of the users of Internet forums interviewed within this thesis seemed to be quantitatively and qualitatively appropriate. Conclusion: Self-medication by Internet users in this study seems to be reasonable in a quantitative and qualitative way. © Georg Thieme Verlag KG Stuttgart · New York.

  2. Reliability and Validity of the Korean Version of the Internet Addiction Test among College Students

    PubMed Central

    Lee, Kounseok; Lee, Hye-Kyung; Gyeong, Hyunsu; Yu, Byeongkwan; Song, Yul-Mai

    2013-01-01

    We developed a Korean translation of the Internet Addiction Test (KIAT), widely used self-report for internet addiction and tested its reliability and validity in a sample of college students. Two hundred seventy-nine college students at a national university completed the KIAT. Internal consistency and two week test-retest reliability were calculated from the data, and principal component factor analysis was conducted. Participants also completed the Internet Addiction Diagnostic Questionnaire (IADQ), the Korea Internet addiction scale (K-scale), and the Patient Health Questionnaire-9 for the criterion validity. Cronbach's alpha of the whole scale was 0.91, and test-retest reliability was also good (r = 0.73). The IADQ, the K-scale, and depressive symptoms were significantly correlated with the KIAT scores, demonstrating concurrent and convergent validity. The factor analysis extracted four factors (Excessive use, Dependence, Withdrawal, and Avoidance of reality) that accounted for 59% of total variance. The KIAT has outstanding internal consistency and high test-retest reliability. Also, the factor structure and validity data show that the KIAT is comparable to the original version. Thus, the KIAT is a psychometrically sound tool for assessing internet addiction in the Korean-speaking population. PMID:23678270

  3. Using the Internet in Rural Special Education: Accessing Resources.

    ERIC Educational Resources Information Center

    Bull, Kay S.; Kimball, Sarah L.

    This paper provides basic information on searching the Internet and describes sites of interest in the area of rural special education. The first section traces the evolution of the Internet through various phases--ARPANET, NSFNET, CERNET, and the beginnings of the World Wide Web--and describes various protocols (methods and tools) developed to…

  4. Assessing Information on the Internet: Toward Providing Library Services for Computer-Mediated Communication.

    ERIC Educational Resources Information Center

    Dillon, Martin; And Others

    1992-01-01

    Describes a project that examined textual information available on the Internet and potential means of providing access to this information. Highlights include an overview of Internet resources, a profile of a document sample, description of FTP (File Transfer Protocol) sites, and an automated method of categorizing files. (MES)

  5. Tools to Ease Your Internet Adventures: Part I.

    ERIC Educational Resources Information Center

    Descy, Don E.

    1993-01-01

    This first of a two-part series highlights three tools that improve accessibility to Internet resources: (1) Alex, a database that accesses files in FTP (file transfer protocol) sites; (2) Archie, software that searches for file names with a user's search term; and (3) Gopher, a menu-driven program to access Internet sites. (LRW)

  6. Citing Internet Addresses: A How-To Guide for Referencing Online Sources in Student Bibliographies. Revised.

    ERIC Educational Resources Information Center

    McClain, Tim

    This paper provides easy-to-understand guidelines for citing online information in student bibliographies. Citation structure and examples are provided for each type of Internet source. Guidelines are included for the following Internet sources: electronic mail; Gopher; File Transfer Protocol (FTP); Telnet; World Wide Web; Usenet Newsgroups;…

  7. A Teacher's Project Guide to the Internet.

    ERIC Educational Resources Information Center

    Crotchett, Kevin R.

    This book is a step-by-step guide to the Internet, suggesting creative K-12 classroom projects ranging from one of the most basic Internet functions, e-mail, to one of the more difficult, writing World Wide Web homepages. Intervening chapters describe projects using Usenet Newsgroups, File Transfer Protocols (FTP), Gopher, Veronica, the World Wide…

  8. Privacy/Security Policy

    Science.gov Websites

    automatically is: The Internet Protocol (IP) address of the domain from which you access the Internet (i.e DUF6 Management and Uses DUF6 Conversion EIS Documents News FAQs Internet Resources Glossary Home  , to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system

  9. A Lightweight Continuous Authentication Protocol for the Internet of Things.

    PubMed

    Chuang, Yo-Hsuan; Lo, Nai-Wei; Yang, Cheng-Ying; Tang, Ssu-Wei

    2018-04-05

    Modern societies are moving toward an information-oriented environment. To gather and utilize information around people's modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.

  10. Measurement issues related to data collection on the World Wide Web.

    PubMed

    Strickland, Ora L; Moloney, Margaret F; Dietrich, Alexa S; Myerburg, Stuart; Cotsonis, George A; Johnson, Robert V

    2003-01-01

    As the World Wide Web has become more prominent as a mode of communication, it has opened up new possibilities for research data collection. This article identifies measurement issues that occur with Internet data collection that are relevant to qualitative and quantitative research approaches as they occurred in a triangulated Internet study of perimenopausal women with migraine headaches. Issues associated with quantitative data collection over the Internet include (a) selecting and designing Internet data collection protocols that adequately address study aims while also taking advantage of the Internet, (b) ensuring the reliability and validity of Internet data collected, (c) adapting quantitative paper-and-pencil data collection protocols for the Internet, (d) making Internet data collection practical for respondents and researchers, and (e) ensuring the quality of quantitative data collected. Qualitative data collection over the Internet needs to remain true to the philosophical stance of the qualitative approach selected. Researcher expertise in qualitative data collection must be combined with expertise in computer technology and information services if data are to be of ultimate quality The advantages and limitations of collecting qualitative data in real time or at a later time are explored, as well as approaches to enhance qualitative data collection over the Internet. It was concluded that like any research approach or method, Internet data collection requires considerable creativity, expertise, and planning to take advantage of the technology for the collection of reliable and valid research data.

  11. Internet Data Delivery for Future Space Missions

    NASA Technical Reports Server (NTRS)

    Rash, James; Hogie, Keith; Casasanta, Ralph; Hennessy, Joseph F. (Technical Monitor)

    2002-01-01

    This paper presents work being done at NASA/GSFC (Goddard Space Flight Center) on applying standard Internet applications and protocols to meet the technology challenge of future satellite missions. Internet protocols (IP) can provide seamless dynamic communication among heterogeneous instruments, spacecraft, ground stations, and constellations of spacecraft. A primary component of this work is to design and demonstrate automated end-to-end transport of files in a dynamic space environment using off-the-shelf, low-cost, commodity-level standard applications and protocols. These functions and capabilities will become increasingly significant in the years to come as both Earth and space science missions fly more sensors and the present labor-intensive, mission-specific techniques for processing and routing data become prohibitively expensive. This paper describes how an IP-based communication architecture can support existing operations concepts and how it will enable some new and complex communication and science concepts. The authors identify specific end-to-end file transfers all the way from instruments to control centers and scientists, and then describe how each data flow can be supported using standard Internet protocols and applications. The scenarios include normal data downlink and command uplink as well as recovery scenarios for both onboard and ground failures. The scenarios are based on an Earth orbiting spacecraft with data rates and downlink capabilities from 300 Kbps to 4 Mbps. Many examples are based on designs currently being investigated for the Global Precipitation Measurement (GPM) mission.

  12. 48 CFR 1815.604 - Agency points of contact. (NASA supplements paragraph (a))

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Internet at http://ec.msfc.nasa.gov/hq/library/unSol-Prop.html. A deviation is required for use of any modified or summarized version of the Internet information or for alternate means of general dissemination...

  13. 47 CFR 11.56 - Obligation to process CAP-formatted EAS messages.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ...), and Common Alerting Protocol, v. 1.2 USA Integrated Public Alert and Warning System Profile Version 1...) “Common Alerting Protocol, v. 1.2 USA Integrated Public Alert and Warning System Profile Version 1.0” (Oct...

  14. 47 CFR 11.56 - Obligation to process CAP-formatted EAS messages.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...), and Common Alerting Protocol, v. 1.2 USA Integrated Public Alert and Warning System Profile Version 1...) “Common Alerting Protocol, v. 1.2 USA Integrated Public Alert and Warning System Profile Version 1.0” (Oct...

  15. 47 CFR 11.56 - Obligation to process CAP-formatted EAS messages.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ...), and Common Alerting Protocol, v. 1.2 USA Integrated Public Alert and Warning System Profile Version 1...) “Common Alerting Protocol, v. 1.2 USA Integrated Public Alert and Warning System Profile Version 1.0” (Oct...

  16. An Internet-based intervention for eating disorders consisting of automated computer-tailored feedback with or without supplemented frequent or infrequent support from a coach: study protocol for a randomized controlled trial.

    PubMed

    Aardoom, Jiska J; Dingemans, Alexandra E; Spinhoven, Philip; Hakkaart-van Roijen, Leona; Van Furth, Eric F

    2013-10-17

    Several Internet-based interventions for eating disorders have shown their effectiveness. Still, there is a need to refine such interventions given that most existing programs seem to be limited by their static 'one-size-fits-all' approach. 'Featback', an Internet-based intervention for symptoms of eating disorders provides a more individualized approach. It consists of several components (psychoeducation, a fully automated monitoring and feedback system, and support from a coach), which can be matched to participants' needs and preferences. Until now, it is unclear whether online self-help interventions for eating disorders with support are more effective than those without. The aims of the current study are i) to examine the relative effectiveness of (the different components of) Featback; ii) to examine predictors, moderators and mediators of intervention responses; iii) to report on practical experiences with Featback; and iv) to examine the cost-effectiveness of Featback. Individuals aged 16 years or older, with mild to severe eating disorder symptoms will be randomized to one of the four study conditions. In condition one, participants receive the basic version of Featback, consisting of psychoeducation and a fully automated monitoring and feedback system. In conditions two and three, participants receive the basic version of Featback supplemented with the possibility of infrequent (weekly) or frequent (three times a week) e-mail, chat, or Skype support from a coach, respectively. The fourth condition is a waiting list control condition. Participants are assessed at baseline, post-intervention (8 weeks), and at 3- and 6-month follow-up (the latter except for participants in the waiting list control condition). Primary outcome measures are disordered eating behaviors and attitudes. Secondary outcome measures are (eating disorder-related) quality of life, self-stigma of seeking help, self-esteem, mastery and support, symptoms of depression and anxiety, repetitive negative thinking, motivation to change, user satisfaction, compliance, and help-seeking attitudes and behaviors. This study aims to provide more insight into the (cost-) effectiveness of Internet-based interventions for eating disorders, particularly those with and without professional support, as well as different levels of support. NTR3646.

  17. Treatment of Internet Addiction with Anxiety Disorders: Treatment Protocol and Preliminary Before-After Results Involving Pharmacotherapy and Modified Cognitive Behavioral Therapy.

    PubMed

    Santos, Veruska Andrea; Freire, Rafael; Zugliani, Morená; Cirillo, Patricia; Santos, Hugo Henrique; Nardi, Antonio Egidio; King, Anna Lucia

    2016-03-22

    The growth of the Internet has led to significant change and has become an integral part of modern life. It has made life easier and provided innumerous benefits; however, excessive use has brought about the potential for addiction, leading to severe impairments in social, academic, financial, psychological, and work domains. Individuals addicted to the Internet usually have comorbid psychiatric disorders. Panic disorder (PD) and generalized anxiety disorder (GAD) are prevalent mental disorders, involving a great deal of damage in the patient's life. This open trial study describes a treatment protocol among 39 patients with anxiety disorders and Internet addiction (IA) involving pharmacotherapy and modified cognitive behavioral therapy (CBT). Of the 39 patients, 25 were diagnosed with PD and 14 with GAD, in addition to Internet addiction. At screening, patients responded to the MINI 5.0, Hamilton Anxiety Rating Scale, Hamilton Depression Rating Scale, Clinical Global Impressions Scale, and the Young Internet Addiction Scale. At that time, IA was observed taking into consideration the IAT scale (cutoff score above 50), while anxiety disorders were diagnosed by a psychiatrist. Patients were forwarded for pharmacotherapy and a modified CBT protocol. Psychotherapy was conducted individually, once a week, over a period of 10 weeks, and results suggest that the treatment was effective for anxiety and Internet addiction. Before treatment, anxiety levels suggested severe anxiety, with an average score of 34.26 (SD 6.13); however, after treatment the mean score was 15.03 (SD 3.88) (P<.001). A significant improvement in mean Internet addiction scores was observed, from 67.67 (SD 7.69) before treatment, showing problematic internet use, to 37.56 (SD 9.32) after treatment (P<.001), indicating medium Internet use. With respect to the relationship between IA and anxiety, the correlation between scores was .724. This study is the first research into IA treatment of a Brazilian population. The improvement was remarkable due to the complete engagement of patients in therapy, which contributed to the success of the treatment from a behavioral perspective, and gave patients the confidence to continue to manage Internet use in their lives.

  18. A Scalable Context-Aware Objective Function (SCAOF) of Routing Protocol for Agricultural Low-Power and Lossy Networks (RPAL).

    PubMed

    Chen, Yibo; Chanet, Jean-Pierre; Hou, Kun-Mean; Shi, Hongling; de Sousa, Gil

    2015-08-10

    In recent years, IoT (Internet of Things) technologies have seen great advances, particularly, the IPv6 Routing Protocol for Low-power and Lossy Networks (RPL), which provides a powerful and flexible routing framework that can be applied in a variety of application scenarios. In this context, as an important role of IoT, Wireless Sensor Networks (WSNs) can utilize RPL to design efficient routing protocols for a specific application to increase the ubiquity of networks with resource-constrained WSN nodes that are low-cost and easy to deploy. In this article, our work starts with the description of Agricultural Low-power and Lossy Networks (A-LLNs) complying with the LLN framework, and to clarify the requirements of this application-oriented routing solution. After a brief review of existing optimization techniques for RPL, our contribution is dedicated to a Scalable Context-Aware Objective Function (SCAOF) that can adapt RPL to the environmental monitoring of A-LLNs, through combining energy-aware, reliability-aware, robustness-aware and resource-aware contexts according to the composite routing metrics approach. The correct behavior of this enhanced RPL version (RPAL) was verified by performance evaluations on both simulation and field tests. The obtained experimental results confirm that SCAOF can deliver the desired advantages on network lifetime extension, and high reliability and efficiency in different simulation scenarios and hardware testbeds.

  19. A Scalable Context-Aware Objective Function (SCAOF) of Routing Protocol for Agricultural Low-Power and Lossy Networks (RPAL)

    PubMed Central

    Chen, Yibo; Chanet, Jean-Pierre; Hou, Kun-Mean; Shi, Hongling; de Sousa, Gil

    2015-01-01

    In recent years, IoT (Internet of Things) technologies have seen great advances, particularly, the IPv6 Routing Protocol for Low-power and Lossy Networks (RPL), which provides a powerful and flexible routing framework that can be applied in a variety of application scenarios. In this context, as an important role of IoT, Wireless Sensor Networks (WSNs) can utilize RPL to design efficient routing protocols for a specific application to increase the ubiquity of networks with resource-constrained WSN nodes that are low-cost and easy to deploy. In this article, our work starts with the description of Agricultural Low-power and Lossy Networks (A-LLNs) complying with the LLN framework, and to clarify the requirements of this application-oriented routing solution. After a brief review of existing optimization techniques for RPL, our contribution is dedicated to a Scalable Context-Aware Objective Function (SCAOF) that can adapt RPL to the environmental monitoring of A-LLNs, through combining energy-aware, reliability-aware, robustness-aware and resource-aware contexts according to the composite routing metrics approach. The correct behavior of this enhanced RPL version (RPAL) was verified by performance evaluations on both simulation and field tests. The obtained experimental results confirm that SCAOF can deliver the desired advantages on network lifetime extension, and high reliability and efficiency in different simulation scenarios and hardware testbeds. PMID:26266411

  20. Firewall Traversal for CORBA Applications Using an Implementation of Bidirectional IIOP in MICO

    NASA Technical Reports Server (NTRS)

    Griffin, Robert I.; Lopez, Isaac (Technical Monitor)

    2002-01-01

    The Object Management Group (OMG) has added specifications to the General Inter-ORB Protocol (GIOP 1.2), specifically the Internet Inter-ORB Protocol (IIOP 1.2), that allow servers and clients on opposing sides of a firewall to reverse roles and still communicate freely. This addition to the GIOP specifications is referred to as Bidirectional GIOP. The implementation of these specifications as applied to communication over TCP/IP connections is referred to as 'Bidirectional Internet Inter-ORB Protocol' or BiDirIIOP. This paper details the implementation and testing of the BiDirIIOP Specification in an open source ORB, MICO, that did not previously support Bidirectional GIOP. It also provides simple contextual information and a description of the OMG GIOP/IIOP messaging protocols.

  1. Internet-Related Disorders: Development of the Short Compulsive Internet Use Scale.

    PubMed

    Besser, Bettina; Rumpf, Hans-Jürgen; Bischof, Anja; Meerkerk, Gert-Jan; Higuchi, Susumu; Bischof, Gallus

    2017-11-01

    The addiction treatment system only reaches a small number of individuals suffering from Internet-related disorders. Therefore, it is important to improve case detection for preventive measures and brief interventions. Existing screening instruments are often time-consuming and rarely validated using clinical criteria. The aim of this study is to develop an optimized short screening for problematic Internet use and Internet addiction (IA). A regression analysis was conducted in random subsamples of a merged sample (N = 3,040; N = 1,209) to examine the item performance of the Compulsive Internet Use Scale (CIUS). Based on the results, a short version of the CIUS was developed and compared with the original CIUS. A fully structured diagnostic interview, covering the Diagnostic and Statistical Manual of Mental Disorders, Fifth Edition (DSM-5) criteria for the Internet gaming disorder with a broader focus on all Internet activities, was conducted. A five-item version of the short screening performed best across the samples. Comparing the area under the curve (AUC) of the receiver operating characteristic between the Short CIUS and the original test revealed no significant difference (AUC = 0.968; 0.977). A cutoff point of 7 turned out to perform best for case detection and yielded a sensitivity of 0.95 and a specificity of 0.87, Cronbach's alpha was 0.77. The analysis showed that the performance of the Short CIUS is just as good in detecting problematical Internet use and IA as the performance of the original CIUS. The Short CIUS provides an economical and valid instrument for the assessment of problematic Internet use and IA.

  2. IoT real time data acquisition using MQTT protocol

    NASA Astrophysics Data System (ADS)

    Atmoko, R. A.; Riantini, R.; Hasin, M. K.

    2017-05-01

    The Internet of Things (IoT) provides ease to monitor and to gain sensor data through the Internet [1]. The need of high quality data is increasing to the extent that data monitoring and acquisition system in real time is required, such as smart city or telediagnostic in medical areas [2]. Therefore, an appropriate communication protocol is required to resolve these problems. Lately, researchers have developed a lot of communication protocols for IoT, of which each has advantages and disadvantages. This study proposes the utilization of MQTT as a communication protocol, which is one of data communication protocols for IoT. This study used temperature and humidity sensors because the physical parameters are often needed as parameters of environment condition [3]. Data acquisition was done in real-time and stored in MySQL database. This study is also completed by interface web-based and mobile for online monitoring. This result of this study is the enhancement of data quality and reliability using MQTT protocol.

  3. Depression Awareness and Self-Management Through the Internet: Protocol for an Internationally Standardized Approach

    PubMed Central

    Koburger, Nicole; Larkin, Celine; Karwig, Gillian; Coffey, Claire; Maxwell, Margaret; Harris, Fiona; Rummel-Kluge, Christine; van Audenhove, Chantal; Sisask, Merike; Alexandrova-Karamanova, Anna; Perez, Victor; Purebl, György; Cebria, Annabel; Palao, Diego; Costa, Susana; Mark, Lauraliisa; Tóth, Mónika Ditta; Gecheva, Marieta; Ibelshäuser, Angela; Gusmão, Ricardo; Hegerl, Ulrich

    2015-01-01

    Background Depression incurs significant morbidity and confers increased risk of suicide. Many individuals experiencing depression remain untreated due to systemic and personal barriers to care. Guided Internet-based psychotherapeutic programs represent a promising means of overcoming such barriers and increasing the capacity for self-management of depression. However, existing programs tend to be available only in English and can be expensive to access. Furthermore, despite evidence of the effectiveness of a number of Internet-based programs, there is limited evidence regarding both the acceptability of such programs and feasibility of their use, for users and health care professionals. Objective This paper will present the protocol for the development, implementation, and evaluation of the iFightDepression tool, an Internet-based self-management tool. This is a cost-free, multilingual, guided, self-management program for mild to moderate depression cases. Methods The Preventing Depression and Improving Awareness through Networking in the European Union consortium undertook a comprehensive systematic review of the available evidence regarding computerized cognitive behavior therapy in addition to a consensus process involving mental health experts and service users to inform the development of the iFightDepression tool. The tool was implemented and evaluated for acceptability and feasibility of its use in a pilot phase in 5 European regions, with recruitment of users occurring through general practitioners and health care professionals who participated in a standardized training program. Results Targeting mild to moderate depression, the iFightDepression tool is based on cognitive behavioral therapy and addresses behavioral activation (monitoring and planning daily activities), cognitive restructuring (identifying and challenging unhelpful thoughts), sleep regulation, mood monitoring, and healthy lifestyle habits. There is also a tailored version of the tool for young people, incorporating less formal language and additional age-appropriate modules on relationships and social anxiety. The tool is accompanied by a 3-hour training intervention for health care professionals. Conclusions It is intended that the iFightDepression tool and associated training for health care professionals will represent a valuable resource for the management of depression that will complement existing resources for health care professionals. It is also intended that the iFightDepression tool and training will represent an additional resource within a multifaceted approach to improving the care of depression and preventing suicidal behavior in Europe. PMID:26251104

  4. Science and Technology Undergraduate Students' Use of the Internet, Cell Phones and Social Networking Sites to Access Library Information

    ERIC Educational Resources Information Center

    Salisbury, Lutishoor; Laincz, Jozef; Smith, Jeremy J.

    2012-01-01

    Many academic libraries and publishers have developed mobile-optimized versions of their web sites and catalogs. Almost all database vendors and major journal publishers have provided a way to connect to their resources via the Internet and the mobile web. In light of this pervasive use of the Internet, mobile devices and social networking, this…

  5. Design and Implementation of Online Communities

    DTIC Science & Technology

    2001-09-01

    online community. In reality, the first online community predates even the ARPANET by over 100 years. The first “netizens” communicated on the 19th ...Century’s version of the Internet, which Tom Standage calls “The Victorian Internet” (Standage, 1998). The Victorian Internet was actually the...network of networks extending throughout much of the world. The similarities don’t stop there. The Victorian Internet spawned an extensive online

  6. Internet Access to Spacecraft

    NASA Technical Reports Server (NTRS)

    Rash, James; Parise, Ron; Hogie, Keith; Criscuolo, Ed; Langston, Jim; Jackson, Chris; Price, Harold; Powers, Edward I. (Technical Monitor)

    2000-01-01

    The Operating Missions as Nodes on the Internet (OMNI) project at NASA's Goddard Space flight Center (GSFC), is demonstrating the use of standard Internet protocols for spacecraft communication systems. This year, demonstrations of Internet access to a flying spacecraft have been performed with the UoSAT-12 spacecraft owned and operated by Surrey Satellite Technology Ltd. (SSTL). Previously, demonstrations were performed using a ground satellite simulator and NASA's Tracking and Data Relay Satellite System (TDRSS). These activities are part of NASA's Space Operations Management Office (SOMO) Technology Program, The work is focused on defining the communication architecture for future NASA missions to support both NASA's "faster, better, cheaper" concept and to enable new types of collaborative science. The use of standard Internet communication technology for spacecraft simplifies design, supports initial integration and test across an IP based network, and enables direct communication between scientists and instruments as well as between different spacecraft, The most recent demonstrations consisted of uploading an Internet Protocol (IP) software stack to the UoSAT- 12 spacecraft, simple modifications to the SSTL ground station, and a series of tests to measure performance of various Internet applications. The spacecraft was reconfigured on orbit at very low cost. The total period between concept and the first tests was only 3 months. The tests included basic network connectivity (PING), automated clock synchronization (NTP), and reliable file transfers (FTP). Future tests are planned to include additional protocols such as Mobile IP, e-mail, and virtual private networks (VPN) to enable automated, operational spacecraft communication networks. The work performed and results of the initial phase of tests are summarized in this paper. This work is funded and directed by NASA/GSFC with technical leadership by CSC in arrangement with SSTL, and Vytek Wireless.

  7. Designing a Virtual Classroom for Distance Learning Students through the Internet.

    ERIC Educational Resources Information Center

    Bradshaw, Allen

    Advantages to using the Internet to deliver instruction include the fact that Hypertext Markup Language (HTML) can be accessed on any computer, broadening the student base to anyone with an Internet browser and a PPP (Point-to-Point Protocol) account. In addition, instructions, lectures, and examples can be linked together for use as students need…

  8. Searching Internet Archive Sites with Archie: Why, What, Where, and How.

    ERIC Educational Resources Information Center

    Simmonds, Curtis

    1993-01-01

    Describes Archie, an online catalog of electronic holdings of anonymous FTP (File Transfer Protocol) archive sites on the Internet. Accessing Archie through e-mail and using it in a telnet session are discussed. The Internet Gopher and Whatis, which can be used with Archie, are also explained, and search examples are included. (four references)…

  9. Robust Multi-unit Auction Protocol against False-name Bids

    NASA Astrophysics Data System (ADS)

    Yokoo, Makoto; Sakurai, Yuko; Matsubara, Shigeo

    This paper presents a new multi-unit auction protocol (IR protocol) that is robust against false-name bids. Internet auctions have become an integral part of Electronic Commerce and a promising field for applying agent and Artificial Intelligence technologies. Although the Internet provides an excellent infrastructure for executing auctions, the possibility of a new type of cheating called false-name bids has been pointed out. A false-name bid is a bid submitted under a fictitious name. A protocol called LDS has been developed for combinatorial auctions of multiple different items and has proven to be robust against false-name bids. Although we can modify the LDS protocol to handle multi-unit auctions, in which multiple units of an identical item are auctioned, the protocol is complicated and requires the auctioneer to carefully pre-determine the combination of bundles to obtain a high social surplus or revenue. For the auctioneer, our newly developed IR protocol is easier to use than the LDS, since the combination of bundles is automatically determined in a flexible manner according to the declared evaluation values of agents. The evaluation results show that the IR protocol can obtain a better social surplus than that obtained by the LDS protocol.

  10. Association Among Internet Usage, Body Image and Eating Behaviors of Secondary School Students

    PubMed Central

    KAEWPRADUB, Natthakarn; KIATRUNGRIT, Komsan; HONGSANGUANSRI, Sirichai; PAVASUTHIPAISIT, Chosita

    2017-01-01

    Background Presently, the internet plays a big role in daily life, especially for adolescents. In this age group, they are more concerned about their face and body shape. Despite the numerous studies on the effect traditional media has on body image, very few have focused on the effect of newer forms of media (e.g. online media). And almost none have looked at the relationship between time spent online and body image. Aim To study the associations between time spent on the internet, body image satisfaction and eating behaviors of students grades 7 to 12 in the Thai educational system. Methods The sample group included 620 students, who were selected using simple random sampling from 6 secondary schools in Bangkok. Data were collected using the Media and Internet use behavior questionnaires, The Body-Esteem Scale for Adolescents and Adults: Thai version (BESAA), Drive for Muscularity Scale (DMS: males only), The Rosenberg Self-Esteem Scale: Thai version, Eating Attitude Test-26: Thai version (EAT-26) and the eating behaviors at risk of obesity questionnaire. Results Mean (sd) age of the sample was 15.7 (1.9) years, 246 participants (39.7%) were male and 374 (60.3%) were female. Using the internet and social networks for content related to body image and eating behaviors, was negatively associated with body image satisfaction but positively associated with inappropriate eating attitudes/behaviors, binging, purging, use of laxatives/diuretics and drive for muscularity with respect to behaviors and attitudes, and was associated with eating behaviors that carried a risk for obesity. Conclusions Time spent on internet, especially engaged in activities related to self-image, and eating attitudes and behaviors, were associated with a decrease in body image satisfaction and problematic eating behaviors. PMID:28955140

  11. Association Among Internet Usage, Body Image and Eating Behaviors of Secondary School Students.

    PubMed

    Kaewpradub, Natthakarn; Kiatrungrit, Komsan; Hongsanguansri, Sirichai; Pavasuthipaisit, Chosita

    2017-08-25

    Presently, the internet plays a big role in daily life, especially for adolescents. In this age group, they are more concerned about their face and body shape. Despite the numerous studies on the effect traditional media has on body image, very few have focused on the effect of newer forms of media (e.g. online media). And almost none have looked at the relationship between time spent online and body image. To study the associations between time spent on the internet, body image satisfaction and eating behaviors of students grades 7 to 12 in the Thai educational system. The sample group included 620 students, who were selected using simple random sampling from 6 secondary schools in Bangkok. Data were collected using the Media and Internet use behavior questionnaires, The Body-Esteem Scale for Adolescents and Adults: Thai version (BESAA), Drive for Muscularity Scale (DMS: males only), The Rosenberg Self-Esteem Scale: Thai version, Eating Attitude Test-26: Thai version (EAT-26) and the eating behaviors at risk of obesity questionnaire. Mean (sd) age of the sample was 15.7 (1.9) years, 246 participants (39.7%) were male and 374 (60.3%) were female. Using the internet and social networks for content related to body image and eating behaviors, was negatively associated with body image satisfaction but positively associated with inappropriate eating attitudes/behaviors, binging, purging, use of laxatives/diuretics and drive for muscularity with respect to behaviors and attitudes, and was associated with eating behaviors that carried a risk for obesity. Time spent on internet, especially engaged in activities related to self-image, and eating attitudes and behaviors, were associated with a decrease in body image satisfaction and problematic eating behaviors.

  12. SEnviro: a sensorized platform proposal using open hardware and open standards.

    PubMed

    Trilles, Sergio; Luján, Alejandro; Belmonte, Óscar; Montoliu, Raúl; Torres-Sospedra, Joaquín; Huerta, Joaquín

    2015-03-06

    The need for constant monitoring of environmental conditions has produced an increase in the development of wireless sensor networks (WSN). The drive towards smart cities has produced the need for smart sensors to be able to monitor what is happening in our cities. This, combined with the decrease in hardware component prices and the increase in the popularity of open hardware, has favored the deployment of sensor networks based on open hardware. The new trends in Internet Protocol (IP) communication between sensor nodes allow sensor access via the Internet, turning them into smart objects (Internet of Things and Web of Things). Currently, WSNs provide data in different formats. There is a lack of communication protocol standardization, which turns into interoperability issues when connecting different sensor networks or even when connecting different sensor nodes within the same network. This work presents a sensorized platform proposal that adheres to the principles of the Internet of Things and theWeb of Things. Wireless sensor nodes were built using open hardware solutions, and communications rely on the HTTP/IP Internet protocols. The Open Geospatial Consortium (OGC) SensorThings API candidate standard was used as a neutral format to avoid interoperability issues. An environmental WSN developed following the proposed architecture was built as a proof of concept. Details on how to build each node and a study regarding energy concerns are presented.

  13. Internet Protocol Enhanced over Satellite Networks

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    1999-01-01

    Extensive research conducted by the Satellite Networks and Architectures Branch of the NASA Lewis Research Center led to an experimental change to the Internet's Transmission Control Protocol (TCP) that will increase performance over satellite channels. The change raises the size of the initial burst of data TCP can send from 1 packet to 4 packets or roughly 4 kilobytes (kB), whichever is less. TCP is used daily by everyone on the Internet for e-mail and World Wide Web access, as well as other services. TCP is one of the feature protocols used in computer communications for reliable data delivery and file transfer. Increasing TCP's initial data burst from the previously specified single segment to approximately 4 kB may improve data transfer rates by up to 27 percent for very small files. This is significant because most file transfers in wide-area networks today are small files, 4 kilobytes or less. In addition, because data transfers over geostationary satellites can take 5 to 20 times longer than over typical terrestrial connections, increasing the initial burst of data that can be sent is extremely important. This research along with research from other institutions has led to the release of two new Request for Comments from the Internet Engineering Task Force (IETF, the international body that sets Internet standards). In addition, two studies of the implications of this mechanism were also funded by NASA Lewis.

  14. SEnviro: A Sensorized Platform Proposal Using Open Hardware and Open Standards

    PubMed Central

    Trilles, Sergio; Luján, Alejandro; Belmonte, Óscar; Montoliu, Raúl; Torres-Sospedra, Joaquín; Huerta, Joaquín

    2015-01-01

    The need for constant monitoring of environmental conditions has produced an increase in the development of wireless sensor networks (WSN). The drive towards smart cities has produced the need for smart sensors to be able to monitor what is happening in our cities. This, combined with the decrease in hardware component prices and the increase in the popularity of open hardware, has favored the deployment of sensor networks based on open hardware. The new trends in Internet Protocol (IP) communication between sensor nodes allow sensor access via the Internet, turning them into smart objects (Internet of Things and Web of Things). Currently, WSNs provide data in different formats. There is a lack of communication protocol standardization, which turns into interoperability issues when connecting different sensor networks or even when connecting different sensor nodes within the same network. This work presents a sensorized platform proposal that adheres to the principles of the Internet of Things and the Web of Things. Wireless sensor nodes were built using open hardware solutions, and communications rely on the HTTP/IP Internet protocols. The Open Geospatial Consortium (OGC) SensorThings API candidate standard was used as a neutral format to avoid interoperability issues. An environmental WSN developed following the proposed architecture was built as a proof of concept. Details on how to build each node and a study regarding energy concerns are presented. PMID:25756864

  15. The design of the m-health service application using a Nintendo DS game console.

    PubMed

    Lee, Sangjoon; Kim, Jungkuk; Lee, Myoungho

    2011-03-01

    In this article, we developed an m-health monitoring system using a Nintendo DS game console to demonstrate its utility. The proposed system consists of a biosignal acquisition device, wireless sensor network, base-station for signal reception from the sensor network and signal conversion according to Internet protocol, personal computer display program, and the Nintendo DS game console. The system collects three-channel electrocardiogram (ECG) signals for cardiac abnormality detection and three-axis accelerometer signals for fall detection of a person. The collected signals are then transmitted to the base-station through the wireless sensor network, where they are transformed according to the transmission control protocol/Internet protocol (TCP/IP) and sent to the destination IP through Internet network. To test the developed system, the collected signals were displayed on a computer located in different building through wired Internet network and also simultaneously displayed on the Nintendo DS game console connected to Internet network wirelessly. The system was able to collect and transmit signals for more than 24 h without any interruptions or malfunctions, showing the possibility of integrating healthcare monitoring functions into a small handheld-type electronic device developed for different purposes without significant complications. It is expected that the system can be used in an ambulance, nursing home, or general hospital where efficient patient monitoring from long distance is necessary.

  16. A Public-Key Based Authentication and Key Establishment Protocol Coupled with a Client Puzzle.

    ERIC Educational Resources Information Center

    Lee, M. C.; Fung, Chun-Kan

    2003-01-01

    Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…

  17. The 10 Hottest Technologies in Telecom.

    ERIC Educational Resources Information Center

    Flanagan, Patrick

    1997-01-01

    Presents the fourth annual listing of the 10 "hottest" telecommunications technologies. Describes Web broadcasting, remote-access servers, extranets, Internet telephony, enterprise network directory services, Web site management tools, IP (Internet Protocols) switching, wavelength division multiplexing, digital subscriber lines, and…

  18. Psychometric properties of the Internet Addiction Test in Turkish

    PubMed Central

    Kaya, Fatih; Delen, Erhan; Young, Kimberly S.

    2016-01-01

    Background and aims In this study, the Internet Addiction Test (IAT) was adapted to Turkish language, which was originally developed by Young (1998) in English to measure the presence and severity of the Internet dependency. The main purpose was to ensure that the psychometric features and the factor structure of the test were suitable for Turkish university students. Method The study was conducted in two sequent phases. Participants were 990 undergraduate students from several public universities in Turkey. Results In the first phase, an exploratory factor analysis (EFA) was applied to figure out the factor structure of the Turkish version of the IAT. The EFA revealed four factors, which explained 46.02% of the total variance. In the following phase, a confirmatory factor analysis (CFA) was conducted with a different sample, to verify the factor structure that was found in the initial EFA. The CFA resulted four-factor model was satisfactory for the Turkish version of the IAT. These four factors were named as Mood, Relationship, Responsibilities, and Duration. Conclusions Based on the findings, the administration of Turkish version of the IAT provided acceptable results on undergraduate students. PMID:28092191

  19. History, structure, and function of the Internet.

    PubMed

    Glowniak, J

    1998-04-01

    The Internet stands at the forefront of telecommunications in medicine. This worldwide system of computers had its beginnings in networking projects in the United States and western Europe in the 1960s and 1970s. The precursor of the Internet was ARPANET, a long-distance telecommunication network funded by the Department of Defense that linked together computers throughout the United States. In the 1980s, ARPANET was superseded by NSFNET, a series of networks created by the National Science Foundation, which established the present-day structure of the Internet. The physical structure of the Internet resembles and is integrated with the telephone system. Long-distance data transport services are provided by large telecommunication companies, called network service providers (NSPs), through high-capacity, high-speed national and international fiber optic cables. These transport services are accessed through Internet service providers, ISPs. ISPs, the equivalent of regional Bell operating companies, provide the physical link to the NSPs for individuals and organizations. Telecommunications on the Internet are standardized by a set of communications protocols, the TCP/IP protocol suite, that describe routing of messages over the Internet, computer naming conventions, and commonly used Internet services such as e-mail. At present, the Internet consists of over 20 million computer worldwide and is continuing to grow at a rapid rate. Along with the growth of the Internet, higher speed access methods are offering a range of new services such as real-time video and voice communications. Medical education, teaching, and research, as well as clinical practice, will be affected in numerous different ways by these advances.

  20. A Lightweight Continuous Authentication Protocol for the Internet of Things

    PubMed Central

    Chuang, Yo-Hsuan; Yang, Cheng-Ying; Tang, Ssu-Wei

    2018-01-01

    Modern societies are moving toward an information-oriented environment. To gather and utilize information around people’s modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments. PMID:29621168

  1. Low-earth-orbit Satellite Internet Protocol Communications Concept and Design

    NASA Technical Reports Server (NTRS)

    Slywezak, Richard A.

    2004-01-01

    This report presents a design concept for a low-Earth-orbit end-to-end Internet-Protocol- (IP-) based mission. The goal is to maintain an up-to-date communications infrastructure that makes communications seamless with the protocols used in terrestrial computing. It is based on the premise that the use of IPs will permit greater interoperability while also reducing costs and providing users the ability to retrieve data directly from the satellite. However, implementing an IP-based solution also has a number of challenges, since wireless communications have different characteristics than wired communications. This report outlines the design of a low-Earth-orbit end-to-end IP-based mission; the ideas and concepts of Space Internet architectures and networks are beyond the scope of this document. The findings of this report show that an IP-based mission is plausible and would provide benefits to the user community, but the outstanding issues must be resolved before a design can be implemented.

  2. DWTP: a basis for networked VR on the Internet

    NASA Astrophysics Data System (ADS)

    Broll, Wolfgang; Schick, Daniel

    1998-04-01

    Shared virtual worlds are one of today's major research topics. While limited to particular application areas and high speed networks in the past, they become more and more available to a large number of users. One reason for this development was the introduction of VRML (the Virtual Reality Modeling Language), which has been established as a standard of the exchange of 3D worlds on the Internet. Although a number of prototype systems have been developed to realize shared multi-user worlds based on VRML, no suitable network protocol to support the demands of such environments has yet been established. In this paper we will introduce our approach of a network protocol for shared virtual environments: DWTP--the Distributed Worlds Transfer and communication Protocol. We will show how DWTP meets the demands of shared virtual environments on the Internet. We will further present SmallView, our prototype of a distributed multi-user VR system, to show how DWTP can be used to realize shared worlds.

  3. Research Networks and Technology Migration (RESNETSII)

    DTIC Science & Technology

    2004-07-01

    Laboratory (LBNL), The International Computer Science Institute (ICSI) Center for Internet Research (ICIR) DARWIN Developing protocols and...degradation in network loss, delay and throughput AT&T Center for Internet Research at ICSI (ACIRI), AT&T Labs-Research, University Of Massachusetts

  4. Operating CFDP in the Interplanetary Internet

    NASA Technical Reports Server (NTRS)

    Burleigh, S.

    2002-01-01

    This paper examines the design elements of CCSDS File Delivery Protocol and Interplanetary Internet technologies that will simplify their integration and discusses the resulting new capabilities, such as efficient transmission of large files via multiple relay satellites operating in parallel.

  5. Adding tools to the open source toolbox: The Internet

    NASA Technical Reports Server (NTRS)

    Porth, Tricia

    1994-01-01

    The Internet offers researchers additional sources of information not easily available from traditional sources such as print volumes or commercial data bases. Internet tools such as e-mail and file transfer protocol (ftp) speed up the way researchers communicate and transmit data. Mosaic, one of the newest additions to the Internet toolbox, allows users to combine tools such as ftp, gopher, wide area information server, and the world wide web with multimedia capabilities. Mosaic has quickly become a popular means of making information available on the Internet because it is versatile and easily customizable.

  6. M/A-COM linkabit eastern operations

    NASA Astrophysics Data System (ADS)

    Mills, D. L.; Avramovic, Z.

    1983-03-01

    This first Quarterly Project Report on LINKABIT's contribution to the Defense Advanced Research Projects Agency (DARPA) Internet Program covers the period from 22 December 1982 through 21 March 1983. LINKABIT's support of the Internet Program is concentrated in the areas of protocol design, implementation, testing, and evaluation. In addition, LINKABIT staff are providing integration and support services for certain computer systems to be installed at DARPA sites in Washington, D.C., and Stuttgart, West Germany. During the period covered by this report, LINKABIT organized the project activities and established staff responsibilities. Several computers and peripheral devices were made available from Government sources for use in protocol development and network testing. Considerable time was devoted to installing this equipment, integrating the software, and testing it with the Internet system.

  7. Internet cognitive testing of large samples needed in genetic research.

    PubMed

    Haworth, Claire M A; Harlaar, Nicole; Kovas, Yulia; Davis, Oliver S P; Oliver, Bonamy R; Hayiou-Thomas, Marianna E; Frances, Jane; Busfield, Patricia; McMillan, Andrew; Dale, Philip S; Plomin, Robert

    2007-08-01

    Quantitative and molecular genetic research requires large samples to provide adequate statistical power, but it is expensive to test large samples in person, especially when the participants are widely distributed geographically. Increasing access to inexpensive and fast Internet connections makes it possible to test large samples efficiently and economically online. Reliability and validity of Internet testing for cognitive ability have not been previously reported; these issues are especially pertinent for testing children. We developed Internet versions of reading, language, mathematics and general cognitive ability tests and investigated their reliability and validity for 10- and 12-year-old children. We tested online more than 2500 pairs of 10-year-old twins and compared their scores to similar internet-based measures administered online to a subsample of the children when they were 12 years old (> 759 pairs). Within 3 months of the online testing at 12 years, we administered standard paper and pencil versions of the reading and mathematics tests in person to 30 children (15 pairs of twins). Scores on Internet-based measures at 10 and 12 years correlated .63 on average across the two years, suggesting substantial stability and high reliability. Correlations of about .80 between Internet measures and in-person testing suggest excellent validity. In addition, the comparison of the internet-based measures to ratings from teachers based on criteria from the UK National Curriculum suggests good concurrent validity for these tests. We conclude that Internet testing can be reliable and valid for collecting cognitive test data on large samples even for children as young as 10 years.

  8. Internet Technology for Future Space Missions

    NASA Technical Reports Server (NTRS)

    Hennessy, Joseph F. (Technical Monitor); Rash, James; Casasanta, Ralph; Hogie, Keith

    2002-01-01

    Ongoing work at National Aeronautics and Space Administration Goddard Space Flight Center (NASA/GSFC), seeks to apply standard Internet applications and protocols to meet the technology challenge of future satellite missions. Internet protocols and technologies are under study as a future means to provide seamless dynamic communication among heterogeneous instruments, spacecraft, ground stations, constellations of spacecraft, and science investigators. The primary objective is to design and demonstrate in the laboratory the automated end-to-end transport of files in a simulated dynamic space environment using off-the-shelf, low-cost, commodity-level standard applications and protocols. The demonstrated functions and capabilities will become increasingly significant in the years to come as both earth and space science missions fly more sensors and the present labor-intensive, mission-specific techniques for processing and routing data become prohibitively. This paper describes how an IP-based communication architecture can support all existing operations concepts and how it will enable some new and complex communication and science concepts. The authors identify specific end-to-end data flows from the instruments to the control centers and scientists, and then describe how each data flow can be supported using standard Internet protocols and applications. The scenarios include normal data downlink and command uplink as well as recovery scenarios for both onboard and ground failures. The scenarios are based on an Earth orbiting spacecraft with downlink data rates from 300 Kbps to 4 Mbps. Included examples are based on designs currently being investigated for potential use by the Global Precipitation Measurement (GPM) mission.

  9. HotJava: Sun's Animated Interactive World Wide Web Browser for the Internet.

    ERIC Educational Resources Information Center

    Machovec, George S., Ed.

    1995-01-01

    Examines HotJava and Java, World Wide Web technology for use on the Internet. HotJava, an interactive, animated Web browser, based on the object-oriented Java programming language, is different from HTML-based browsers such as Netscape. Its client/server design does not understand Internet protocols but can dynamically find what it needs to know.…

  10. Privacy & Security Notice | Argonne National Laboratory

    Science.gov Websites

    server logs: The Internet Protocol (IP) address of the domain from which you access the Internet (i.e service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to . 123.456.789.012) whether yours individually or provided as a proxy by your Internet Service Provider (ISP), The

  11. Continued Development of Internet Protocols under the IBM OS/MVS operating System

    DTIC Science & Technology

    1986-03-10

    this contract, the UCLA Office of Academic Computing (OAC) continued its participation in the Internet research effort of * DARPA. OAC’s effort has...is adapted and condensed from TR51. 1.2 NAME RESOLVER The Internet research community is installing a system of name resolvers and name servers...several attributes favoring their use within the ACP. • The "C" language is heavily used within the DARPA Internet research community, giving it an

  12. Java: An Explosion on the Internet.

    ERIC Educational Resources Information Center

    Read, Tim; Hall, Hazel

    Summer 1995 saw the release, with considerable media attention, of draft versions of Sun Microsystems' Java computer programming language and the HotJava browser. Java has been heralded as the latest "killer" technology in the Internet explosion. Sun Microsystems and numerous companies including Microsoft, IBM, and Netscape have agreed…

  13. Integrated Service Provisioning in an Ipv6 over ATM Research Network

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Eli Dart; Helen Chen; Jerry Friesen

    1999-02-01

    During the past few years, the worldwide Internet has grown at a phenomenal rate, which has spurred the proposal of innovative network technologies to support the fast, efficient and low-latency transport of a wide spectrum of multimedia traffic types. Existing network infrastructures have been plagued by their inability to provide for real-time application traffic as well as their general lack of resources and resilience to congestion. This work proposes to address these issues by implementing a prototype high-speed network infrastructure consisting of Internet Protocol Version 6 (IPv6) on top of an Asynchronous Transfer Mode (ATM) transport medium. Since ATM ismore » connection-oriented whereas IP uses a connection-less paradigm, the efficient integration of IPv6 over ATM is especially challenging and has generated much interest in the research community. We propose, in collaboration with an industry partner, to implement IPv6 over ATM using a unique approach that integrates IP over fast A TM hardware while still preserving IP's connection-less paradigm. This is achieved by replacing ATM's control software with IP's routing code and by caching IP's forwarding decisions in ATM's VPI/VCI translation tables. Prototype ''VR'' and distributed-parallel-computing applications will also be developed to exercise the realtime capability of our IPv6 over ATM network.« less

  14. Easy Online Access to Helpful Internet Guides.

    ERIC Educational Resources Information Center

    Tuss, Joan

    1993-01-01

    Lists recommended guides to the Internet that are available electronically. Basic commands needed to use anonymous ftp (file transfer protocol) are explained. An annotation and command formats to access, scan, retrieve, and exit each file are included for 11 titles. (EAM)

  15. Architectural and engineering issues for building an optical Internet

    NASA Astrophysics Data System (ADS)

    St. Arnaud, Bill

    1998-10-01

    Recent developments in high density Wave Division Multiplexing fiber systems allows for the deployment of a dedicated optical Internet network for large volume backbone pipes that does not require an underlying multi-service SONET/SDH and ATM transport protocol. Some intrinsic characteristics of Internet traffic such as its self similar nature, server bound congestion, routing and data asymmetry allow for highly optimized traffic engineered networks using individual wavelengths. By transmitting GigaBit Ethernet or SONET/SDH frames natively over WDM wavelengths that directly interconnect high performance routers the original concept of the Internet as an intrinsically survivable datagram network is possible. Traffic engineering, restoral, protection and bandwidth management of the network must now be carried out at the IP layer and so new routing or switching protocols such as MPLS that allow for uni- directional paths with fast restoral and protection at the IP layer become essential for a reliable production network. The deployment of high density WDM municipal and campus networks also gives carriers and ISPs the flexibility to offer customers as integrated and seamless set of optical Internet services.

  16. Validation of the Arabic Version of the Internet Gaming Disorder-20 Test.

    PubMed

    Hawi, Nazir S; Samaha, Maya

    2017-04-01

    In recent years, researchers have been trying to shed light on gaming addiction and its association with different psychiatric disorders and psychological determinants. The latest edition version of the American Psychiatric Association's Diagnostic and Statistical Manual of Mental Disorders, Fifth Edition (DSM-5) included in its Section 3 Internet Gaming Disorder (IGD) as a condition for further empirical study and proposed nine criteria for the diagnosis of IGD. The 20-item Internet Gaming Disorder (IGD-20) Test was developed as a valid and reliable tool to assess gaming addiction based on the nine criteria set by the DSM-5. The aim of this study is to validate an Arabic version of the IGD-20 Test. The Arabic version of IGD-20 will not only help in identifying Arabic-speaking pathological gamers but also stimulate cross-cultural studies that could contribute to an area in need of more research for insight and treatment. After a process of translation and back-translation and with the participation of a sizable sample of Arabic-speaking adolescents, the present study conducted a psychometric validation of the IGD-20 Test. Our confirmatory factor analysis showed the validity of the Arabic version of the IGD-20 Test. The one-factor model of the Arabic IGD-20 Test had very good psychometric properties, and it fitted the sample data extremely well. In addition, correlation analysis between the IGD-20 Test and the daily duration on weekdays and weekends gameplay revealed significant positive relationships that warranted a criterion-related validation. Thus, the Arabic version of the IGD-20 Test is a valid and reliable measure of IGD among Arabic-speaking populations.

  17. Development of Virtual Resource Based IoT Proxy for Bridging Heterogeneous Web Services in IoT Networks.

    PubMed

    Jin, Wenquan; Kim, DoHyeun

    2018-05-26

    The Internet of Things is comprised of heterogeneous devices, applications, and platforms using multiple communication technologies to connect the Internet for providing seamless services ubiquitously. With the requirement of developing Internet of Things products, many protocols, program libraries, frameworks, and standard specifications have been proposed. Therefore, providing a consistent interface to access services from those environments is difficult. Moreover, bridging the existing web services to sensor and actuator networks is also important for providing Internet of Things services in various industry domains. In this paper, an Internet of Things proxy is proposed that is based on virtual resources to bridge heterogeneous web services from the Internet to the Internet of Things network. The proxy enables clients to have transparent access to Internet of Things devices and web services in the network. The proxy is comprised of server and client to forward messages for different communication environments using the virtual resources which include the server for the message sender and the client for the message receiver. We design the proxy for the Open Connectivity Foundation network where the virtual resources are discovered by the clients as Open Connectivity Foundation resources. The virtual resources represent the resources which expose services in the Internet by web service providers. Although the services are provided by web service providers from the Internet, the client can access services using the consistent communication protocol in the Open Connectivity Foundation network. For discovering the resources to access services, the client also uses the consistent discovery interface to discover the Open Connectivity Foundation devices and virtual resources.

  18. 75 FR 36066 - Promise Neighborhoods Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-24

    ... official version of this document is the document published in the Federal Register. Free Internet access... Federal Relay Service, toll free, at 1-800-877-8339. Electronic Access to This Document: You can view this... Adobe Portable Document Format (PDF) on the Internet at the following site: http://www.ed.gov/news...

  19. Treatment of Internet Addiction with Anxiety Disorders: Treatment Protocol and Preliminary Before-After Results Involving Pharmacotherapy and Modified Cognitive Behavioral Therapy

    PubMed Central

    Santos, Hugo Henrique

    2016-01-01

    Background The growth of the Internet has led to significant change and has become an integral part of modern life. It has made life easier and provided innumerous benefits; however, excessive use has brought about the potential for addiction, leading to severe impairments in social, academic, financial, psychological, and work domains. Individuals addicted to the Internet usually have comorbid psychiatric disorders. Panic disorder (PD) and generalized anxiety disorder (GAD) are prevalent mental disorders, involving a great deal of damage in the patient’s life. Objective This open trial study describes a treatment protocol among 39 patients with anxiety disorders and Internet addiction (IA) involving pharmacotherapy and modified cognitive behavioral therapy (CBT). Methods Of the 39 patients, 25 were diagnosed with PD and 14 with GAD, in addition to Internet addiction. At screening, patients responded to the MINI 5.0, Hamilton Anxiety Rating Scale, Hamilton Depression Rating Scale, Clinical Global Impressions Scale, and the Young Internet Addiction Scale. At that time, IA was observed taking into consideration the IAT scale (cutoff score above 50), while anxiety disorders were diagnosed by a psychiatrist. Patients were forwarded for pharmacotherapy and a modified CBT protocol. Psychotherapy was conducted individually, once a week, over a period of 10 weeks, and results suggest that the treatment was effective for anxiety and Internet addiction. Results Before treatment, anxiety levels suggested severe anxiety, with an average score of 34.26 (SD 6.13); however, after treatment the mean score was 15.03 (SD 3.88) (P<.001). A significant improvement in mean Internet addiction scores was observed, from 67.67 (SD 7.69) before treatment, showing problematic internet use, to 37.56 (SD 9.32) after treatment (P<.001), indicating medium Internet use. With respect to the relationship between IA and anxiety, the correlation between scores was .724. Conclusions This study is the first research into IA treatment of a Brazilian population. The improvement was remarkable due to the complete engagement of patients in therapy, which contributed to the success of the treatment from a behavioral perspective, and gave patients the confidence to continue to manage Internet use in their lives. PMID:27005889

  20. AIB-OR: improving onion routing circuit construction using anonymous identity-based cryptosystems.

    PubMed

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet.

  1. AIB-OR: Improving Onion Routing Circuit Construction Using Anonymous Identity-Based Cryptosystems

    PubMed Central

    Wang, Changji; Shi, Dongyuan; Xu, Xilei

    2015-01-01

    The rapid growth of Internet applications has made communication anonymity an increasingly important or even indispensable security requirement. Onion routing has been employed as an infrastructure for anonymous communication over a public network, which provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. However, existing onion routing protocols usually exhibit poor performance due to repeated encryption operations. In this paper, we first present an improved anonymous multi-receiver identity-based encryption (AMRIBE) scheme, and an improved identity-based one-way anonymous key agreement (IBOWAKE) protocol. We then propose an efficient onion routing protocol named AIB-OR that provides provable security and strong anonymity. Our main approach is to use our improved AMRIBE scheme and improved IBOWAKE protocol in onion routing circuit construction. Compared with other onion routing protocols, AIB-OR provides high efficiency, scalability, strong anonymity and fault tolerance. Performance measurements from a prototype implementation show that our proposed AIB-OR can achieve high bandwidths and low latencies when deployed over the Internet. PMID:25815879

  2. Use of the Internet for educational applications in prosthodontics.

    PubMed

    van Putten, M C

    1996-08-01

    Internet is the common term for the information superhighway. The Internet has become a major information resource for educational, governmental, and business institutions. This article reviews the current operation of the Internet as a background for discussing educational opportunities for instruction in prosthodontics. Electronic mail, news groups, file transfer protocol, Gopher, and network navigators are discussed. The use of the World Wide Web for educational purposes by The Ohio State University College of Dentistry Department of Restorative and Prosthetic Dentistry is described.

  3. Telehematology: a pilot experience of cytological diagnosis of acute myeloid leukemia via the Internet. A GOELAMS study.

    PubMed

    Leymarie, Vincent; Flandrin, Georges; Noguera, Maria Elena; Leymarie, Florence; Lioure, Bruno; Daliphard, Sylvie

    2006-09-01

    Although modern communication technology is well developed, telehematology does not readily lend itself to practical laboratory use. Multicenter therapeutic protocols may offer preferential opportunities. The cytologists of the AML-2001 protocol established an innovative organization to demonstrate the reliability of the diagnostic assessment of acute myeloid leukemia through a rapid and decentralized exchange of information via the internet and to define the conditions optimizing expert diagnosis. Telediagnosis appears to be a powerful tool for cytological review and other issues.

  4. Validity of the Internet Addiction Test for Adolescents and Older Children (IAT-A): Tests of Measurement Invariance and Latent Mean Differences

    ERIC Educational Resources Information Center

    Teo, Timothy; Kam, Chester

    2014-01-01

    Following the call to ensure the validity of instruments used to assess users' level of Internet usage, this study examined the factor structure of the Internet Addiction Test-Adolescence version (IAT-A) when applied to a sample of young children in a multicultural society and assessed whether the items in the IAT-A were invariant by gender and,…

  5. Internet-based affect-focused psychodynamic therapy for social anxiety disorder: A randomized controlled trial with 2-year follow-up.

    PubMed

    Johansson, Robert; Hesslow, Thomas; Ljótsson, Brjánn; Jansson, Angelica; Jonsson, Lina; Färdig, Smilla; Karlsson, Josefine; Hesser, Hugo; Frederick, Ronald J; Lilliengren, Peter; Carlbring, Per; Andersson, Gerhard

    2017-12-01

    Social anxiety disorder (SAD) is associated with considerable individual suffering and societal costs. Although there is ample evidence for the efficacy of cognitive behavior therapy, recent studies suggest psychodynamic therapy may also be effective in treating SAD. Furthermore, Internet-based psychodynamic therapy (IPDT) has shown promising results for addressing mixed depression and anxiety disorders. However, no study has yet investigated the effects of IPDT specifically for SAD. This paper describes a randomized controlled trial testing the efficacy of a 10-week, affect-focused IPDT protocol for SAD, compared with a wait-list control group. Long-term effects were also estimated by collecting follow-up data, 6, 12, and 24 months after the end of therapy. A total of 72 individuals meeting diagnostic criteria for DSM-IV social anxiety disorder were included. The primary outcome was the self-report version of Liebowitz Social Anxiety Scale. Mixed model analyses using the full intention-to-treat sample revealed a significant interaction effect of group and time, suggesting a larger effect in the treatment group than in the wait-list control. A between-group effect size Cohen's d = 1.05 (95% [CI]: [0.62, 1.53]) was observed at termination. Treatment gains were maintained at the 2-year follow-up, as symptom levels in the treated group continued to decrease significantly. The findings suggest that Internet-based affect-focused psychodynamic therapy is a promising treatment for social anxiety disorder. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  6. O How Wondrous Is E-Mail!

    ERIC Educational Resources Information Center

    Buchanan, Larry

    1998-01-01

    Addresses the use of e-mail for communication and collaborative projects in schools. Discusses the effectiveness of an e-mail system based on a UNIX host; problems with POP (post office protocol) client programs; and the new Internet Mail Access Protocol (IMAP) which addresses most of the shortcomings of the POP protocol while keeping advantages…

  7. Secure Data Aggregation Protocol for M2M Communications

    DTIC Science & Technology

    2015-03-24

    networking and collaboration among various devices has experienced tremendous growth. To adapt to the trend, the concept of Internet of Things ( IoT ... IoTs ): Models, Algorithms, and Implementations, accepted Title: “Privacy-Preserving Time-Series Data Aggregation for Internet of Things ” Date...public release; distribution is unlimited. (5) Privacy-Preserving Time-Series Data Aggregation for Internet of Things Abstract In recent years, the

  8. Impact of VoIP and QoS on Open and Distance Learning

    ERIC Educational Resources Information Center

    Saxena, P. C.; Jasola, Sanjay; Sharma, Ramesh C.

    2006-01-01

    Voice over Internet Protocol (VoIP) is becoming a reality in many organizations. The potential for mobility in voice over wi-fi networks will derive demand for the technology. Wireless VoIP is poised to rival VoIP as an alternative telephony tool. Internet has been used to transport data in the form of packet. In the past, Internet did not support…

  9. New Web Server - the Java Version of Tempest - Produced

    NASA Technical Reports Server (NTRS)

    York, David W.; Ponyik, Joseph G.

    2000-01-01

    A new software design and development effort has produced a Java (Sun Microsystems, Inc.) version of the award-winning Tempest software (refs. 1 and 2). In 1999, the Embedded Web Technology (EWT) team received a prestigious R&D 100 Award for Tempest, Java Version. In this article, "Tempest" will refer to the Java version of Tempest, a World Wide Web server for desktop or embedded systems. Tempest was designed at the NASA Glenn Research Center at Lewis Field to run on any platform for which a Java Virtual Machine (JVM, Sun Microsystems, Inc.) exists. The JVM acts as a translator between the native code of the platform and the byte code of Tempest, which is compiled in Java. These byte code files are Java executables with a ".class" extension. Multiple byte code files can be zipped together as a "*.jar" file for more efficient transmission over the Internet. Today's popular browsers, such as Netscape (Netscape Communications Corporation) and Internet Explorer (Microsoft Corporation) have built-in Virtual Machines to display Java applets.

  10. Glossary of Internet Terms.

    ERIC Educational Resources Information Center

    Microcomputers for Information Management, 1995

    1995-01-01

    Provides definitions for 71 terms related to the Internet, including Archie, bulletin board system, cyberspace, e-mail (electronic mail), file transfer protocol, gopher, hypertext, integrated services digital network, local area network, listserv, modem, packet switching, server, telnet, UNIX, WAIS (wide area information servers), and World Wide…

  11. Potholes on the Infobahn: Hazardous Conditions Ahead?

    ERIC Educational Resources Information Center

    Laughon, Sally; Hanson, William R.

    1996-01-01

    Alerts educators to potentially objectionable Internet materials. Electronic mail, newsgroups, file transfer protocol sites, Internet Relay Chat (IRC), Multiuser Dungeons (MUDs), and Multiuser Object Oriented (MOOs) are services whose user anonymity can embolden discussions regarding sex, prejudice, religious dogma, and gambling. Teachers may wish…

  12. Bundle Security Protocol for ION

    NASA Technical Reports Server (NTRS)

    Burleigh, Scott C.; Birrane, Edward J.; Krupiarz, Christopher

    2011-01-01

    This software implements bundle authentication, conforming to the Delay-Tolerant Networking (DTN) Internet Draft on Bundle Security Protocol (BSP), for the Interplanetary Overlay Network (ION) implementation of DTN. This is the only implementation of BSP that is integrated with ION.

  13. Study and Simulation of Enhancements for TCP (Transmission Control Protocol) Performance Over Noisy, High-Latency Links

    NASA Technical Reports Server (NTRS)

    Shepard, Timothy J.; Partridge, Craig; Coulter, Robert

    1997-01-01

    The designers of the TCP/IP protocol suite explicitly included support of satellites in their design goals. The goal of the Internet Project was to design a protocol which could be layered over different networking technologies to allow them to be concatenated into an internet. The results of this project included two protocols, IP and TCP. IP is the protocol used by all elements in the network and it defines the standard packet format for IP datagrams. TCP is the end-to-end transport protocol commonly used between end systems on the Internet to derive a reliable bi-directional byte-pipe service from the underlying unreliable IP datagram service. Satellite links are explicitly mentioned in Vint Cerf's 2-page article which appeared in 1980 in CCR [2] to introduce the specifications for IP and TCP. In the past fifteen years, TCP has been demonstrated to work over many differing networking technologies, including over paths including satellites links. So if satellite links were in the minds of the designers from the beginning, what is the problem? The problem is that the performance of TCP has in some cases been disappointing. A goal of the authors of the original specification of TCP was to specify only enough behavior to ensure interoperability. The specification left a number of important decisions, in particular how much data is to be sent when, to the implementor. This was deliberately' done. By leaving performance-related decisions to the implementor, this would allow the protocol TCP to be tuned and adapted to different networks and situations in the future without the need to revise the specification of the protocol, or break interoperability. Interoperability would continue while future implementations would be allowed flexibility to adapt to needs which could not be anticipated at the time of the original protocol design.

  14. Moving beyond the current state of the internet

    NASA Astrophysics Data System (ADS)

    Chen, Edward S.; Davison, Daniel B.

    1997-06-01

    Whereas the Internet has been greatly publicized in the past few years, its effects on education are still largely unexplored. Here, we discuss the future of the Internet itself and the effect on education. Expanding educational and commercial requirements will result in improved bandwidth and connectivity. Larger address spaces will be required, and the next generation of Internet Protocols will provide the addressability required. The real question—how will all of these changes affect education—is explored here. We believe that Internet resources will be a superb supplement to education, but not replace either tutored learning or written texts.

  15. Effects of Adding an Internet-Based Pain Coping Skills Training Protocol to a Standardized Education and Exercise Program for People With Persistent Hip Pain (HOPE Trial): Randomized Controlled Trial Protocol

    PubMed Central

    Rini, Christine; Keefe, Francis; French, Simon; Nelligan, Rachel; Kasza, Jessica; Forbes, Andrew; Dobson, Fiona; Haxby Abbott, J.; Dalwood, Andrew; Vicenzino, Bill; Harris, Anthony; Hinman, Rana S.

    2015-01-01

    Background Persistent hip pain in older people is usually due to hip osteoarthritis (OA), a major cause of pain, disability, and psychological dysfunction. Objective The purpose of this study is to evaluate whether adding an Internet-based pain coping skills training (PCST) protocol to a standardized intervention of education followed by physical therapist–instructed home exercise leads to greater reductions in pain and improvements in function. Design An assessor-, therapist-, and participant-blinded randomized controlled trial will be conducted. Setting The study will be conducted in a community setting. Participants The participants will be 142 people over 50 years of age with self-reported hip pain consistent with hip OA. Intervention Participants will be randomly allocated to: (1) a control group receiving a 24-week standardized intervention comprising an 8-week Internet-based education package followed by 5 individual physical therapy exercise sessions plus home exercises (3 times weekly) or (2) a PCST group receiving an 8-week Internet-based PCST protocol in addition to the control intervention. Measurements Outcomes will be measured at baseline and 8, 24, and 52 weeks, with the primary time point at 24 weeks. Primary outcomes are hip pain on walking and self-reported physical function. Secondary outcomes include health-related quality-of-life, participant-perceived treatment response, self-efficacy for pain management and function, pain coping attempts, pain catastrophizing, and physical activity. Measurements of adherence, adverse events, use of health services, and process measures will be collected at 24 and 52 weeks. Cost-effectiveness will be assessed at 52 weeks. Limitations A self-reported diagnosis of persistent hip pain will be used. Conclusions The findings will help determine whether adding an Internet-based PCST protocol to standardized education and physical therapist–instructed home exercise is more effective than education and exercise alone for persistent hip pain. This study has the potential to guide clinical practice toward innovative modes of psychosocial health care provision. PMID:26023213

  16. Effects of Adding an Internet-Based Pain Coping Skills Training Protocol to a Standardized Education and Exercise Program for People With Persistent Hip Pain (HOPE Trial): Randomized Controlled Trial Protocol.

    PubMed

    Bennell, Kim L; Rini, Christine; Keefe, Francis; French, Simon; Nelligan, Rachel; Kasza, Jessica; Forbes, Andrew; Dobson, Fiona; Abbott, J Haxby; Dalwood, Andrew; Vicenzino, Bill; Harris, Anthony; Hinman, Rana S

    2015-10-01

    Persistent hip pain in older people is usually due to hip osteoarthritis (OA), a major cause of pain, disability, and psychological dysfunction. The purpose of this study is to evaluate whether adding an Internet-based pain coping skills training (PCST) protocol to a standardized intervention of education followed by physical therapist-instructed home exercise leads to greater reductions in pain and improvements in function. An assessor-, therapist-, and participant-blinded randomized controlled trial will be conducted. The study will be conducted in a community setting. The participants will be 142 people over 50 years of age with self-reported hip pain consistent with hip OA. Participants will be randomly allocated to: (1) a control group receiving a 24-week standardized intervention comprising an 8-week Internet-based education package followed by 5 individual physical therapy exercise sessions plus home exercises (3 times weekly) or (2) a PCST group receiving an 8-week Internet-based PCST protocol in addition to the control intervention. Outcomes will be measured at baseline and 8, 24, and 52 weeks, with the primary time point at 24 weeks. Primary outcomes are hip pain on walking and self-reported physical function. Secondary outcomes include health-related quality-of-life, participant-perceived treatment response, self-efficacy for pain management and function, pain coping attempts, pain catastrophizing, and physical activity. Measurements of adherence, adverse events, use of health services, and process measures will be collected at 24 and 52 weeks. Cost-effectiveness will be assessed at 52 weeks. A self-reported diagnosis of persistent hip pain will be used. The findings will help determine whether adding an Internet-based PCST protocol to standardized education and physical therapist-instructed home exercise is more effective than education and exercise alone for persistent hip pain. This study has the potential to guide clinical practice toward innovative modes of psychosocial health care provision. © 2015 American Physical Therapy Association.

  17. Comparison of H.323 and SIP for IP telephony signaling

    NASA Astrophysics Data System (ADS)

    Dalgic, Ismail; Fang, Hanlin

    1999-11-01

    Two standards currently compete for the dominance of IP telephony signaling: the H.323 protocol suite by ITU-T, and the Session Initiation Protocol (SIP) by IETF. Both of these signaling protocols provide mechanisms for call establishment and teardown, call control and supplementary services, and capability exchange. We investigate and compare these two protocols in terms of Functionality, Quality of Service (QoS), Scalability, Flexibility, Interoperability, and Ease of Implementation. For fairness of comparison, we consider similar scenarios for both protocols. In particular, we focus on scenarios that involve a gatekeeper for H.323, and a Proxy/Redirect server for SIP. The reason is that medium-to-large IP Telephony systems are not manageable without a gatekeeper or proxy server. We consider all three versions of H.323. In terms of functionality and services that can be supported, H.323 version 2 and SIP are very similar. However, supplementary services in H.323 are more rigorously defined, and therefore fewer interoperability issues are expected among its implementations. Furthermore, H.323 has taken more steps to ensure compatibility among its different versions, and to interoperate with PSTN. The two protocols are comparable in their QoS support [similar call setup delays, no support for resource reservation or class of service (CoS) setting], but H.323 version 3 will allow signaling of the requested CoS. SIP's primary advantages are (1) flexibility to add new features, and (2) relative ease of implementation and debugging. Finally, we note that H.323 and SIP are improving themselves by learning from each other, and the differences between them are diminishing with each new version.

  18. Networking Foundations for Collaborative Computing at Internet Scope

    DTIC Science & Technology

    2006-01-01

    network-supported synchronous multime- dia groupwork at Internet scope and for large user groups. Contributions entail an novel classification for...multimedia resources in interactive groupwork , generalized to the domain of CSCW from the “right to speak” [26]. A floor control protocol mediates access to

  19. Collecting and Animating Online Satellite Images.

    ERIC Educational Resources Information Center

    Irons, Ralph

    1995-01-01

    Describes how to generate automated classroom resources from the Internet. Topics covered include viewing animated satellite weather images using file transfer protocol (FTP); sources of images on the Internet; shareware available for viewing images; software for automating image retrieval; procedures for animating satellite images; and storing…

  20. Internet-Based Acceptance and Commitment Therapy for Psychological Distress Experienced by People With Hearing Problems: Study Protocol for a Randomized Controlled Trial.

    PubMed

    Molander, Peter; Hesser, Hugo; Weineland, Sandra; Bergwall, Kajsa; Buck, Sonia; Hansson-Malmlöf, Johan; Lantz, Henning; Lunner, Thomas; Andersson, Gerhard

    2015-09-01

    Psychological distress and psychiatric symptoms are prevalent among people with hearing loss or other audiological conditions, but psychological interventions for these groups are rare. This article describes the study protocol for a randomized controlled trial for evaluating the effect of a psychological treatment delivered over the Internet for individuals with hearing problems and concurrent psychological distress. Participants who are significantly distressed will be randomized to either an 8-week Internet-delivered acceptance-based cognitive behavioral therapy (i.e., acceptance and commitment therapy [ACT]), or wa it-list control. We aim to include measures of distress associated with hearing difficulties, anxiety, and depression. In addition, we aim to measure acceptance associated with hearing difficulties as well as quality of life. The results of the trial may further our understanding of how to best treat people who present problems with both psychological distress and hearing in using the Internet.

  1. Improving Service Management in the Internet of Things

    PubMed Central

    Sammarco, Chiara; Iera, Antonio

    2012-01-01

    In the Internet of Things (IoT) research arena, many efforts are devoted to adapt the existing IP standards to emerging IoT nodes. This is the direction followed by three Internet Engineering Task Force (IETF) Working Groups, which paved the way for research on IP-based constrained networks. Through a simplification of the whole TCP/IP stack, resource constrained nodes become direct interlocutors of application level entities in every point of the network. In this paper we analyze some side effects of this solution, when in the presence of large amounts of data to transmit. In particular, we conduct a performance analysis of the Constrained Application Protocol (CoAP), a widely accepted web transfer protocol for the Internet of Things, and propose a service management enhancement that improves the exploitation of the network and node resources. This is specifically thought for constrained nodes in the abovementioned conditions and proves to be able to significantly improve the node energetic performance when in the presence of large resource representations (hence, large data transmissions).

  2. Psychometric Properties of the Persian Language Version of Yang Internet Addiction Questionnaire: An Explanatory Factor Analysis.

    PubMed

    Mohammadsalehi, Narges; Mohammadbeigi, Abolfazl; Jadidi, Rahmatollah; Anbari, Zohreh; Ghaderi, Ebrahim; Akbari, Mojtaba

    2015-09-01

    Reliability and validity are the key concepts in measurement processes. Young internet addiction test (YIAT) is regarded as a valid and reliable questionnaire in English speaking countries for diagnosis of Internet-related behavior disorders. This study aimed at validating the Persian version of YIAT in the Iranian society. A pilot and a cross-sectional study were conducted on 28 and 254 students of Qom University of Medical Sciences, respectively, in order to validate the Persian version of YIAT. Forward and backward translations were conducted to develop a Persian version of the scale. Reliability was measured by test-retest, Cronbach's alpha and interclass correlation coefficient (ICC). Face, content and construct validity were approved by the importance score index, content validity ratio (CVR), content validity index (CVI), correlation matrix and factor analysis. The SPSS software was used for data analysis. The Cronbach's alpha was 0.917 (CI 95%; 0.901 - 0.931). The average of scale-level CVI was calculated to be 0.74; the CVI index for each item was higher than 0.83 and the average of CVI index was equal to 0.89. Factor analysis extracted three factors including personal activities disorder (PAD), emotional and mood disorder (EMD) and social activities disorder (SAD), with more than 55.8% of total variances. The ICC for different factors of Persian version of Young Questionnaire including PAD, EMD and for SAD was r = 0.884; CI 95%; 0.861 - 0.904, r = 0.766; CI 95%; 0.718 - 0.808 and r = 0.745; CI 95%; 0.686 - 0.795, respectively. Our study showed that the Persian version of YIAT is good and usable on Iranian people. The reliability of the instrument was very good. Moreover, the validity of the Persian translated version of the scale was sufficient. In addition, the reliability and validity of the three extracted factors of YIAT were evaluated and were acceptable.

  3. Psychometric Properties of the Persian Language Version of Yang Internet Addiction Questionnaire: An Explanatory Factor Analysis

    PubMed Central

    Mohammadsalehi, Narges; Mohammadbeigi, Abolfazl; Jadidi, Rahmatollah; Anbari, Zohreh; Ghaderi, Ebrahim; Akbari, Mojtaba

    2015-01-01

    Background: Reliability and validity are the key concepts in measurement processes. Young internet addiction test (YIAT) is regarded as a valid and reliable questionnaire in English speaking countries for diagnosis of Internet-related behavior disorders. Objectives: This study aimed at validating the Persian version of YIAT in the Iranian society. Patients and Methods: A pilot and a cross-sectional study were conducted on 28 and 254 students of Qom University of Medical Sciences, respectively, in order to validate the Persian version of YIAT. Forward and backward translations were conducted to develop a Persian version of the scale. Reliability was measured by test-retest, Cronbach’s alpha and interclass correlation coefficient (ICC). Face, content and construct validity were approved by the importance score index, content validity ratio (CVR), content validity index (CVI), correlation matrix and factor analysis. The SPSS software was used for data analysis. Results: The Cronbach’s alpha was 0.917 (CI 95%; 0.901 - 0.931). The average of scale-level CVI was calculated to be 0.74; the CVI index for each item was higher than 0.83 and the average of CVI index was equal to 0.89. Factor analysis extracted three factors including personal activities disorder (PAD), emotional and mood disorder (EMD) and social activities disorder (SAD), with more than 55.8% of total variances. The ICC for different factors of Persian version of Young Questionnaire including PAD, EMD and for SAD was r = 0.884; CI 95%; 0.861 - 0.904, r = 0.766; CI 95%; 0.718 - 0.808 and r = 0.745; CI 95%; 0.686 - 0.795, respectively. Conclusions: Our study showed that the Persian version of YIAT is good and usable on Iranian people. The reliability of the instrument was very good. Moreover, the validity of the Persian translated version of the scale was sufficient. In addition, the reliability and validity of the three extracted factors of YIAT were evaluated and were acceptable. PMID:26495253

  4. 76 FR 27309 - Committee on Measures of Student Success

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-11

    ... version of this document is the document published in the Federal Register. Free Internet access to the... text or Adobe Portable Document Format (PDF) on the Internet at the following site: http://www.ed.gov/news/fed-register/index.html . To use PDF you must have Adobe Acrobat Reader, which is available free...

  5. 75 FR 16763 - Ready-to-Learn Television Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-02

    ... official version of this document is the document published in the Federal Register. Free Internet access... Service, toll free, at 1-800-877-8339. Electronic Access to This Document: You can view this document, as... Portable Document Format (PDF) on the Internet at the following site: http://www.ed.gov/news/fedregister...

  6. 75 FR 38797 - Predominantly Black Institutions Formula Grant Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-06

    ... official version of this document is the document published in the Federal Register. Free Internet access... (FRS), toll free, at 1-800-877-8339. Electronic Access to This Document: You can view this document, as... Portable Document Format (PDF) on the Internet at the following site: http://www.ed.gov/news/fedregister...

  7. 76 FR 50198 - Committee on Measures of Student Success

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-12

    ...: The official version of this document is the document published in the Federal Register. Free Internet... Federal Register, in text or Adobe Portable Document Format (PDF) on the Internet at the following site... is available free at this site. If you have questions about using PDF, call the U.S. Government...

  8. Using the Internet To Teach the Internet: An Opportunistic Approach.

    ERIC Educational Resources Information Center

    Pasch, Grete; Stewart, Quinn

    2002-01-01

    Describes the development of a Web-based version of an information in cyberspace course at the University of Texas at Austin for the library and information science graduate school. Topics include using the best technology; focusing on course content; streaming media; student needs and student feedback; reusing materials; and future plans. (LRW)

  9. NVR Home Page

    Science.gov Websites

    Internet Explorer. Please use the latest version of Internet Explorer for full functionality. CVN 69 NVR Online The NVR is a product of the NAVSEA Shipbuilding Support Office (NAVSHIPSO) In cooperation with Group (NAVSEA 05C) Images Courtesy of US Navy Photos and the US Navy Fact File Naval Sea Systems Command

  10. Form and Functions: Publishing the Canadian Government "Weekly Checklist" on the Internet.

    ERIC Educational Resources Information Center

    Davies, Ron; Chalk, Tanis

    1996-01-01

    When a Canadian government documents listing was distributed over the Internet, differences were revealed in the design and implementation of print, FTP, Gopher and World Wide Web versions. Publishing form was found to affect: ability to provide specific editions for target audiences, amount of information delivered at one time, presentation…

  11. GEONETCast Americas

    Science.gov Websites

    unless the user has internet access on the same machine. The products, including metadata, that are on is an access portal to GEONETCast products. It is a searchable database that can be found at -channel. This version will run on a local computer at a user site but internet links will not function

  12. 75 FR 18170 - Ready-to-Learn Television Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-09

    ... official version of this document is the document published in the Federal Register. Free Internet access... Federal Relay Service, toll free, at 1-800-877-8339. Electronic Access to This Document: You can view this... Adobe Portable Document Format (PDF) on the Internet at the following site: http://www.ed.gov/news...

  13. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version

    PubMed Central

    Babu, M. Rajesh; Dian, S. Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan

    2015-01-01

    The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things. PMID:26495430

  14. Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version.

    PubMed

    Babu, M Rajesh; Dian, S Moses; Chelladurai, Siva; Palaniappan, Mathiyalagan

    2015-01-01

    The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. In doing so, the existing networks which include wired, wireless, and ad hoc networks should be utilized. Moreover, apart from other networks, the ad hoc network is full of security challenges. For instance, the MANET (mobile ad hoc network) is susceptible to various attacks in which the black hole attacks and its versions do serious damage to the entire MANET infrastructure. The severity of this attack increases, when the compromised MANET nodes work in cooperation with each other to make a cooperative black hole attack. Therefore this paper proposes an alleviation procedure which consists of timely mandate procedure, hole detection algorithm, and sensitive guard procedure to detect the maliciously behaving nodes. It has been observed that the proposed procedure is cost-effective and ensures QoS guarantee by assuring resource availability thus making the MANET appropriate for Internet of Things.

  15. Secure authentication protocol for Internet applications over CATV network

    NASA Astrophysics Data System (ADS)

    Chin, Le-Pond

    1998-02-01

    An authentication protocol is proposed in this paper to implement secure functions which include two way authentication and key management between end users and head-end. The protocol can protect transmission from frauds, attacks such as reply and wiretap. Location privacy is also achieved. A rest protocol is designed to restore the system once when systems fail. The security is verified by taking several security and privacy requirements into consideration.

  16. Global Connections for Lasting Impressions: Experiential Learning about TCP

    NASA Astrophysics Data System (ADS)

    Allison, Colin; Miller, Alan; Oliver, Iain; Sturgeon, Thomas

    “Tell me and I forget, Show me and I remember, Involve me and I understand”. This paper discusses the motivation for, and design of, a learning resource which allows students to explore the Transmission Control Protocol (TCP). TCP is responsible for transporting over 80% of the traffic on the Internet - all web and e-mail for example - and in addition is the primary means of achieving Internet congestion control. TCP is therefore core to modern life. It is a protocol under constant study with a view to evolution, and it is incumbent on all ICT curricula to provide education at appropriate levels about its dynamics, strengths and weaknesses. There are no shortages of good textbooks which provide information on TCP, but these are no substitute for experiential learning in order to provide a lasting understanding. The TCP Live learning resource allows students to explore the behavior of TCP on the global Internet, and see the wide variety of conditions that the protocol has to cope with, thereby extending their viewpoint outwith the limited scope of their own institutional firewalls.

  17. Enhanced International Space Station Ku-Band Telemetry Service

    NASA Technical Reports Server (NTRS)

    Cecil, Andrew; Pitts, Lee; Welch, Steven; Bryan, Jason

    2014-01-01

    (1) The ISS is diligently working to increase utilization of the resources this unique laboratory provides; (2) Recent upgrades enabled the use of Internet Protocol communication using the CCSDS IP Encapsulation protocol; and (3) The Huntsville Operations Support Center has extended the onboard LAN to payload teams enabling the use of standard IP protocols for payload operations.

  18. Better Ira Remsen Demonstration

    ERIC Educational Resources Information Center

    Dalby, David K.; Maynard, James H.; Moore, John W.

    2011-01-01

    Many versions of the classic Ira Remsen experience involving copper and concentrated nitric acid have been used as lecture demonstrations. Remsen's original reminiscence from 150 years ago is included in the Supporting Information, and his biography can be found on the Internet. This article presents a new version that makes the demonstration more…

  19. Interactive Sections Of An Internet-Based Intervention Increase Patient Empowerment: A Study With Chronic Back Pain Patients

    ClinicalTrials.gov

    2014-04-12

    Group 1 (Control): Access to a Static Version of the Website Containing Only Static Features (i.e. Library, First Aid, and FAQ); Group2 (Intervention) Access to an Interactive Version of the Website Containing Both Static and Interactive Features

  20. Darton College Customized Nursing Program for the Fort Benning Community and Research Project

    DTIC Science & Technology

    2013-10-01

    Netbook /laptop versions of English 1102, Communication 1101, PSYC 2115 and PHED 1161 will be developed for deployed students with limited or no...internet accessibility. Netbook /laptop versions of English 1102, Communication 1101, PSYC, and PHED 1161 for deployed students with limited or no

  1. Internet Addiction: A Logotherapeutic Approach

    ERIC Educational Resources Information Center

    Didelot, Mary J.; Hollingsworth, Lisa; Buckenmeyer, Janet A.

    2012-01-01

    Internet addiction (IA) is both the most rapidly growing addiction and the least understood addiction (Watson, 2005). For counselors, treatment issues surrounding the disease are also growing. At the forefront is the lack of understanding concerning treatment protocol to manage the challenging recovery and maintenance stages after IA behavior has…

  2. Using Internet Audio to Enhance Online Accessibility

    ERIC Educational Resources Information Center

    Schwartz, Linda Matula

    2004-01-01

    Accessibility to online education programs is an important factor that requires continued research, improvement, and regulation. Particularly valuable in the enhancement of online accessibility is the Voice-over Internet Protocol (VOIP) medium. VOIP compresses analog voice data and converts it into digital packets for transmission over the…

  3. Evaluating Information on the Internet.

    ERIC Educational Resources Information Center

    Brandt, D. Scott

    1996-01-01

    Evaluation of information found on the Internet requires the same assessment of reliability, credibility, perspective, purpose and author credentials as required with print materials. Things to check include whether the source is from a moderated or unmoderated list or FTP (file transfer protocol) site; directories for affiliation and biographical…

  4. Developing Multimedia Courseware for the Internet's Java versus Shockwave.

    ERIC Educational Resources Information Center

    Majchrzak, Tina L.

    1996-01-01

    Describes and compares two methods for developing multimedia courseware for use on the Internet: an authoring tool called Shockwave, and an object-oriented language called Java. Topics include vector graphics, browsers, interaction with network protocols, data security, multithreading, and computer languages versus development environments. (LRW)

  5. Efficient Group Coordination in Multicast Trees

    DTIC Science & Technology

    2001-01-01

    describe a novel protocol to coordinate multipoint groupwork within the IP-multicast framework. The protocol supports Internet-wide coordination for large...and highly-interactive groupwork , relying on the dissemination of coordination directives among group members across a shared end-to-end multicast

  6. Strategy for Developing Expert-System-Based Internet Protocols (TCP/IP)

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.

    1997-01-01

    The Satellite Networks and Architectures Branch of NASA's Lewis Research is addressing the issue of seamless interoperability of satellite networks with terrestrial networks. One of the major issues is improving reliable transmission protocols such as TCP over long latency and error-prone links. Many tuning parameters are available to enhance the performance of TCP including segment size, timers and window sizes. There are also numerous congestion avoidance algorithms such as slow start, selective retransmission and selective acknowledgment that are utilized to improve performance. This paper provides a strategy to characterize the performance of TCP relative to various parameter settings in a variety of network environments (i.e. LAN, WAN, wireless, satellite, and IP over ATM). This information can then be utilized to develop expert-system-based Internet protocols.

  7. Autonomous Data Transfer Operations for Missions

    NASA Technical Reports Server (NTRS)

    Repaci, Max; Baker, Paul; Brosi, Fred

    2000-01-01

    Automating the data transfer operation can significantly reduce the cost of moving data from a spacecraft to a location on Earth. Automated data transfer methods have been developed for the terrestrial Internet. However, they often do not apply to the space environment, since in general they are based on assumptions about connectivity that are true on the Internet but not on space links. Automated file transfer protocols have been developed for use over space links that transfer data via store-and-forward of files or segments of files. This paper investigates some of the operational concepts made possible by these protocols.

  8. [Access to the internet among nurses and type of information sought].

    PubMed

    Muñoz-Izquierdo, Amparo; Puchades-Simó, Amparo; Marco-Gisbert, Amparo; Piquer-Bosca, Cecilia; Ferrer-Casares, Elena; Canela-Ferrer, Amparo; Gómez-Muñoz, Neus; Costa-Pastrana, M Carmen

    2008-01-01

    To identify how nurses use the Internet through a survey performed in May 2005. A descriptive cross-sectional study was performed. The information source was a survey sent electronically and through surface mail. The study population consisted of nursing professionals from distinct autonomous regions. The overall response rate was 40% (444 of 1,100). A total of 38.6% (184) of the nursing professionals used the Internet continually, especially men and nursing staff with a high level of English. The 5 most frequent reasons for surfing the net were searching for nursing literature (63% [264]), consulting the web pages of nursing journals (58.6% [256]), seeking information on drugs (55% [230]), seeking protocol manuals (50% [204]), and consulting the web pages of colleges of nursing (48). The behavior of nursing professionals is similar to that found among the general population in the "BBVA Foundation study of the Internet in Spain". Most nursing professionals are women. Male nursing professionals more frequently search for subjects related to nursing theory. Nurses use the Internet to search for nursing literature and consult journals, protocol manuals, and colleges of nursing, as well as to be familiar with the information aimed at patients.

  9. Brief Internet and NREN Glossary: Part II (M-Z).

    ERIC Educational Resources Information Center

    Machovec, George S.

    1993-01-01

    Presents the second and final part of a selected glossary of terms commonly used in discussions relating to the Internet and the National Research and Education Network (NREN). Highlights include various network names; organizations; acronyms; user interfaces; network research testbeds; various protocols; remote login; and Wide Area Information…

  10. Remote Patron Validation: Posting a Proxy Server at the Digital Doorway.

    ERIC Educational Resources Information Center

    Webster, Peter

    2002-01-01

    Discussion of remote access to library services focuses on proxy servers as a method for remote access, based on experiences at Saint Mary's University (Halifax). Topics include Internet protocol user validation; browser-directed proxies; server software proxies; vendor alternatives for validating remote users; and Internet security issues. (LRW)

  11. 47 CFR 64.613 - Numbering directory for Internet-based TRS users.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... the user's Internet Protocol (IP) address. For each record associated with an IP Relay user, the URI... a VRS user's geographically appropriate NANP telephone number, the URI shall contain the IP address of the user's device. For each record associated with an IP Relay user's geographically appropriate...

  12. All Aboard the Internet.

    ERIC Educational Resources Information Center

    Descy, Don E.

    1993-01-01

    This introduction to the Internet with examples for Macintosh computer users demonstrates the ease of using e-mail, participating on discussion group listservs, logging in to remote sites using Telnet, and obtaining resources using the File Transfer Protocol (FTP). Included are lists of discussion groups, Telnet sites, and FTP Archive sites. (EA)

  13. The University of Minnesota's Internet Gopher System: A Tool for Accessing Network-Based Electronic Information.

    ERIC Educational Resources Information Center

    Wiggins, Rich

    1993-01-01

    Describes the Gopher system developed at the University of Minnesota for accessing information on the Internet. Highlights include the need for navigation tools; Gopher clients; FTP (File Transfer Protocol); campuswide information systems; navigational enhancements; privacy and security issues; electronic publishing; multimedia; and future…

  14. 78 FR 6216 - Extension of the Commission's Rules Regarding Outage Reporting to Interconnected Voice Over...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-30

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 4 [PS Docket No. 11-82; DA 12-1962] Extension of the Commission's Rules Regarding Outage Reporting to Interconnected Voice Over Internet Protocol Service Providers and Broadband Internet Service Providers AGENCY: Federal Communications Commission. ACTION: Final...

  15. Enhancing Online Education Using Collaboration Solutions

    ERIC Educational Resources Information Center

    Ge, Shuzhi Sam; Tok, Meng Yong

    2003-01-01

    With the advances in Internet technologies, online education is fast gaining ground as an extension to traditional education. Webcast allows lectures conducted on campus to be viewed by students located at remote sites by streaming the audio and video content over Internet Protocol (IP) networks. However when used alone, webcast does not provide…

  16. 77 FR 11997 - Consumer and Governmental Affairs Bureau Seeks To Refresh the Record Regarding Misuse of Internet...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-28

    ... legitimate relay calls, however, are not entitled to these transparency and confidentiality protections... Relay Service AGENCY: Federal Communications Commission. ACTION: Proposed rule. SUMMARY: In this... refresh the record regarding misuse of Internet Protocol relay service. Further comments are requested to...

  17. CALEA: Prepare for the Worst, Hope for the Best

    ERIC Educational Resources Information Center

    Wigen, Wendy

    2006-01-01

    On August 5, 2005, nearly a year since requesting public comment on the issue, the Federal Communications Commission (FCC) voted to extend the Communications Assistance for Law Enforcement Act (CALEA) to broadband Internet and interconnected Voice-over-Internet Protocol (VoIP) providers. This includes college and university campus networks, as…

  18. High-Frequency Mapping of the IPV6 Internet Using YARRP

    DTIC Science & Technology

    2017-03-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA APPLIED CYBER OPERATIONS CAPSTONE PROJECT REPORT HIGH -FREQUENCY MAPPING OF THE IPV6 INTERNET USING...03-30-2017 4. TITLE AND SUBTITLE HIGH -FREQUENCY MAPPING OF THE IPV6 INTERNET USING YARRP 5. FUNDING NUMBERS RCKHX 6. AUTHOR(S) Eric W. Gaston 7...the U.S. Government. IRB Protocol Number: N/A. 12a. DISTRIBUTION / AVAILABILITY STATEMENT Approved for public release. Distribution is unlimited. 12b

  19. 76 FR 5363 - Intent To Compromise Claim Against the State of Oklahoma Department of Education

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-31

    ... must have Adobe Acrobat Reader, which is available free at this site. Note: The official version of this document is the document published in the Federal Register. Free Internet access to the official... Document Format (PDF) on the Internet at the following site: http://frwebgate.access.gpo.gov/cgi-bin...

  20. The Journal, the Internet, and Teaching

    NASA Astrophysics Data System (ADS)

    Lagowski, J. J.

    1995-11-01

    With this issue, the Journal begins to create an access to the Internet. Our future on the Internet will be achieved systematically, and it will be designed to compliment--add value to--the print Journal. Our Internet connection must be useful to our readers in ways not possible with the print Journal, however, economic considerations cannot be ignored. It would be intellectually and economically unacceptable to produce only a direct copy of theJournal for electronic distribution. The Internet--the information super highway--has been hailed by many as an important information source in the educational process and will become increasingly so in the future. Indeed, there are extant descriptions of apparently innovative uses of modern interactive communications technologies in the education of scientists at the undergraduate level. However, anyone who has attempted to obtain information from the Internet knows that you are as likely to find garbage as you are to find quality information. Webster tells us that garbage is "worthless or nonsensical matter; rubbish; inferior or offensive material; incorrect, meaningless, or unwanted information." An eye for discrimination, which is often a reflection of maturity, is essential when using the current Internet. In other words, because a bit of information appears on the Internet does not ensure its quality. Only in cases where the information sought has its source in a review-oriented process, e.g., from library holdings, can the information on the Internet be trusted. The Internet is fast becoming a "vanity press," where anything can be published with virtually no critique regarding the quality and accuracy of the content. Indeed, it is not necessarily true that the person to whom a bit of information is attributed is the person who posted it. A bit of information on the Internet lies there until someone comes across it and uses it (or links to it), forming a nucleus for further growth. Further growth may center about critiques of the original piece of information, but, in general, we have no way of establishing the credentials of the critics. It may take an enormous amount of time for an Internet publication to accrue a critique that is equivalent to that received by a equivalent quantum of information in a peer reviewed, paper-oriented journal. It is difficult to decide (unless you already know because of your expertise) when an Internet publication has "passed the test," in contrast to the paper published in a refereed journal. When the printed paper appears, most of the critics associated with that journal have agreed (through the editorial process) that it is probably worthwhile publishing. The appearance of an Internet paper does not carry the same implication since anyone can put anything on the Internet. Anyone who has a computer and a network connection is empowered to publish on the Internet, and often does. Putting a neophyte--a beginning student--in this kind of environment with little or no guidance would seem to abrogate certain responsibilities that teachers have to guide a student's intellectual growth and ability to make critical judgments. This is not an argument against the use of the Internet for teaching; rather it is a plea to use this new tool with care lest our students be harmed intellectually. "As the twig is bent. . ." The Internet can be likened to an open library where anyone can come in and put a book or a note on a scrap of paper anywhere on the shelves. Further, anyone can go in anytime they wish and make a copy of anything to take away. Without the value added by a librarian, who brings a known (if not necessarily perfect) order to the holdings, the open library is virtually worthless to people who have specific tasks to perform, e.g., finding the NMR spectrum of (or anything characteristic of) a specific compound. Unless we learn how to assure the usefulness and reliability of information on the Internet, one of the era's most valuable resources may never realize its academic potential. The Internet has become a useful and valuable academic tool where it connects users to an information source of previously established quality, as, for example, in the case of Chemical Abstracts On Line. The processes that establish the quality of the information in the printed version of CA are the same as those for the on-line version; indeed, the printed version is the same as the on-line version, but electronic access provides a variety of potential advantages that include on demand access as well as multiple accesses. All of this, of course, comes at a cost which some have not figured out how to bear. The point of the CA analogy is that the quality of the on-line material is assured because there is no difference between the information in the electronic and the printed version. How can telecommunications technologies be used to enhance, for example, this Journal. We clearly can't afford to "give away" the contents of the Journal on the Internet although this is technologically feasible. An exact representation of each page of the Journal could be made available in electronic form to be delivered to a local laser printer--but to what end? We could attempt to sell electronic subscriptions, but our estimate is that these would be more expensive than the equivalent print version of the Journal. Moreover, many of our current readers could not access, or possibly would not be interested in, an exact electronic representation. So we have chosen to augment the print Journal with an electronic addition that will permit us to provide an expanded service to those who have access to the Internet. For example, we can provide supplementary tables of data, student handouts, full-size templates for models, color versions of illustrations that our print budget dictates be printed in black and white, and eventually, video clips of demonstrations and experiments. Our electronic augmentation begins with this issue--at our new Web site at http://www.utexas.edu/cons/jchemed/. The Computer Series article by Pospisil, Zalis, and Fanelli incorporates several fractal diagrams that are available in color on our Web site. We expect future issues of this print Journal to have similar electronic components. Look for them if you have access to the Internet. In addition, we begin publication of the abstracts of the papers that appear in the Journal. Abstracts starting with the July 1995 issue are currently available on-line along with the full text of a few articles. We intend to publish the abstracts for a given issue on the date the Journal is released to be printed, providing a preview of the Journal each month and a way of introducing potential subscribers to our wide range of interesting material for teachers.

  1. Infrastructure Vulnerability Assessment and Defense

    DTIC Science & Technology

    2005-03-01

    companies or organizations. The connectivity and communications within and among networks are "glued" together by a set of protocols defined by the Internet ... research communities, which are modified and improved over decades of time. Those protocols are usually designed in the principle to achieve

  2. [How do Norwegian dermatologists keep themselves professionally updated?].

    PubMed

    Gjersvik, P J; Nylenna, M; Aasland, O G

    2001-12-10

    We have explored continuing medical education among Norwegian dermatologists, especially their use of medical journals and the Internet. In April 2001, a questionnaire was sent to 170 dermatologists, including junior doctors in specialist training. 129 questionnaires (76%) were returned, of which 16 were excluded from the analysis. Mean time used per week reading articles in medical journals was 149 minutes (95% confidence interval (CI) 129-168 minutes). 90% of the respondents had Internet access at work and/or at home. Hospital consultants used the Internet for medical purposes for significantly more time per week than doctors in private practice (146 minutes (CI 98-195 minutes) versus 72 minutes (CI 52-93 minutes)). More hospital doctors had difficulties in getting or taking time off to attend courses and congresses (p < 0.01) and with financial costs (p < 0.001) than those in private practice. Most dermatologists found the paper version of journals (88%) and courses and congresses (79%) to be important for their continuing medical education, while fewer found medical databases on the Internet (57%) and the Internet version of journals (35%) to be so. In a logistic regression model, fewer private practitioners than hospital doctors (p = 0.011) and more female than male doctors (p = 0.014) had a feeling of insufficiency in regard to the increasing amount of medical information. The Internet has become part of the professional life of most Norwegian dermatologists, but has so far not replaced traditional forms of continuing medical education.

  3. Method of Performance-Aware Security of Unicast Communication in Hybrid Satellite Networks

    NASA Technical Reports Server (NTRS)

    Baras, John S. (Inventor); Roy-Chowdhury, Ayan (Inventor)

    2014-01-01

    A method and apparatus utilizes Layered IPSEC (LES) protocol as an alternative to IPSEC for network-layer security including a modification to the Internet Key Exchange protocol. For application-level security of web browsing with acceptable end-to-end delay, the Dual-mode SSL protocol (DSSL) is used instead of SSL. The LES and DSSL protocols achieve desired end-to-end communication security while allowing the TCP and HTTP proxy servers to function correctly.

  4. Teaching physiology and the World Wide Web: electrochemistry and electrophysiology on the Internet.

    PubMed

    Dwyer, T M; Fleming, J; Randall, J E; Coleman, T G

    1997-12-01

    Students seek active learning experiences that can rapidly impart relevant information in the most convenient way possible. Computer-assisted education can now use the resources of the World Wide Web to convey the important characteristics of events as elemental as the physical properties of osmotically active particles in the cell and as complex as the nerve action potential or the integrative behavior of the intact organism. We have designed laboratory exercises that introduce first-year medical students to membrane and action potentials, as well as the more complex example of integrative physiology, using the dynamic properties of computer simulations. Two specific examples are presented. The first presents the physical laws that apply to osmotic, chemical, and electrical gradients, leading to the development of the concept of membrane potentials; this module concludes with the simulation of the ability of the sodium-potassium pump to establish chemical gradients and maintain cell volume. The second module simulates the action potential according to the Hodgkin-Huxley model, illustrating the concepts of threshold, inactivation, refractory period, and accommodation. Students can access these resources during the scheduled laboratories or on their own time via our Web site on the Internet (http./(/)phys-main.umsmed.edu) by using the World Wide Web protocol. Accurate version control is possible because one valid, but easily edited, copy of the labs exists at the Web site. A common graphical interface is possible through the use of the Hypertext mark-up language. Platform independence is possible through the logical and arithmetic calculations inherent to graphical browsers and the Javascript computer language. The initial success of this program indicates that medical education can be very effective both by the use of accurate simulations and by the existence of a universally accessible Internet resource.

  5. Psychological Assessment via the Internet: A Reliability and Validity Study of Online (vs Paper-and-Pencil) Versions of the General Health Questionnaire-28 (GHQ-28) and the Symptoms Check-List-90-Revised (SCL-90-R)

    PubMed Central

    Jordán, Carlos M; Díaz, Marta I; Comeche, María I; Ortega, José

    2007-01-01

    Background Internet psychology services are rapidly increasing and that implies online assessment. To guarantee the results of these new online evaluation procedures, it is necessary to have reliable and valid assessment tools. Objective In this work we analyzed the online versions of two popular psychopathology screening questionnaires: the General Health Questionnaire-28 (GHQ-28) and the Symptoms Check-List-90-Revised (SCL-90-R). Methods A total of 185 psychology students were recruited from two universities in Madrid, Spain. All of them had Internet access at home. A test-retest situation and factorial analysis were used to generate reliability and validity data. Both paper-and-pencil questionnaires (test) and their online versions (retest) were completed by 100 participants (median gap = 17 days). Results Results suggest that both online questionnaires were fairly equivalent to their paper-and-pencil versions, with higher reliability values for the SCL-90-R. Factorial analysis tended to reproduce the structure shown in former investigations of both questionnaires, replicating the four-factor structure of the GHQ-28 but failing to do so with the nine-factor structure of the SCL-90-R. Instead, a large unrotated factor appeared. Conclusions Further research should be carried out to confirm these data, but our work supports the online use of both assessment tools. The psychometric properties of the online version of GHQ-28 is similar to the paper-and-pencil and we can recommend its utilization in a Web environment. In contrast, SCL-90-R can only be recommended as a global index for psychological distress, using the Global Severity Index (GSI), not necessarily its subscales; and it should be considered that the online scores were lower than the ones with the paper-and-pencil version. PMID:17478411

  6. Psychological assessment via the internet: a reliability and validity study of online (vs paper-and-pencil) versions of the General Health Questionnaire-28 (GHQ-28) and the Symptoms Check-List-90-Revised (SCL-90-R).

    PubMed

    Vallejo, Miguel A; Jordán, Carlos M; Díaz, Marta I; Comeche, María I; Ortega, José

    2007-01-31

    Internet psychology services are rapidly increasing and that implies online assessment. To guarantee the results of these new online evaluation procedures, it is necessary to have reliable and valid assessment tools. In this work we analyzed the online versions of two popular psychopathology screening questionnaires: the General Health Questionnaire-28 (GHQ-28) and the Symptoms Check-List-90-Revised (SCL-90-R). A total of 185 psychology students were recruited from two universities in Madrid, Spain. All of them had Internet access at home. A test-retest situation and factorial analysis were used to generate reliability and validity data. Both paper-and-pencil questionnaires (test) and their online versions (retest) were completed by 100 participants (median gap = 17 days). Results suggest that both online questionnaires were fairly equivalent to their paper-and-pencil versions, with higher reliability values for the SCL-90-R. Factorial analysis tended to reproduce the structure shown in former investigations of both questionnaires, replicating the four-factor structure of the GHQ-28 but failing to do so with the nine-factor structure of the SCL-90-R. Instead, a large unrotated factor appeared. Further research should be carried out to confirm these data, but our work supports the online use of both assessment tools. The psychometric properties of the online version of GHQ-28 is similar to the paper-and-pencil and we can recommend its utilization in a Web environment. In contrast, SCL-90-R can only be recommended as a global index for psychological distress, using the Global Severity Index (GSI), not necessarily its subscales; and it should be considered that the online scores were lower than the ones with the paper-and-pencil version.

  7. Personal digital assistant-based, internet-enabled remote communication system for a wearable pneumatic biventricular assist device.

    PubMed

    Nam, Kyoung Won; Lee, Jung Joo; Hwang, Chang Mo; Choi, Seong Wook; Son, Ho Sung; Sun, Kyung

    2007-11-01

    Currently, personal mobile communication devices have become quite common, and the applications of such devices have expanded quickly. Remote communication systems might be employed for the telemonitoring of patients or the operating status of their medical devices. In this article, we describe the development of a mobile-based artificial heart telemanagement system for use in a wearable extracorporeal pneumatic biventricular assist device, which is capable of telemonitoring and telecontrolling the operating status of the ventricular assist device from any site. The system developed herein utilized small mobile phones for the client device and adopted a standard transmission control protocol/Internet protocol communication protocol for the purposes of telecommunication. The results of in vitro and animal experiments showed that the telemanagement system developed herein operated in accordance with the desired parameters.

  8. Body awareness and mindfulness: validation of the Spanish version of the Scale of Body Connection.

    PubMed

    del C Quezada-Berumen, Lucía; González-Ramírez, Mónica T; Cebolla, Ausias; Soler, Joaquim; Garcia-Campayo, Javier

    2014-01-01

    To assess the psychometric properties and the factor structure of the Spanish version of the Scale of Body Connection (SBC) in a community population of meditators and non-meditators and to investigate the relationships among mindfulness, body awareness and body dissociation. Design. Validation study. Sampling. An internet-based commercial system was used to recruit the sample. Instruments. In addition to the SBC, the Five Facet Mindfulness Questionnaire (FFMQ) and the Depression, Anxiety, and Stress Scale (DASS-21) were administered. A sample of 578 subjects responded to all of the items in the protocol. A total of 55.2% of respondents had some previous experience with meditation. A Scree plot showed a two-factor solution involving the Body Awareness (BA) and Body Dissociation (BD) subscales. This study differed from the original validation study in the lack of independence of the subscales; they were correlated in the present study (r=-.11). Internal consistency for BA was α: .86, and for BD, the α was .62. Test-retest reliability was assessed in a subsample (N=67) and was r=.679 for BA and r=.765 for BD. Hierarchical multiple regression analyses showed that mindfulness practice and the FFMQ factors of Observing and Describing were positive predictors of BA. Describing, Acting with awareness and Non-judging negatively predicted BD, and Observing positively predicted BD. The study confirms the adequacy of the psychometric properties of the Spanish version of the SBC for use in community samples. The relationship between SBC and mindfulness is discussed in light of previous research.

  9. Development of Mobile Communications in Slovenia: Looking to the Future Global Information (Mobile/Internet) Society.

    ERIC Educational Resources Information Center

    Simonic, Tomaz; Mlinar, Tomi

    2000-01-01

    Discusses the planning and provision of mobile communications in Slovenia and suggests areas that will be developed in the future. Topics include the global mobile market; digital mobile networks; evolution from voice to multimedia services; wireless application protocol; the Internet; general packet radio service; and universal mobile…

  10. One Server Fits All

    ERIC Educational Resources Information Center

    Villano, Matt

    2006-01-01

    The benefits of deploying a communications system that runs over the Internet Protocol are well documented. Sending voice over the Internet, a process commonly known as VoIP, has been shown to save money on long distance calls, make voice mail more accessible, and enable users to answer their phones from anywhere. The technology also makes adding…

  11. Towards an interplanetary internet: a proposed strategy for standardization

    NASA Technical Reports Server (NTRS)

    Hooke, A. J.

    2002-01-01

    This paper reviews the current set of standard data communications capabilities that exist to support advanced missions, discusses the architectural concepts for the future Interplanetary Internet, and suggests how a standardized set of space communications protocols that can grow to support future scenarios where human intelligence is widely distributed across the Solar System.

  12. VoIP to the Rescue

    ERIC Educational Resources Information Center

    Milner, Jacob

    2005-01-01

    Voice over Internet Protocol (VoIP) is everywhere. The technology lets users make and receive phone calls over the Internet, transporting voice traffic alongside data traffic such as instant messages (IMs) and e-mail. While the number of consumer customers using VoIP increases every week, the technology is finding its way into K-12 education as…

  13. 78 FR 36759 - Funding Down the Grant Slate From Fiscal Year (FY) 2012; Graduate Assistance in Areas of National...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-19

    ... official version of this document is the document published in the Federal Register. Free Internet access... 7105, Washington, DC 20006-8510. Telephone: (202) 502-7779 or via Internet: [email protected] . If you... Service (FRS), toll free, at 1- 800-877-8339. Individuals with disabilities can obtain this document in an...

  14. Use of IPsec by Manned Space Missions

    NASA Technical Reports Server (NTRS)

    Pajevski, Michael J.

    2009-01-01

    NASA's Constellation Program is developing its next generation manned space systems for missions to the International Space Station (ISS) and the Moon. The Program is embarking on a path towards standards based Internet Protocol (IP) networking for space systems communication. The IP based communications will be paired with industry standard security mechanisms such as Internet Protocol Security (IPsec) to ensure the integrity of information exchanges and prevent unauthorized release of sensitive information in-transit. IPsec has been tested in simulations on the ground and on at least one Earth orbiting satellite, but the technology is still unproven in manned space mission situations and significant obstacles remain.

  15. Running TCP/IP over ATM Networks.

    ERIC Educational Resources Information Center

    Witt, Michael

    1995-01-01

    Discusses Internet protocol (IP) and subnets and describes how IP may operate over asynchronous transfer mode (ATM). Topics include TCP (transmission control protocol), ATM cells and adaptation layers, a basic architectural model for IP over ATM, address resolution, mapping IP to a subnet technology, and connection management strategy. (LRW)

  16. Frequency Count Attribute Oriented Induction of Corporate Network Data for Mapping Business Activity

    NASA Astrophysics Data System (ADS)

    Tanutama, Lukas

    2014-03-01

    Companies increasingly rely on Internet for effective and efficient business communication. As Information Technology infrastructure backbone for business activities, corporate network connects the company to Internet and enables its activities globally. It carries data packets generated by the activities of the users performing their business tasks. Traditionally, infrastructure operations mainly maintain data carrying capacity and network devices performance. It would be advantageous if a company knows what activities are running in its network. The research provides a simple method of mapping the business activity reflected by the network data. To map corporate users' activities, a slightly modified Attribute Oriented Induction (AOI) approach to mine the network data was applied. The frequency of each protocol invoked were counted to show what the user intended to do. The collected data was samples taken within a certain sampling period. Samples were taken due to the enormous data packets generated. Protocols of interest are only Internet related while intranet protocols are ignored. It can be concluded that the method could provide the management a general overview of the usage of its infrastructure and lead to efficient, effective and secure ICT infrastructure.

  17. Providing Internet Access to High-Resolution Lunar Images

    NASA Technical Reports Server (NTRS)

    Plesea, Lucian

    2008-01-01

    The OnMoon server is a computer program that provides Internet access to high-resolution Lunar images, maps, and elevation data, all suitable for use in geographical information system (GIS) software for generating images, maps, and computational models of the Moon. The OnMoon server implements the Open Geospatial Consortium (OGC) Web Map Service (WMS) server protocol and supports Moon-specific extensions. Unlike other Internet map servers that provide Lunar data using an Earth coordinate system, the OnMoon server supports encoding of data in Moon-specific coordinate systems. The OnMoon server offers access to most of the available high-resolution Lunar image and elevation data. This server can generate image and map files in the tagged image file format (TIFF) or the Joint Photographic Experts Group (JPEG), 8- or 16-bit Portable Network Graphics (PNG), or Keyhole Markup Language (KML) format. Image control is provided by use of the OGC Style Layer Descriptor (SLD) protocol. Full-precision spectral arithmetic processing is also available, by use of a custom SLD extension. This server can dynamically add shaded relief based on the Lunar elevation to any image layer. This server also implements tiled WMS protocol and super-overlay KML for high-performance client application programs.

  18. Utilization of Internet Protocol-Based Voice Systems in Remote Payload Operations

    NASA Technical Reports Server (NTRS)

    Chamberlain, jim; Bradford, Bob; Best, Susan; Nichols, Kelvin

    2002-01-01

    Due to limited crew availability to support science and the large number of experiments to be operated simultaneously, telescience is key to a successful International Space Station (ISS) science program. Crew, operations personnel at NASA centers, and researchers at universities and companies around the world must work closely together to per orm scientific experiments on-board ISS. The deployment of reliable high-speed Internet Protocol (IP)-based networks promises to greatly enhance telescience capabilities. These networks are now being used to cost-effectively extend the reach of remote mission support systems. They reduce the need for dedicated leased lines and travel while improving distributed workgroup collaboration capabilities. NASA has initiated use of Voice over Internet Protocol (VoIP) to supplement the existing mission voice communications system used by researchers at their remote sites. The Internet Voice Distribution System (IVoDS) connects remote researchers to mission support "loopsll or conferences via NASA networks and Internet 2. Researchers use NODS software on personal computers to talk with operations personnel at NASA centers. IVoDS also has the ;capability, if authorized, to allow researchers to communicate with the ISS crew during experiment operations. NODS was developed by Marshall Space Flight Center with contractors & Technology, First Virtual Communications, Lockheed-Martin, and VoIP Group. NODS is currently undergoing field-testing with full deployment for up to 50 simultaneous users expected in 2002. Research is being performed in parallel with IVoDS deployment for a next-generation system to qualitatively enhance communications among ISS operations personnel. In addition to the current voice capability, video and data/application-sharing capabilities are being investigated. IVoDS technology is also being considered for mission support systems for programs such as Space Launch Initiative and Homeland Defense.

  19. Effects of task complexity on activation of language areas in a semantic decision fMRI protocol.

    PubMed

    Lopes, Tátila Martins; Yasuda, Clarissa Lin; de Campos, Brunno Machado; Balthazar, Marcio L F; Binder, Jeffrey R; Cendes, Fernando

    2016-01-29

    Language tasks used for clinical fMRI studies may be too complex for some patients with cognitive impairments, and "easier" versions are sometimes substituted, though the effects on brain activity of such changes in task complexity are largely unknown. To investigate these differences, we compared two versions of an fMRI language comprehension protocol, with different levels of difficulty, in 24 healthy right-handed adults. The protocol contrasted an auditory word comprehension task (semantic decision) with a nonspeech control task using tone sequences (tone decision). In the "complex" version (CV), the semantic decision task required two complex semantic decisions for each word, and the tone decision task required the participant to count the number of target tones in each sequence. In the "easy" version (EV), the semantic task required only a single easier decision, and the tone task required only detection of the presence or absence of a target tone in each sequence. The protocols were adapted for a Brazilian population. Typical left hemisphere language lateralization was observed in 92% of participants for both CV and EV using the whole-brain lateralization index, and typical language lateralization was also observed for others regions of interest. Task performance was superior on the EV compared to the CV (p=0.014). There were many common areas of activation across the two version; however, the CV produced greater activation in the left superior and middle frontal giri, angular gyrus, and left posterior cingulate gyrus compared to the EV, the majority of which are areas previously identified with language and semantic processing. The EV produced stronger activation only in a small area in the posterior middle temporal gyrus. These results reveal differences between two versions of the protocol and provide evidence that both are useful for language lateralization and worked well for Brazilian population. The complex version produces stronger activation in several nodes of the semantic network and therefore is elected for participants who can perform well these tasks. Copyright © 2015 Elsevier Ltd. All rights reserved.

  20. Internet Technology on Spacecraft

    NASA Technical Reports Server (NTRS)

    Rash, James; Parise, Ron; Hogie, Keith; Criscuolo, Ed; Langston, Jim; Powers, Edward I. (Technical Monitor)

    2000-01-01

    The Operating Missions as Nodes on the Internet (OMNI) project has shown that Internet technology works in space missions through a demonstration using the UoSAT-12 spacecraft. An Internet Protocol (IP) stack was installed on the orbiting UoSAT-12 spacecraft and tests were run to demonstrate Internet connectivity and measure performance. This also forms the basis for demonstrating subsequent scenarios. This approach provides capabilities heretofore either too expensive or simply not feasible such as reconfiguration on orbit. The OMNI project recognized the need to reduce the risk perceived by mission managers and did this with a multi-phase strategy. In the initial phase, the concepts were implemented in a prototype system that includes space similar components communicating over the TDRS (space network) and the terrestrial Internet. The demonstration system includes a simulated spacecraft with sample instruments. Over 25 demonstrations have been given to mission and project managers, National Aeronautics and Space Administration (NASA), Department of Defense (DoD), contractor technologists and other decisions makers, This initial phase reached a high point with an OMNI demonstration given from a booth at the Johnson Space Center (JSC) Inspection Day 99 exhibition. The proof to mission managers is provided during this second phase with year 2000 accomplishments: testing the use of Internet technologies onboard an actual spacecraft. This was done with a series of tests performed using the UoSAT-12 spacecraft. This spacecraft was reconfigured on orbit at very low cost. The total period between concept and the first tests was only 6 months! On board software was modified to add an IP stack to support basic IP communications. Also added was support for ping, traceroute and network timing protocol (NTP) tests. These tests show that basic Internet functionality can be used onboard spacecraft. The performance of data was measured to show no degradation from current approaches. The cost to implement is much less than current approaches due to the availability of highly reliable and standard Internet tools. Use of standard Internet applications onboard reduces the risk of obsolescence inherent in custom protocols due to extremely wide use across all domains. These basic building blocks provide the framework for building onboard software to support direct user communication with payloads including payload control. Other benefits are payload to payload communication from dissimilar spacecraft, constellations of spacecraft, and reconfigurability on orbit. This work is funded through contract with the National Aeronautics and Space Administration (NASA) Goddard Space Flight Center (GSFC).

  1. Advanced communications technology satellite high burst rate link evaluation terminal communication protocol software user's guide, version 1.0

    NASA Technical Reports Server (NTRS)

    Reinhart, Richard C.

    1993-01-01

    The Communication Protocol Software was developed at the NASA Lewis Research Center to support the Advanced Communications Technology Satellite High Burst Rate Link Evaluation Terminal (ACTS HBR-LET). The HBR-LET is an experimenters terminal to communicate with the ACTS for various experiments by government, university, and industry agencies. The Communication Protocol Software is one segment of the Control and Performance Monitor (C&PM) Software system of the HBR-LET. The Communication Protocol Software allows users to control and configure the Intermediate Frequency Switch Matrix (IFSM) on board the ACTS to yield a desired path through the spacecraft payload. Besides IFSM control, the C&PM Software System is also responsible for instrument control during HBR-LET experiments, uplink power control of the HBR-LET to demonstrate power augmentation during signal fade events, and data display. The Communication Protocol Software User's Guide, Version 1.0 (NASA CR-189162) outlines the commands and procedures to install and operate the Communication Protocol Software. Configuration files used to control the IFSM, operator commands, and error recovery procedures are discussed. The Communication Protocol Software Maintenance Manual, Version 1.0 (NASA CR-189163, to be published) is a programmer's guide to the Communication Protocol Software. This manual details the current implementation of the software from a technical perspective. Included is an overview of the Communication Protocol Software, computer algorithms, format representations, and computer hardware configuration. The Communication Protocol Software Test Plan (NASA CR-189164, to be published) provides a step-by-step procedure to verify the operation of the software. Included in the Test Plan is command transmission, telemetry reception, error detection, and error recovery procedures.

  2. 76 FR 55719 - Proposed Collection; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-08

    ...-4K paper notice, an Electronic Data Interchange (EDI) version of the Form Letter ID-4K notice, or an... completed ID-4K back to the RRB, or electronically via EDI or ERS. Completion is voluntary. No changes are...-4E paper notice and the EDI and Internet equivalent versions are transmitted on a daily basis...

  3. 75 FR 53841 - Display of Official Sign; Permanent Increase in Standard Maximum Share Insurance Amount

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-09-02

    ... to replace the old version of the official sign with the revised official sign at required locations.... Additionally, a credit union must replace the old version of the official sign with the revised official sign... internet signs and deplete its stockpiles of other printed advertising materials. NCUA also believes that...

  4. The Milwaukee Inventory for Styles of Trichotillomania-Child Version (MIST-C): Initial Development and Psychometric Properties

    ERIC Educational Resources Information Center

    Flessner, Christopher A.; Woods, Douglas W.; Franklin, Martin E.; Keuthen, Nancy J.; Piacentini, John; Cashin, Susan E.; Moore, Phoebe S.

    2007-01-01

    This article describes the development and initial psychometric properties of the Milwaukee Inventory for Styles of Trichotillomania-Child Version (MIST-C), a self-report scale designed to assess styles of hair pulling in children and adolescents diagnosed with trichotillomania (TTM). Using Internet sampling procedures, the authors recruited 164…

  5. A study on Turkish adolescent's Internet use: possible predictors of Internet addiction.

    PubMed

    Ak, Serife; Koruklu, Nermin; Yılmaz, Yusuf

    2013-03-01

    The purpose of this study is to investigate the internet use of Turkish adolescents, with a (particular) focus on the risk of Internet addiction. A web-based questionnaire was completed by a total of 4,311 adolescents attending public high schools in grades 9-12, in a small-sized city in western Turkey. Ages ranged from 15 to 19 years, 54 percent were female and 46 percent male. The questionnaire included items on sociodemographic information, Internet usage, and a Turkish version of the Young's Internet Addiction Test. The data were analyzed in SPPS 15.0 program using the t test, the Mann-Whitney U test, correlation and hierarchic regression analysis. The findings show that, regardless of gender, Facebook ranked highest in the classification of students' purpose of Internet use; it was also found that females mainly used the Internet for communication, whereas males were more interested in playing online games and reading newspapers and magazines. The results of hierarchic regression analysis indicated that the significant predictors of the internet addiction were the presence of Internet access at home, gender, and family income levels.

  6. A Scenario-Based Protocol Checker for Public-Key Authentication Scheme

    NASA Astrophysics Data System (ADS)

    Saito, Takamichi

    Security protocol provides communication security for the internet. One of the important features of it is authentication with key exchange. Its correctness is a requirement of the whole of the communication security. In this paper, we introduce three attack models realized as their attack scenarios, and provide an authentication-protocol checker for applying three attack-scenarios based on the models. We also utilize it to check two popular security protocols: Secure SHell (SSH) and Secure Socket Layer/Transport Layer Security (SSL/TLS).

  7. Network Analysis with SiLK

    DTIC Science & Technology

    2015-01-06

    Carnegie Mellon University rwcut Default Display By default • sIP , sPort • dIP, dPort • protocol • packets, bytes • flags • sTime, eTime, duration...TCP/IP SOCKET IP address: 10.0.0.1 L4 protocol : TCP High-numbered ephemeral port # TCP/IP SOCKET IP address: 203.0.113.1 L4 protocol : TCP Low-numbered...Fields found to be useful in analysis: • source address, destination address • source port, destination port (Internet Control Message Protocol

  8. Voice over Internet protocol for the orthodontic practice: a sensible switch from plain old telephone service.

    PubMed

    Mupparapu, Muralidhar

    2008-03-01

    Voice over Internet protocol (VoIP) is a revolutionary new technology that is causing a stir in the telecommunications industry and threatening the existence of traditional telephone service providers. Based on a simple method of converting analog audio signals into digital data before being transmitted over the Internet, VoIP has gained immense popularity among consumers. The technology is now regarded as an alternative to traditional telephone service for the orthodontic office. When the economics are considered, it is cost-effective, especially for a busy orthodontic practice where the call volumes both in and out are always high. VoIP has the potential to reduce costs, break the barriers between local vs long-distance calling, and make life easier for the office staff. However, deploying VoIP requires a cautious and thought-out process. Users should fully understand the risks and benefits before switching from the public switched telephone network. VoIP customers and service providers are vulnerable to many of the same impersonation-based attacks by those who attempt toll fraud, and identity and information theft. In this article, VoIP is introduced to orthodontic practitioners, who might be unfamiliar with this technology. Internet protocol based private branch exchange systems that are currently marketed as open-source technologies are also reviewed. Additionally, VoIP is compared with the traditional public switched telephone network technology and evaluated for its potential applications in an orthodontic office for both increased efficiency and cost savings.

  9. Securing TCP/IP and Dial-up Access to Administrative Data.

    ERIC Educational Resources Information Center

    Conrad, L. Dean

    1992-01-01

    This article describes Arizona State University's solution to security risk inherent in general access systems such as TCP/IP (Transmission Control Protocol/INTERNET Protocol). Advantages and disadvantages of various options are compared, and the process of selecting a log-on authentication approach involving generation of a different password at…

  10. Migrating an Online Service to WAP - A Case Study.

    ERIC Educational Resources Information Center

    Klasen, Lars

    2002-01-01

    Discusses mobile access via wireless application protocol (WAP) to online services that is offered in Sweden through InfoTorg. Topics include the Swedish online market; filtering HTML data from an Internet/Web server into WML (wireless markup language); mobile phone technology; microbrowsers; WAP protocol; and future possibilities. (LRW)

  11. NASA STI Program Coordinating Council Twelfth Meeting: Standards

    NASA Technical Reports Server (NTRS)

    1994-01-01

    The theme of this NASA Scientific and Technical Information Program Coordinating Council Meeting was standards and their formation and application. Topics covered included scientific and technical information architecture, the Open Systems Interconnection Transmission Control Protocol/Internet Protocol, Machine-Readable Cataloging (MARC) open system environment procurement, and the Government Information Locator Service.

  12. Open Source Cybersecurity for the 21st Century

    DTIC Science & Technology

    2013-03-01

    would eventually develop into Transmission Control Protocol/Internet Protocol ( TCP /IP) based on the following ground rules:12  Each distinct...The internet’s design permits any device conforming to modern day protocol standards ( TCP /IP being the most prevalent) to communicate across the... factors , coupled with the internet’s global reach and low cost of entry, are what make securing the cyber domain one of the most complex challenges we

  13. Technical Assessment: Integrated Photonics

    DTIC Science & Technology

    2015-10-01

    in global internet protocol traffic as a function of time by local access technology. Photonics continues to play a critical role in enabling this...communication networks. This has enabled services like the internet , high performance computing, and power-efficient large-scale data centers. The...signal processing, quantum information science, and optics for free space applications. However major obstacles challenge the implementation of

  14. A View from the Clouds

    ERIC Educational Resources Information Center

    Chudnov, Daniel

    2010-01-01

    Cloud computing is definitely a thing now, but it's not new and it's not even novel. Back when people were first learning about the Internet in the 1990s, every diagram that one saw showing how the Internet worked had a big cloud in the middle. That cloud represented the diverse links, routers, gateways, and protocols that passed traffic around in…

  15. Global Access to Library of Congress' Digital Resources: National Digital Library and Internet Resources.

    ERIC Educational Resources Information Center

    Chen, Ching-chih

    1996-01-01

    Summarizes how the Library of Congress' digital library collections can be accessed globally via the Internet and World Wide Web. Outlines the resources found in each of the various access points: gopher, online catalog, library and legislative Web sites, legal and copyright databases, and FTP (file transfer protocol) sites. (LAM)

  16. Internet Protocol Geolocation: Development of a Delay-Based Hybrid Methodology for Locating the Geographic Location of a Network Node

    DTIC Science & Technology

    2007-03-01

    provides a means for anyone who has access to an Internet connection to collect or disseminate information on a global scale at a very low cost. The......AIR UNIVERSITY AIR FORCE INSTITUTE OF TECHNOLOGY Wright-Patterson Air Force Base, Ohio APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED

  17. Economic Incentives in Content-Centric Networking: Implications for Protocol Design and Public Policy

    ERIC Educational Resources Information Center

    Agyapong, Parick Kwadwo

    2013-01-01

    Content-centric networking (CCN) has emerged as a dominant paradigm for future Internet architecture design due to its efficient support for content dissemination, which currently dominates Internet use. This dissertation shows how economic and social welfare analysis can be used to inform the design of a CCN architecture that provides network…

  18. Internet VSMOKE: A user-oriented system for smoke management

    Treesearch

    James T. Paul; Alan Dozier; Daniel Chan

    2007-01-01

    The Georgia Forestry Commission has developed an Internet-based, user friendly version of a USDA Forest Service smoke dispersion model called “VSMOKE.” The program provides an easy to use method to quickly evaluate what areas will likely be impacted by smoke from a wild or prescribed fire. This is particularly important in assessing air quality, public safety and...

  19. A Preliminary Trial of a Prototype Internet Dissonance-Based Eating Disorder Prevention Program for Young Women with Body Image Concerns

    ERIC Educational Resources Information Center

    Stice, Eric; Rohde, Paul; Durant, Shelley; Shaw, Heather

    2012-01-01

    Objective: A group dissonance-based eating disorder prevention program, in which young women critique the thin ideal, reduces eating disorder risk factors and symptoms, but it can be difficult to identify school clinicians with the time and expertise to deliver the intervention. Thus, we developed a prototype Internet version of this program and…

  20. "Freely Ye Have Received, Freely Give" (Matthew 10: 8)--How Giving Away Religious Digital Books Influences the Print Sales of Those Books

    ERIC Educational Resources Information Center

    Hilton, John, III.

    2010-01-01

    Lack of access prevents many from benefiting from educational resources. Digital technologies now enable educational resources, such as books, to be openly available to those with access to the Internet. This study examined the financial viability of a religious publisher's putting free digital versions of eight of its books on the Internet. The…

  1. Application Transparent HTTP Over a Disruption Tolerant Smartnet

    DTIC Science & Technology

    2014-09-01

    American Standard Code for Information Interchange BP Bundle Protocol BPA bundle protocol agent CLA convergence layer adapters CPU central processing...forwarding them through the plugin pipeline. The initial version of the DTNInput plugin uses the BBN Spindle bundle protocol agent ( BPA ) implementation

  2. Neural correlate of Internet use in patients undergoing psychological treatment for Internet addiction.

    PubMed

    Lai, Carlo; Altavilla, Daniela; Mazza, Marianna; Scappaticci, Silvia; Tambelli, Renata; Aceto, Paola; Luciani, Massimiliano; Corvino, Stefano; Martinelli, David; Alimonti, Flaminia; Tonioni, Federico

    2017-06-01

    The new version of Diagnostic and Statistical Manual of Mental Disorders (DSM-5th) proposed the Internet Gaming Disorder for the diagnosis of Internet addiction (IA) considering the neurobiological evidence of the craving. The aim was to test the neural correlate in response to the Internet cue in patients with IA. Sixteen males with IA diagnosis (clinical group) and 14 healthy male (control group) were recruited for an experimental visual task composed of Internet images and emotional images. During the visual presentation of Internet cue, electroencefalographic data were recorded using Net Station 4.5.1 with a 256-channels HydroCel Geodesic Sensor Net. Event-related potential (ERP) components and low-resolution electromagnetic tomography (sLoreta) were analysed. sLoreta analyses showed that patients from the clinical group presented a higher primary somatosensorial cortex and lower paralimbic, temporal and orbito-frontal activation in response to both Internet and emotional images compared to those of the control group. These results suggest that clinically recognized pathological use of Internet could be linked to dissociative symptoms.

  3. Internet-Based Partner Services in US Sexually Transmitted Disease Prevention Programs: 2009-2013.

    PubMed

    Moody, Victoria; Hogben, Matthew; Kroeger, Karen; Johnson, James

    2015-01-01

    Social networking sites have become increasingly popular venues for meeting sex partners. Today, some sexually transmitted disease (STD) programs conduct Internet-based partner services (IPS). The purpose of the study was to explore how the Internet is being used by STD prevention programs to perform partner services. We assessed US STD prevention programs receiving funds through the 2008-2013 Comprehensive STD Prevention Systems cooperative agreement. We (1) reviewed 2009 IPS protocols in 57 funding applications against a benchmark of national guidelines and (2) surveyed persons who conducted IPS in jurisdictions conducting IPS in 2012. Of the 57 project areas receiving Comprehensive STD Prevention Systems funds, 74% provided an IPS protocol. States with IPS protocols had larger populations and more gonorrhea and syphilis cases (t = 2.2-2.6; all Ps < .05), although not higher rates of infection. Most protocols included staffing (92%) and IPS documentation (87%) requirements, but fewer had evaluation plans (29%) or social networking site engagement strategies (16%). Authority to perform a complete range of IPS activities (send e-mail, use social networking sites) was associated with contacting more partners via IPSs (P < .05). This study provides a snapshot of IPS activities in STD programs in the United States. Further research is needed to move from assessment to generating data that can assist training efforts and program action and, finally, to enable efficient IPS programs that are integrated into STD prevention and control efforts.

  4. Using Screening Level Environmental Life Cycle Assessment to Aid Decision Making: A Case Study of a College Annual Report

    ERIC Educational Resources Information Center

    Ingwersen, Wesley W.; Curran, Mary Ann; Gonzalez, Michael A.; Hawkins, Troy R.

    2012-01-01

    Purpose: The purpose of this study is to compare the life cycle environmental impacts of the University of Cincinnati College of Engineering and Applied Sciences' current printed annual report to a version distributed via the internet. Design/methodology/approach: Life cycle environmental impacts of both versions of the report are modeled using…

  5. Advances on Sensor Web for Internet of Things

    NASA Astrophysics Data System (ADS)

    Liang, S.; Bermudez, L. E.; Huang, C.; Jazayeri, M.; Khalafbeigi, T.

    2013-12-01

    'In much the same way that HTML and HTTP enabled WWW, the Open Geospatial Consortium (OGC) Sensor Web Enablement (SWE), envisioned in 2001 [1] will allow sensor webs to become a reality.'. Due to the large number of sensor manufacturers and differing accompanying protocols, integrating diverse sensors into observation systems is not a simple task. A coherent infrastructure is needed to treat sensors in an interoperable, platform-independent and uniform way. SWE standardizes web service interfaces, sensor descriptions and data encodings as building blocks for a Sensor Web. SWE standards are now mature specifications (version 2.0) with approved OGC compliance test suites and tens of independent implementations. Many earth and space science organizations and government agencies are using the SWE standards to publish and share their sensors and observations. While SWE has been demonstrated very effective for scientific sensors, its complexity and the computational overhead may not be suitable for resource-constrained tiny sensors. In June 2012, a new OGC Standards Working Group (SWG) was formed called the Sensor Web Interface for Internet of Things (SWE-IoT) SWG. This SWG focuses on developing one or more OGC standards for resource-constrained sensors and actuators (e.g., Internet of Things devices) while leveraging the existing OGC SWE standards. In the near future, billions to trillions of small sensors and actuators will be embedded in real- world objects and connected to the Internet facilitating a concept called the Internet of Things (IoT). By populating our environment with real-world sensor-based devices, the IoT is opening the door to exciting possibilities for a variety of application domains, such as environmental monitoring, transportation and logistics, urban informatics, smart cities, as well as personal and social applications. The current SWE-IoT development aims on modeling the IoT components and defining a standard web service that makes the observations captured by IoT devices easily accessible and allows users to task the actuators on the IoT devices. The SWE IoT model links things with sensors and reuses the OGC Observation and Model (O&M) to link sensors with features of interest and observed properties Unlike most SWE standards, the SWE-IoT defines a RESTful web interface for users to perform CRUD (i.e., create, read, update, and delete) functions on resources, including Things, Sensors, Actuators, Observations, Tasks, etc. Inspired by the OASIS Open Data Protocol (OData), the SWE-IoT web service provides the multi-faceted query, which means that users can query from different entity collections and link from one entity to other related entities. This presentation will introduce the latest development of the OGC SWE-IoT standards. Potential applications and implications in Earth and Space science will also be discussed. [1] Mike Botts, Sensor Web Enablement White Paper, Open GIS Consortium, Inc. 2002

  6. Internetting tactical security sensor systems

    NASA Astrophysics Data System (ADS)

    Gage, Douglas W.; Bryan, W. D.; Nguyen, Hoa G.

    1998-08-01

    The Multipurpose Surveillance and Security Mission Platform (MSSMP) is a distributed network of remote sensing packages and control stations, designed to provide a rapidly deployable, extended-range surveillance capability for a wide variety of military security operations and other tactical missions. The baseline MSSMP sensor suite consists of a pan/tilt unit with video and FLIR cameras and laser rangefinder. With an additional radio transceiver, MSSMP can also function as a gateway between existing security/surveillance sensor systems such as TASS, TRSS, and IREMBASS, and IP-based networks, to support the timely distribution of both threat detection and threat assessment information. The MSSMP system makes maximum use of Commercial Off The Shelf (COTS) components for sensing, processing, and communications, and of both established and emerging standard communications networking protocols and system integration techniques. Its use of IP-based protocols allows it to freely interoperate with the Internet -- providing geographic transparency, facilitating development, and allowing fully distributed demonstration capability -- and prepares it for integration with the IP-based tactical radio networks that will evolve in the next decade. Unfortunately, the Internet's standard Transport layer protocol, TCP, is poorly matched to the requirements of security sensors and other quasi- autonomous systems in being oriented to conveying a continuous data stream, rather than discrete messages. Also, its canonical 'socket' interface both conceals short losses of communications connectivity and simply gives up and forces the Application layer software to deal with longer losses. For MSSMP, a software applique is being developed that will run on top of User Datagram Protocol (UDP) to provide a reliable message-based Transport service. In addition, a Session layer protocol is being developed to support the effective transfer of control of multiple platforms among multiple control stations.

  7. Energy star compliant voice over internet protocol (VoIP) telecommunications network including energy star compliant VoIP devices

    DOEpatents

    Kouchri, Farrokh Mohammadzadeh

    2012-11-06

    A Voice over Internet Protocol (VoIP) communications system, a method of managing a communications network in such a system and a program product therefore. The system/network includes an ENERGY STAR (E-star) aware softswitch and E-star compliant communications devices at system endpoints. The E-star aware softswitch allows E-star compliant communications devices to enter and remain in power saving mode. The E-star aware softswitch spools messages and forwards only selected messages (e.g., calls) to the devices in power saving mode. When the E-star compliant communications devices exit power saving mode, the E-star aware softswitch forwards spooled messages.

  8. Guided, internet-based, rumination-focused cognitive behavioural therapy (i-RFCBT) versus a no-intervention control to prevent depression in high-ruminating young adults, along with an adjunct assessment of the feasibility of unguided i-RFCBT, in the REducing Stress and Preventing Depression trial (RESPOND): study protocol for a phase III randomised controlled trial.

    PubMed

    Cook, Lorna; Watkins, Edward

    2016-01-04

    Depression is a global health challenge. Prevention is highlighted as a priority to reduce its prevalence. Although effective preventive interventions exist, the efficacy and coverage can be improved. One proposed means to increase efficacy is by using interventions to target specific risk factors, such as rumination. Rumination-focused CBT (RFCBT) was developed to specifically target depressive rumination and reduces acute depressive symptoms and relapse for patients with residual depression in a randomised controlled trial. Preliminary findings from a Dutch randomised prevention trial in 251 high-risk 15- to 22-year-old subjects selected with elevated worry and rumination found that both supported internet-RFBCT and group-delivered RFCBT equally reduced depressive symptoms and the onset of depressive cases over a period of 1 year, relative to the no-intervention control. A phase III randomised controlled trial following the Medical Research Council (MRC) Complex Interventions Framework will extend a Dutch trial to the United Kingdom, with the addition of diagnostic interviews, primarily to test whether guided internet-RFCBT reduces the onset of depression relative to a no-intervention control. High-risk young adults (aged 18 to 24 years), selected with elevated worry/rumination and recruited through university and internet advertisement, will be randomised to receive either guided internet-RFCBT, supported by clinical psychologists or mental health paraprofessionals, or a no-intervention control. As an adjunct arm, participants are also randomised to unguided internet-RFCBT self-help to provide an initial test of the feasibility and effect size of this intervention. While participants are also randomised to unguided internet-RFCBT, the trial was designed and powered as a phase III trial comparing guided internet-RFCBT versus a no-intervention control. In the comparison between these two arms, the primary outcomes are as follows: a) onset of major depressive episode over a 12-month period, assessed with a Structured Clinical Interview for Diagnosis at 3 months (post-intervention), 6 months and 15 months after randomisation. The following secondary outcomes will be recorded: the incidence of generalized anxiety disorder, symptoms of depression and anxiety, and levels of worry and rumination, measured at baseline and at the same follow-up intervals. In relation to the pilot investigation of unguided internet-RFCBT (the adjunct intervention arm), we will assess the feasibility and acceptability of the data-collection procedures, levels of attrition, effect size and acceptability of the unguided internet-RFCBT intervention. Widespread implementation is necessary for effective prevention, suggesting that the internet may be a valuable mode of delivery. Previous research suggests that guided internet-RFCBT reduces incidence rates relative to controls. We are also interested in developing and evaluating an unguided version to potentially increase the availability and reduce the costs. Current Controlled Trials ISRCTN12683436 . Date of registration: 27 October 2014.

  9. EPA Traceability Protocol for Assay and Certification of Gaseous Calibration Standards

    EPA Science Inventory

    In 1997, the U.S. Environmental Protection Agency (EPA) in Research Triangle Park, North Carolina, revised its 1993 version of its traceability protocol for the assay and certification of compressed gas and permeation-device calibration standards. The protocol allows producers o...

  10. Interoperability in the Planetary Science Archive (PSA)

    NASA Astrophysics Data System (ADS)

    Rios Diaz, C.

    2017-09-01

    The protocols and standards currently being supported by the recently released new version of the Planetary Science Archive at this time are the Planetary Data Access Protocol (PDAP), the EuroPlanet- Table Access Protocol (EPN-TAP) and Open Geospatial Consortium (OGC) standards. We explore these protocols in more detail providing scientifically useful examples of their usage within the PSA.

  11. Fingerprinting Software Defined Networks and Controllers

    DTIC Science & Technology

    2015-03-01

    24 2.5.3 Intrusion Prevention System with SDN . . . . . . . . . . . . . . . 25 2.5.4 Modular Security Services...Control Message Protocol IDS Intrusion Detection System IPS Intrusion Prevention System ISP Internet Service Provider LLDP Link Layer Discovery Protocol...layer functions (e.g., web proxies, firewalls, intrusion detection/prevention, load balancers, etc.). The increase in switch capabilities combined

  12. Improving Internet Archive Service through Proxy Cache.

    ERIC Educational Resources Information Center

    Yu, Hsiang-Fu; Chen, Yi-Ming; Wang, Shih-Yong; Tseng, Li-Ming

    2003-01-01

    Discusses file transfer protocol (FTP) servers for downloading archives (files with particular file extensions), and the change to HTTP (Hypertext transfer protocol) with increased Web use. Topics include the Archie server; proxy cache servers; and how to improve the hit rate of archives by a combination of caching and better searching mechanisms.…

  13. On the Nets. Comparing Web Browsers: Mosaic, Cello, Netscape, WinWeb and InternetWorks Life.

    ERIC Educational Resources Information Center

    Notess, Greg R.

    1995-01-01

    World Wide Web browsers are compared by speed, setup, hypertext transport protocol (HTTP) handling, management of file transfer protocol (FTP), telnet, gopher, and wide area information server (WAIS); bookmark options; and communication functions. Netscape has the most features, the fastest retrieval, sophisticated bookmark capabilities. (JMV)

  14. ACTS 118x: High Speed TCP Interoperability Testing

    NASA Technical Reports Server (NTRS)

    Brooks, David E.; Buffinton, Craig; Beering, Dave R.; Welch, Arun; Ivancic, William D.; Zernic, Mike; Hoder, Douglas J.

    1999-01-01

    With the recent explosion of the Internet and the enormous business opportunities available to communication system providers, great interest has developed in improving the efficiency of data transfer over satellite links using the Transmission Control Protocol (TCP) of the Internet Protocol (IP) suite. The NASA's ACTS experiments program initiated a series of TCP experiments to demonstrate scalability of TCP/IP and determine to what extent the protocol can be optimized over a 622 Mbps satellite link. Through partnerships with the government technology oriented labs, computer, telecommunication, and satellite industries NASA Glenn was able to: (1) promote the development of interoperable, high-performance TCP/IP implementations across multiple computing / operating platforms; (2) work with the satellite industry to answer outstanding questions regarding the use of standard protocols (TCP/IP and ATM) for the delivery of advanced data services, and for use in spacecraft architectures; and (3) conduct a series of TCP/IP interoperability tests over OC12 ATM over a satellite network in a multi-vendor environment using ACTS. The experiments' various network configurations and the results are presented.

  15. A Key Establishment Protocol for RFID User in IPTV Environment

    NASA Astrophysics Data System (ADS)

    Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  16. Experimental Evaluation of Unicast and Multicast CoAP Group Communication

    PubMed Central

    Ishaq, Isam; Hoebeke, Jeroen; Moerman, Ingrid; Demeester, Piet

    2016-01-01

    The Internet of Things (IoT) is expanding rapidly to new domains in which embedded devices play a key role and gradually outnumber traditionally-connected devices. These devices are often constrained in their resources and are thus unable to run standard Internet protocols. The Constrained Application Protocol (CoAP) is a new alternative standard protocol that implements the same principals as the Hypertext Transfer Protocol (HTTP), but is tailored towards constrained devices. In many IoT application domains, devices need to be addressed in groups in addition to being addressable individually. Two main approaches are currently being proposed in the IoT community for CoAP-based group communication. The main difference between the two approaches lies in the underlying communication type: multicast versus unicast. In this article, we experimentally evaluate those two approaches using two wireless sensor testbeds and under different test conditions. We highlight the pros and cons of each of them and propose combining these approaches in a hybrid solution to better suit certain use case requirements. Additionally, we provide a solution for multicast-based group membership management using CoAP. PMID:27455262

  17. Connecting the Force from Space: The IRIS Joint Capability Technology Demonstration

    DTIC Science & Technology

    2010-01-01

    the Joint in Joint Capability Technology Demonstration, we have two sponsors, both U.S. Strategic Command and the Defense Information Systems...Capability Technology Demonstration will provide an excellent source of data on space-based Internet Protocol net- working. Operational... Internet Routing in Space Joint Capability Technology Demonstration Operational Manager, Space and Missile Defense Battle Lab, Colorado Springs

  18. Welcome to the Web: An Activity Booklet for Parents and Kids = Bienvenidos a Internet: Libro de actividades para padres y ninos.

    ERIC Educational Resources Information Center

    Schottman, Elly, Ed.

    Noting that children need help in learning to use wisely the computer and the Internet, this booklet, in English and Spanish versions, uses the characters from the public television program "Arthur" to suggest activities for parents to use with their children. The booklet begins with a read-aloud story about using computer games and the…

  19. TCP Performance Enhancement Over Iridium

    NASA Technical Reports Server (NTRS)

    Torgerson, Leigh; Hutcherson, Joseph; McKelvey, James

    2007-01-01

    In support of iNET maturation, NASA-JPL has collaborated with NASA-Dryden to develop, test and demonstrate an over-the-horizon vehicle-to-ground networking capability, using Iridium as the vehicle-to-ground communications link for relaying critical vehicle telemetry. To ensure reliability concerns are met, the Space Communications Protocol Standards (SCPS) transport protocol was investigated for its performance characteristics in this environment. In particular, the SCPS-TP software performance was compared to that of the standard Transmission Control Protocol (TCP) over the Internet Protocol (IP). This paper will report on the results of this work.

  20. Shuttle Payload Ground Command and Control: An Experiment Implementation Combustion Module-2 Software Development, STS-107

    NASA Technical Reports Server (NTRS)

    Carek, David Andrew

    2003-01-01

    This presentation covers the design of a command and control architecture developed by the author for the Combustion Module-2 microgravity experiment, which flew aboard the STS-107 Shuttle mission, The design was implemented to satisfy a hybrid network that utilized TCP/IP for both the onboard segment and ground segment, with an intermediary unreliable transport for the space to ground segment. With the infusion of Internet networking technologies into Space Shuttle, Space Station, and spacecraft avionics systems, comes the need for robust methodologies for ground command and control. Considerations of high bit error links, and unreliable transport over intermittent links must be considered in such systems. Internet protocols applied to these systems, coupled with the appropriate application layer protections, can provide adequate communication architectures for command and control. However, there are inherent limitations and additional complexities added by the use of Internet protocols that must be considered during the design. This presentation will discuss the rationale for the: framework and protocol algorithms developed by the author. A summary of design considerations, implantation issues, and learned lessons will be will be presented. A summary of mission results using this communications architecture will be presented. Additionally, areas of further needed investigation will be identified.

  1. Simple Automatic File Exchange (SAFE) to Support Low-Cost Spacecraft Operation via the Internet

    NASA Technical Reports Server (NTRS)

    Baker, Paul; Repaci, Max; Sames, David

    1998-01-01

    Various issues associated with Simple Automatic File Exchange (SAFE) are presented in viewgraph form. Specific topics include: 1) Packet telemetry, Internet IP networks and cost reduction; 2) Basic functions and technical features of SAFE; 3) Project goals, including low-cost satellite transmission to data centers to be distributed via an Internet; 4) Operations with a replicated file protocol; 5) File exchange operation; 6) Ground stations as gateways; 7) Lessons learned from demonstrations and tests with SAFE; and 8) Feedback and future initiatives.

  2. Demonstration and Certification of Amphibian Ecological Risk Assessment Protocol. Cost and Performance Report (Version 2)

    DTIC Science & Technology

    2009-07-01

    sediment protocol, respectively). The soil protocol evaluates impacts to adult salamanders and the sediment protocol evaluates impacts to larval tadpoles ...the sediment protocol evaluates impacts to larval tadpoles . When selecting appropriate receptors to derive ERA-based remedial goals, amphibians...Sediment tests are conducted with recently hatched tadpoles (i.e., Rana pipiens; Gosner Stages 17-20). Young tadpoles are placed in beakers

  3. Citizen Explorer. 1; An Earth Observer With New Small Satellite Technology

    NASA Technical Reports Server (NTRS)

    Allen, Zachary; Dunn, Catherine E.

    2003-01-01

    Citizen Explorer-I (CX-I), designed and built by students at Colorado Space Grant Consortium in Boulder to provide global ozone monitoring, employs a unique mission architecture and several innovative technologies during its mission. The mission design allows K-12 schools around the world to be involved as ground stations available to receive science data and telemetry from CX-I. Another important technology allows the spacecraft to be less reliant on ground operators. Spacecraft Command Language (SCL) allows mission designers to set constraints on the satellite operations. The satellite then automatically adheres to the constraints when the satellite is out of contact with Mission Operations. In addition to SCL, a low level of artificial intelligence will be supplied to the spacecraft through the use of the Automated Scheduling and Planning ENvironment (ASPEN). ASPEN is used to maintain a spacecraft schedule in order to achieve the objectives a mission operator would normally have to complete. Within the communications system of CX-I, internet of CX-I, internet protocols are the main method for communicating with the satellite. As internet protocols have not been widely used in satellite communication, CX-I provides an opportunity to study the effectiveness of using internet protocols over radio links. The Attitude Determination and Control System (ADCS) on CX-I uses a gravity gradient boom as a means of orienting the satellite's science instruments toward nadir. The boom design is unique because it is constructed of tape measure material. These new technologies' effectiveness will be tested for use on future small satellite projects within the space satellite industry.

  4. Internet-based interventions for the prevention and treatment of depression in people living in developing countries: A systematic review.

    PubMed

    Martínez, Pablo; Rojas, Graciela; Martínez, Vania; Lara, María Asunción; Pérez, J Carola

    2018-07-01

    Internet-based interventions for depression may be a valuable resource to reduce the treatment gap for those living in developing countries. However, evidence comes mainly from developed countries. This systematic review summarized the evidence on preventive or therapeutic Internet-based interventions for depression for people who reside in developing countries. CINAHL, EMBASE, PubMed, SciELO Citation Indexes, the Journal of Medical Internet Research, and the Telemedicine and e-Health journal, were searched up to June 2017, to identify feasibility or effectiveness studies of preventive or therapeutic Internet-based interventions for depression, with or without human support. Studies included subjects residing in developing countries, and were published in English or Spanish. Study protocols were included. Risk of bias and/or quality of the reporting of the studies included was assessed. Five feasibility studies, aimed at the prevention of depression, and a study protocol were included in this systematic review. Reports came mostly from the Americas (n = 4). Internet-based interventions aimed at the prevention of depression presented low levels of human support, were useful and acceptable to their users, and require further design refinements to improve their use and retention. No gray literature was searched or included in this systematic review. Searches were limited to English and Spanish languages. Internet-based interventions aimed at the prevention of depression in people who reside in developing countries are in an early phase of development, limiting the generalizability of the results. Future studies must employ persuasive designs to improve user retention, incorporating larger samples and a control group to conclusively determine feasibility. Copyright © 2018 Elsevier B.V. All rights reserved.

  5. Relationship between borderline personality symptoms and Internet addiction: The mediating effects of mental health problems.

    PubMed

    Lu, Wei-Hsin; Lee, Kun-Hua; Ko, Chih-Hung; Hsiao, Ray C; Hu, Huei-Fan; Yen, Cheng-Fang

    2017-09-01

    Aim To examine the relationship between borderline personality symptoms and Internet addiction as well as the mediating role of mental health problems between them. Methods A total of 500 college students from Taiwan were recruited and assessed for symptoms of Internet addiction using the Chen Internet Addiction Scale, borderline personality symptoms using the Taiwanese version of the Borderline Symptom List and mental health problems using four subscales from the Symptom Checklist-90-Revised Scale (interpersonal sensitivity, depression, anxiety, and hostility). Structural equation modeling (SEM) was used to test our hypothesis that borderline personality symptoms are associated with the severity of Internet addiction directly and also through the mediation of mental health problems. Results SEM analysis revealed that all paths in the hypothesized model were significant, indicating that borderline personality symptoms were directly related to the severity of Internet addiction as well as indirectly related to the severity of Internet addiction by increasing the severity of mental health problems. Conclusion Borderline personality symptoms and mental health problems should be taken into consideration when designing intervention programs for Internet addiction.

  6. NorthStar, a support tool for the design and evaluation of quality improvement interventions in healthcare.

    PubMed

    Akl, Elie A; Treweek, Shaun; Foy, Robbie; Francis, Jill; Oxman, Andrew D

    2007-06-26

    The Research-Based Education and Quality Improvement (ReBEQI) European partnership aims to establish a framework and provide practical tools for the selection, implementation, and evaluation of quality improvement (QI) interventions. We describe the development and preliminary evaluation of the software tool NorthStar, a major product of the ReBEQI project. We focused the content of NorthStar on the design and evaluation of QI interventions. A lead individual from the ReBEQI group drafted each section, and at least two other group members reviewed it. The content is based on published literature, as well as material developed by the ReBEQI group. We developed the software in both a Microsoft Windows HTML help system version and a web-based version. In a preliminary evaluation, we surveyed 33 potential users about the acceptability and perceived utility of NorthStar. NorthStar consists of 18 sections covering the design and evaluation of QI interventions. The major focus of the intervention design sections is on how to identify determinants of practice (factors affecting practice patterns), while the major focus of the intervention evaluation sections is on how to design a cluster randomised trial. The two versions of the software can be transferred by email or CD, and are available for download from the internet. The software offers easy navigation and various functions to access the content. Potential users (55% response rate) reported above-moderate levels of confidence in carrying out QI research related tasks if using NorthStar, particularly when developing a protocol for a cluster randomised trial NorthStar is an integrated, accessible, practical, and acceptable tool to assist developers and evaluators of QI interventions.

  7. NorthStar, a support tool for the design and evaluation of quality improvement interventions in healthcare

    PubMed Central

    Akl, Elie A; Treweek, Shaun; Foy, Robbie; Francis, Jill; Oxman, Andrew D

    2007-01-01

    Background The Research-Based Education and Quality Improvement (ReBEQI) European partnership aims to establish a framework and provide practical tools for the selection, implementation, and evaluation of quality improvement (QI) interventions. We describe the development and preliminary evaluation of the software tool NorthStar, a major product of the ReBEQI project. Methods We focused the content of NorthStar on the design and evaluation of QI interventions. A lead individual from the ReBEQI group drafted each section, and at least two other group members reviewed it. The content is based on published literature, as well as material developed by the ReBEQI group. We developed the software in both a Microsoft Windows HTML help system version and a web-based version. In a preliminary evaluation, we surveyed 33 potential users about the acceptability and perceived utility of NorthStar. Results NorthStar consists of 18 sections covering the design and evaluation of QI interventions. The major focus of the intervention design sections is on how to identify determinants of practice (factors affecting practice patterns), while the major focus of the intervention evaluation sections is on how to design a cluster randomised trial. The two versions of the software can be transferred by email or CD, and are available for download from the internet. The software offers easy navigation and various functions to access the content. Potential users (55% response rate) reported above-moderate levels of confidence in carrying out QI research related tasks if using NorthStar, particularly when developing a protocol for a cluster randomised trial Conclusion NorthStar is an integrated, accessible, practical, and acceptable tool to assist developers and evaluators of QI interventions. PMID:17594495

  8. Internet research: self-monitoring and judgments of attractiveness.

    PubMed

    Buchanan, T

    2000-11-01

    Two studies examined the relationship between self-monitoring and factors influencing romantic attraction to others. In Study 1, participants completed an Internet-mediated version of the Self-Monitoring Scale (Gangestad & Snyder, 1985) and indicated which of two people (one physically attractive, one with a more desirable personality) they found most attractive. Results matched previous findings (Snyder, Berscheid, & Glick, 1985), but the effect was smaller. Study 2, a paper-and-pencil replication of Study 1, examined whether the weaker effect was due to Internet mediation and found no differences in the choices made by high and low self-monitors. Results suggested that while determinants of attraction may vary for different populations, Internet research methods can tap the same phenomena as traditional laboratory studies.

  9. A systematic review of the relationship between internet use, self-harm and suicidal behaviour in young people: The good, the bad and the unknown.

    PubMed

    Marchant, Amanda; Hawton, Keith; Stewart, Ann; Montgomery, Paul; Singaravelu, Vinod; Lloyd, Keith; Purdy, Nicola; Daine, Kate; John, Ann

    2017-01-01

    Research exploring internet use and self-harm is rapidly expanding amidst concerns regarding influences of on-line activities on self-harm and suicide, especially in young people. We aimed to systematically review evidence regarding the potential influence of the internet on self-harm/suicidal behaviour in young people. We conducted a systematic review based on an electronic search for articles published between 01/01/2011 and 26/01/2015 across databases including Medline, Cochrane and PsychInfo. Articles were included if: the study examined internet use by individuals who engaged in self-harm/ suicidal behaviour, or internet use clearly related to self-harm content; reported primary empirical data; participants were aged under 25 years. New studies were combined with those identified in a previous review and subject to data extraction, quality rating and narrative synthesis. Forty-six independent studies (51 articles) of varying quality were included. Perceived influences were: positive for 11 studies (38191 participants); negative for 18 studies (119524 participants); and mixed for 17 studies (35235 participants). In contrast to previous reviews on this topic studies focused on a wide range of internet mediums: general internet use; internet addiction; online intervention/treatment; social media; dedicated self-harm websites; forums; video/image sharing and blogs. A relationship between internet use and self-harm/suicidal behaviour was particularly associated with internet addiction, high levels of internet use, and websites with self-harm or suicide content. While there are negative aspects of internet use the potential for isolation reduction, outreach and as a source of help and therapy were also identified. There is significant potential for harm from online behaviour (normalisation, triggering, competition, contagion) but also the potential to exploit its benefits (crisis support, reduction of social isolation, delivery of therapy, outreach). Young people appear to be increasingly using social media to communicate distress, particularly to peers. The focus should now be on how specific mediums' (social media, video/image sharing) might be used in therapy and recovery. Clinicians working with young people who self-harm or have mental health issues should engage in discussion about internet use. This should be a standard item during assessment. A protocol for this review was registered with the PROSPERO systematic review protocol registry: (http://www.crd.york.ac.uk/prospero/display_record.asp?ID=CRD42015019518).

  10. A new Information publishing system Based on Internet of things

    NASA Astrophysics Data System (ADS)

    Zhu, Li; Ma, Guoguang

    2018-03-01

    A new information publishing system based on Internet of things is proposed, which is composed of four level hierarchical structure, including the screen identification layer, the network transport layer, the service management layer and the publishing application layer. In the architecture, the screen identification layer has realized the internet of screens in which geographically dispersed independent screens are connected to the internet by the customized set-top boxes. The service management layer uses MQTT protocol to implement a lightweight broker-based publish/subscribe messaging mechanism in constrained environments such as internet of things to solve the bandwidth bottleneck. Meanwhile the cloud-based storage technique is used to storage and manage the promptly increasing multimedia publishing information. The paper has designed and realized a prototype SzIoScreen, and give some related test results.

  11. EPA Traceability Protocol for Assay and Certification of Gaseous Calibration Standards (EPA/600/R-12/531, May 2012)

    EPA Science Inventory

    In 1997, the U.S. Environmental Protection Agency (EPA) in Research Triangle Park, North Carolina, revised its 1993 version of its traceability protocol for the assay and certification of compressed gas and permeation-device calibration standards. The protocol allows producers of...

  12. OSI in the NASA science internet: An analysis

    NASA Technical Reports Server (NTRS)

    Nitzan, Rebecca

    1990-01-01

    The Open Systems Interconnection (OSI) protocol suite is a result of a world-wide effort to develop international standards for networking. OSI is formalized through the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). The goal of OSI is to provide interoperability between network products without relying on one particular vendor, and to do so on a multinational basis. The National Institute for Standards and Technology (NIST) has developed a Government OSI Profile (GOSIP) that specified a subset of the OSI protocols as a Federal Information Processing Standard (FIPS 146). GOSIP compatibility has been adopted as the direction for all U.S. government networks. OSI is extremely diverse, and therefore adherence to a profile will facilitate interoperability within OSI networks. All major computer vendors have indicated current or future support of GOSIP-compliant OSI protocols in their products. The NASA Science Internet (NSI) is an operational network, serving user requirements under NASA's Office of Space Science and Applications. NSI consists of the Space Physics Analysis Network (SPAN) that uses the DECnet protocols and the NASA Science Network (NSN) that uses TCP/IP protocols. The NSI Project Office is currently working on an OSI integration analysis and strategy. A long-term goal is to integrate SPAN and NSN into one unified network service, using a full OSI protocol suite, which will support the OSSA user community.

  13. The Internet for Librarians

    NASA Astrophysics Data System (ADS)

    Grothkopf, U.

    Librarianship is currently undergoing major changes. New information sources, accessible via the "network of networks", the Internet, offer opportunities which were previously unknown, but which require continuous ongoing learning. The Internet seems to be organized badly or not at all. The poor appearance might lead to an underestimation of its value. In the following, an introduction to the main functions will be given in order to facilitate understanding and use of the Internet. E-Mail, FTP (File Transfer Protocol) and Telnet will be covered, as well as Mailing lists, Newsgroups and the tools Archie, Gopher, Veronica, WAIS (Wide Area Information Server) and the World Wide Web (WWW). Examples will be given to show possible applications for library services.

  14. OSI and TCP/IP

    NASA Technical Reports Server (NTRS)

    Randolph, Lynwood P.

    1994-01-01

    The Open Systems Interconnection Transmission Control Protocol/Internet Protocol (OSI TCP/IP) and the Government Open Systems Interconnection Profile (GOSIP) are compared and described in terms of Federal internetworking. The organization and functions of the Federal Internetworking Requirements Panel (FIRP) are discussed and the panel's conclusions and recommendations with respect to the standards and implementation of the National Information Infrastructure (NII) are presented.

  15. Ship-Shore Packet Switched Communications System.

    DTIC Science & Technology

    1986-06-01

    PERFORMING ORGANIZATION 6b OFFICE SYMBOL 7a. NAME OF MONITORING ORGANIZATION (If applicable ) Naval Postgraduate School 54 Naval Postgraduate School 6c...OFFICE SYMBOL 9 PROCUREMENT INSTRUMENT IDENTIFICATION NUMBER ORGANIZATION (If applicable ) 8c ADDRESS (City, State, and ZIPCode) 10 SOURCE OF FUNDING...level acknowledgement system. 37 Network Protocol Application P re sen tation Session ____ ____ ____ ___Internet TranportProtocol Network

  16. Psychometric Properties of the Problematic Internet Use Questionnaire Short-Form (PIUQ-SF-6) in a Nationally Representative Sample of Adolescents.

    PubMed

    Demetrovics, Zsolt; Király, Orsolya; Koronczai, Beatrix; Griffiths, Mark D; Nagygyörgy, Katalin; Elekes, Zsuzsanna; Tamás, Domokos; Kun, Bernadette; Kökönyei, Gyöngyi; Urbán, Róbert

    2016-01-01

    Despite the large number of measurement tools developed to assess problematic Internet use, numerous studies use measures with only modest investigation into their psychometric properties. The goal of the present study was to validate the short (6-item) version of the Problematic Internet Use Questionnaire (PIUQ) on a nationally representative adolescent sample (n = 5,005; mean age 16.4 years, SD = 0.87) and to determine a statistically established cut-off value. Data were collected within the framework of the European School Survey Project on Alcohol and Other Drugs project. Results showed an acceptable fit of the original three-factor structure to the data. In addition, a MIMIC model was carried out to justify the need for three distinct factors. The sample was divided into users at-risk of problematic Internet use and those with no-risk using a latent profile analysis. Two latent classes were obtained with 14.4% of adolescents belonging to the at-risk group. Concurrent and convergent validity were tested by comparing the two groups across a number of variables (i.e., time spent online, academic achievement, self-esteem, depressive symptoms, and preferred online activities). Using the at-risk latent profile analysis class as the gold standard, a cut-off value of 15 (out of 30) was suggested based on sensitivity and specificity analyses. In conclusion, the brief version of the (6-item) PIUQ also appears to be an appropriate measure to differentiate between Internet users at risk of developing problematic Internet use and those not at risk. Furthermore, due to its brevity, the shortened PIUQ is advantageous to utilize within large-scale surveys assessing many different behaviors and/or constructs by reducing the overall number of survey questions, and as a consequence, likely increasing completion rates.

  17. The ROI of VoIP: Everybody Says VoIP Saves Big Bucks. But Does It?

    ERIC Educational Resources Information Center

    Villano, Matt

    2006-01-01

    Advocates of Voice over Internet Protocol (VoIP) say it saves money on long distance calls by sending them over the Internet, improves communication by eliminating the Private Branch Exchange (PBX), and offers a host of neat features such as call forwarding, e-mail accessible voicemail, and more. When it comes to measuring the dollars-and-cents…

  18. Optimising the Use of Wireless Application Protocol (WAP) Sites for Listening Activities in a Korean English as a Foreign Language (EFL) Context

    ERIC Educational Resources Information Center

    Nah, Ki Chune

    2011-01-01

    Using the Internet through a mobile phone for learning English as a foreign language (EFL) listening skills has significant potential, and language learners in South Korea hold clearly positive attitudes towards using this. However, the barriers discouraging language learners from using the Internet for EFL listening have not yet been thoroughly…

  19. Technology: Cookies, Web Profilers, Social Network Cartography, and Proxy Servers

    ERIC Educational Resources Information Center

    Van Horn, Royal

    2004-01-01

    The Internet was designed as an open system that promoted the two-way flow of information. In other words, everything that is sent has a return address called an IP or Internet Protocol address of the form: 000.11.222.33. Whenever you connect to a website, the site learns your IP address. It also learns the type of computer you are using, the…

  20. Tera-node Network Technology (Task 3) Scalable Personal Telecommunications

    DTIC Science & Technology

    2000-03-14

    Simulation results of this work may be found in http://north.east.isi.edu/spt/ audio.html. 6. Internet Research Task Force Reliable Multicast...Adaptation, 4. Multimedia Proxy Caching, 5. Experiments with the Rate Adaptation Protocol (RAP) 6. Providing leadership and innovation to the Internet ... Research Task Force (IRTF) Reliable Multicast Research Group (RMRG) 1. End-to-end Architecture for Quality-adaptive Streaming Applications over the

  1. Defense Simulation Internet: next generation information highway.

    PubMed

    Lilienthal, M G

    1995-06-01

    The Department of Defense has been engaged in the Defense Modeling and Simulation Initiative (DMSI) to provide advanced distributed simulation warfighters in geographically distributed localities. Lessons learned from the Defense Simulation Internet (DSI) concerning architecture, standards, protocols, interoperability, information sharing, and distributed data bases are equally applicable to telemedicine. Much of the vision and objectives of the DMSI are easily translated into the vision for world wide telemedicine.

  2. Multicasting in Wireless Communications (Ad-Hoc Networks): Comparison against a Tree-Based Approach

    NASA Astrophysics Data System (ADS)

    Rizos, G. E.; Vasiliadis, D. C.

    2007-12-01

    We examine on-demand multicasting in ad hoc networks. The Core Assisted Mesh Protocol (CAMP) is a well-known protocol for multicast routing in ad-hoc networks, generalizing the notion of core-based trees employed for internet multicasting into multicast meshes that have much richer connectivity than trees. On the other hand, wireless tree-based multicast routing protocols use much simpler structures for determining route paths, using only parent-child relationships. In this work, we compare the performance of the CAMP protocol against the performance of wireless tree-based multicast routing protocols, in terms of two important factors, namely packet delay and ratio of dropped packets.

  3. A Robust Open Ascending-price Multi-unit Auction Protocol against False-name Bids

    NASA Astrophysics Data System (ADS)

    Iwasaki, Atsushi; Yokoo, Makoto; Terada, Kenji

    This paper develops a new ascending-price multi-unit auction protocol that has following characteristics: (i) it has an open format, (ii) sincere bidding is an equilibrium strategy even if the marginal utilities of each agent can increase and agents can submit false-name bids. False-name bids are bids submitted under fictitious names such as multiple e-mail addresses, which can be done easily in the Internet. This is the first protocol that has these two characteristics. We show that our new protocol outperforms an existing protocol, which satisfies (ii), with respect to the social surplus and the seller's revenue.

  4. Improving management performance of P2PSIP for mobile sensing in wireless overlays.

    PubMed

    Sendín-Raña, Pablo; González-Castaño, Francisco Javier; Gómez-Cuba, Felipe; Asorey-Cacheda, Rafael; Pousada-Carballo, José María

    2013-11-08

    Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P) technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by defining an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT) and dSIP.

  5. Improving Management Performance of P2PSIP for Mobile Sensing in Wireless Overlays

    PubMed Central

    Sendín-Raña, Pablo; González-Castaño, Francisco Javier; Gómez-Cuba, Felipe; Asorey-Cacheda, Rafael; Pousada-Carballo, José María

    2013-01-01

    Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P) technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by defining an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT) and dSIP PMID:24217358

  6. Effects of the Voice over Internet Protocol on Perturbation Analysis of Normal and Pathological Phonation

    PubMed Central

    Zhu, Yanmei; Witt, Rachel E.; MacCallum, Julia K.; Jiang, Jack J.

    2010-01-01

    Objective In this study, a Voice over Internet Protocol (VoIP) communication based on G.729 protocol was simulated to determine the effects of this system on acoustic perturbation parameters of normal and pathological voice signals. Patients and Methods: Fifty recordings of normal voice and 48 recordings of pathological voice affected by laryngeal paralysis were transmitted through a VoIP communication system. The acoustic analysis programs of CSpeech and MDVP were used to determine the percent jitter and percent shimmer from the voice samples before and after VoIP transmission. The effects of three frequently used audio compression protocols (MP3, WMA, and FLAC) on the perturbation measures were also studied. Results It was found that VoIP transmission disrupts the waveform and increases the percent jitter and percent shimmer of voice samples. However, after VoIP transmission, significant discrimination between normal and pathological voices affected by laryngeal paralysis was still possible. It was found that the lossless compression method FLAC does not exert any influence on the perturbation measures. The lossy compression methods MP3 and WMA increase percent jitter and percent shimmer values. Conclusion This study validates the feasibility of these transmission and compression protocols in developing remote voice signal data collection and assessment systems. PMID:20588051

  7. Test Review: Test of English as a Foreign Language[TM]--Internet-Based Test (TOEFL iBT[R])

    ERIC Educational Resources Information Center

    Alderson, J. Charles

    2009-01-01

    In this article, the author reviews the TOEFL iBT which is the latest version of the TOEFL, whose history stretches back to 1961. The TOEFL iBT was introduced in the USA, Canada, France, Germany and Italy in late 2005. Currently the TOEFL test is offered in two testing formats: (1) Internet-based testing (iBT); and (2) paper-based testing (PBT).…

  8. Guide for Regional Integrated Assessments: Handbook of Methods and Procedures, Version 5.1. Appendix 1

    NASA Technical Reports Server (NTRS)

    Rosenzweig, Cynthia E.; Jones, James W.; Hatfield, Jerry; Antle, John; Ruane, Alex; Boote, Ken; Thorburn, Peter; Valdivia, Roberto; Porter, Cheryl; Janssen, Sander; hide

    2015-01-01

    The purpose of this handbook is to describe recommended methods for a trans-disciplinary, systems-based approach for regional-scale (local to national scale) integrated assessment of agricultural systems under future climate, bio-physical and socio-economic conditions. An earlier version of this Handbook was developed and used by several AgMIP Regional Research Teams (RRTs) in Sub-Saharan Africa (SSA) and South Asia (SA)(AgMIP handbook version 4.2, www.agmip.org/regional-integrated-assessments-handbook/). In contrast to the earlier version, which was written specifically to guide a consistent set of integrated assessments across SSA and SA, this version is intended to be more generic such that the methods can be applied to any region globally. These assessments are the regional manifestation of research activities described by AgMIP in its online protocols document (available at www.agmip.org). AgMIP Protocols were created to guide climate, crop modeling, economics, and information technology components of its projects.

  9. Developing a Web-Based Version of An Exercise-Based Rehabilitation Program for People With Chronic Knee and Hip Pain: A Mixed Methods Study

    PubMed Central

    2016-01-01

    Background Osteoarthritis is highly prevalent and has enormous personal and socioeconomic impact. Enabling Self-management and Coping with Arthritic Pain through Exercise (ESCAPE-pain) is an integrated rehabilitation program that helps people understand how exercise can improve physical and psychosocial well-being. Unfortunately, its availability is limited. A Web-based version of the program could increase access for more people. Many Web-based resources are developed without end-user input and result in over-complex, unwanted, ineffective products with limited uptake. Objective The objective of this study was to codesign a Web-based version of ESCAPE-pain that people with chronic joint pain find engaging, informative, and useful. Methods To establish older persons' Internet use we conducted a postal survey of 200 people. To establish their opinions, likes or dislikes, and requirements for a Web-based version of the ESCAPE-pain program, we conducted two focus groups with 11 people who had participated in a program based on ESCAPE-pain and two with 13 people who had not. Information from the postal survey and focus groups was used to develop an online prototype website. People's opinions of the prototype website were gauged from thematic analysis of eight semistructured “think aloud” interviews. Results The survey response rate was 42% (83/200), of whom 67% (56/83) were female and mean age was 67 years. Eighty-three percent of the people had used the Internet, 69% described themselves as either very confident or confident Internet users, and 77% had looked online for health information. With regard to participating online, 34% had read a commentary or watched a video of someone else’s experience of a health problem and 23% had tracked a health issue. Key qualitative themes emerged that included engagement, acceptability and usability, and structure and content of the program. Conclusions Older people use the Internet as a source of health information but have concerns about safe use and quality of information. Users require a credible website that provides personalized information, support, monitoring, and feedback. PMID:27197702

  10. IPv6 Addressing Proxy: Mapping Native Addressing from Legacy Technologies and Devices to the Internet of Things (IPv6)

    PubMed Central

    Jara, Antonio J.; Moreno-Sanchez, Pedro; Skarmeta, Antonio F.; Varakliotis, Socrates; Kirstein, Peter

    2013-01-01

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB), Controller Area Network (CAN) and radio frequency ID (RFID) from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6. PMID:23686145

  11. IPv6 addressing proxy: mapping native addressing from legacy technologies and devices to the Internet of Things (IPv6).

    PubMed

    Jara, Antonio J; Moreno-Sanchez, Pedro; Skarmeta, Antonio F; Varakliotis, Socrates; Kirstein, Peter

    2013-05-17

    Sensors utilize a large number of heterogeneous technologies for a varied set of application environments. The sheer number of devices involved requires that this Internet be the Future Internet, with a core network based on IPv6 and a higher scalability in order to be able to address all the devices, sensors and things located around us. This capability to connect through IPv6 devices, sensors and things is what is defining the so-called Internet of Things (IoT). IPv6 provides addressing space to reach this ubiquitous set of sensors, but legacy technologies, such as X10, European Installation Bus (EIB), Controller Area Network (CAN) and radio frequency ID (RFID) from the industrial, home automation and logistic application areas, do not support the IPv6 protocol. For that reason, a technique must be devised to map the sensor and identification technologies to IPv6, thus allowing homogeneous access via IPv6 features in the context of the IoT. This paper proposes a mapping between the native addressing of each technology and an IPv6 address following a set of rules that are discussed and proposed in this work. Specifically, the paper presents a technology-dependent IPv6 addressing proxy, which maps each device to the different subnetworks built under the IPv6 prefix addresses provided by the internet service provider for each home, building or user. The IPv6 addressing proxy offers a common addressing environment based on IPv6 for all the devices, regardless of the device technology. Thereby, this offers a scalable and homogeneous solution to interact with devices that do not support IPv6 addressing. The IPv6 addressing proxy has been implemented in a multi-protocol Sensors 2013, 13 6688 card and evaluated successfully its performance, scalability and interoperability through a protocol built over IPv6.

  12. Therapeutic benefit of internet-based lifestyle counselling for hypertension.

    PubMed

    Nolan, Robert P; Liu, Sam; Shoemaker, J Kevin; Hachinski, Vladimir; Lynn, Hazel; Mikulis, David J; Wennberg, Richard A; Moy Lum-Kwong, Margaret; Zbib, Ahmad

    2012-05-01

    Preventive electronic (e)-counselling has been shown to reduce cardiovascular risk factors. However, heterogeneity in outcomes is commonly reported due to differences in e-protocols. We incorporated key features of an established behavioural therapy, motivational interviewing, to help standardize e-counselling in order to reduce blood pressure in patients with hypertension. Subjects (n = 387, mean age = 56 years, 59% female, 72% taking ≥ 1 antihypertensive drug) were diagnosed with stage 1 or 2 hypertension. Subjects were randomized to a 4-month protocol of e-counselling (beta version of the "Blood Pressure Action Plan", Heart and Stroke Foundation of Canada) vs waitlist control (general e-information on heart-healthy living). Outcomes were systolic, diastolic, and pulse pressures, and total lipoprotein cholesterol after treatment. Intention to treat analysis did not find a significant group difference in outcomes due to contamination across the 2 arms of this trial. However, per protocol analysis indicated that subjects receiving ≥ 8 e-counselling messages (a priori therapeutic dose) vs 0 e-counselling messages (control) demonstrated greater reduction in systolic blood pressure (mean, -8.9 mm Hg; 95% confidence interval [CI], -11.5 to -6.4 vs -5.0 mm Hg; 95% CI, -6.7 to -3.3, P = 0.03), pulse pressure (-6.1 mm Hg; 95% CI, -8.1 to -4.1 vs -3.1 mm Hg; 95% CI, -4.3 to -1.8, P = 0.02) and total cholesterol (-0.24 mmol/L; 95% CI, -0.43 to -0.06 vs 0.05 mmol/L; 95% CI, -0.06 to 0.16, P = 0.03), but not diastolic blood pressure. These findings support the merit of evaluating whether e-counselling can improve blood pressure control and reduce cardiovascular risk over the long-term. Copyright © 2012 Canadian Cardiovascular Society. Published by Elsevier Inc. All rights reserved.

  13. The Jade File System. Ph.D. Thesis

    NASA Technical Reports Server (NTRS)

    Rao, Herman Chung-Hwa

    1991-01-01

    File systems have long been the most important and most widely used form of shared permanent storage. File systems in traditional time-sharing systems, such as Unix, support a coherent sharing model for multiple users. Distributed file systems implement this sharing model in local area networks. However, most distributed file systems fail to scale from local area networks to an internet. Four characteristics of scalability were recognized: size, wide area, autonomy, and heterogeneity. Owing to size and wide area, techniques such as broadcasting, central control, and central resources, which are widely adopted by local area network file systems, are not adequate for an internet file system. An internet file system must also support the notion of autonomy because an internet is made up by a collection of independent organizations. Finally, heterogeneity is the nature of an internet file system, not only because of its size, but also because of the autonomy of the organizations in an internet. The Jade File System, which provides a uniform way to name and access files in the internet environment, is presented. Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Because of autonomy, Jade is designed under the restriction that the underlying file systems may not be modified. In order to avoid the complexity of maintaining an internet-wide, global name space, Jade permits each user to define a private name space. In Jade's design, we pay careful attention to avoiding unnecessary network messages between clients and file servers in order to achieve acceptable performance. Jade's name space supports two novel features: (1) it allows multiple file systems to be mounted under one direction; and (2) it permits one logical name space to mount other logical name spaces. A prototype of Jade was implemented to examine and validate its design. The prototype consists of interfaces to the Unix File System, the Sun Network File System, and the File Transfer Protocol.

  14. Using the Internet for Surveys and Health Research

    PubMed Central

    Eysenbach, Gunther; Wyatt, Jeremy

    2002-01-01

    This paper concerns the use of the Internet in the research process, from identifying research issues through qualitative research, through using the Web for surveys and clinical trials, to pre-publishing and publishing research results. Material published on the Internet may be a valuable resource for researchers desiring to understand people and the social and cultural contexts within which they live outside of experimental settings, with due emphasis on the interpretations, experiences, and views of `real world' people. Reviews of information posted by consumers on the Internet may help to identify health beliefs, common topics, motives, information, and emotional needs of patients, and point to areas where research is needed. The Internet can further be used for survey research. Internet-based surveys may be conducted by means of interactive interviews or by questionnaires designed for self-completion. Electronic one-to-one interviews can be conducted via e-mail or using chat rooms. Questionnaires can be administered by e-mail (e.g. using mailing lists), by posting to newsgroups, and on the Web using fill-in forms. In "open" web-based surveys, selection bias occurs due to the non-representative nature of the Internet population, and (more importantly) through self-selection of participants, i.e. the non-representative nature of respondents, also called the `volunteer effect'. A synopsis of important techniques and tips for implementing Web-based surveys is given. Ethical issues involved in any type of online research are discussed. Internet addresses for finding methods and protocols are provided. The Web is also being used to assist in the identification and conduction of clinical trials. For example, the web can be used by researchers doing a systematic review who are looking for unpublished trials. Finally, the web is used for two distinct types of electronic publication. Type 1 publication is unrefereed publication of protocols or work in progress (a `post-publication' peer review process may take place), whereas Type 2 publication is peer-reviewed and will ordinarily take place in online journals. PMID:12554560

  15. ISS and STS Commercial Off-the-Shelf Router Testing

    NASA Technical Reports Server (NTRS)

    Ivancie, William D.; Bell, Terry L.; Shell, Dan

    2002-01-01

    This report documents the results of testing performed with commercial off-the-shelf (COTS) routers and Internet Protocols (IPs) to determine if COTS equipment and IP could be utilized to upgrade NASA's current Space Transportation System (STS), the Shuttle, and the International Space Station communication infrastructure. Testing was performed by NASA Glenn Research Center (GRC) personnel within the Electronic Systems Test Laboratory (ESTE) with cooperation from the Mission Operations Directorate (MOD) Qualification and Utilization of Electronic System Technology (QUEST) personnel. The ESTE testing occurred between November 1 and 9, 2000. Additional testing was performed at NASA Glenn Research Center in a laboratory environment with equipment configured to emulate the STS. This report documents those tests and includes detailed test procedures, equipment interface requirements, test configurations and test results. The tests showed that a COTS router and standard Transmission Control Protocols and Internet Protocols (TCP/IP) could be used for both the Shuttle and the Space Station if near-error-free radio links are provided.

  16. Turkish version of the modified Constant-Murley score and standardized test protocol: reliability and validity.

    PubMed

    Çelik, Derya

    2016-01-01

    The Constant-Murley score (CMS) is widely used to evaluate disabilities associated with shoulder injuries, but it has been criticized for relying on imprecise terminology and a lack of standardized methodology. A modified guideline, therefore, was published in 2008 with several recommendations. This new version has not yet been translated or culturally adapted for Turkish-speaking populations. The purpose of this study was to translate and cross-culturally adapt the modified CMS and its test protocol, as well as define and measure its reliability and validity. The modified CMS was translated into Turkish, consistent with published methodological guidelines. The measurement properties of the Turkish version of the modified CMS were tested in 30 patients (12 males, 18 females; mean age: 59.5±13.5 years) with a variety of shoulder pathologies. Intraclass correlation coefficients (ICC) were used to estimate test-retest reliability. Construct validity was analyzed with the Turkish version of the American Shoulder and Elbow Surgeons (ASES) Standardized Shoulder Assessment Form and Short-Form Health Survey (SF-12). No difficulties were found in the translation process. The Turkish version of the modified CMS showed excellent test-retest reliability (ICC=0.86). The correlation coefficients between the Turkish version of the modified CMS and the ASES, SF-12-physical component score, and SF-12 mental component scores were found to be 0.48, 0.35, and 0.05, respectively. No floor or ceiling effects were found. The translation and cultural adaptation of the modified CMS and its standardized test protocol into Turkish were successful. The Turkish version of the modified CMS has sufficient reliability and validity to measure a variety of shoulder disorders for Turkish-speaking individuals.

  17. Investigating measurement equivalence of visual analogue scales and Likert-type scales in Internet-based personality questionnaires.

    PubMed

    Kuhlmann, Tim; Dantlgraber, Michael; Reips, Ulf-Dietrich

    2017-12-01

    Visual analogue scales (VASs) have shown superior measurement qualities in comparison to traditional Likert-type response scales in previous studies. The present study expands the comparison of response scales to properties of Internet-based personality scales in a within-subjects design. A sample of 879 participants filled out an online questionnaire measuring Conscientiousness, Excitement Seeking, and Narcissism. The questionnaire contained all instruments in both answer scale versions in a counterbalanced design. Results show comparable reliabilities, means, and SDs for the VAS versions of the original scales, in comparison to Likert-type scales. To assess the validity of the measurements, age and gender were used as criteria, because all three constructs have shown non-zero correlations with age and gender in previous research. Both response scales showed a high overlap and the proposed relationships with age and gender. The associations were largely identical, with the exception of an increase in explained variance when predicting age from the VAS version of Excitement Seeking (B10 = 1318.95, ΔR(2) = .025). VASs showed similar properties to Likert-type response scales in most cases.

  18. Signal Waveform Detection with Statistical Automaton for Internet and Web Service Streaming

    PubMed Central

    Liu, Yiming; Huang, Nai-Lun; Zeng, Fufu; Lin, Fang-Ying

    2014-01-01

    In recent years, many approaches have been suggested for Internet and web streaming detection. In this paper, we propose an approach to signal waveform detection for Internet and web streaming, with novel statistical automatons. The system records network connections over a period of time to form a signal waveform and compute suspicious characteristics of the waveform. Network streaming according to these selected waveform features by our newly designed Aho-Corasick (AC) automatons can be classified. We developed two versions, that is, basic AC and advanced AC-histogram waveform automata, and conducted comprehensive experimentation. The results confirm that our approach is feasible and suitable for deployment. PMID:25032231

  19. Time to first compression using Medical Priority Dispatch System compression-first dispatcher-assisted cardiopulmonary resuscitation protocols.

    PubMed

    Van Vleet, Lee M; Hubble, Michael W

    2012-01-01

    Without bystander cardiopulmonary resuscitation (CPR), cardiac arrest survival decreases 7%-10% for every minute of delay until defibrillation. Dispatcher-assisted CPR (D-CPR) has been shown to increase the rates of bystander CPR and cardiac arrest survival. Other reports suggest that the most critical component of bystander CPR is chest compressions with minimal interruption. Beginning with version 11.2 of the Medical Priority Dispatch System (MPDS) protocols, instructions for mouth-to-mouth ventilation (MTMV) and pulse check were removed and a compression-first pathway was introduced to facilitate rapid delivery of compressions. Additionally, unconscious choking and third-trimester pregnancy decision-making criteria were added in versions 11.3 and 12.0, respectively. However, the effects of these changes on time to first compression (TTFC) have not been evaluated. We sought to quantify the TTFC of MPDS versions 11.2, 11.3, and 12.0 for all calls identified as cardiac arrest on call intake that did not require MTMV instruction. Audio recordings of all D-CPR events for October 2005 through May 2010 were analyzed for TTFC. Differences in TTFC across versions were compared using the Kruskal-Wallis test. A total of 778 cases received D-CPR. Of these, 259 were excluded because they met criteria for MTMV (pediatric patients, allergic reaction, etc.), were missing data, or were not initially identified as cardiac arrest. Of the remaining 519 calls, the mean TTFC was 240 seconds, with no significant variation across the MPDS versions (p = 0.08). Following the removal of instructions for pulse check and MTMV, as well as other minor changes in the MPDS protocols, we found the overall TTFC to be 240 seconds with little variation across the three versions evaluated. This represents an improvement in TTFC compared with reports of an earlier version of MPDS that included pulse checks and MTMV instructions (315 seconds). However, the MPDS TTFC does not compare favorably with reports of older, non-MPDS protocols that included pulse checks and MTMV. Efforts should continue to focus on improving this key, and modifiable, determinant of cardiac arrest survival.

  20. Internet over the VDL-2 Subnetwork: the VDL-2/IP Aviation Datalink System

    NASA Technical Reports Server (NTRS)

    Grappel, R. D.

    2000-01-01

    This report describes the design to operate the standard Internet communications protocols (IP) over the VHF aviation Data Link Mode 2 (VDL-2) subnetwork. The VDL-2/IP system specified in this report can operate transparently with the current aviation users of VDL-2 (Airline Communications and Reporting System, ACARS and Aeronautical Telecommunications Network, ATN) and proposed users (Flight Information Service via Broadcast, FIS-B). The VDL-2/IP system provides a straightforward mechanisms to utilize inexpensive, commercial off-the-shelf (COTS) communications packages developed for the Internet as part of the aviation datalink system.

  1. 76 FR 31855 - Impact Aid Programs; Corrections

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-02

    ... official version of this document is the document published in the Federal Register. Free Internet access... available free at the site. You may also access documents of the Department published in the Federal...

  2. Incorpoaration of Geosensor Networks Into Internet of Things for Environmental Monitoring

    NASA Astrophysics Data System (ADS)

    Habibi, R.; Alesheikh, A. A.

    2015-12-01

    Thanks to the recent advances of miniaturization and the falling costs for sensors and also communication technologies, Internet specially, the number of internet-connected things growth tremendously. Moreover, geosensors with capability of generating high spatial and temporal resolution data, measuring a vast diversity of environmental data and automated operations provide powerful abilities to environmental monitoring tasks. Geosensor nodes are intuitively heterogeneous in terms of the hardware capabilities and communication protocols to take part in the Internet of Things scenarios. Therefore, ensuring interoperability is an important step. With this respect, the focus of this paper is particularly on incorporation of geosensor networks into Internet of things through an architecture for monitoring real-time environmental data with use of OGC Sensor Web Enablement standards. This approach and its applicability is discussed in the context of an air pollution monitoring scenario.

  3. CTC Sentinel. Volume 2, Issue 4, April 2009. Defining the Punjabi Taliban Network

    DTIC Science & Technology

    2009-04-01

    Province (which has better educational facilities) and urban linkages where internet access and communications equipment are more readily available...calls by using Voice over Internet Protocol (VoIP) technology. sending an e-mail from Afghanistan explaining why he was fighting jihad.49 One of...ascendancy to power and collaborative approach represents to al-Qa`ida’s legitimacy. President Bush’s controversial policies and public persona

  4. Merging Theoretical Models and Therapy Approaches in the Context of Internet Gaming Disorder: A Personal Perspective.

    PubMed

    Young, Kimberly S; Brand, Matthias

    2017-01-01

    Although, it is not yet officially recognized as a clinical entity which is diagnosable, Internet Gaming Disorder (IGD) has been included in section III for further study in the DSM-5 by the American Psychiatric Association (APA, 2013). This is important because there is increasing evidence that people of all ages, in particular teens and young adults, are facing very real and sometimes very severe consequences in daily life resulting from an addictive use of online games. This article summarizes general aspects of IGD including diagnostic criteria and arguments for the classification as an addictive disorder including evidence from neurobiological studies. Based on previous theoretical considerations and empirical findings, this paper examines the use of one recently proposed model, the Interaction of Person-Affect-Cognition-Execution (I-PACE) model, for inspiring future research and for developing new treatment protocols for IGD. The I-PACE model is a theoretical framework that explains symptoms of Internet addiction by looking at interactions between predisposing factors, moderators, and mediators in combination with reduced executive functioning and diminished decision making. Finally, the paper discusses how current treatment protocols focusing on Cognitive-Behavioral Therapy for Internet addiction (CBT-IA) fit with the processes hypothesized in the I-PACE model.

  5. Merging Theoretical Models and Therapy Approaches in the Context of Internet Gaming Disorder: A Personal Perspective

    PubMed Central

    Young, Kimberly S.; Brand, Matthias

    2017-01-01

    Although, it is not yet officially recognized as a clinical entity which is diagnosable, Internet Gaming Disorder (IGD) has been included in section III for further study in the DSM-5 by the American Psychiatric Association (APA, 2013). This is important because there is increasing evidence that people of all ages, in particular teens and young adults, are facing very real and sometimes very severe consequences in daily life resulting from an addictive use of online games. This article summarizes general aspects of IGD including diagnostic criteria and arguments for the classification as an addictive disorder including evidence from neurobiological studies. Based on previous theoretical considerations and empirical findings, this paper examines the use of one recently proposed model, the Interaction of Person-Affect-Cognition-Execution (I-PACE) model, for inspiring future research and for developing new treatment protocols for IGD. The I-PACE model is a theoretical framework that explains symptoms of Internet addiction by looking at interactions between predisposing factors, moderators, and mediators in combination with reduced executive functioning and diminished decision making. Finally, the paper discusses how current treatment protocols focusing on Cognitive-Behavioral Therapy for Internet addiction (CBT-IA) fit with the processes hypothesized in the I-PACE model. PMID:29104555

  6. NSI customer service representatives and user support office: NASA Science Internet

    NASA Technical Reports Server (NTRS)

    1991-01-01

    The NASA Science Internet, (NSI) was established in 1987 to provide NASA's Offices of Space Science and Applications (OSSA) missions with transparent wide-area data connectivity to NASA's researchers, computational resources, and databases. The NSI Office at NASA/Ames Research Center has the lead responsibility for implementing a total, open networking program to serve the OSSA community. NSI is a full-service communications provider whose services include science network planning, network engineering, applications development, network operations, and network information center/user support services. NSI's mission is to provide reliable high-speed communications to the NASA science community. To this end, the NSI Office manages and operates the NASA Science Internet, a multiprotocol network currently supporting both DECnet and TCP/IP protocols. NSI utilizes state-of-the-art network technology to meet its customers' requirements. THe NASA Science Internet interconnects with other national networks including the National Science Foundation's NSFNET, the Department of Energy's ESnet, and the Department of Defense's MILNET. NSI also has international connections to Japan, Australia, New Zealand, Chile, and several European countries. NSI cooperates with other government agencies as well as academic and commercial organizations to implement networking technologies which foster interoperability, improve reliability and performance, increase security and control, and expedite migration to the OSI protocols.

  7. Treatment of nulliparous women with severe fear of childbirth via the Internet: a feasibility study.

    PubMed

    Nieminen, Katri; Andersson, Gerhard; Wijma, Barbro; Ryding, Elsa-Lena; Wijma, Klaas

    2016-01-01

    The aim of the present study was to test the feasibility of Internet interventions among nulliparous women suffering from severe fear of childbirth (FOC) by means of an Internet-delivered therapist-supported self-help program based on cognitive behavioral therapy (ICBT). Prospective, longitudinal cohort study. A feasibility study of an ICBT program for the treatment of severe FOC in pregnant women. Twenty-eight Swedish-speaking nulliparous women with severe FOC recruited via a project home page from January 2012 to December 2013. The main components of the ICBT program for the treatment of severe FOC comprised psycho-education, breathing retraining, cognitive restructuring, imaginary exposure, in vivo exposure and relapse prevention. The study participants were anonymously self-recruited over the Internet, interviewed by telephone and then enrolled. All participants were offered 8 weeks of treatment via the Internet. Participants reported their homework weekly, submitted measurements of their fear and received feedback from a therapist via a secure online contact management system. Level of FOC measured with the Wijma Delivery Expectancy/Experience Questionnaire (W-DEQ A) during screening at enrollment and weekly during the treatment (W-DEQ version A), and after the delivery (W-DEQ version B). A statistically significant (p < 0.0005) decrease of FOC [W-DEQ sum score decreased pre to post-therapy, with a large effect size (Cohen's d = 0.95)]. The results of this feasibility study suggest that ICBT has potential in the treatment of severe FOC during pregnancy in motivated nulliparous women. The results need to be confirmed by randomized controlled studies.

  8. A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography

    NASA Astrophysics Data System (ADS)

    Chen, Tien-Ho; Yeh, Hsiu-Lien; Liu, Pin-Chuan; Hsiang, Han-Chen; Shih, Wei-Kuan

    Session initiation protocol (SIP) is a technology regularly performed in Internet Telephony, and Hyper Text Transport Protocol (HTTP) as digest authentication is one of the major methods for SIP authentication mechanism. In 2005, Yang et al. pointed out that HTTP could not resist server spoofing attack and off-line guessing attack and proposed a secret authentication with Diffie-Hellman concept. In 2009, Tsai proposed a nonce based authentication protocol for SIP. In this paper, we demonstrate that their protocol could not resist the password guessing attack and insider attack. Furthermore, we propose an ECC-based authentication mechanism to solve their issues and present security analysis of our protocol to show that ours is suitable for applications with higher security requirement.

  9. Implementing Internet of Things in a military command and control environment

    NASA Astrophysics Data System (ADS)

    Raglin, Adrienne; Metu, Somiya; Russell, Stephen; Budulas, Peter

    2017-05-01

    While the term Internet of Things (IoT) has been coined relatively recently, it has deep roots in multiple other areas of research including cyber-physical systems, pervasive and ubiquitous computing, embedded systems, mobile ad-hoc networks, wireless sensor networks, cellular networks, wearable computing, cloud computing, big data analytics, and intelligent agents. As the Internet of Things, these technologies have created a landscape of diverse heterogeneous capabilities and protocols that will require adaptive controls to effect linkages and changes that are useful to end users. In the context of military applications, it will be necessary to integrate disparate IoT devices into a common platform that necessarily must interoperate with proprietary military protocols, data structures, and systems. In this environment, IoT devices and data will not be homogeneous and provenance-controlled (i.e. single vendor/source/supplier owned). This paper presents a discussion of the challenges of integrating varied IoT devices and related software in a military environment. A review of contemporary commercial IoT protocols is given and as a practical example, a middleware implementation is proffered that provides transparent interoperability through a proactive message dissemination system. The implementation is described as a framework through which military applications can integrate and utilize commercial IoT in conjunction with existing military sensor networks and command and control (C2) systems.

  10. Application of Mobile Router to Military Communications

    NASA Technical Reports Server (NTRS)

    Stewart, David H.; Ivancic, William D.; Bell, Terry L.; Kachmar, Brian A.; Shell, Dan; Leung, Kent

    2002-01-01

    Cisco Systems and NASA Glenn Research Center under a NASA Space Act Agreement have been performing joint networking research to apply Internet technologies and protocols to space-based communications. During this time, Cisco Systems developed the mobile-router which NASA and Cisco jointly tested. The early field trials of this technology have been successfully completed. The mobile-router is software code that resides in a network router. A Mobile-Router allows entire networks to roam while maintaining connectivity to the Internet. This router code is pertinent to a myriad of applications for both the government and commercial sectors. This technology will be applied to the wireless battlefield. NASA and the Department of Defense will utilize this technology for near-planetary observation and sensing spacecraft. It is the enabling technology for communication via the Internet or Intranets to aircraft. Information such as weather, air traffic control, voice and video can be easily and inexpensively transmitted to the aircraft using Internet protocols. The mobile router can be incorporated into emergency vehicles particularly ambulances and life-flight aircraft to provide real-time connectivity back to the hospital and healthcare experts. Commercial applications include entertainment services, IP telephone, and Internet connectivity for cruise ships, commercial shipping, tour busses, aircraft, and eventually cars. This paper will briefly describe the mobile router operation. An upcoming wide area network field test with application to US Coast Guard communications will be described. The paper will also highlight military and government networks that will benefit from the deployment of mobile router and the associated applications.

  11. Successful minority recruitment and adherence in physical activity Internet-based research: the WIN study.

    PubMed

    Frierson, Georita M; Morrow, James R; Vidales, Andrew

    2012-01-01

    Researchers studying physical activity often face challenges dealing with recruitment and resources, particularly when conducting longitudinal Internet-based research. Commonly raised methodological problems such as minority recruitment, participant commitment, and participant-staff involvement are addressed through a theoretically driven recruitment and adherence protocol in The Women's Exercise Injuries: Incidence and Risk Factors (WIN) Internet-based study. The objectives of this paper were to review and suggest solutions to problems of: (1) low recruitment of diverse samples, (2) low adherence, and (3) staffing needs. We recruited 1303 community-dwelling women and followed them through a multiple-phase, longitudinal, Internet-based study. Recruitment and adherence data were analyzed through descriptive methods and logistic regressions to examine participant adherence and sociodemographic factors and predictors of who entered the long-term phase of the study. We successfully retained 71.6% of the sample through 4 recruitment phases. Twenty-seven percent of the initially recruited sample was racial/ethnically diverse, 24% began the long-term phase, and 23% completed. Several strategies to enhance participant commitment were successfully used during the practice phase, providing a successful, low staff to participant ratio. Logistic regression indicated being married, being older, and having greater Internet skills were predictive of successfully entering the long-term phase of the study. Recruitment and compliance protocols were successful in meeting overall and racial/ethnic enrollment and recruitment goals. The theoretically based practice phase techniques were successful in re-engaging noncompliant participants. Strategies for minority enrollment and compliance are evaluated.

  12. Terrestrial vegetation monitoring protocol for the Mediterranean Coast Network—Cabrillo National Monument, Channel Islands National Park, and Santa Monica Mountains National Recreation Area: Standard Operating Procedures, Version 1.0

    USGS Publications Warehouse

    Tiszler, John; Rodriguez, Dirk; Lombardo, Keith; Sagar, Tarja; Aguilar, Luis; Lee, Lena; Handley, Timothy; McEachern, A. Kathryn; Harrod Starcevich, Leigh Ann; Witter, Marti; Philippi, Tom; Ostermann-Kelm, Stacey

    2016-01-01

    These Standard Operating Procedures are one part of a two-part protocol for monitoring terrestrial vegetation in the Mediterranean Coast Network. The second part of the protocol is the narrative:Tiszler, J., D. Rodriguez, K. Lombardo, T. Sagar, L. Aguilar, L. Lee, T. Handley, K. McEachern, L. Starcevich, M. Witter, T. Philippi, and S. Ostermann-Kelm. 2016. Terrestrial vegetation monitoring protocol for the Mediterranean Coast Network—Cabrillo National Monument, Channel Islands National Park, and Santa Monica Mountains National Recreation Area: Narrative, version 1.0. Natural Resource Report NPS/MEDN/NRR—2016/1296. National Park Service, Fort Collins, Colorado.National parks in the Mediterranean Inventory and Monitoring Network:Cabrillo National Monument (CABR)Channel Islands National Park (CHIS)Santa Monica Mountains National Recreation Area (SAMO)

  13. Inventing an Energy Internet: Concepts, Architectures and Protocols for Smart Energy Utilization

    ScienceCinema

    Tsoukalas, Lefteri

    2018-01-24

    In recent years, the Internet is revolutionizing information availability much like the Power Grid revolutionized energy availability a century earlier. We will explore the differences and similarities of these two critical infrastructures and identify ways for convergence which may lead to an energy internet. Pricing signals, nodal forecasting, and short-term elasticities are key concepts in smart energy flows respecting the delicate equilibrium involved in generation-demand and aiming at higher efficiencies. We will discuss how intelligent forecasting approaches operating at multiple levels (including device or nodal levels) can ameliorate the challenges of power storage. In addition to higher efficiencies, an energy internet may achieve significant reliability and security improvements and offer greater flexibility and transparency in the overall energy-environmental relation.

  14. "There Is Something We Need to Tell You…": Communicating Health-Screening Results to Older Adults via the Internet.

    PubMed

    Beukema, Sander; van Velsen, Lex; Jansen-Kosterink, Stephanie; Karreman, Joyce

    2017-09-01

    With the introduction of online health screenings, guidelines describing how to communicate about a person's health need to be adapted for a digital setting. This study aimed to uncover older adults' preferences regarding such online messages. Thirty older adults (aged 65 to 75 years) viewed four versions of the results message of a screening aimed at identifying frailty: a standard, empathic, tailored, or both empathic and tailored message. After each version, they were interviewed about what they (dis)liked about the message. They also ranked the four versions according to preference. Ranks were analyzed with a Friedman's test and a Wilcoxon's signed-rank test. There was no significant difference for message-type preference when the outcome was positive. For the prefrail or frail outcome, message-type preferences differed (χ 2  = 10.51, p = 0.02 and χ 2  = 13.56, p < 0.01, respectively). Overall, for the prefrail and frail outcome, the tailored version was appreciated most. Participants commented that the tailored version made them feel appreciated more as a person. Some found the empathic additions comforting, others found these unnecessary. When communicating the results of an online health screening to older adults via the Internet, one should primarily tailor the message toward personal characteristics. The effect of empathic elements in results messages appeared to be limited. Whether a message should be adapted depends on whether the outcome is positive or negative.

  15. Internet addiction disorder: prevalence in an Italian student population.

    PubMed

    Poli, Roberto; Agrimi, Emilia

    2012-02-01

    Internet addiction is one of the latest forms of addiction that has attracted the attention of popular media and researchers in these last few years. Several authors think Internet addiction is a separate disorder that merits inclusion in DSM-V. There is considerable controversy about this opinion. The aim of this study was to assess the prevalence of Internet addiction in a representative sample of high school students attending secondary institutions in the district of Cremona and to assess any difference concerning variables such as gender, age, place of residence and kind of school attended. The Italian version of the Internet Addiction Test (IAT) has been administered to a sample of 2533 students from different kinds of school. The survey also required social and demographic data. The majority of respondents were classified as normal users of the Internet (n = 2386, 94.19%), with 127 (5.01%) moderately addicted and 20 (0.79%) seriously addicted. Significant differences in gender and in kinds of school were found. No statistical differences were revealed in age and urban or rural conditions. Our study has confirmed the general use of the Internet among youngest people, the emergence of Internet addiction and the male preponderance of this phenomenon.

  16. High-speed network for delivery of education-on-demand

    NASA Astrophysics Data System (ADS)

    Cordero, Carlos; Harris, Dale; Hsieh, Jeff

    1996-03-01

    A project to investigate the feasibility of delivering on-demand distance education to the desktop, known as the Asynchronous Distance Education ProjecT (ADEPT), is presently being carried out. A set of Stanford engineering classes is digitized on PC, Macintosh, and UNIX platforms, and is made available on servers. Students on campus and in industry may then access class material on these servers via local and metropolitan area networks. Students can download class video and audio, encoded in QuickTimeTM and Show-Me TVTM formats, via file-transfer protocol or the World Wide Web. Alternatively, they may stream a vector-quantized version of the class directly from a server for real-time playback. Students may also download PostscriptTM and Adobe AcrobatTM versions of class notes. Off-campus students may connect to ADEPT servers via the internet, the Silicon Valley Test Track (SVTT), or the Bay-Area Gigabit Network (BAGNet). The SVTT and BAGNet are high-speed metropolitan-area networks, spanning the Bay Area, which provide IP access over asynchronous transfer mode (ATM). Student interaction is encouraged through news groups, electronic mailing lists, and an ADEPT home page. Issues related to having multiple platforms and interoperability are examined in this paper. The ramifications of providing a reliable service are discussed. System performance and the parameters that affect it are then described. Finally, future work on expanding ATM access, real-time delivery of classes, and enhanced student interaction is described.

  17. 47 CFR 9.3 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... recent information obtained by an interconnected VoIP service provider that identifies the physical...

  18. 47 CFR 9.3 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... VoIP service. An interconnected Voice over Internet protocol (VoIP) service is a service that: (1... recent information obtained by an interconnected VoIP service provider that identifies the physical...

  19. A telemedicine instrument for Internet-based home monitoring of thoracoabdominal motion in patients with respiratory diseases

    NASA Astrophysics Data System (ADS)

    da Silva Junior, Evert Pereira; Esteves, Guilherme Pompeu; Dames, Karla Kristine; Melo, Pedro Lopes de

    2011-01-01

    Changes in thoracoabdominal motion are highly prevalent in patients with chronic respiratory diseases. Home care services that use telemedicine techniques and Internet-based monitoring have the potential to improve the management of these patients. However, there is no detailed description in the literature of a system for Internet-based monitoring of patients with disturbed thoracoabdominal motion. The purpose of this work was to describe the development of a new telemedicine instrument for Internet-based home monitoring of thoracoabdominal movement. The instrument directly measures changes in the thorax and abdomen circumferences and transfers data through a transmission control protocol/Internet protocol connection. After the design details are described, the accuracy of the electronic and software processing units of the instrument is evaluated by using electronic signals simulating normal subjects and individuals with thoracoabdominal motion disorders. The results obtained during in vivo studies on normal subjects simulating thoracoabdominal motion disorders showed that this new system is able to detect a reduction in abdominal movement that is associated with abnormal thoracic breathing (p < 0.0001) and the reduction in thoracic movement during abnormal abdominal breathing (p < 0.005). Simulated asynchrony in thoracoabdominal motion was also adequately detected by the system (p < 0.0001). The experimental results obtained for patients with respiratory diseases were in close agreement with the expected values, providing evidence that this instrument can be a useful tool for the evaluation of thoracoabdominal motion. The Internet transmission tests showed that the acquisition and analysis of the thoracoabdominal motion signals can be performed remotely. The user can also receive medical recommendations. The proposed system can be used in a spectrum of telemedicine scenarios, which can reduce the costs of assistance offered to patients with respiratory diseases.

  20. A systematic review of the relationship between internet use, self-harm and suicidal behaviour in young people: The good, the bad and the unknown

    PubMed Central

    Marchant, Amanda; Hawton, Keith; Stewart, Ann; Montgomery, Paul; Singaravelu, Vinod; Lloyd, Keith; Purdy, Nicola; Daine, Kate

    2017-01-01

    Background Research exploring internet use and self-harm is rapidly expanding amidst concerns regarding influences of on-line activities on self-harm and suicide, especially in young people. We aimed to systematically review evidence regarding the potential influence of the internet on self-harm/suicidal behaviour in young people. Methods We conducted a systematic review based on an electronic search for articles published between 01/01/2011 and 26/01/2015 across databases including Medline, Cochrane and PsychInfo. Articles were included if: the study examined internet use by individuals who engaged in self-harm/ suicidal behaviour, or internet use clearly related to self-harm content; reported primary empirical data; participants were aged under 25 years. New studies were combined with those identified in a previous review and subject to data extraction, quality rating and narrative synthesis. Results Forty-six independent studies (51 articles) of varying quality were included. Perceived influences were: positive for 11 studies (38191 participants); negative for 18 studies (119524 participants); and mixed for 17 studies (35235 participants). In contrast to previous reviews on this topic studies focused on a wide range of internet mediums: general internet use; internet addiction; online intervention/treatment; social media; dedicated self-harm websites; forums; video/image sharing and blogs. A relationship between internet use and self-harm/suicidal behaviour was particularly associated with internet addiction, high levels of internet use, and websites with self-harm or suicide content. While there are negative aspects of internet use the potential for isolation reduction, outreach and as a source of help and therapy were also identified. Conclusions There is significant potential for harm from online behaviour (normalisation, triggering, competition, contagion) but also the potential to exploit its benefits (crisis support, reduction of social isolation, delivery of therapy, outreach). Young people appear to be increasingly using social media to communicate distress, particularly to peers. The focus should now be on how specific mediums’ (social media, video/image sharing) might be used in therapy and recovery. Clinicians working with young people who self-harm or have mental health issues should engage in discussion about internet use. This should be a standard item during assessment. A protocol for this review was registered with the PROSPERO systematic review protocol registry: (http://www.crd.york.ac.uk/prospero/display_record.asp?ID=CRD42015019518). PMID:28813437

  1. Quantum internet: the certifiable road ahead

    NASA Astrophysics Data System (ADS)

    Elkouss, David; Lipinska, Victoria; Goodenough, Kenneth; Rozpedek, Filip; Kalb, Norbert; van Dam, Suzanne; Le Phuc, Thinh; Murta, Glaucia; Humphreys, Peter; Taminiau, Tim; Hanson, Ronald; Wehner, Stephanie

    A future quantum internet enables quantum communication between any two points on earth in order to solve problems which are provably impossible using classical communication. The most well-known application of quantum communication is quantum key distribution, which allows two users to establish an encryption key. However, many other applications are known ranging from protocols for clock synchronization, extending the baselines of telescopes to exponential savings in communication. Due to recent technological progress, we are now on the verge of seeing the first small-scale quantum communication networks being realized. Here, we present a roadmap towards the ultimate form of a quantum internet. Specifically, we identify stages of development that are distinguished by an ever increasing amount of functionality. Each stage supports a certain class of quantum protocols and is interesting in its own right. What's more, we propose a series of simple tests to certify that an experimental implementation has achieved a certain stage. Jointly, the stages and the certification tests will allow us to track and benchmark experimental progress in the years to come. This work is supported by STW, NWO VIDI and ERC Starting Grant.

  2. Effectiveness of a fully automated internet-based smoking cessation program: a randomized controlled trial (STAMP).

    PubMed

    Nguyen Thanh, Viet; Guignard, Romain; Lancrenon, Sylvie; Bertrand, Camille; Delva, Catherine; Berlin, Ivan; Pasquereau, Anne; Arwidson, Pierre

    2018-01-23

    The internet offers an interesting alternative to face-to-face and telephone-based support for smoking cessation. This study was designed to assess the effectiveness of a personalized and automated internet-based program. French current adult smokers willing to quit within 2 weeks were recruited for a randomized controlled trial. The intervention consisted of an automated program of 45 e-mails ("e-coaching") sent over a 3-month period. The control group received a PDF version of a booklet on smoking cessation. Self-reported 7-day point prevalence smoking abstinence was measured at 6 months (primary outcome), at 3 and 12 months of follow-up (secondary outcomes). 2,478 smokers were randomized (1,242 for e-coaching, 1,236 for the booklet). Cessation rate in the intention-to-treat population was not significantly different between the two groups at 6 and 12 months, but was higher in the e-coaching group at 3 months than in the control group (27.5% vs 23.5%, p=0.02, OR=1.24, CI=[1.03-1.49]). After adjustment for baseline conditions, the effect of the intervention in the per-protocol (PP) sample was significant at 3 months (aOR=1.72 [1.31-2.28], p<0.001, N=1042) and at 6 months (aOR=1.27 [1.00-1.60], p=0.05, N=1082). GLM repeated measure analyses showed significant group by time interaction in the ITT and a significant group effect in the PP population. Analyzed intention-to-treat, e-coaching was superior to a booklet at 3 months (end of intervention) but no more superior at 6 and 12 months follow up. Among those who actually followed the program, the effectiveness is also observed 3 months after the intervention is stopped. © The Author(s) 2018. Published by Oxford University Press on behalf of the Society for Research on Nicotine and Tobacco. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  3. Intelligent device management in the selfcare marketplace.

    PubMed

    Biniaris, Christos G; Marsh, Andrew J

    2008-01-01

    Over the last ten years the Internet has emerged as a key infrastructure for service innovation, enabling IP (Internet Protocol) to become the wide area network communication protocol of choice. The natural result of this choice is that service providers and their customers are looking for ways to optimise costs by migrating existing services and applications onto IP as well. A good example is the medical industry, which is transitioning to Internet-based communications as the field of telemedicine broadens to preventative and self healthcare. However, technology is changing quickly and consumers face an array of choices to satisfy their healthcare needs with numerous devices from different vendors. Seamless healthcare device networking can play a major role in automating and safeguarding the process of collecting and transferring medical data, remote patient monitoring and reducing costs through remote equipment monitoring. In this scope, we describe an approach augmenting the Session Initiation Protocol (SIP) with healthcare services in order to form a framework for efficient collection and storage of measurements, aiming to address the issues of the lack of a standardised data interface for consumer healthcare technologies (including hardware and protocols) and the lack of a standardised format for self-collected healthcare data (including the storage medium). In this framework, measurements can be seamlessly collected and stored as XML notes located virtually anywhere, such as the user's home or mobile device. Additionally, these notes can be accessed locally or remotely by doctors and specialists. Also, we discuss how this approach supports user mobility by proxying and redirecting requests to the user's current location and how it can remove the complexity of using consumer healthcare technologies from different vendors connected to different devices and the opportunities for Independent Software Vendors to develop additional services.

  4. Privacy Analysis of the Internet Protocol

    DTIC Science & Technology

    2002-12-01

    mixing approach first proposed for e-mail by David Chaum [Cha81]. The Onion Routing system maintains a set of mixing centers called onion routers...IEEE Computer, vol. 33, no. 5, pp. 59-67, May, 2000. 5. [Cha81] Chaum , D., Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms...the Internet,” Proceedings of IEEE COMPCON, 1997. 11. [Gol99] Goldschlag, David M., Reed, Michael G., and Syverson, Paul F., “Onion Routing for

  5. Active Computer Network Defense: An Assessment

    DTIC Science & Technology

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  6. Rethinking Traffic Management: Design of Optimizable Networks

    DTIC Science & Technology

    2008-06-01

    Though this paper used optimization theory to design and analyze DaVinci , op- timization theory is one of many possible tools to enable a grounded...dynamically allocate bandwidth shares. The distributed protocols can be implemented using DaVinci : Dynamically Adaptive VIrtual Networks for a Customized...Internet. In DaVinci , each virtual network runs traffic-management protocols optimized for a traffic class, and link bandwidth is dynamically allocated

  7. Design and research on the platform of network manufacture product electronic trading

    NASA Astrophysics Data System (ADS)

    Zhou, Zude; Liu, Quan; Jiang, Xuemei

    2003-09-01

    With the rapid globalization of market and business, E-trading affects every manufacture enterprise. However, the security of network manufacturing products of transmission on Internet is very important. In this paper we discussed the protocol of fair exchange and platform for network manufacture products E-trading based on fair exchange protocol and digital watermarking techniques. The platform realized reliable and copyright protection.

  8. Mobilizing Compatriots: Russia’s Strategy, Tactics, and Influence in the Former Soviet Union

    DTIC Science & Technology

    2015-11-01

    troll army.102 Another report indicates that at one “troll factory” in St. Petersburg, employees receive over $500 a month to pose as internet users ...internet companies operating webpages within Russia must house their user data so that those data are available to Russian security services.109...social media: Pavel Durov, the CEO of VKontakte , a Russian version of Facebook, was “elbowed” out of the company and fled to the Caribbean. VKontakte

  9. Visualizing Internet routing changes.

    PubMed

    Lad, Mohit; Massey, Dan; Zhang, Lixia

    2006-01-01

    Today's Internet provides a global data delivery service to millions of end users and routing protocols play a critical role in this service. It is important to be able to identify and diagnose any problems occurring in Internet routing. However, the Internet's sheer size makes this task difficult. One cannot easily extract out the most important or relevant routing information from the large amounts of data collected from multiple routers. To tackle this problem, we have developed Link-Rank, a tool to visualize Internet routing changes at the global scale. Link-Rank weighs links in a topological graph by the number of routes carried over each link and visually captures changes in link weights in the form of a topological graph with adjustable size. Using Link-Rank, network operators can easily observe important routing changes from massive amounts of routing data, discover otherwise unnoticed routing problems, understand the impact of topological events, and infer root causes of observed routing changes.

  10. Journal searching in non-MEDLINE resources on Internet Web sites.

    PubMed

    Lingle, V A

    1997-01-01

    Internet access to the medical journal literature is absorbing the attention of all relevant parties, i.e., publishers, journal vendors, librarians, commercial providers, government agencies, and end users. Journal content on the Web sites spans the range from advertising and ordering information for the print version, to table of contents and abstracts, to downloadable full text and graphics of articles. The searching parameters for systems other than MEDLINE also differ extensively with a wide variety of features and resulting retrieval. This discussion reviews a selection of providers of medical information (particularly the journal literature) on the Internet, making a comparison of what is available on Web sites and how it can be searched.

  11. 47 CFR 52.35 - Porting Intervals.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... “telecommunications carrier” includes an interconnected Voice over Internet Protocol (VoIP) provider as that term in... ports” includes (i) Wireline-to-wireless ports; (ii) Wireless-to-wireline ports; and (iii) Ports...

  12. Quantum teleportation scheme by selecting one of multiple output ports

    NASA Astrophysics Data System (ADS)

    Ishizaka, Satoshi; Hiroshima, Tohya

    2009-04-01

    The scheme of quantum teleportation, where Bob has multiple (N) output ports and obtains the teleported state by simply selecting one of the N ports, is thoroughly studied. We consider both the deterministic version and probabilistic version of the teleportation scheme aiming to teleport an unknown state of a qubit. Moreover, we consider two cases for each version: (i) the state employed for the teleportation is fixed to a maximally entangled state and (ii) the state is also optimized as well as Alice’s measurement. We analytically determine the optimal protocols for all the four cases and show the corresponding optimal fidelity or optimal success probability. All these protocols can achieve the perfect teleportation in the asymptotic limit of N→∞ . The entanglement properties of the teleportation scheme are also discussed.

  13. Network Upgrade for the SLC: Control System Modifications

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Crane, M.; Mackenzie, R.; Sass, R.

    2011-09-09

    Current communications between the SLAC Linear Collider control system central host and the SLCmicros is built upon the SLAC developed SLCNET communication hardware and protocols. We will describe how the Internet Suite of protocols (TCP/IP) are used to replace the SLCNET protocol interface. The major communication pathways and their individual requirements are described. A proxy server is used to reduce the number of total system TCP/IP connections. The SLCmicros were upgraded to use Ethernet and TCP/IP as well as SLCNET. Design choices and implementation experiences are addressed.

  14. The covert channel over HTTP protocol

    NASA Astrophysics Data System (ADS)

    Graniszewski, Waldemar; Krupski, Jacek; Szczypiorski, Krzysztof

    2016-09-01

    The paper presents a new steganographic method - the covert channel is created over HTTP protocol header, i.e. trailer field. HTTP protocol is one of the most frequently used in the Internet. The popularity of the Web servers and network traffic from, and to them, is one of the requirements for undetectable message exchange. To study this kind of the information hiding technique an application in Javascript language based on the Node.js framework was written. The results of the experiment that was performed to send a message in the covert channel are also presented.

  15. An Evaluation Methodology for Protocol Analysis Systems

    DTIC Science & Technology

    2007-03-01

    Main Memory Requirement NS: Needham-Schroeder NSL: Needham-Schroeder-Lowe OCaml : Objective Caml POSIX: Portable Operating System...methodology is needed. A. PROTOCOL ANALYSIS FIELD As with any field, there is a specialized language used within the protocol analysis community. Figure...ProVerif requires that Objective Caml ( OCaml ) be installed on the system, OCaml version 3.09.3 was installed. C. WINDOWS CONFIGURATION OS

  16. Development and Validation of a Self-reported Questionnaire for Measuring Internet Search Dependence

    PubMed Central

    Wang, Yifan; Wu, Lingdan; Zhou, Hongli; Xu, Jiaojing; Dong, Guangheng

    2016-01-01

    Internet search has become the most common way that people deal with issues and problems in everyday life. The wide use of Internet search has largely changed the way people search for and store information. There is a growing interest in the impact of Internet search on users’ affect, cognition, and behavior. Thus, it is essential to develop a tool to measure the changes in psychological characteristics as a result of long-term use of Internet search. The aim of this study is to develop a Questionnaire on Internet Search Dependence (QISD) and test its reliability and validity. We first proposed a preliminary structure and items of the QISD based on literature review, supplemental investigations, and interviews. And then, we assessed the psychometric properties and explored the factor structure of the initial version via exploratory factor analysis (EFA). The EFA results indicated that four dimensions of the QISD were very reliable, i.e., habitual use of Internet search, withdrawal reaction, Internet search trust, and external storage under Internet search. Finally, we tested the factor solution obtained from EFA through confirmatory factor analysis (CFA). The results of CFA confirmed that the four dimensions model fits the data well. In all, this study suggests that the 12-item QISD is of high reliability and validity and can serve as a preliminary tool to measure the features of Internet search dependence. PMID:28066753

  17. Development and Validation of a Self-reported Questionnaire for Measuring Internet Search Dependence.

    PubMed

    Wang, Yifan; Wu, Lingdan; Zhou, Hongli; Xu, Jiaojing; Dong, Guangheng

    2016-01-01

    Internet search has become the most common way that people deal with issues and problems in everyday life. The wide use of Internet search has largely changed the way people search for and store information. There is a growing interest in the impact of Internet search on users' affect, cognition, and behavior. Thus, it is essential to develop a tool to measure the changes in psychological characteristics as a result of long-term use of Internet search. The aim of this study is to develop a Questionnaire on Internet Search Dependence (QISD) and test its reliability and validity. We first proposed a preliminary structure and items of the QISD based on literature review, supplemental investigations, and interviews. And then, we assessed the psychometric properties and explored the factor structure of the initial version via exploratory factor analysis (EFA). The EFA results indicated that four dimensions of the QISD were very reliable, i.e., habitual use of Internet search, withdrawal reaction, Internet search trust, and external storage under Internet search. Finally, we tested the factor solution obtained from EFA through confirmatory factor analysis (CFA). The results of CFA confirmed that the four dimensions model fits the data well. In all, this study suggests that the 12-item QISD is of high reliability and validity and can serve as a preliminary tool to measure the features of Internet search dependence.

  18. [Security aspects on the Internet].

    PubMed

    Seibel, R M; Kocher, K; Landsberg, P

    2000-04-01

    Is it possible to use the Internet as a secure media for transport of telemedicine? Which risks exist for routine use? In this article state of the art methods of security were analysed. Telemedicine in the Internet has severe risks, because patient data and hospital data of a secure Intranet can be manipulated by connecting it to the Web. Establishing of a firewall and the introduction of HPC (Health Professional Card) are minimizing the risk of un-authorized access to the hospital server. HPC allows good safety with digital signature and authentication of host and client of medical data. For secure e-mail PGP (Pretty Good Privacy) is easy to use as a standard protocol. Planning all activities exactly as well as following legal regulations are important requisites for reduction of safety risks in Internet.

  19. Securing internet by eliminating DDOS attacks

    NASA Astrophysics Data System (ADS)

    Niranchana, R.; Gayathri Devi, N.; Santhi, H.; Gayathri, P.

    2017-11-01

    The major threat caused to the authorised usage of Internet is Distributed Denial of Service attack. The mechanisms used to prevent the DDoS attacks are said to overcome the attack’s ability in spoofing the IP packets source addresses. By utilising Internet Protocol spoofing, the attackers cause a consequential load over the networks destination for policing attack packets. To overcome the IP Spoofing level on the Internet, We propose an Inter domain Packet Filter (IPF) architecture. The proposed scheme is not based on global routing information. The packets with reliable source addresses are not rejected, the IPF frame work works in such a manner. The spoofing capability of attackers is confined by IPF, and also the filter identifies the source of an attack packet by minimal number of candidate network.

  20. Inventing an Energy Internet: Concepts, Architectures and Protocols for Smart Energy Utilization

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Tsoukalas, Lefteri

    2009-04-29

    In recent years, the Internet is revolutionizing information availability much like the Power Grid revolutionized energy availability a century earlier. We will explore the differences and similarities of these two critical infrastructures and identify ways for convergence which may lead to an energy internet. Pricing signals, nodal forecasting, and short-term elasticities are key concepts in smart energy flows respecting the delicate equilibrium involved in generation-demand and aiming at higher efficiencies. We will discuss how intelligent forecasting approaches operating at multiple levels (including device or nodal levels) can ameliorate the challenges of power storage. In addition to higher efficiencies, an energymore » internet may achieve significant reliability and security improvements and offer greater flexibility and transparency in the overall energy-environmental relation.« less

Top